Somehow Terminator 2 came to my mind. When John Conor calls his stepparents to inform them and the T800 mimics his voice to find out if they are really them.. scary stuff
Really scaring for the future, how many old people will fall in this trap. Do you have a french speaking version of this great video, i am sensibilizing people from my village to all types of hackings and i would like them to see it. The translated subtitles are really average
Unfortunately, I can barely speak my native tongue of English so no French version, I’m afraid. But I appreciate that you watched and are trying to inform others.
Instead of dividing the key info up, we could essentially 2nd factor it and repeat the important information in a text message before taking action. This way a single communication path being compromised becomes detectable. Assuming only the integrity and not the confidentiality being important of course. By the way, the exact topic of this video came up in an interview with a prospective employer yesterday. Very relevant stuff!
Glad to hear you found it useful! Actually, even your proposal would have some risk. If the MITM has control of the endpoint device (i.e., phone), then it might be able to read text messages before they are even sent, which is why I suggested using another device
So, LLM-powered botnet could automate man-in-the-middle attacks, allowing for large-scale interception and manipulation of communication! It's really scary.
I, for one, will welcome our new AI overlords 😂 (Just remember, this stuff all runs on computers and computers run on electricity and we can always pull the plug)
@@jeffcrume Thank you. Could I request a video discussing countermeasures against the misuse of generative AI in ensuring the integrity of videos and pictures? Do you believe that implementing a mechanism for labeling media files with a signature is essential? I am concerned about the perfection of deepfakes, which could potentially harm individuals or industries.
Somehow Terminator 2 came to my mind. When John Conor calls his stepparents to inform them and the T800 mimics his voice to find out if they are really them.. scary stuff
I’ll be back … 😎
Yes... an other way of defense is that you make intentional mistakes in the call like the T800 did and wait for the reaction on the other side... :)
Thank you Jeff chrume.
Thank you for watching!
Great video as always!! Thanks much. I hope you feel better 💐
Thanks so much! I’m all healed up now!
Really scaring for the future, how many old people will fall in this trap. Do you have a french speaking version of this great video, i am sensibilizing people from my village to all types of hackings and i would like them to see it. The translated subtitles are really average
Unfortunately, I can barely speak my native tongue of English so no French version, I’m afraid. But I appreciate that you watched and are trying to inform others.
great vid as always Jeff, keep 'em coming
Thanks so much!
This is really getting scary 😮
Indeed it is
Well, it seems we’ll be getting back to new generation of antivirus softwares (antiAI). It’s always two steps forwards and one step back.
Indeed, it is. Every technology’s potential to do good is directly proportional to its potential to do bad.
Instead of dividing the key info up, we could essentially 2nd factor it and repeat the important information in a text message before taking action. This way a single communication path being compromised becomes detectable. Assuming only the integrity and not the confidentiality being important of course.
By the way, the exact topic of this video came up in an interview with a prospective employer yesterday. Very relevant stuff!
Glad to hear you found it useful!
Actually, even your proposal would have some risk. If the MITM has control of the endpoint device (i.e., phone), then it might be able to read text messages before they are even sent, which is why I suggested using another device
Does this mean that service providers using voice identification for security can be easily duped?
It certainly does, unfortunately. Voice authentication, unless you are physically in front of the person, should be considered suspect
Coincidence 🤯
pi: 3.141592
pi day: March 14
Phone#: 3.1415~29~ (dyslexia autocorrected: 3.141592)
Congratulations! You figured out the other Easter egg 🥚
So, LLM-powered botnet could automate man-in-the-middle attacks, allowing for large-scale interception and manipulation of communication!
It's really scary.
It is, indeed
Great as usual, thank you
Thank you for watching!
Thanks again for that pizza!
It’s the least I could do for you for doing a cameo in the video with me! 😊
C00L... lets just say i want to stop this kinda thing so I should know where to get these tools. Tell me where!
Most of what I mentioned don’t require tools as much as they require attention by the users so that they avoid becoming victims
Nowadays, I can't even trust my own shadow!
Thanks Jeff. I hope you get paid by Morten soon :D
I know what you mean! And, I’m not holding my breath on that funds transfer … 😂
great vid🎉
Thanks!
New threat, old solutions...
Is that AGI will arrive by 2026? What you will do to live after the arrival of AGI friend?
I, for one, will welcome our new AI overlords 😂 (Just remember, this stuff all runs on computers and computers run on electricity and we can always pull the plug)
Master inventor 😊
Martin and I both hold that title but he has far more patents than I do
the solution would be an end to end communication, right?
Right. You need to ensure that there is no man-in-the-middle, but that’s not easy to do
@@jeffcrume Thank you. Could I request a video discussing countermeasures against the misuse of generative AI in ensuring the integrity of videos and pictures? Do you believe that implementing a mechanism for labeling media files with a signature is essential? I am concerned about the perfection of deepfakes, which could potentially harm individuals or industries.
Hello IBM
do you write everything backwards?!
No, we flip the video in post production. Search this channel for “how we make them” and you can see
Leave Jenny out of this.
I was wondering if someone would catch that! 😊
Was about to comment something similar!
Phone calls over RSA
Still wouldn’t help if the MITM is actually installed on the endpoint device and inserts itself ahead of the phone app
First.