{"id":10028,"date":"2024-02-14T13:20:29","date_gmt":"2024-02-14T13:20:29","guid":{"rendered":"https:\/\/dailyai.com\/?p=10028"},"modified":"2024-02-14T13:20:29","modified_gmt":"2024-02-14T13:20:29","slug":"ibm-security-shows-how-ai-can-hijack-audio-conversations","status":"publish","type":"post","link":"https:\/\/dailyai.com\/da\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/","title":{"rendered":"IBM Security viser, hvordan AI kan kapre lydsamtaler"},"content":{"rendered":"<p><strong>IBM Security offentliggjorde forskning p\u00e5 sin Security Intelligence-blog for at vise, hvordan AI-stemmekloner kunne injiceres i en live-samtale, uden at deltagerne var klar over det.<\/strong><\/p>\n<p>Efterh\u00e5nden som stemmekloningsteknologien forbedres, har vi set <a href=\"https:\/\/dailyai.com\/da\/2024\/01\/robocall-impersonating-joe-biden-surfaces-in-new-hampshire\/\">falske robocalls<\/a> der udgiver sig for at v\u00e6re Joe Biden, og fupopkald, der udgiver sig for at v\u00e6re et n\u00f8dlidende familiemedlem, der beder om penge.<\/p>\n<p>Lyden i disse opkald lyder godt, men fupopkaldet kan ofte let afv\u00e6rges ved at stille et par personlige sp\u00f8rgsm\u00e5l for at identificere den, der ringer op, som en bedrager.<\/p>\n<p>I deres avancerede proof of concept-angreb <a href=\"https:\/\/securityintelligence.com\/posts\/using-generative-ai-distort-live-audio-transactions\/\" target=\"_blank\" rel=\"noopener\">IBM's sikkerhedsforskere<\/a> viste, at en LLM kombineret med stemmekloning kunne fungere som en man-in-the-middle til kun at kapre en afg\u00f8rende del af en samtale i stedet for hele opkaldet.<\/p>\n<h2>S\u00e5dan fungerer det<\/h2>\n<p>Angrebet kan leveres via malware installeret p\u00e5 ofrenes telefoner eller en ondsindet kompromitteret Voice over IP (VoIP)-tjeneste. N\u00e5r programmet er p\u00e5 plads, overv\u00e5ger det samtalen og har kun brug for 3 sekunders lyd for at kunne klone begge stemmer.<\/p>\n<p>En tale-til-tekst-generator g\u00f8r det muligt for LLM at overv\u00e5ge samtalen for at forst\u00e5 konteksten for diskussionen. Programmet blev instrueret i at videresende samtalens lyd, som den er, men at \u00e6ndre samtalens lyd, n\u00e5r en person beder om bankkontooplysninger.<\/p>\n<p>N\u00e5r personen svarer for at give sine bankkontooplysninger, \u00e6ndrer stemmeklonen lyden, s\u00e5 den i stedet giver svindlerens bankoplysninger. Forsinkelsen i lyden under \u00e6ndringen d\u00e6kkes af noget fyldtale.<\/p>\n<p>Her er en illustration af, hvordan proof of concept-angrebet (PoC) fungerer.<\/p>\n<figure id=\"attachment_10030\" aria-describedby=\"caption-attachment-10030\" style=\"width: 1278px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-10030\" src=\"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/hijacked-conversation.png\" alt=\"\" width=\"1278\" height=\"1136\" srcset=\"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/hijacked-conversation.png 1278w, https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/hijacked-conversation-300x267.png 300w, https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/hijacked-conversation-1024x910.png 1024w, https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/hijacked-conversation-768x683.png 768w, https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/hijacked-conversation-370x329.png 370w, https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/hijacked-conversation-800x711.png 800w, https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/hijacked-conversation-20x18.png 20w, https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/hijacked-conversation-740x658.png 740w, https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/hijacked-conversation-54x48.png 54w\" sizes=\"auto, (max-width: 1278px) 100vw, 1278px\" \/><figcaption id=\"caption-attachment-10030\" class=\"wp-caption-text\">Illustration af, hvordan AI \u00e6ndrer en del af samtalen. U\u00e6ndret samtale i sort og \u00e6ndret lyd angivet med r\u00f8dt. Kilde: Security Intelligence<\/figcaption><\/figure>\n<p>Fordi LLM'en videresender u\u00e6ndret lyd under st\u00f8rstedelen af opkaldet, er det virkelig sv\u00e6rt at vide, at truslen er i spil.<\/p>\n<p>Forskerne sagde, at det samme angreb \"ogs\u00e5 kunne \u00e6ndre medicinske oplysninger, s\u00e5som blodtype og allergier i samtaler; det kunne beordre en analytiker til at s\u00e6lge eller k\u00f8be en aktie; det kunne instruere en pilot til at omdirigere.\"<\/p>\n<p>Forskerne sagde, at \"det var overraskende og skr\u00e6mmende nemt at bygge denne PoC.\" Efterh\u00e5nden som stemmeklonernes intonation og f\u00f8lelser forbedres, og bedre hardware reducerer ventetiden, vil denne type angreb blive meget vanskelige at opdage eller forhindre.<\/p>\n<p>Forskerne udvider konceptet ud over at kapre en lydsamtale og siger, at med \"eksisterende modeller, der kan konvertere tekst til video, er det teoretisk muligt at opsnappe en live-streamet video, som f.eks. nyheder p\u00e5 tv, og erstatte det oprindelige indhold med et manipuleret.\"<\/p>\n<p>Det kan v\u00e6re sikrere kun at tro p\u00e5 sine \u00f8jne og \u00f8rer, n\u00e5r man fysisk er i n\u00e6rheden af den person, man taler med.<\/p>","protected":false},"excerpt":{"rendered":"<p>IBM Security har offentliggjort forskning p\u00e5 sin Security Intelligence-blog, der viser, hvordan AI-stemmekloner kan inddrages i en live-samtale, uden at deltagerne er klar over det. I takt med at teknologien til stemmekloning forbedres, har vi set falske robocalls, der udgiver sig for at v\u00e6re Joe Biden, og fupopkald, der udgiver sig for at v\u00e6re et n\u00f8dlidende familiemedlem, der beder om penge. Lyden i disse opkald lyder godt, men fupopkaldet er ofte let at afv\u00e6rge ved at stille et par personlige sp\u00f8rgsm\u00e5l for at identificere den, der ringer op, som en bedrager. I deres avancerede proof of concept-angreb viste IBM Security-forskerne, at en LLM kombineret med voice<\/p>","protected":false},"author":6,"featured_media":10031,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[84],"tags":[163,94,107],"class_list":["post-10028","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-industry","tag-ai-risks","tag-deep-fakes","tag-generative-ai"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IBM Security shows how AI can hijack audio conversations | DailyAI<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dailyai.com\/da\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/\" \/>\n<meta property=\"og:locale\" content=\"da_DK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IBM Security shows how AI can hijack audio conversations | DailyAI\" \/>\n<meta property=\"og:description\" content=\"IBM Security published research on its Security Intelligence blog to show how AI voice clones could be injected into a live conversation without the participants realizing it. As voice cloning technology improves, we\u2019ve seen fake robocalls pretending to be Joe Biden and scam calls pretending to be a distressed family member asking for money. The audio in these calls sounds good, but the scam call is often easily thwarted by asking a few personal questions to identify the caller as an imposter. In their advanced proof of concept attack, the IBM Security researchers showed that an LLM coupled with voice\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dailyai.com\/da\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/\" \/>\n<meta property=\"og:site_name\" content=\"DailyAI\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-14T13:20:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/AI-man-in-the-middle-call-hijack.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"384\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Eugene van der Watt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@DailyAIOfficial\" \/>\n<meta name=\"twitter:site\" content=\"@DailyAIOfficial\" \/>\n<meta name=\"twitter:label1\" content=\"Skrevet af\" \/>\n\t<meta name=\"twitter:data1\" content=\"Eugene van der Watt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimeret l\u00e6setid\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/\"},\"author\":{\"name\":\"Eugene van der Watt\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/#\\\/schema\\\/person\\\/7ce525c6d0c79838b7cc7cde96993cfa\"},\"headline\":\"IBM Security shows how AI can hijack audio conversations\",\"datePublished\":\"2024-02-14T13:20:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/\"},\"wordCount\":467,\"publisher\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/AI-man-in-the-middle-call-hijack.jpg\",\"keywords\":[\"AI risks\",\"Deep fakes\",\"Generative AI\"],\"articleSection\":[\"Industry\"],\"inLanguage\":\"da-DK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/\",\"url\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/\",\"name\":\"IBM Security shows how AI can hijack audio conversations | DailyAI\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/AI-man-in-the-middle-call-hijack.jpg\",\"datePublished\":\"2024-02-14T13:20:29+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/#breadcrumb\"},\"inLanguage\":\"da-DK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/#primaryimage\",\"url\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/AI-man-in-the-middle-call-hijack.jpg\",\"contentUrl\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/AI-man-in-the-middle-call-hijack.jpg\",\"width\":1000,\"height\":384},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/dailyai.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IBM Security shows how AI can hijack audio conversations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/#website\",\"url\":\"https:\\\/\\\/dailyai.com\\\/\",\"name\":\"DailyAI\",\"description\":\"Your Daily Dose of AI News\",\"publisher\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/dailyai.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"da-DK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/#organization\",\"name\":\"DailyAI\",\"url\":\"https:\\\/\\\/dailyai.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Daily-Ai_TL_colour.png\",\"contentUrl\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Daily-Ai_TL_colour.png\",\"width\":4501,\"height\":934,\"caption\":\"DailyAI\"},\"image\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/DailyAIOfficial\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/dailyaiofficial\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@DailyAIOfficial\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/#\\\/schema\\\/person\\\/7ce525c6d0c79838b7cc7cde96993cfa\",\"name\":\"Eugene van der Watt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/Eugine_Profile_Picture-96x96.png\",\"url\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/Eugine_Profile_Picture-96x96.png\",\"contentUrl\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/Eugine_Profile_Picture-96x96.png\",\"caption\":\"Eugene van der Watt\"},\"description\":\"Eugene comes from an electronic engineering background and loves all things tech. When he takes a break from consuming AI news you'll find him at the snooker table.\",\"sameAs\":[\"www.linkedin.com\\\/in\\\/eugene-van-der-watt-16828119\"],\"url\":\"https:\\\/\\\/dailyai.com\\\/da\\\/author\\\/eugene\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IBM Security viser, hvordan AI kan kapre lydsamtaler | DailyAI","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dailyai.com\/da\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/","og_locale":"da_DK","og_type":"article","og_title":"IBM Security shows how AI can hijack audio conversations | DailyAI","og_description":"IBM Security published research on its Security Intelligence blog to show how AI voice clones could be injected into a live conversation without the participants realizing it. As voice cloning technology improves, we\u2019ve seen fake robocalls pretending to be Joe Biden and scam calls pretending to be a distressed family member asking for money. The audio in these calls sounds good, but the scam call is often easily thwarted by asking a few personal questions to identify the caller as an imposter. In their advanced proof of concept attack, the IBM Security researchers showed that an LLM coupled with voice","og_url":"https:\/\/dailyai.com\/da\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/","og_site_name":"DailyAI","article_published_time":"2024-02-14T13:20:29+00:00","og_image":[{"width":1000,"height":384,"url":"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/AI-man-in-the-middle-call-hijack.jpg","type":"image\/jpeg"}],"author":"Eugene van der Watt","twitter_card":"summary_large_image","twitter_creator":"@DailyAIOfficial","twitter_site":"@DailyAIOfficial","twitter_misc":{"Skrevet af":"Eugene van der Watt","Estimeret l\u00e6setid":"3 minutter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/#article","isPartOf":{"@id":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/"},"author":{"name":"Eugene van der Watt","@id":"https:\/\/dailyai.com\/#\/schema\/person\/7ce525c6d0c79838b7cc7cde96993cfa"},"headline":"IBM Security shows how AI can hijack audio conversations","datePublished":"2024-02-14T13:20:29+00:00","mainEntityOfPage":{"@id":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/"},"wordCount":467,"publisher":{"@id":"https:\/\/dailyai.com\/#organization"},"image":{"@id":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/#primaryimage"},"thumbnailUrl":"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/AI-man-in-the-middle-call-hijack.jpg","keywords":["AI risks","Deep fakes","Generative AI"],"articleSection":["Industry"],"inLanguage":"da-DK"},{"@type":"WebPage","@id":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/","url":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/","name":"IBM Security viser, hvordan AI kan kapre lydsamtaler | DailyAI","isPartOf":{"@id":"https:\/\/dailyai.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/#primaryimage"},"image":{"@id":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/#primaryimage"},"thumbnailUrl":"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/AI-man-in-the-middle-call-hijack.jpg","datePublished":"2024-02-14T13:20:29+00:00","breadcrumb":{"@id":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/#breadcrumb"},"inLanguage":"da-DK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/"]}]},{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/#primaryimage","url":"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/AI-man-in-the-middle-call-hijack.jpg","contentUrl":"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/AI-man-in-the-middle-call-hijack.jpg","width":1000,"height":384},{"@type":"BreadcrumbList","@id":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dailyai.com\/"},{"@type":"ListItem","position":2,"name":"IBM Security shows how AI can hijack audio conversations"}]},{"@type":"WebSite","@id":"https:\/\/dailyai.com\/#website","url":"https:\/\/dailyai.com\/","name":"DailyAI","description":"Din daglige dosis af AI-nyheder","publisher":{"@id":"https:\/\/dailyai.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dailyai.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"da-DK"},{"@type":"Organization","@id":"https:\/\/dailyai.com\/#organization","name":"DailyAI","url":"https:\/\/dailyai.com\/","logo":{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/dailyai.com\/#\/schema\/logo\/image\/","url":"https:\/\/dailyai.com\/wp-content\/uploads\/2023\/06\/Daily-Ai_TL_colour.png","contentUrl":"https:\/\/dailyai.com\/wp-content\/uploads\/2023\/06\/Daily-Ai_TL_colour.png","width":4501,"height":934,"caption":"DailyAI"},"image":{"@id":"https:\/\/dailyai.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/DailyAIOfficial","https:\/\/www.linkedin.com\/company\/dailyaiofficial\/","https:\/\/www.youtube.com\/@DailyAIOfficial"]},{"@type":"Person","@id":"https:\/\/dailyai.com\/#\/schema\/person\/7ce525c6d0c79838b7cc7cde96993cfa","name":"Eugene van der Watt","image":{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/dailyai.com\/wp-content\/uploads\/2023\/07\/Eugine_Profile_Picture-96x96.png","url":"https:\/\/dailyai.com\/wp-content\/uploads\/2023\/07\/Eugine_Profile_Picture-96x96.png","contentUrl":"https:\/\/dailyai.com\/wp-content\/uploads\/2023\/07\/Eugine_Profile_Picture-96x96.png","caption":"Eugene van der Watt"},"description":"Eugene har en baggrund som elektronikingeni\u00f8r og elsker alt, hvad der har med teknologi at g\u00f8re. N\u00e5r han tager en pause fra at l\u00e6se AI-nyheder, kan du finde ham ved snookerbordet.","sameAs":["www.linkedin.com\/in\/eugene-van-der-watt-16828119"],"url":"https:\/\/dailyai.com\/da\/author\/eugene\/"}]}},"_links":{"self":[{"href":"https:\/\/dailyai.com\/da\/wp-json\/wp\/v2\/posts\/10028","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dailyai.com\/da\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dailyai.com\/da\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dailyai.com\/da\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/dailyai.com\/da\/wp-json\/wp\/v2\/comments?post=10028"}],"version-history":[{"count":3,"href":"https:\/\/dailyai.com\/da\/wp-json\/wp\/v2\/posts\/10028\/revisions"}],"predecessor-version":[{"id":10033,"href":"https:\/\/dailyai.com\/da\/wp-json\/wp\/v2\/posts\/10028\/revisions\/10033"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dailyai.com\/da\/wp-json\/wp\/v2\/media\/10031"}],"wp:attachment":[{"href":"https:\/\/dailyai.com\/da\/wp-json\/wp\/v2\/media?parent=10028"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dailyai.com\/da\/wp-json\/wp\/v2\/categories?post=10028"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dailyai.com\/da\/wp-json\/wp\/v2\/tags?post=10028"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}