Many voice protection tools promise to block cloning by adding hidden noise to speech. Researchers at a Texas university found that widely used voice protection methods can be stripped away, restoring speaker identity and allowing fake voices to pass automated checks. A demonstration of how an attacker leverages VocalBridge to bypass existing defenses and execute voice-cloning attacks. The academic study examines what happens after protected audio is shared beyond the control of the person trying … More
The post Voice cloning defenses are easier to undo than expected appeared first on Help Net Security.
