It is interesting how easy this has got with a popular service like Prime Voice AI, and when you realise that many use voice recognition for authenticated access to systems, we can see where the risks come in. Like most technology, there are lots of positive upsides, but it always opens up the negatives as well. As Steve points out in his commentary in the linked article, the bad actors are often quicker than anyone else nowadays to take advantage of these new developments.

No end in sight for the upward trajectory of careers in security and vulnerability consultants.

#technology #security #voicecloning

@poohbear
link
fedilink
English
31Y

Everyone needs to start the conversation with their loved ones as soon as they can to question anything that seems out of character. It doesn’t matter if they sound like or look like them - if anyone is asking for money or sensitive information, question it no matter what.

I know a lot of folks may feel like that’s an impossible task, especially with parents and older relatives, but it’s possible - I just recently had a conversation with my parents, and I was bracing myself for it to be an uphill battle, but they were switched on and got it. You’ve gotta at least try.

But how else are we going to be able to hear Squidward singing Never Gonna Give You Up?

https://www.youtube.com/watch?v=OBLOxQu6s_s

nii236
link
fedilink
English
11Y

Since when does anything use voice recognition for authentication?!

GadgeteerZA
creator
link
fedilink
English
21Y

Just some:

  • Medical devices: Voice recognition is used in medical devices to allow patients to control their devices without having to use their hands.
  • Call centres: Voice recognition is used in call centres to allow agents to answer calls without having to type.
  • Manufacturing: Voice recognition is used in manufacturing to control robots and other machines.
  • Customer service: Voice recognition is used in customer service to allow customers to get information and resolve issues without having to wait on hold (including some banks).
  • Family ransom requests by phone

But those aren’t examples of using voice recognition for authentication. In all of those cases if someone else walked up to the person using the thing and shouted the right command, we don’t expect the system doing the voice recognition to ignore it because the wrong person said it.

Hmmm, can I ransom my own family? ¯⁠\⁠(⁠°⁠_⁠o⁠)⁠/⁠¯

GadgeteerZA
creator
link
fedilink
English
21Y

Sadly its been attempted a few times… we normally hear from the failed attempts.

You shall not hear about me.

nii236
link
fedilink
English
21Y

Its a pretty dark and grim future. Until then, here’s an AI trained on Ariana Grande’s voice singing in Vietnamese.

GadgeteerZA
creator
link
fedilink
English
01Y

And apparently Paul McCartney used AI now to recreate John Lennon’s voice in a recent Beatles song…

nii236
link
fedilink
English
11Y

Its not all doom and gloom out there!

@CasualTee@beehaw.org
link
fedilink
English
61Y

Not only organisations, but everyone really. The eldery are already massively targeted by scammers. Now, on top of that, scammers can find a child or grandchild voice sample on some social media and use that to ask for money over the phone. Or even via video call with deep fakes. And they can do that at scale.

You don’t even need social media. Call person A and keep them on the phone for 15 seconds to get a snippet of their voice. Feed through AI, use that to call person B and extort them or whatever crime you were planning on.

Create a post

Rumors, happenings, and innovations in the technology sphere. If it’s technological news or discussion of technology, it probably belongs here.

Subcommunities on Beehaw:


This community’s icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.

  • 1 user online
  • 52 users / day
  • 352 users / week
  • 795 users / month
  • 3.26K users / 6 months
  • 3 subscribers
  • 2.86K Posts
  • 73.6K Comments
  • Modlog