They warned you: Someone allegedly used a politician’s cloned voice to interfere with an election | It will most assuredly not be the last time this happens::undefined
They warned you: Someone allegedly used a politician’s cloned voice to interfere with an election | It will most assuredly not be the last time this happens::undefined
You don’t even need to ID who is sending it, just that the content itself can provide some grounding in an authentic source.
Like if a picture can say that it derives from an original photo captured by a camera signed with Canon’s credentials, and was changed in Photoshop in these specific ways and signed by Adobe…
There is a group working on exactly this. It’s called C2PA.