In this case, even if the attacker's code is successful in attempting to exploit the browser, the attacker finds their code running in a clean environment with no interesting data, no access to any user credentials, and no access to other endpoints on the corporate network. (blogs.windows.com)
Change report events help Alexa know whether a customer's request is meant for a video endpoint or one of potentially multiple other endpoints in the home such as smart speakers or a whole home audio system. (developer.amazon.com)
There are other endpoints we can use, but limiting the discussion to 25 - 54 year olds is the most common approach. (canadianbusiness.com)