Home / Series / DEF CON / Aired Order / Season 32 / Episode 144

Exploiting Voice Cloning in Adversarial Simulation

We live in an era where voice verification is increasingly adopted in security protocols. The potential for abuse through voice cloning technology presents a significant and growing threat to cybersecurity. This talk dives into the alarming capabilities of deep learning to create highly convincing voice clones. Using my own voice as a case study, I will demonstrate a recorded simulation where the cloned voice successfully bypasses several major institutions’ voice verification systems.

English
  • Created August 26, 2024 by
    Subscriber-2473783
  • Modified August 30, 2024 by
    Subscriber-2473783