In the era of "Fake News," a more worrisome phenomenon has emerged: Deepfakes. They are videos aimed to completely deceive the viewer by showing celebrities and common people doing or saying things they never did. Thanks to the use of artificial intelligence, users can create hyperrealistic result , almost impossible to detect.
What are deepfakes and where do they come from?
Deepfake is a union of two words: deep learning, the learning system that uses artificial intelligence (AI) and 'fake' or false.
The first deepfake that went viral showed Hollywood actresses like Jessica Alba and Natalie Portman, acting in porn movies. Subsequently, it was learned that these videos were crafted by experts in artificial intelligence. This phenomenon only began in 2018, and since then many other videos starring other actors have emerged, such as comedian Bill Hader becoming Tom Cruise in an interview at David Letterman's talk show.
And also political personalities, including former US president Barak Obama apparently insulting Donald Trump. As you can see, it's not just about porn content, but about speeches that can seriously damage the reputation of the people who appear in them by putting words they never uttered in their mouths.
How is a deepfake made?
Most surprising is the speed at which these techniques have advanced since they first appeared. At present, there are already numerous programs and applications available to anyone that allow you to create a Deepfake.
All that's required is to get hold of one of these softwares, compile videos of the person with whom you want to create the montage (something extremely simple, given the large amount of audiovisual content that internet users upload daily to networks), and Enter them in the program. Artificial intelligence studies the person's gestures and mimicry, extracts the images frame by frame - as if they were photographs - and creates in a few minutes a Deepfake video: the more the information entered into the program, the more realistic the Deepfake will appear.
What are the dangers of a deepfake?
Although at first this science fiction technology may seem fascinating, there are numerous risks involved. Although we have become accustomed to the circulation of false photos, many people still blindly trust the reality of the images they see to form their opinion about an event or a person. Can you imagine the potential impact of a Deepfake video? Specialists warn that Deepfake could be used for example to manipulate elections or cause social uprisings with videos that are actually fake.
On the other hand, do not think that Deepfakes are used only to embarrass known personalities: in several countries, including Mexico, they have already been used in extortion against individuals. This included those who who were contacted by the networks and then blackmailed with fake videos in which they appear for example naked or having sex:
What can you do against deepfakes?
First of all, every time you receive a video in which something too incredible appears to be true, search the web for alternative and trusted sources (such as notable media sources) to verify. For example, in the case of politicians' speeches, any strongly worded or suspicious comments should be verified.
As for your own personal security, consider what information you upload to the network, and if you have the bad luck of being a victim of one of these blackmails, immediately report it to the police.
- Jessica alba deepfake
- Deepfake video call > Guide
- Deepfake apk > Download
- Video Downloader professional > Download
- How to disable DeepGuard feature of F-Secure
- iCloud+: privacy features, login, pricing
- How to disappear completely from the Internet?
- Is your phone listening to you?
- How to find location from phone number?
- How to remove your personal information from Google Search?
- All about IT security: confidentiality, authentication
- How to avoid Bitcoin and cryptocurrency scams?
- How to improve your online privacy
- How to know if your phone is being tracked?
- Private-key (or Secret-key) Cryptography: advantages
- Block spam calls: on iPhone, Android
- Encryption with DES: algorithm, DES vs AES, 3DES
- What are the security risks of remote work?
- How can you tell if the app is real or fake?
- Voice hacking: what is it and how to avoid it