Skip to main content

Download Hitman: Sniper APK Free

Deep Fakes: Why this tech is a game-changer in the worst-possible way

  • Deep Fakes: Why this tech is a game-changer in the worst-possible way

First coming to prominence in 2017, having been used in the porn industry, the deepfake technology has led some to raise concerns that 'seeing is no longer believing.'

Deepfake
Photo Credit: PTI
Several experts have raised serious concerns over how the deepfake technology can be used to subvert the electoral process.

Key Highlights

  • Although the BJP has stated that the deepfake software was employed to create “positive campaigns”, there are much darker implications of the AI-driven technology
  • Even though the origin of the technology remains uncertain, it came to prominence in 2017, following its use to impose celebrity faces on to porn actors
  • Deepfakes have the capacity to cause serious instability within nations
A day before the Delhi Assembly election that took place earlier this month, two videos began doing the rounds on popular messaging platform, WhatsApp, of Bharatiya Janata Party (BJP) Delhi unit chief Manoj Tiwari attacking the policies of the incumbent Aam Aadmi Party government, and encouraging constituents to vote for the BJP. The first video showed Tiwari speaking in English, however, the second shows him speaking in the Haryanvvi dialect.
On first glance, it might appear that both the videos are authentic and part of a larger political outreach campaign planned by the BJP. However, the truth is that both videos were, in fact, fake. BJP Head of Media Relations Neelkant Bakshi later confirmed that the videos were sanctioned by the party, however, he opted to distance himself from the technology, stating that the BJP had not signed any agreement or contract with the political communications firm, The Ideaz Factory, that, reportedly, made the two videos. Bakshi confirmed that the move was simply a trial campaign to test the effectiveness of the technology in the election campaign process.

What are deepfakes? 

Although the BJP has stated that the deepfake software was employed to create “positive campaigns,” there are much darker implications of the AI-driven technology. Deepfakes are, essentially, audio or video recordings capable of making real people appear to do or say fictitious things. However, unlike expensive Computer-generated Imagery (CGI) employed in Hollywood, deepfake technology is available to be downloaded online, enabling anyone with a computer, an internet connection, and a basic understanding of deep-learning algorithms, to create fictitious videos.

Comments

Popular posts from this blog

Top 15 Live Cyber Attack Maps for Visualizing Digital Threat Incidents

What is a DDoS Attack? First, we must define the meaning of a DDoS attack. DDoS attacks are a main concern in internet security, and many people misunderstand what exactly they are. A Distributed Denial of Service (DDoS) attack is a malicious attempt to upset typical internet traffic of a targeted server by overwhelming it with traffic from multiple sources. DDoS attacks target a plethora of important resources, from banks to news websites, and present a major challenge to making sure Internet users can publish and access important information. A DDoS attack is similar to a traffic jam on a highway, preventing typical traffic flow. How does a DDoS attack work? A DDoS attack requires the attacker to gain control of a network of online machines. Computers are infected with malware, turning them into a bot. Then, the attacker has control over the group of bots, now called a botnet. Once a botnet is established, the attacker will send instructions to each bot from a re

8 Best DDoS Attack Tools (Free DDoS Tool Of The Year 2021)

  The list of the Best free DDoS Attack Tools in the market: Distributed Denial of Service Attack is the attack that is made on a website or a server to lower the performance intentionally. Multiple computers are used for this. These multiple computers attack the targeted website or server with the DoS attack. As this attack is performed through a distributed network it is called as Distributed Denial of Service attack. In simple terms, multiple computers send fake requests to the target in larger quantity. The target is flooded with such requests, thereby the resources become unavailable to legitimate requests or users. Purpose of DDoS Attack Generally, the purpose of a DDoS attack is to crash the website. The duration for which the DDoS attack will last depends on the fact that the attack is on the network layer or application layer. Network layer attack lasts for a maximum of 48 to 49 hours. Application layer attack lasts for a maximum of 60 to 70 days. DD

How to score good marks in exam?

  Being properly organized and prepared for tests and exams can make all the difference to school performance. Effective studying starts with the right attitude—a positive outlook can shift studying from a punishment to an opportunity to learn. There is no one-size-fits-all approach when learning how to effectively study. Studying methods should be tailored to each student. Everyone has different abilities, so it is important to determine what works for you and what doesn’t. (Find out what  type of learner  you are and which study techniques will work best for you!) For some students, studying and staying motivated comes easily — others may have to work a little bit harder. WHAT IS THE MOST EFFECTIVE WAY TO STUDY? Finding the best way to study is an ongoing process. It isn’t something that can be left to the night before the test. You should be constantly improving your study skills to better understand what works (and what doesn’t). Learning how to study better helps avoid panic and f