Reports

Are you sure your last email or phone call was with who you think it was?

The Truth is that you may having been speaking to an AI imposter.


Let us explain.

Non-Repudiation

- The assurance that someone can not deny the validity or authorship of a text or communication -

How it happens

published: 2022


Hostile Governments and bad guys in general have acquired the technology to impersonate you and everyone you know. They can create digital equals of you or your contacts. This includes digital visual clones that talk, act and look identical to you. The youtube clip below is an example of an early version of this technology -  it was done 4 years ago. The technology has improved exponentially since then.

Is the "person" on the other side of the call or email, who you think it is?


Artificial intelligence can perfectly mimic a person's digital appearance and voice while simultaneously participate in an intelligent conversation with you - IN REAL TIME.


Do you want to see an AI algorithm in action - trying speaking to ChatGPT to get an idea of its capabilities.

But why does this matter to me?

It means that bad guys can impersonate you or your contacts by intercepting your call or emails in order to manipulate or influence you, and all this in real time.


In other words... the conversation you are having with [insert: lover, brother, mother, bank, etc.] is actually a conversation with an AI algorithm which is actively manipulating you.

This is both easy to do technically and cheap.


But...  I can always validate the conversation later when I meet the person physically.

Well not always.. Bad guys can intercept both sides of the conversation in real time and only intercept and replace your speech / text with a slight modification that only slightly changes the tone, and intent of the message.  That makes it much harder to detect later...


Welcome to the Matrix...

But how can I protect myself?

Digital certification - complex algorithmic keys that certify your identity to third parties and vice versa.


You can do this with tools like PGP which enables you to digitally sign or certify a document, file, video, etc. with your private key. A 3rd party can then verify whether the digitally signed document was created by you and validate that the document has been unaltered in any form, by checking the digitally signed document with your public key. Although this process can be somewhat complex - this can withstand AI attacks due to the mathematical rules of encryption (which applies even to AI). This enables you to authenticate the ownership and integrity of any document / file.


This is currently the only way to confirm that the file you are reading or viewing is truly from who you think it is and unaltered in any way.


Don't worry - you already use this technology every time you surf the web  - remember the lock icon at the top of your browser? Problem is - you don't use this technology to certify your communication (calls and emails).


So now what?

The easy solution

1.

Set up GPG for your email (link). To be honest - this is quite complex and easy to get wrong (contact us if you need some help) so we suggest:

2.

Register with Proton Mail (click image on the left). It's easy, encrypts and digitally signs your emails providing you with security and privacy. Plus its based in Switzerland - a neutral country with strong privacy laws.

3.

We recommend the total package email + vpn.

What People Say About Us

Subscribe to our newsletter

Share by: