Can AI face changing be prevented? Let's take a look at how high technology "defeats" high technology together
On September 11th, the 2023 National Cybersecurity Awareness Week, jointly organized by ten departments including the Central Propaganda Department, the Central Cyberspace Administration, the Ministry of Education, and the Ministry of Industry and Information Technology, officially kicked off in Fuzhou, Fujian. As a key supporting event, the Cybersecurity Expo opened in Fuzhou the day before. Entering the exhibition, it is not difficult to discover some unexpected network security risks brought about by technological development, and at the same time, one can also see the high-tech that can "defeat" these high-tech.
The 2023 National Cybersecurity Promotion Week Cybersecurity Expo opened on September 10th. Photo by Huang Dongyi from People's Daily Online
Scenario 1: Identifying "AI Face Changing Scam"
Display of artificial intelligence facial synthesis scam scenes in the Meiya Baike exhibition area. Photo by Huang Dongyi from People's Daily Online
![Can AI face changing be prevented? Let's take a look at how high technology "defeats" high technology together](https://a5qu.com/upload/images/12dc56f039a89d5dd51c0371043ed44e.png)
In recent years, with the rapid development of AI technology, "AI face changing scams" have received increasing public attention.
With just a photo of the target person and artificial intelligence synthesis, standing in front of the camera, you can "turn" into him on the screen. You can also pass facial authentication on the online lending platform and transfer money with just a blink of an eye and a shake of your head. At the Meiya Baike exhibition area, staff demonstrated this fresh scam.
How to crack it? On site staff stated that currently, Meiya Baike has independently developed a deep forgery detection and identification platform, which can intelligently detect and identify forged videos, helping regulatory authorities improve their content security governance capabilities.
Scenario 2: Eliminate malicious USB drives
![Can AI face changing be prevented? Let's take a look at how high technology "defeats" high technology together](https://a5qu.com/upload/images/954047d08bdf5913b80a1c1e09dcdbb0.png)
Staff demonstration. Photo by Huang Dongyi from People's Daily Online
"This is a virus USB drive. After I inserted it into a regular computer, it started executing malicious code to gain computer control privileges. The virus designer can remotely control your computer and obtain important information, such as personal privacy photos stored inside the computer," said the Green Alliance Technology staff.
The terrifying aspect of this attack method is that the malicious code is stored in the firmware of the USB drive. As the antivirus software in the PC cannot access the area where the firmware is stored on the USB drive, it means that both the antivirus software and USB drive formatting cannot respond to this attack.
"Be cautious when picking up unfamiliar USB drives! Do not randomly insert them into your computer to avoid unnecessary losses," the staff reminded.
![Can AI face changing be prevented? Let's take a look at how high technology "defeats" high technology together](https://a5qu.com/upload/images/522dbff63771c0c925afbc3584093368.png)
Scenario 3: Block harassing phone calls
The staff is introducing high-frequency harassment telephone protection products. Photo by Huang Dongyi from People's Daily Online
At the booth of China Mobile, staff demonstrated high-frequency harassment telephone protection services for personal calls.
"It can intercept various types of harassing and fraudulent calls from both domestic and international sources. In addition, it provides various personalized protection settings, such as designated number, starting number, custom number range interception, custom number interception, and preset special switches for international numbers as well as Hong Kong, Macao, and Taiwan numbers. Users can add a whitelist to release the specified number, and after interception, a notification will be pushed to the user. There are various notification methods, and users can choose by themselves.".
![Can AI face changing be prevented? Let's take a look at how high technology "defeats" high technology together](https://a5qu.com/upload/images/7f331f55f85b54778adad242935a72f3.png)
Scenario 4: "Lightning Protection" Transfer Trap
Alipay will inform the fraud victim of the risk in the form of pop-up window when transferring funds. Photo by Huang Dongyi from People's Daily Online
In the exhibition area of Ant Group, the staff demonstrated the anti fraud scenario. Before the victim transferred money, Alipay jumped out of the pop-up window to inform the user of the risks.
"We have been exploring intelligent risk control technology on a large scale since around 2015, and have independently developed the 'Intelligent Risk Perception and Response Joint Anti Fraud System'. Ant Group's on-site staff explained that this anti fraud system has several significant characteristics. Firstly, it integrates artificial intelligence and security technology, which can quickly complete risk identification for a transaction."; The second is to polish a set of "AI anti fraud wake-up services" based on active interactive risk control technology, such as reminder pop ups, wake-up hotlines, delayed account arrivals, etc., to awaken users who are being scammed as much as possible.
![Can AI face changing be prevented? Let's take a look at how high technology "defeats" high technology together](https://a5qu.com/upload/images/fcb2a5aa0cd7468073012662207cbfcb.png)