Siri Proxy Adds Tons Of Functionality, Doesn’t Require A Jailbreak


[Pete] has an iPhone 4s and loves Siri, but he wishes she had some more baked-in capabilities. While the application is technically still in beta and will likely be updated in the near future, [Pete] wanted more functionality now.

Since Apple isn’t known for their open architecture, he had to get creative. Knowing how Siri’s commands are relayed to Apple thanks to the folks at Applidium, he put together a proxy server that allows him to intercept and work with the data.

The hack is pretty slick, and doesn’t even require a jailbreak. A bit of DNS and SSL trickery is used to direct Siri’s WiFi traffic through his server, which then relays the commands to Apple’s servers for processing. On the return trip, his server interprets the data, looking for custom commands he has defined.

In the video below, he gives a brief overview of the system, then spends some time showing how he can use Siri to control his WiFi enabled thermostat. While the process only works while Siri is connected to his home network via WiFi, it’s still pretty awesome.


24 thoughts on “Siri Proxy Adds Tons Of Functionality, Doesn’t Require A Jailbreak

      1. It would be really cool if you could cut out the phone and have the proxy just fake it, becoming a DIY Siri-enabled device. The “proxy” server at this point could pretend to be an apple device itself and could receive voice data from anything else you build, and return the results. In theory, any sufficiently powerful device might be able to do this, meaning you could build this into projects and carry it with you, rather than rely on a server back at home.

    1. No! They need to manually, physically install a root certificate in your phone, or Siri won’t accept the proxy’s certificate and fail to connect. This is NOT a security hole.

      Please read step 2 in the “Setup Instructions”.

    1. Between you and Olek, the lack of actually taking the time to read the guy’s site makes me want to cry.

      Yes, anyone with a WAP can spy on my SIRI conversation, providing they jigger with DNS AND if I happen to install the self-signed SSL cert they have created on my phone ahead of time.

      Seriously people RTFA.

    2. No! Siri checks to see if the proxy has a valid certificate for the server. The only way they can bypass it is because they manually, physically installed a root certificate they control on the phone.

      Unless you physically give your phone to some stranger, the HTTPS connection will fail and Siri won’t be able to connect.

Leave a Reply

Please be kind and respectful to help make the comments section excellent. (Comment Policy)

This site uses Akismet to reduce spam. Learn how your comment data is processed.