deepfake

Spot the deepfake: The AI tools undermining our own eyes and ears

Have you ever seen a deepfake? More importantly, can you spot the difference between these AI-generated images, audio clips and videos and the real thing?

As more than 2 billion voters across 50 countries prepare for national elections in 2024, that question — and the ability of such deepfakes to skew potential voters’ decisions at the polls — has never been more critical.

Case in point: In recent months, people have increasingly flagged alleged AI-powered deepfake images, audio and videos on X (formerly Twitter), according to a Brookings Institution review of the platform’s so-called community notes, a crowdsourced fact-checking initiative on the platform.

POLITICO decided to put you to the test.

Using Midjourney, an AI research lab whose technology can create lifelike images based on someone simply typing suggestions into the company’s online platform, POLITICO collected a series of real images — and those generated by artificial intelligence. Repeated global trials have shown that, on average, people can detect digital forgeries compared with legitimate images about 60 percent of the time, according to tech company officials with whom POLITICO spoke.

While the technology is still a work in progress, the ability of anyone — including POLITICO reporters — to create such realistic images with a few clicks on a keyboard has politicians, policymakers and disinformation experts worried.

If AI puts such power in the hands of anyone with a laptop, internet connection and $50 to access these powerful tools, such deepfake political content may flood people’s social media feeds in the months ahead.

How well will you do? Take the quiz before you read the rest of the story. (Spoilers below!)

Source

Veille-cyber

Share
Published by
Veille-cyber

Recent Posts

L’IA : opportunité ou menace ? Les DSI de la finance s’interrogent

L'IA : opportunité ou menace ? Les DSI de la finance s'interrogent Alors que l'intelligence…

1 mois ago

Sécurité des identités : un pilier essentiel pour la conformité au règlement DORA dans le secteur financier

Sécurité des identités : un pilier essentiel pour la conformité au règlement DORA dans le…

1 mois ago

Règlement DORA : implications contractuelles pour les entités financières et les prestataires informatiques

La transformation numérique du secteur financier n'a pas que du bon : elle augmente aussi…

1 mois ago

Telegram menace de quitter la France : le chiffrement de bout en bout en ligne de mire

Telegram envisage de quitter la France : le chiffrement de bout en bout au cœur…

2 mois ago

Quand l’IA devient l’alliée des hackers : le phishing entre dans une nouvelle ère

L'intelligence artificielle (IA) révolutionne le paysage de la cybersécurité, mais pas toujours dans le bon…

2 mois ago

LES DIFFÉRENCES ENTRE ISO 27001 ET TISAX®

TISAX® et ISO 27001 sont toutes deux des normes dédiées à la sécurité de l’information. Bien qu’elles aient…

2 mois ago

This website uses cookies.