• 1 Post
  • 190 Comments
Joined 1 year ago
cake
Cake day: June 7th, 2023

help-circle

  • Yeah, the genie is out of the bottle on this one. I can do voice cloning with consumer hardware and available models. That can’t be undone, but good legal protections would be nice.

    That said, the Johanson case is a bad example because it really didn’t sound much like her at all. It was a chipper yound white lady sound, but to my ear sounded nothing like Johanson. It did sound kinda like a character she voiced, but I would not gave confused the two. They cloned the voice of someone they paid to give a similar inflection as the voice from Her. That’s far removed from cloning Johanson herself. It is closer to people making music “in the style of”.





  • I don’t see it as a status symbol, although I’m certain that is a huge part of it for a lot of people, but fashion part is right. Cars have design styles, motifs, and trends. I don’t know the names for most of them, but I can normally place a car in a 3 year range on sight. Make and model are also often very obvious through those same features, even across a larger number of years, slowly transitioning from one "age’ of car design to another. I’m not a car person, but I am, in weird ways, a design nerd.














  • Effectively, the other option is passwords, and people are really, really, bad at passwords. Password managers help, but then you just need to compromise the password manager. Strong SSO, backed by hardware, at least makes the attack need to be either physical, or running on a hardware approved by the company. When you mix that with strong execution protections, an EDR, and general policy enforcement and compliance checking, you get protection that beats the pants off 30 different passwords to 30 different sites, or more realistically, 3 passwords to 30 different sites.


  • The modern direction is actually going the other way. Tying identity to hardware, preventing access on unapproved or uncompliant hardware. It has the advantage of allowing biometrics or things like simple pins. In an ideal world, SSO would ensure that every single account, across the many vendors, have these protections, although we are far from a perfect world.