Hacker News new | past | comments | ask | show | jobs | submit login

But this is not a fundamentally new threat. A bad actor today could compromise any of these and impersonate the person they took it from.



But not:

1) Automated at scale

2) To such a convincing degree

3) In real time, including audio and video




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: