this post was submitted on 13 Jun 2023
13 points (100.0% liked)

Technology

37712 readers
568 users here now

A nice place to discuss rumors, happenings, innovations, and challenges in the technology sphere. We also welcome discussions on the intersections of technology and society. If it’s technological news or discussion of technology, it probably belongs here.

Remember the overriding ethos on Beehaw: Be(e) Nice. Each user you encounter here is a person, and should be treated with kindness (even if they’re wrong, or use a Linux distro you don’t like). Personal attacks will not be tolerated.

Subcommunities on Beehaw:


This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.

founded 2 years ago
MODERATORS
 

It is interesting how easy this has got with a popular service like Prime Voice AI, and when you realise that many use voice recognition for authenticated access to systems, we can see where the risks come in. Like most technology, there are lots of positive upsides, but it always opens up the negatives as well. As Steve points out in his commentary in the linked article, the bad actors are often quicker than anyone else nowadays to take advantage of these new developments.

No end in sight for the upward trajectory of careers in security and vulnerability consultants.

#technology #security #voicecloning

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 1 points 1 year ago (7 children)

Since when does anything use voice recognition for authentication?!

[–] [email protected] 2 points 1 year ago (6 children)

Just some:

  • Medical devices: Voice recognition is used in medical devices to allow patients to control their devices without having to use their hands.
  • Call centres: Voice recognition is used in call centres to allow agents to answer calls without having to type.
  • Manufacturing: Voice recognition is used in manufacturing to control robots and other machines.
  • Customer service: Voice recognition is used in customer service to allow customers to get information and resolve issues without having to wait on hold (including some banks).
  • Family ransom requests by phone
[–] [email protected] 1 points 1 year ago

But those aren't examples of using voice recognition for authentication. In all of those cases if someone else walked up to the person using the thing and shouted the right command, we don't expect the system doing the voice recognition to ignore it because the wrong person said it.

load more comments (5 replies)
load more comments (5 replies)