• 0 Posts
  • 23 Comments
Joined 1 year ago
cake
Cake day: June 7th, 2023

help-circle
  • Yeah, the genie is out of the bottle on this one. I can do voice cloning with consumer hardware and available models. That can’t be undone, but good legal protections would be nice.

    That said, the Johanson case is a bad example because it really didn’t sound much like her at all. It was a chipper yound white lady sound, but to my ear sounded nothing like Johanson. It did sound kinda like a character she voiced, but I would not gave confused the two. They cloned the voice of someone they paid to give a similar inflection as the voice from Her. That’s far removed from cloning Johanson herself. It is closer to people making music “in the style of”.


















  • I know there is a lot of marketing fluff, but yes, it is an EDR. Which means instead of just checking file signatures against a database if known bad stuff, it actually examines what applications do and makes a sort of judgement on if it is acting maliciously or not. I use a similar product. Although the false positives can sometimes be baffling, it honestly can catch a legit program misbehaving.

    On top of that, everything is logged. Every file, network connection, or registry key that every process on the computer touches is logged. That means when something happens, you can see the full and complete list of actions taken by the malicious system. Thus can actually be a drain on the computer, but modern systems handle it well enough.