{"id":10028,"date":"2024-02-14T13:20:29","date_gmt":"2024-02-14T13:20:29","guid":{"rendered":"https:\/\/dailyai.com\/?p=10028"},"modified":"2024-02-14T13:20:29","modified_gmt":"2024-02-14T13:20:29","slug":"ibm-security-shows-how-ai-can-hijack-audio-conversations","status":"publish","type":"post","link":"https:\/\/dailyai.com\/fr\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/","title":{"rendered":"IBM Security montre comment l'IA peut d\u00e9tourner des conversations audio"},"content":{"rendered":"<p><strong>IBM Security a publi\u00e9 sur son blog Security Intelligence une \u00e9tude montrant comment des clones vocaux d'IA pouvaient \u00eatre inject\u00e9s dans une conversation en direct sans que les participants s'en rendent compte.<\/strong><\/p>\n<p>Au fur et \u00e0 mesure que la technologie de clonage de la voix s'am\u00e9liore, nous avons vu <a href=\"https:\/\/dailyai.com\/fr\/2024\/01\/robocall-impersonating-joe-biden-surfaces-in-new-hampshire\/\">faux appels t\u00e9l\u00e9phoniques<\/a> se faisant passer pour Joe Biden et des appels frauduleux se faisant passer pour un membre de la famille en d\u00e9tresse demandant de l'argent.<\/p>\n<p>Le son de ces appels est bon, mais il est souvent facile de d\u00e9jouer l'escroquerie en posant quelques questions personnelles pour identifier l'appelant comme \u00e9tant un imposteur.<\/p>\n<p>Dans leur attaque de d\u00e9monstration avanc\u00e9e, les <a href=\"https:\/\/securityintelligence.com\/posts\/using-generative-ai-distort-live-audio-transactions\/\" target=\"_blank\" rel=\"noopener\">Chercheurs en s\u00e9curit\u00e9 d'IBM<\/a> a montr\u00e9 qu'un LLM coupl\u00e9 \u00e0 un clonage vocal pouvait agir comme un homme du milieu pour ne d\u00e9tourner qu'une partie cruciale d'une conversation, plut\u00f4t que l'ensemble de l'appel.<\/p>\n<h2>Comment cela fonctionne-t-il ?<\/h2>\n<p>L'attaque peut \u00eatre men\u00e9e via un logiciel malveillant install\u00e9 sur les t\u00e9l\u00e9phones des victimes ou via un service de voix sur IP (VoIP) malveillant compromis. Une fois en place, le programme surveille la conversation et n'a besoin que de 3 secondes d'audio pour pouvoir cloner les deux voix.<\/p>\n<p>Un g\u00e9n\u00e9rateur de texte permet au LLM de suivre la conversation afin de comprendre le contexte de la discussion. Le programme a re\u00e7u pour instruction de relayer le son de la conversation tel quel, mais de modifier le son de l'appel chaque fois qu'une personne demande des informations sur son compte bancaire.<\/p>\n<p>Lorsque la personne r\u00e9pond pour fournir ses coordonn\u00e9es bancaires, le clone vocal modifie l'audio pour fournir \u00e0 la place les coordonn\u00e9es bancaires du fraudeur. La latence dans l'audio pendant la modification est couverte par des paroles de remplissage.<\/p>\n<p>Voici une illustration du fonctionnement de l'attaque par preuve de concept (PoC).<\/p>\n<figure id=\"attachment_10030\" aria-describedby=\"caption-attachment-10030\" style=\"width: 1278px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-10030\" src=\"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/hijacked-conversation.png\" alt=\"\" width=\"1278\" height=\"1136\" srcset=\"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/hijacked-conversation.png 1278w, https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/hijacked-conversation-300x267.png 300w, https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/hijacked-conversation-1024x910.png 1024w, https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/hijacked-conversation-768x683.png 768w, https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/hijacked-conversation-370x329.png 370w, https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/hijacked-conversation-800x711.png 800w, https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/hijacked-conversation-20x18.png 20w, https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/hijacked-conversation-740x658.png 740w, https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/hijacked-conversation-54x48.png 54w\" sizes=\"auto, (max-width: 1278px) 100vw, 1278px\" \/><figcaption id=\"caption-attachment-10030\" class=\"wp-caption-text\">Illustration de la mani\u00e8re dont l'IA modifie une partie de la conversation. La conversation non modifi\u00e9e est en noir et l'audio modifi\u00e9 est indiqu\u00e9 en rouge. Source : Security Intelligence<\/figcaption><\/figure>\n<p>\u00c9tant donn\u00e9 que le LLM transmet un son non modifi\u00e9 pendant la majeure partie de l'appel, il est vraiment difficile de savoir si la menace est en jeu.<\/p>\n<p>Selon les chercheurs, la m\u00eame attaque \"pourrait \u00e9galement modifier des informations m\u00e9dicales, telles que le groupe sanguin et les allergies dans les conversations ; elle pourrait ordonner \u00e0 un analyste de vendre ou d'acheter une action ; elle pourrait ordonner \u00e0 un pilote de changer d'itin\u00e9raire\".<\/p>\n<p>Les chercheurs ont d\u00e9clar\u00e9 que \"la construction de ce PoC a \u00e9t\u00e9 \u00e9tonnamment et effroyablement facile\". \u00c0 mesure que l'intonation et l'\u00e9motion des clones vocaux s'am\u00e9liorent et qu'un meilleur mat\u00e9riel r\u00e9duit la latence, ce type d'attaque serait vraiment difficile \u00e0 d\u00e9tecter ou \u00e0 pr\u00e9venir.<\/p>\n<p>En \u00e9largissant le concept au-del\u00e0 du d\u00e9tournement d'une conversation audio, les chercheurs ont d\u00e9clar\u00e9 qu'avec \"les mod\u00e8les existants qui peuvent convertir du texte en vid\u00e9o, il est th\u00e9oriquement possible d'intercepter une vid\u00e9o diffus\u00e9e en direct, comme les informations \u00e0 la t\u00e9l\u00e9vision, et de remplacer le contenu d'origine par un contenu manipul\u00e9\".<\/p>\n<p>Il peut \u00eatre plus prudent de ne croire que ses yeux et ses oreilles lorsqu'on est physiquement en pr\u00e9sence de la personne \u00e0 qui l'on parle.<\/p>","protected":false},"excerpt":{"rendered":"<p>IBM Security a publi\u00e9 sur son blog Security Intelligence une \u00e9tude montrant comment des clones vocaux d'IA pouvaient \u00eatre inject\u00e9s dans une conversation en direct sans que les participants s'en rendent compte. \u00c0 mesure que la technologie de clonage de la voix s'am\u00e9liore, nous avons vu de faux robocalls se faisant passer pour Joe Biden et des appels frauduleux se faisant passer pour un membre de la famille en d\u00e9tresse demandant de l'argent. Le son de ces appels est bon, mais l'appel frauduleux est souvent facilement d\u00e9jou\u00e9 en posant quelques questions personnelles pour identifier l'appelant comme un imposteur. Dans leur attaque de d\u00e9monstration avanc\u00e9e, les chercheurs d'IBM Security ont montr\u00e9 qu'un LLM coupl\u00e9 \u00e0 un syst\u00e8me d'identification vocale (voice<\/p>","protected":false},"author":6,"featured_media":10031,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[84],"tags":[163,94,107],"class_list":["post-10028","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-industry","tag-ai-risks","tag-deep-fakes","tag-generative-ai"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IBM Security shows how AI can hijack audio conversations | DailyAI<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dailyai.com\/fr\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IBM Security shows how AI can hijack audio conversations | DailyAI\" \/>\n<meta property=\"og:description\" content=\"IBM Security published research on its Security Intelligence blog to show how AI voice clones could be injected into a live conversation without the participants realizing it. As voice cloning technology improves, we\u2019ve seen fake robocalls pretending to be Joe Biden and scam calls pretending to be a distressed family member asking for money. The audio in these calls sounds good, but the scam call is often easily thwarted by asking a few personal questions to identify the caller as an imposter. In their advanced proof of concept attack, the IBM Security researchers showed that an LLM coupled with voice\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dailyai.com\/fr\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/\" \/>\n<meta property=\"og:site_name\" content=\"DailyAI\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-14T13:20:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/AI-man-in-the-middle-call-hijack.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"384\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Eugene van der Watt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@DailyAIOfficial\" \/>\n<meta name=\"twitter:site\" content=\"@DailyAIOfficial\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Eugene van der Watt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/\"},\"author\":{\"name\":\"Eugene van der Watt\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/#\\\/schema\\\/person\\\/7ce525c6d0c79838b7cc7cde96993cfa\"},\"headline\":\"IBM Security shows how AI can hijack audio conversations\",\"datePublished\":\"2024-02-14T13:20:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/\"},\"wordCount\":467,\"publisher\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/AI-man-in-the-middle-call-hijack.jpg\",\"keywords\":[\"AI risks\",\"Deep fakes\",\"Generative AI\"],\"articleSection\":[\"Industry\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/\",\"url\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/\",\"name\":\"IBM Security shows how AI can hijack audio conversations | DailyAI\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/AI-man-in-the-middle-call-hijack.jpg\",\"datePublished\":\"2024-02-14T13:20:29+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/#primaryimage\",\"url\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/AI-man-in-the-middle-call-hijack.jpg\",\"contentUrl\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/AI-man-in-the-middle-call-hijack.jpg\",\"width\":1000,\"height\":384},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/dailyai.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IBM Security shows how AI can hijack audio conversations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/#website\",\"url\":\"https:\\\/\\\/dailyai.com\\\/\",\"name\":\"DailyAI\",\"description\":\"Your Daily Dose of AI News\",\"publisher\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/dailyai.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/#organization\",\"name\":\"DailyAI\",\"url\":\"https:\\\/\\\/dailyai.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Daily-Ai_TL_colour.png\",\"contentUrl\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Daily-Ai_TL_colour.png\",\"width\":4501,\"height\":934,\"caption\":\"DailyAI\"},\"image\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/DailyAIOfficial\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/dailyaiofficial\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@DailyAIOfficial\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/#\\\/schema\\\/person\\\/7ce525c6d0c79838b7cc7cde96993cfa\",\"name\":\"Eugene van der Watt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/Eugine_Profile_Picture-96x96.png\",\"url\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/Eugine_Profile_Picture-96x96.png\",\"contentUrl\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/Eugine_Profile_Picture-96x96.png\",\"caption\":\"Eugene van der Watt\"},\"description\":\"Eugene comes from an electronic engineering background and loves all things tech. When he takes a break from consuming AI news you'll find him at the snooker table.\",\"sameAs\":[\"www.linkedin.com\\\/in\\\/eugene-van-der-watt-16828119\"],\"url\":\"https:\\\/\\\/dailyai.com\\\/fr\\\/author\\\/eugene\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IBM Security montre comment l'IA peut d\u00e9tourner des conversations audio | DailyAI","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dailyai.com\/fr\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/","og_locale":"fr_FR","og_type":"article","og_title":"IBM Security shows how AI can hijack audio conversations | DailyAI","og_description":"IBM Security published research on its Security Intelligence blog to show how AI voice clones could be injected into a live conversation without the participants realizing it. As voice cloning technology improves, we\u2019ve seen fake robocalls pretending to be Joe Biden and scam calls pretending to be a distressed family member asking for money. The audio in these calls sounds good, but the scam call is often easily thwarted by asking a few personal questions to identify the caller as an imposter. In their advanced proof of concept attack, the IBM Security researchers showed that an LLM coupled with voice","og_url":"https:\/\/dailyai.com\/fr\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/","og_site_name":"DailyAI","article_published_time":"2024-02-14T13:20:29+00:00","og_image":[{"width":1000,"height":384,"url":"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/AI-man-in-the-middle-call-hijack.jpg","type":"image\/jpeg"}],"author":"Eugene van der Watt","twitter_card":"summary_large_image","twitter_creator":"@DailyAIOfficial","twitter_site":"@DailyAIOfficial","twitter_misc":{"\u00c9crit par":"Eugene van der Watt","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/#article","isPartOf":{"@id":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/"},"author":{"name":"Eugene van der Watt","@id":"https:\/\/dailyai.com\/#\/schema\/person\/7ce525c6d0c79838b7cc7cde96993cfa"},"headline":"IBM Security shows how AI can hijack audio conversations","datePublished":"2024-02-14T13:20:29+00:00","mainEntityOfPage":{"@id":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/"},"wordCount":467,"publisher":{"@id":"https:\/\/dailyai.com\/#organization"},"image":{"@id":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/#primaryimage"},"thumbnailUrl":"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/AI-man-in-the-middle-call-hijack.jpg","keywords":["AI risks","Deep fakes","Generative AI"],"articleSection":["Industry"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/","url":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/","name":"IBM Security montre comment l'IA peut d\u00e9tourner des conversations audio | DailyAI","isPartOf":{"@id":"https:\/\/dailyai.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/#primaryimage"},"image":{"@id":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/#primaryimage"},"thumbnailUrl":"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/AI-man-in-the-middle-call-hijack.jpg","datePublished":"2024-02-14T13:20:29+00:00","breadcrumb":{"@id":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/#primaryimage","url":"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/AI-man-in-the-middle-call-hijack.jpg","contentUrl":"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/AI-man-in-the-middle-call-hijack.jpg","width":1000,"height":384},{"@type":"BreadcrumbList","@id":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dailyai.com\/"},{"@type":"ListItem","position":2,"name":"IBM Security shows how AI can hijack audio conversations"}]},{"@type":"WebSite","@id":"https:\/\/dailyai.com\/#website","url":"https:\/\/dailyai.com\/","name":"DailyAI","description":"Votre dose quotidienne de nouvelles sur l'IA","publisher":{"@id":"https:\/\/dailyai.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dailyai.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/dailyai.com\/#organization","name":"DailyAI","url":"https:\/\/dailyai.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/dailyai.com\/#\/schema\/logo\/image\/","url":"https:\/\/dailyai.com\/wp-content\/uploads\/2023\/06\/Daily-Ai_TL_colour.png","contentUrl":"https:\/\/dailyai.com\/wp-content\/uploads\/2023\/06\/Daily-Ai_TL_colour.png","width":4501,"height":934,"caption":"DailyAI"},"image":{"@id":"https:\/\/dailyai.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/DailyAIOfficial","https:\/\/www.linkedin.com\/company\/dailyaiofficial\/","https:\/\/www.youtube.com\/@DailyAIOfficial"]},{"@type":"Person","@id":"https:\/\/dailyai.com\/#\/schema\/person\/7ce525c6d0c79838b7cc7cde96993cfa","name":"Eug\u00e8ne van der Watt","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/dailyai.com\/wp-content\/uploads\/2023\/07\/Eugine_Profile_Picture-96x96.png","url":"https:\/\/dailyai.com\/wp-content\/uploads\/2023\/07\/Eugine_Profile_Picture-96x96.png","contentUrl":"https:\/\/dailyai.com\/wp-content\/uploads\/2023\/07\/Eugine_Profile_Picture-96x96.png","caption":"Eugene van der Watt"},"description":"Eugene a une formation d'ing\u00e9nieur en \u00e9lectronique et adore tout ce qui touche \u00e0 la technologie. Lorsqu'il fait une pause dans sa consommation d'informations sur l'IA, vous le trouverez \u00e0 la table de snooker.","sameAs":["www.linkedin.com\/in\/eugene-van-der-watt-16828119"],"url":"https:\/\/dailyai.com\/fr\/author\/eugene\/"}]}},"_links":{"self":[{"href":"https:\/\/dailyai.com\/fr\/wp-json\/wp\/v2\/posts\/10028","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dailyai.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dailyai.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dailyai.com\/fr\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/dailyai.com\/fr\/wp-json\/wp\/v2\/comments?post=10028"}],"version-history":[{"count":3,"href":"https:\/\/dailyai.com\/fr\/wp-json\/wp\/v2\/posts\/10028\/revisions"}],"predecessor-version":[{"id":10033,"href":"https:\/\/dailyai.com\/fr\/wp-json\/wp\/v2\/posts\/10028\/revisions\/10033"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dailyai.com\/fr\/wp-json\/wp\/v2\/media\/10031"}],"wp:attachment":[{"href":"https:\/\/dailyai.com\/fr\/wp-json\/wp\/v2\/media?parent=10028"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dailyai.com\/fr\/wp-json\/wp\/v2\/categories?post=10028"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dailyai.com\/fr\/wp-json\/wp\/v2\/tags?post=10028"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}