+0.38 FaceTime bug lets you hear audio of person you are calling before they pick up (9to5mac.com S:+0.02 )
1534 points by uptown 2589 days ago | 429 comments on HN | Mild positive Contested Editorial · v3.7 · 2026-02-28 10:35:48 0
Summary Privacy Violation & Security Threat Advocates
This article reports on a critical FaceTime privacy vulnerability enabling non-consensual audio and video eavesdropping on incoming calls before recipients can answer. The article identifies the violation, documents its scope and mechanics, and reports on Apple's commitment to remediate it, effectively advocating for recognition of this as a serious privacy and security threat (Articles 12, 3) while demonstrating journalistic free expression (Article 19).
Article Heatmap
Preamble: +0.09 — Preamble P Article 1: ND — Freedom, Equality, Brotherhood Article 1: No Data — Freedom, Equality, Brotherhood 1 Article 2: ND — Non-Discrimination Article 2: No Data — Non-Discrimination 2 Article 3: +0.30 — Life, Liberty, Security 3 Article 4: ND — No Slavery Article 4: No Data — No Slavery 4 Article 5: ND — No Torture Article 5: No Data — No Torture 5 Article 6: ND — Legal Personhood Article 6: No Data — Legal Personhood 6 Article 7: ND — Equality Before Law Article 7: No Data — Equality Before Law 7 Article 8: +0.18 — Right to Remedy 8 Article 9: ND — No Arbitrary Detention Article 9: No Data — No Arbitrary Detention 9 Article 10: ND — Fair Hearing Article 10: No Data — Fair Hearing 10 Article 11: ND — Presumption of Innocence Article 11: No Data — Presumption of Innocence 11 Article 12: +0.37 — Privacy 12 Article 13: ND — Freedom of Movement Article 13: No Data — Freedom of Movement 13 Article 14: ND — Asylum Article 14: No Data — Asylum 14 Article 15: ND — Nationality Article 15: No Data — Nationality 15 Article 16: ND — Marriage & Family Article 16: No Data — Marriage & Family 16 Article 17: ND — Property Article 17: No Data — Property 17 Article 18: ND — Freedom of Thought Article 18: No Data — Freedom of Thought 18 Article 19: +0.36 — Freedom of Expression 19 Article 20: ND — Assembly & Association Article 20: No Data — Assembly & Association 20 Article 21: ND — Political Participation Article 21: No Data — Political Participation 21 Article 22: ND — Social Security Article 22: No Data — Social Security 22 Article 23: ND — Work & Equal Pay Article 23: No Data — Work & Equal Pay 23 Article 24: ND — Rest & Leisure Article 24: No Data — Rest & Leisure 24 Article 25: ND — Standard of Living Article 25: No Data — Standard of Living 25 Article 26: ND — Education Article 26: No Data — Education 26 Article 27: ND — Cultural Participation Article 27: No Data — Cultural Participation 27 Article 28: ND — Social & International Order Article 28: No Data — Social & International Order 28 Article 29: ND — Duties to Community Article 29: No Data — Duties to Community 29 Article 30: +0.12 — No Destruction of Rights 30
Negative Neutral Positive No Data
Aggregates
Editorial Mean +0.38 Structural Mean +0.02
Weighted Mean +0.26 Unweighted Mean +0.24
Max +0.37 Article 12 Min +0.09 Preamble
Signal 6 No Data 25
Volatility 0.11 (Medium)
Negative 0 Channels E: 0.6 S: 0.4
SETL +0.37 Editorial-dominant
FW Ratio 61% 20 facts · 13 inferences
Evidence 15% coverage
3H 3M 25 ND
Theme Radar
Foundation Security Legal Privacy & Movement Personal Expression Economic & Social Cultural Order & Duties Foundation: 0.09 (1 articles) Security: 0.30 (1 articles) Legal: 0.18 (1 articles) Privacy & Movement: 0.37 (1 articles) Personal: 0.00 (0 articles) Expression: 0.36 (1 articles) Economic & Social: 0.00 (0 articles) Cultural: 0.00 (0 articles) Order & Duties: 0.12 (1 articles)
HN Discussion 20 top-level · 30 replies
0x0 2019-01-29 00:49 UTC link
That's a pretty huge flaw. Millions if not billions of people can suddenly remotely spy on almost any other ios or mac anywhere in the world, just by knowing their email address or phone number?

Perhaps Apple should simply pull the plug on the facetime servers for now.

preinheimer 2019-01-29 01:02 UTC link
As an apple user I'm concerned. I hope it doesn't turn out that Apple has known about this for weeks/months/whatever.

On the upside I have a lot of confidence that they can fix this, and that I can receive that patch in a timely fashion.

Jonnax 2019-01-29 01:08 UTC link
Security and privacy are two big parts of the marketing for the iPhone.

I'm curious how they can mitigate the reputational damage.

Edit:

It gets worse:

https://www.theverge.com/2019/1/28/18201383/apple-facetime-b...

If the recipient rejects the call by pressing the power button, it starts sending video.

NelsonMinar 2019-01-29 01:12 UTC link
I'm always curious how a bug like this ships. I mean QA & Testing should catch it, sure. But even before then. Some engineer wrote code for FaceTime that has it open the microphone before the call is accepted. And transmit the audio over the network before the call is accepted. Who did that? And why? I'm not suggesting malice but I do wonder at the lack of defensive programming.
dawnerd 2019-01-29 01:24 UTC link
While they're getting a fix ready, might be smart to just disable FaceTime if you don't rely on it.

https://www.imore.com/how-to-turn-on-off-restrict-facetime-i...

DINKDINK 2019-01-29 01:36 UTC link
I wonder if the Apple representative who said this would be "fixed later this week" realizes this allows any attacker to wiretap any iPhone user (that has the vuln)
yy77 2019-01-29 01:38 UTC link
An quick stop for the possbile privacy disaster for Apple is to stop group facetime call at once but not wait for later this week for bug fix. Could image that quite some one might already try to peek for privacy using this.
throwawaymjabba 2019-01-29 01:39 UTC link
I would like to bring up something that happened to someone I know during WhatsApp call. Person A was in US and person B in India and were audio calling through Whastapp on something work related. Person A starts hearing someone else on his side, nothing unexpected on Bs side. A started a new call and everything was fine. A said it reminded him of the crosstalk that was common during the landline days. Could it be a bug or was someone listening and forgot to turn off their mic? No idea.
kiwijamo 2019-01-29 01:44 UTC link
The other day my friend Alice (not real name) attempted a FaceTime call to Bob. To both our surprise my phone rang with a FaceTime call from Alice (and as far as we know, Bob never received the call). Holding both our phones together, Alice phone was showing a call to Bob while my phone was showing a call from Alice. A very strange fluke which makes me wonder how robust the FaceTime code is.
joeblau 2019-01-29 01:59 UTC link
I just called my friend who was already on a call talking to his brother. He could hear me and his brother but his brother and I couldn't hear each other.

I was also able to call him, have him hang up and then see his video and hear his audio. He couldn't hear me, but I could hear and see everything.

I'm turning my phone off tonight!

dannyw 2019-01-29 02:16 UTC link
If I were Apple, I would be implementing a server side migration right now:

- if someone adds their own email or phone number again to a group chat, immediately terminate the call

As far as I know, this would mitigate the vulnerability.

Alternatively, disable Group FaceTime calls altogether.

rgovostes 2019-01-29 02:50 UTC link
Fun story: I tested this bug, initiating a call from my phone and then joining it on my Mac. After I had ended the call, the Mac's camera LED stayed on, even though the FaceTime app was not showing a video preview (in fact it had no windows open). Was it transmitting? Who knows! State management seems to be a mess all over the place.
kimburgess 2019-01-29 02:53 UTC link
It may be entirely unrelated, however this is the exact sort of behaviour you would expect to see associated with providing compatibility with Australia's newly introduced AABill, or to implement GCHQ's ghost participant proposal (https://www.lawfareblog.com/principles-more-informed-excepti...).
argsv 2019-01-29 03:00 UTC link
Premature optimization, perhaps. Don’t optimize by sending audio too early (as others have suggested) and why should I be able to add my own number to the conversation if I that number is the call’s initiator? Makes no sense.
int_19h 2019-01-29 03:08 UTC link
This sort of thing is why I'd prefer devices to come with hardware killswitches for mic, video, and various radio modules.
smmnyc 2019-01-29 04:13 UTC link
Apple has disabled group FaceTime on their end. https://www.apple.com/support/systemstatus/
shiado 2019-01-29 04:22 UTC link
Perhaps their NSA PRISM code got mixed up with their user facing code? I'm not just joking, we all know Apple only pays lip service to privacy and got caught red-handed during the Snowden leaks.

VOIP is indeed listed. https://cdn.vox-cdn.com/thumbor/6r9jLyDaTuh8MlCgiL-9Uq588TQ=...

docbrown 2019-01-29 07:23 UTC link
Rumor mill: FaceTime bug was submitted to Apple on 20 January 2019 by a concerned mother after .. her 14-year-old son discovered it.

>My teen found a major security flaw in Apple’s new iOS. He can listen in to your iPhone/iPad without your approval. I have video. Submitted bug report to @AppleSupport...waiting to hear back to provide details. Scary stuff! #apple #bugreport @foxnews

[0] https://twitter.com/mgt7500/status/1087171594756083713?s=21

tammer 2019-01-29 19:43 UTC link
I encountered a bug a while back — when I would connect to a dial-out call to get onto my company’s conference service from its app, while using a pair of cheap Bluetooth headphones (I’ve upgraded since then!) the mute button didn’t work.

As in, the mute button would be clearly activated, but my audio still carried through to the call. As in, I discovered this in quite an embarrassing way.

I filed a radar but never got a real response about it. Really there appears to be a strong need at Apple to ensure QA is checking for confirmations of user interaction. As I haven’t experienced anything like this since I’m still with them but these types of problems are the very thing that would lead me to shake my deep investment in the Apple ecosystem.

danra 2019-01-29 20:09 UTC link
Apple’s bug handling is broken.

Anyone who has filed a few rdars knows it is thankless work. The amount of work you have to invest for anyone to even look at your bug is high. In the instance of this particular bug, I wouldn’t be surprised if at least part of the reason it took a week and a half to handle since it was reported was that the initial reply to the reporter was “please send us the exact steps to reproduce” and then nothing was done until the bug reporter replied back. I wouldn’t be surprised to learn there were even a few iterations of this, since I personally experienced it.

Then, your bug gets looked at. But you don’t know anything about its status. Until anything from a few days to a few months later, it gets closed as a duplicate. Of course there is no way to know in advance that the bug was already opened, and that you could save an hour of work time instead of making a minimal reproducible version of your app which reproduces the bug.

At least, that’s been my unfortunate experience.

/rant

gpm 2019-01-29 01:01 UTC link
Unless Apple decides they face significant legal exposure over the bug somehow I don't see them doing that. It would attract so much more attention that it would almost certainly not be worth it economically.

I wonder if they (executives? engineers? the company itself?) could be charged with aiding and abetting wiretapping or something now that they know it's happening and are letting their servers keep doing it.

wmf 2019-01-29 01:14 UTC link
This is a form of speculation which increases performance in the common case where the call is accepted.
akerl_ 2019-01-29 01:17 UTC link
Why would this be any more reputationally damaging than the numerous other bugs with iPhone behavior?

It’s not like iPhones have a reputation for not having bugs; it seems like every version has a passcode bypass or a DoS-via-iMessage. By some standards, this is worse (remotely triggerable, leaks audio/video), but in other cases it’s not as bad: the attacker’s Apple ID ends up in the call logs of the affected person.

Are there prior examples of any phone manufacturer being reputationally damaged by vulnerabilities like this? Heck, Samsung’s phones literally caught fire and they’re still selling phones just fine.

stcredzero 2019-01-29 01:24 UTC link
That's a pretty huge flaw. Millions if not...

Is it just me, or is such a phrase applicable to Apple far too many times in the past several years? I think their engineering is losing quality or is falling behind on what they have to cover.

ummonk 2019-01-29 01:33 UTC link
They said later this week, which seems surprisingly untimely given the severity of this bug.
Someone1234 2019-01-29 01:38 UTC link
It reminds me of this MacOS bug from last year, where simply hitting the login box over and over with no password would eventually bypass the security entirely:

https://www.theregister.co.uk/2017/11/28/root_access_bypass_...

And this other MacOS bug, also from last year, where the password hint would contain the plain text encryption password:

https://www.theregister.co.uk/2017/10/05/apple_patches_passw...

All within a month of each other.

greenleafjacob 2019-01-29 01:55 UTC link
Not sure if this was intentional but in security, Alice and Bob wre the names in hypotheticals for the attacker and unwitting victim since the RSA paper.

https://en.m.wikipedia.org/wiki/Alice_and_Bob

redblacktree 2019-01-29 02:05 UTC link
Yeah, that's bizarre. If my team were responsible for a bug like this, we'd be fixing it before we went home.
dannyw 2019-01-29 02:11 UTC link
Perhaps apppe should disable Group FaceTime calls until an update is out.
leephillips 2019-01-29 02:34 UTC link
Apple has shipped versions of its Mail program that delete email without warning¹ and versions of the Finder or OS X that delete² files. And much more. Yet their reputation is intact: the masses still believe that they put out quality software. They are truly the Teflon corporation.

¹http://discussions.apple.com/thread.jspa?messageID=12758081&...

²http://tomkarpik.com/articles/massive-data-loss-bug-in-leopa...

rgovostes 2019-01-29 02:46 UTC link
It might trigger the bug to just invite any additional participant (say, a second phone the attacker possesses), in which case blocking only inviting oneself is not sufficient.

My theory is that the server routes messages to everyone who has been invited to the call, even if they have not accepted it. One message might be "participant left," in which case if you are the last one, the call ends.

Another would be "participant joined." The bug would center around the fact that the logic for handling a "participant joined" message does not check if the call has been accepted and makes an unexpected transition to a state that it should not be in.

The "participant joined" code likely handles the case that the new participant was already present on the call. Why? Apple wants to support seamlessly transitioning your call from one device to another. That's why blocking might not be so straightforward from the server side.

argsv 2019-01-29 02:48 UTC link
is it not enough to disable FaceTime for the time being?
saagarjha 2019-01-29 02:56 UTC link
This means your camera was in use by some application. Whether that video left your device is harder to ascertain, but you can try quitting FaceTime to see if the light turns off.
notfed 2019-01-29 03:34 UTC link
iPhones already have a "mute" slider switch. When I first looked into iPhones (after years of Androids), my instant reaction upon seeing the slider switch was "Ah! FINALLY! I can feel at peace in the knowledge that software vulnerabilities are powerless to hack my camera or microphone!"

Of course, stupidly, the slider doesn't "mute" my camera or microphone, but only my speaker. For Apple to modify this slider so that it mutes my camera and microphones would require the daunting addition of two transistors. And the act of such a simple modification would put an end to the incredibly creepy, Orwellian possible reality that we all risk taking a part in every time we glance at the familiar tiny screens we have become so intimately glued to.

Apple should add those two transistors.

paxys 2019-01-29 03:52 UTC link
I'm pretty sure there are a lot of Apple engineers evaluating and testing fixes (including this one) as we speak.
paxys 2019-01-29 03:53 UTC link
If it's a client-side fix then I won't be surprised if it does take that long.
paulie_a 2019-01-29 03:56 UTC link
That just seems like a good idea anyways. FaceTime as a product just flat out seems stupid.
yalogin 2019-01-29 04:40 UTC link
Come on this is an overreaction. It’s a bug plain and simple. A bad one for sure but still Apple disabled the feature (allegedly) while they push a fix out. Shit happens.
ben174 2019-01-29 04:43 UTC link
I’m positive this will result in some hardware changes for next gen devices.
timeimp 2019-01-29 04:45 UTC link
Oh damn, they can do it just like that?

I thought FaceTime was a P2P thing... but it appears group FT requires Apple's servers?

saagarjha 2019-01-29 05:55 UTC link
> Alternatively, disable Group FaceTime calls altogether.

Apple has just done this.

_bxg1 2019-01-29 06:23 UTC link
As someone who bought an iPhone specifically for privacy reasons, I'm not really upset about this. What I'm concerned about is passive, mass-scale corporate surveillance, not a one-off bug that allows an individual with mal-intent to listen through my microphone for a few seconds and also let me know about it.
lathiat 2019-01-29 06:41 UTC link
It generally happens because you don’t follow a defined state machine. An example of how this might happen is when starting the call the microphone isn’t opened. Then you add someone else to the Group FaceTime, the event handler for they didn’t stop to consider if the call is active (just assumed it is) and now the code for that handler opens a new port to the microphone so that it can encrypt the audio stream differently for that recipient.

Super easy and not remotely malicious. It’s a failed state check.

The actual bug here might be different but that’s an easy example. But it may also effectively be the bug since all the examples mention adding yourself to the call.

blub 2019-01-29 06:53 UTC link
Something similar happened to me: I got a FaceTime call and both my phone and an iPhone nearby rang! Both contacts were known to the caller, but the AppleIDs were of course different.
yalok 2019-01-29 06:55 UTC link
Observed the same problem the other day.
yalok 2019-01-29 07:13 UTC link
My guess is that it’s an unfortunate combination of several problems:

- audio and video capture has to start going before call is actually established at signaling level, in order to minimize call establishment delay. Audio maybe going through Bluetooth, for example, and waking up Handsfree mode of BT may take 1-2 sec

- most of the group calling functionality was developed by a separate team, and group calling signaling may be loosely integrated at UI level, where, once UI triggers a switch to a group call - internally, the whole new library may kick in and get the current 1-1 call state transferred to it.

- when this “transfer” happens, the state of the first 1-1 call gets affected (at either local or remote side (due to signaling), which leads to either remote side think that the call was answered (a lack of protection in the call signaling state machine to ensure it was users UI action) or local side thinks it’s ok that remote users answers the call (in this case FT must have streamed audio even during 1-1 call establishment phase)

- lack of a check for your own phone number added to a call. This, due to having the same IDs/tokens twice in a group call, may lead to unexpected call signaling state machine switch

- lack of manual testing with focus on edge cases (like the described flow to repro the bug may not be the main flow for how users start group calls on FT)

I never worked at Apple, but I built VoIP stuff for the past 20 years.

samcday 2019-01-29 07:47 UTC link
If the mother did in fact submit a ticket a week ago, it's pretty shameful that the escalation / verification process took more than a week for a bug of this severity.
intsunny 2019-01-29 07:48 UTC link
Amazing, a status page that automatically converts to the local timezone.
npunt 2019-01-29 07:49 UTC link
Interesting twitter account. First tweet 1/1/19, few followers, mostly politics, then a major bug report (not only in discovery but in knowing how to go through the reporting process). Not saying it’s fake at all - it looks 100% legitimate - but it adds some extra bit of weirdness to this story. Quite the providence, and a really bad bug. (edited for clarity)
FuckOffNeemo 2019-01-29 08:43 UTC link
I wish you weren't right.
Editorial Channel
What the content says
+0.75
Article 12 Privacy
High Advocacy Coverage Framing
Editorial
+0.75
SETL
+0.84

This is the core provision addressed. Article identifies and reports on a direct privacy violation: unauthorized audio/video access to personal communications without consent or knowledge. Every element—bug description, reproduction steps, scope analysis—emphasizes violation of privacy rights.

+0.50
Article 3 Life, Liberty, Security
High Advocacy Coverage
Editorial
+0.50
SETL
+0.50

Article identifies and reports on a serious security vulnerability threatening personal liberty and security. It advocates for recognizing this threat and treating it with urgency.

+0.40
Article 19 Freedom of Expression
High Practice Coverage
Editorial
+0.40
SETL
+0.20

Article is itself an exercise of free expression and the right to seek, receive, and impart information. Demonstrates independent investigation and reporting on a significant technology issue.

+0.30
Article 8 Right to Remedy
Medium Advocacy Coverage
Editorial
+0.30
SETL
+0.30

Article discusses remedies and effective recourse: Apple's software fix, interim offline measures, and user mitigations, advocating for the principle of effective remedy.

+0.20
Article 30 No Destruction of Rights
Medium Advocacy
Editorial
+0.20
SETL
+0.20

Article acknowledges potential for abuse of vulnerability, advocating for awareness of misuse risk. However, providing detailed reproduction steps also enables potential abuse.

+0.15
Preamble Preamble
Medium Framing
Editorial
+0.15
SETL
+0.15

The article invokes justice and security by identifying and reporting a violation of personal privacy and security, aligning with the Preamble's commitment to dignity and justice.

ND
Article 1 Freedom, Equality, Brotherhood

Article does not address inherent dignity as a standalone principle.

ND
Article 2 Non-Discrimination

No discrimination or equal protection issues addressed.

ND
Article 4 No Slavery

No slavery or servitude issues addressed.

ND
Article 5 No Torture

No torture or cruel treatment discussed.

ND
Article 6 Legal Personhood

No issues related to recognition as a person addressed.

ND
Article 7 Equality Before Law

No equality or discrimination issues; vulnerability affects all iOS users equally.

ND
Article 9 No Arbitrary Detention

No arbitrary detention or arrest issues discussed.

ND
Article 10 Fair Hearing

No fair trial or due process issues addressed.

ND
Article 11 Presumption of Innocence

While the bug could enable criminal activity, the article does not address criminal liability principles.

ND
Article 13 Freedom of Movement

No freedom of movement or travel issues addressed.

ND
Article 14 Asylum

No asylum or refugee issues addressed.

ND
Article 15 Nationality

No nationality or state membership issues addressed.

ND
Article 16 Marriage & Family

No marriage or family rights issues addressed.

ND
Article 17 Property

No property rights issues addressed.

ND
Article 18 Freedom of Thought

No freedom of conscience, thought, or religion addressed.

ND
Article 20 Assembly & Association

No freedom of peaceful assembly or association issues addressed.

ND
Article 21 Political Participation

No political participation or democratic rights issues addressed.

ND
Article 22 Social Security

No social security or welfare provision issues addressed.

ND
Article 23 Work & Equal Pay

No work, fair wages, or labor rights issues addressed.

ND
Article 24 Rest & Leisure

No rest, leisure, or work-life balance issues addressed.

ND
Article 25 Standard of Living

While privacy violations can affect psychological well-being, article does not frame as health/welfare concern.

ND
Article 26 Education

No education or access to learning issues addressed.

ND
Article 27 Cultural Participation

No cultural or scientific participation issues addressed.

ND
Article 28 Social & International Order

While article describes failure of social/technological order, it does not address the principle itself.

ND
Article 29 Duties to Community

No discussion of duties to community or limitations on rights addressed.

Structural Channel
What the site does
+0.30
Article 19 Freedom of Expression
High Practice Coverage
Structural
+0.30
Context Modifier
ND
SETL
+0.20

Site provides free, unconditional access to article without paywall or registration, enabling the right to receive information.

0.00
Preamble Preamble
Medium Framing
Structural
0.00
Context Modifier
ND
SETL
+0.15

Platform's open publishing supports commitment to justice and information flow.

0.00
Article 3 Life, Liberty, Security
High Advocacy Coverage
Structural
0.00
Context Modifier
ND
SETL
+0.50

No structural implementation of security measures; primarily reporting.

0.00
Article 8 Right to Remedy
Medium Advocacy Coverage
Structural
0.00
Context Modifier
ND
SETL
+0.30

Article itself does not provide structural remedy; reports on remedial actions.

0.00
Article 30 No Destruction of Rights
Medium Advocacy
Structural
0.00
Context Modifier
ND
SETL
+0.20

No structural impact related to preventing abuse.

-0.20
Article 12 Privacy
High Advocacy Coverage Framing
Structural
-0.20
Context Modifier
ND
SETL
+0.84

Site uses Google AdSense tracking, which contradicts the article's privacy focus, creating structural tension between editorial advocacy and platform practice.

ND
Article 1 Freedom, Equality, Brotherhood

ND

ND
Article 2 Non-Discrimination

ND

ND
Article 4 No Slavery

ND

ND
Article 5 No Torture

ND

ND
Article 6 Legal Personhood

ND

ND
Article 7 Equality Before Law

ND

ND
Article 9 No Arbitrary Detention

ND

ND
Article 10 Fair Hearing

ND

ND
Article 11 Presumption of Innocence

ND

ND
Article 13 Freedom of Movement

ND

ND
Article 14 Asylum

ND

ND
Article 15 Nationality

ND

ND
Article 16 Marriage & Family

ND

ND
Article 17 Property

ND

ND
Article 18 Freedom of Thought

ND

ND
Article 20 Assembly & Association

ND

ND
Article 21 Political Participation

ND

ND
Article 22 Social Security

ND

ND
Article 23 Work & Equal Pay

ND

ND
Article 24 Rest & Leisure

ND

ND
Article 25 Standard of Living

ND

ND
Article 26 Education

ND

ND
Article 27 Cultural Participation

ND

ND
Article 28 Social & International Order

ND

ND
Article 29 Duties to Community

ND

Supplementary Signals
How this content communicates, beyond directional lean. Learn more
Epistemic Quality
How well-sourced and evidence-based is this content?
0.74 medium claims
Sources
0.7
Evidence
0.8
Uncertainty
0.8
Purpose
0.8
Propaganda Flags
1 manipulative rhetoric technique found
1 techniques detected
loaded language
Words like 'Major,' 'significant,' 'spreading virally' create urgency about the bug, though supported by factual content.
Emotional Tone
Emotional character: positive/negative, intensity, authority
urgent
Valence
-0.4
Arousal
0.7
Dominance
0.3
Transparency
Does the content identify its author and disclose interests?
0.33
✓ Author ✗ Conflicts ✗ Funding
More signals: context, framing & audience
Solution Orientation
Does this content offer solutions or only describe problems?
0.59 mixed
Reader Agency
0.7
Stakeholder Voice
Whose perspectives are represented in this content?
0.35 3 perspectives
Speaks: institutioncorporation
About: individualscorporation
Temporal Framing
Is this content looking backward, at the present, or forward?
present immediate
Geographic Scope
What geographic area does this content cover?
global
Complexity
How accessible is this content to a general audience?
accessible medium jargon general
Longitudinal · 5 evals
+1 0 −1 HN
Audit Trail 23 entries
2026-02-28 10:35 model_divergence Cross-model spread 0.69 exceeds threshold (5 models) - -
2026-02-28 10:35 eval Evaluated by claude-haiku-4-5-20251001: +0.26 (Mild positive)
2026-02-28 01:41 dlq Dead-lettered after 1 attempts: FaceTime bug lets you hear audio of person you are calling before they pick up - -
2026-02-28 01:39 rate_limit OpenRouter rate limited (429) model=llama-3.3-70b - -
2026-02-28 01:38 rate_limit OpenRouter rate limited (429) model=llama-3.3-70b - -
2026-02-28 01:36 rate_limit OpenRouter rate limited (429) model=llama-3.3-70b - -
2026-02-28 01:36 dlq_replay DLQ message 97642 replayed to LLAMA_QUEUE: FaceTime bug lets you hear audio of person you are calling before they pick up - -
2026-02-28 00:07 eval_success Light evaluated: Moderate positive (0.50) - -
2026-02-28 00:07 eval Evaluated by llama-3.3-70b-wai: +0.50 (Moderate positive)
2026-02-27 20:07 dlq Dead-lettered after 1 attempts: FaceTime bug lets you hear audio of person you are calling before they pick up - -
2026-02-27 20:05 rate_limit OpenRouter rate limited (429) model=llama-3.3-70b - -
2026-02-27 20:04 rate_limit OpenRouter rate limited (429) model=llama-3.3-70b - -
2026-02-27 20:03 rate_limit OpenRouter rate limited (429) model=llama-3.3-70b - -
2026-02-27 20:02 dlq_auto_replay DLQ auto-replay: message 97581 re-enqueued - -
2026-02-27 16:18 eval_success Light evaluated: Moderate positive (0.50) - -
2026-02-27 16:18 eval Evaluated by llama-4-scout-wai: +0.50 (Moderate positive)
2026-02-27 14:30 eval_success Evaluated: Neutral (-0.04) - -
2026-02-27 14:30 eval Evaluated by deepseek-v3.2: -0.04 (Neutral) 16,094 tokens
2026-02-27 13:01 dlq Dead-lettered after 1 attempts: FaceTime bug lets you hear audio of person you are calling before they pick up - -
2026-02-27 13:00 rate_limit OpenRouter rate limited (429) model=llama-3.3-70b - -
2026-02-27 12:59 rate_limit OpenRouter rate limited (429) model=llama-3.3-70b - -
2026-02-27 12:58 rate_limit OpenRouter rate limited (429) model=llama-3.3-70b - -
2026-02-27 12:55 eval Evaluated by claude-haiku-4-5: +0.65 (Neutral)