Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The music fingerprinting on my Android phone works in airplane mode, so it would be possible with modifications. Also, it's likely that Shazam is sending a "hash" of the audio rather than an audio stream in most cases.


Its not a hash though? Its a reverse - fourier transform system that matches the sound- similar to the filter that filters out the vuvuzelas?

https://www.dechicchis.com/assets/Joseph-DeChicchis-Music-Id...

Like having a distinctive click impulse and get the cathedral from that.


Ctrl-F in that document for 'hashing'. That step reduces the audio information to a sparse collection of key points, one for each of four frequency ranges per time segment. I would assume that everything up to that step is done on the phone and only the key points are sent to the server.


I stand corrected. Just sped-read over the abstract.


European law tends not to like "clever" workarounds. IANAL but I belive you would still be practicing illegal surveillance.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: