What if the activation of the microphone for marketing purposes occurred not systematically but randomly, making it harder to detect such functionality? And what if this functionality were activated with code loaded remotely at the moment it needs to be used?