The Truth is that you may having been speaking to an AI imposter.
Let us explain.
- The assurance that someone can not deny the validity or authorship of a text or communication -
published: 2022
Hostile Governments and bad guys in general have acquired the technology to impersonate you and everyone you know. They can create digital equals of you or your contacts. This includes digital visual clones that talk, act and look identical to you.
Is the "person" on the other side of the call or email, who you think it is?
Artificial intelligence can perfectly mimic a person's digital appearance and voice while simultaneously participate in an intelligent conversation with you - IN REAL TIME.
Do you want to see an AI algorithm in action - trying speaking to ChatGPT to get an idea of its capabilities.
It means that bad guys can impersonate you or your contacts by intercepting your call or emails in order to manipulate or influence you, and all this in real time.
In other words... the conversation you are having with [insert: lover, brother, mother, bank, etc.] is actually a conversation with an AI algorithm which is actively manipulating you.
This is both easy to do technically and cheap.
But... I can always validate the conversation later when I meet the person physically.
Well not always.. Bad guys can intercept both sides of the conversation in real time and only intercept and replace your speech / text with a slight modification that only slightly changes the tone, and intent of the message. That makes it much harder to detect later...
Welcome to the Matrix...
Digital certification - complex algorithmic keys that certify your identity to third parties and vice versa.
You can do this with tools like PGP which enables you to digitally sign or certify a document, file, video, etc. with your private key. A 3rd party can then verify whether the digitally signed document was created by you and validate that the document has been unaltered in any form, by checking the digitally signed document with your public key. Although this process can be somewhat complex - this can withstand AI attacks due to the mathematical rules of encryption (which applies even to AI). This enables you to authenticate the ownership and integrity of any document / file.
This is currently the only way to confirm that the file you are reading or viewing is truly from who you think it is and unaltered in any way.
Don't worry - you already use this technology every time you surf the web - remember the lock icon at the top of your browser? Problem is - you don't use this technology to certify your communication (calls and emails).
So now what?
What People Say About Us
Copyright © All Rights Reserved.