“Deepfake” isn’t a new type of beauty cream, an underwater virtual tour or even a sternly worded insult. It is in fact, the culmination of decades worth of audio and video editing methods combined with cutting-edge artificial intelligence and machine learning. 

Despite the fact that most people have come across it on YouTube, Facebook and other places, most actually don’t understand what is involved in it. Why is it so revolutionary and terrifying? What makes it that much different than existing techniques? Why does it have the potential to allow actors, actresses and more to create new content years after they are gone? Let’s find out. 

What is a deepfake?

Deepfakes first entered the public consciousness in 2018, with a demonstration video with President Obama in conjunction with comedian Jordan Peele. We’ll address why that particular video was so effective later, but the core idea of a deepfake is essentially taking media of one person and using it as a template to create a new video of another.

Now some could argue that this has been in place conceptually for years and years now. Take, for instance, “Forrest Gump,” which showcases Tom Hanks meeting historical figures such as President John F. Kennedy. These scenes obviously did not occur — yet look like they did. These examples are forms of video editing where it’s possible to overlay a person into existing film footage, as shown in the behind-the-scenes video from Dateline in 1994. The key limitation with this technique is how well you can match up to the source material. 

On the flip side, there are also imitators of different celebrities and other famous people. Elvis Presley impersonators are a common sight across the United States and are often judged on just how close a resemblance they (Read more...)

*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Kurt Ellzey. Read the original post at:

DevOps Unbound Podcast

Cloud Workload Resilience PulseMeter

Step 1 of 8

How do you define cloud resiliency for cloud workloads? (Select 3)(Required)