{"id":10028,"date":"2024-02-14T13:20:29","date_gmt":"2024-02-14T13:20:29","guid":{"rendered":"https:\/\/dailyai.com\/?p=10028"},"modified":"2024-02-14T13:20:29","modified_gmt":"2024-02-14T13:20:29","slug":"ibm-security-shows-how-ai-can-hijack-audio-conversations","status":"publish","type":"post","link":"https:\/\/dailyai.com\/nl\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/","title":{"rendered":"IBM Security laat zien hoe AI audiogesprekken kan kapen"},"content":{"rendered":"<p><strong>IBM Security publiceerde onderzoek op zijn Security Intelligence blog om te laten zien hoe AI-stemklonen in een live gesprek kunnen worden ge\u00efnjecteerd zonder dat de deelnemers het doorhebben.<\/strong><\/p>\n<p>Naarmate de technologie voor het klonen van stemmen verbetert, hebben we gezien dat <a href=\"https:\/\/dailyai.com\/nl\/2024\/01\/robocall-impersonating-joe-biden-surfaces-in-new-hampshire\/\">nep-robocalls<\/a> die zich voordoet als Joe Biden en oplichtingsgesprekken die zich voordoen als een familielid in nood dat om geld vraagt.<\/p>\n<p>Het geluid van deze oproepen klinkt goed, maar de oplichtingsoproep is vaak eenvoudig te verijdelen door een paar persoonlijke vragen te stellen om de beller te identificeren als een bedrieger.<\/p>\n<p>In hun geavanceerde 'proof of concept'-aanval hebben de <a href=\"https:\/\/securityintelligence.com\/posts\/using-generative-ai-distort-live-audio-transactions\/\" target=\"_blank\" rel=\"noopener\">IBM Beveiligingsonderzoekers<\/a> lieten zien dat een LLM in combinatie met stem klonen kan fungeren als een man-in-the-middle om alleen een cruciaal deel van een gesprek te kapen, in plaats van het hele gesprek.<\/p>\n<h2>Hoe het werkt<\/h2>\n<p>De aanval kan worden uitgevoerd via malware die is ge\u00efnstalleerd op de telefoons van de slachtoffers of een kwaadaardige gecompromitteerde Voice over IP (VoIP) service. Eenmaal op zijn plaats, volgt het programma het gesprek en heeft slechts 3 seconden audio nodig om beide stemmen te kunnen klonen.<\/p>\n<p>Met een spraak-naar-tekst generator kan de LLM het gesprek volgen om de context van de discussie te begrijpen. Het programma kreeg de opdracht om de audio van het gesprek door te geven zoals het is, maar om de audio van het gesprek aan te passen wanneer iemand om bankgegevens vraagt.<\/p>\n<p>Wanneer de persoon antwoordt om zijn bankgegevens te geven, wijzigt de stemkloon de audio om in plaats daarvan de bankgegevens van de fraudeur te geven. De vertraging in de audio tijdens de wijziging wordt opgevangen met wat opvulspraak.<\/p>\n<p>Hier is een illustratie van hoe de proof of concept (PoC) aanval werkt.<\/p>\n<figure id=\"attachment_10030\" aria-describedby=\"caption-attachment-10030\" style=\"width: 1278px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-10030\" src=\"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/hijacked-conversation.png\" alt=\"\" width=\"1278\" height=\"1136\" srcset=\"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/hijacked-conversation.png 1278w, https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/hijacked-conversation-300x267.png 300w, https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/hijacked-conversation-1024x910.png 1024w, https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/hijacked-conversation-768x683.png 768w, https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/hijacked-conversation-370x329.png 370w, https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/hijacked-conversation-800x711.png 800w, https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/hijacked-conversation-20x18.png 20w, https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/hijacked-conversation-740x658.png 740w, https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/hijacked-conversation-54x48.png 54w\" sizes=\"auto, (max-width: 1278px) 100vw, 1278px\" \/><figcaption id=\"caption-attachment-10030\" class=\"wp-caption-text\">Illustratie van hoe AI een deel van het gesprek aanpast. Ongewijzigde conversatie in zwart en gewijzigde audio aangegeven in rood. Bron: Security Intelligence<\/figcaption><\/figure>\n<p>Omdat de LLM het grootste deel van het gesprek ongewijzigde audio doorgeeft, is het echt moeilijk om te weten of de dreiging in het spel is.<\/p>\n<p>De onderzoekers zeiden dat dezelfde aanval \"ook medische informatie zou kunnen wijzigen, zoals bloedgroep en allergie\u00ebn in gesprekken; het zou een analist kunnen bevelen om een aandeel te verkopen of te kopen; het zou een piloot kunnen instrueren om een andere route te nemen\".<\/p>\n<p>De onderzoekers zeiden dat \"het bouwen van deze PoC verrassend en angstaanjagend eenvoudig was\". Naarmate de intonatie en emotie van stemklonen verbetert en betere hardware de latentie verlaagt, zou dit soort aanvallen heel moeilijk te detecteren of te voorkomen zijn.<\/p>\n<p>De onderzoekers gingen verder dan het kapen van een audiogesprek en zeiden dat \"met bestaande modellen die tekst in video kunnen omzetten, het theoretisch mogelijk is om een live gestreamde video, zoals nieuws op tv, te onderscheppen en de originele inhoud te vervangen door een gemanipuleerde inhoud\".<\/p>\n<p>Het kan veiliger zijn om alleen je ogen en oren te geloven als je fysiek in de aanwezigheid bent van de persoon met wie je spreekt.<\/p>","protected":false},"excerpt":{"rendered":"<p>IBM Security heeft onderzoek gepubliceerd op zijn Security Intelligence blog om te laten zien hoe AI-stemklonen in een live gesprek kunnen worden ge\u00efnjecteerd zonder dat de deelnemers het doorhebben. Nu de technologie voor het klonen van stemmen steeds beter wordt, hebben we valse robocalls gezien die zich voordeden als Joe Biden en oplichtingsgesprekken die zich voordoen als een familielid in nood dat om geld vraagt. De audio van deze oproepen klinkt goed, maar het oplichtingsgesprek is vaak eenvoudig te verijdelen door een paar persoonlijke vragen te stellen om de beller te identificeren als een bedrieger. In hun geavanceerde 'proof of concept'-aanval toonden de IBM Security-onderzoekers aan dat een LLM in combinatie met spraak<\/p>","protected":false},"author":6,"featured_media":10031,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[84],"tags":[163,94,107],"class_list":["post-10028","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-industry","tag-ai-risks","tag-deep-fakes","tag-generative-ai"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IBM Security shows how AI can hijack audio conversations | DailyAI<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dailyai.com\/nl\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IBM Security shows how AI can hijack audio conversations | DailyAI\" \/>\n<meta property=\"og:description\" content=\"IBM Security published research on its Security Intelligence blog to show how AI voice clones could be injected into a live conversation without the participants realizing it. As voice cloning technology improves, we\u2019ve seen fake robocalls pretending to be Joe Biden and scam calls pretending to be a distressed family member asking for money. The audio in these calls sounds good, but the scam call is often easily thwarted by asking a few personal questions to identify the caller as an imposter. In their advanced proof of concept attack, the IBM Security researchers showed that an LLM coupled with voice\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dailyai.com\/nl\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/\" \/>\n<meta property=\"og:site_name\" content=\"DailyAI\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-14T13:20:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/AI-man-in-the-middle-call-hijack.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"384\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Eugene van der Watt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@DailyAIOfficial\" \/>\n<meta name=\"twitter:site\" content=\"@DailyAIOfficial\" \/>\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"Eugene van der Watt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/\"},\"author\":{\"name\":\"Eugene van der Watt\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/#\\\/schema\\\/person\\\/7ce525c6d0c79838b7cc7cde96993cfa\"},\"headline\":\"IBM Security shows how AI can hijack audio conversations\",\"datePublished\":\"2024-02-14T13:20:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/\"},\"wordCount\":467,\"publisher\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/AI-man-in-the-middle-call-hijack.jpg\",\"keywords\":[\"AI risks\",\"Deep fakes\",\"Generative AI\"],\"articleSection\":[\"Industry\"],\"inLanguage\":\"nl-NL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/\",\"url\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/\",\"name\":\"IBM Security shows how AI can hijack audio conversations | DailyAI\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/AI-man-in-the-middle-call-hijack.jpg\",\"datePublished\":\"2024-02-14T13:20:29+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/#primaryimage\",\"url\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/AI-man-in-the-middle-call-hijack.jpg\",\"contentUrl\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/AI-man-in-the-middle-call-hijack.jpg\",\"width\":1000,\"height\":384},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/dailyai.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IBM Security shows how AI can hijack audio conversations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/#website\",\"url\":\"https:\\\/\\\/dailyai.com\\\/\",\"name\":\"DailyAI\",\"description\":\"Your Daily Dose of AI News\",\"publisher\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/dailyai.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/#organization\",\"name\":\"DailyAI\",\"url\":\"https:\\\/\\\/dailyai.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Daily-Ai_TL_colour.png\",\"contentUrl\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Daily-Ai_TL_colour.png\",\"width\":4501,\"height\":934,\"caption\":\"DailyAI\"},\"image\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/DailyAIOfficial\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/dailyaiofficial\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@DailyAIOfficial\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/#\\\/schema\\\/person\\\/7ce525c6d0c79838b7cc7cde96993cfa\",\"name\":\"Eugene van der Watt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/Eugine_Profile_Picture-96x96.png\",\"url\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/Eugine_Profile_Picture-96x96.png\",\"contentUrl\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/Eugine_Profile_Picture-96x96.png\",\"caption\":\"Eugene van der Watt\"},\"description\":\"Eugene comes from an electronic engineering background and loves all things tech. When he takes a break from consuming AI news you'll find him at the snooker table.\",\"sameAs\":[\"www.linkedin.com\\\/in\\\/eugene-van-der-watt-16828119\"],\"url\":\"https:\\\/\\\/dailyai.com\\\/nl\\\/author\\\/eugene\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IBM Security laat zien hoe AI audioconversaties kan kapen | DailyAI","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dailyai.com\/nl\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/","og_locale":"nl_NL","og_type":"article","og_title":"IBM Security shows how AI can hijack audio conversations | DailyAI","og_description":"IBM Security published research on its Security Intelligence blog to show how AI voice clones could be injected into a live conversation without the participants realizing it. As voice cloning technology improves, we\u2019ve seen fake robocalls pretending to be Joe Biden and scam calls pretending to be a distressed family member asking for money. The audio in these calls sounds good, but the scam call is often easily thwarted by asking a few personal questions to identify the caller as an imposter. In their advanced proof of concept attack, the IBM Security researchers showed that an LLM coupled with voice","og_url":"https:\/\/dailyai.com\/nl\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/","og_site_name":"DailyAI","article_published_time":"2024-02-14T13:20:29+00:00","og_image":[{"width":1000,"height":384,"url":"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/AI-man-in-the-middle-call-hijack.jpg","type":"image\/jpeg"}],"author":"Eugene van der Watt","twitter_card":"summary_large_image","twitter_creator":"@DailyAIOfficial","twitter_site":"@DailyAIOfficial","twitter_misc":{"Geschreven door":"Eugene van der Watt","Geschatte leestijd":"3 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/#article","isPartOf":{"@id":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/"},"author":{"name":"Eugene van der Watt","@id":"https:\/\/dailyai.com\/#\/schema\/person\/7ce525c6d0c79838b7cc7cde96993cfa"},"headline":"IBM Security shows how AI can hijack audio conversations","datePublished":"2024-02-14T13:20:29+00:00","mainEntityOfPage":{"@id":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/"},"wordCount":467,"publisher":{"@id":"https:\/\/dailyai.com\/#organization"},"image":{"@id":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/#primaryimage"},"thumbnailUrl":"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/AI-man-in-the-middle-call-hijack.jpg","keywords":["AI risks","Deep fakes","Generative AI"],"articleSection":["Industry"],"inLanguage":"nl-NL"},{"@type":"WebPage","@id":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/","url":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/","name":"IBM Security laat zien hoe AI audioconversaties kan kapen | DailyAI","isPartOf":{"@id":"https:\/\/dailyai.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/#primaryimage"},"image":{"@id":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/#primaryimage"},"thumbnailUrl":"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/AI-man-in-the-middle-call-hijack.jpg","datePublished":"2024-02-14T13:20:29+00:00","breadcrumb":{"@id":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/#primaryimage","url":"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/AI-man-in-the-middle-call-hijack.jpg","contentUrl":"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/AI-man-in-the-middle-call-hijack.jpg","width":1000,"height":384},{"@type":"BreadcrumbList","@id":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dailyai.com\/"},{"@type":"ListItem","position":2,"name":"IBM Security shows how AI can hijack audio conversations"}]},{"@type":"WebSite","@id":"https:\/\/dailyai.com\/#website","url":"https:\/\/dailyai.com\/","name":"DailyAI","description":"Uw dagelijkse dosis AI-nieuws","publisher":{"@id":"https:\/\/dailyai.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dailyai.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/dailyai.com\/#organization","name":"DailyAI","url":"https:\/\/dailyai.com\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/dailyai.com\/#\/schema\/logo\/image\/","url":"https:\/\/dailyai.com\/wp-content\/uploads\/2023\/06\/Daily-Ai_TL_colour.png","contentUrl":"https:\/\/dailyai.com\/wp-content\/uploads\/2023\/06\/Daily-Ai_TL_colour.png","width":4501,"height":934,"caption":"DailyAI"},"image":{"@id":"https:\/\/dailyai.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/DailyAIOfficial","https:\/\/www.linkedin.com\/company\/dailyaiofficial\/","https:\/\/www.youtube.com\/@DailyAIOfficial"]},{"@type":"Person","@id":"https:\/\/dailyai.com\/#\/schema\/person\/7ce525c6d0c79838b7cc7cde96993cfa","name":"Eugene van der Watt","image":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/dailyai.com\/wp-content\/uploads\/2023\/07\/Eugine_Profile_Picture-96x96.png","url":"https:\/\/dailyai.com\/wp-content\/uploads\/2023\/07\/Eugine_Profile_Picture-96x96.png","contentUrl":"https:\/\/dailyai.com\/wp-content\/uploads\/2023\/07\/Eugine_Profile_Picture-96x96.png","caption":"Eugene van der Watt"},"description":"Eugene heeft een achtergrond in elektrotechniek en houdt van alles wat met techniek te maken heeft. Als hij even pauzeert van het consumeren van AI-nieuws, kun je hem aan de snookertafel vinden.","sameAs":["www.linkedin.com\/in\/eugene-van-der-watt-16828119"],"url":"https:\/\/dailyai.com\/nl\/author\/eugene\/"}]}},"_links":{"self":[{"href":"https:\/\/dailyai.com\/nl\/wp-json\/wp\/v2\/posts\/10028","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dailyai.com\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dailyai.com\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dailyai.com\/nl\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/dailyai.com\/nl\/wp-json\/wp\/v2\/comments?post=10028"}],"version-history":[{"count":3,"href":"https:\/\/dailyai.com\/nl\/wp-json\/wp\/v2\/posts\/10028\/revisions"}],"predecessor-version":[{"id":10033,"href":"https:\/\/dailyai.com\/nl\/wp-json\/wp\/v2\/posts\/10028\/revisions\/10033"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dailyai.com\/nl\/wp-json\/wp\/v2\/media\/10031"}],"wp:attachment":[{"href":"https:\/\/dailyai.com\/nl\/wp-json\/wp\/v2\/media?parent=10028"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dailyai.com\/nl\/wp-json\/wp\/v2\/categories?post=10028"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dailyai.com\/nl\/wp-json\/wp\/v2\/tags?post=10028"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}