{"id":10028,"date":"2024-02-14T13:20:29","date_gmt":"2024-02-14T13:20:29","guid":{"rendered":"https:\/\/dailyai.com\/?p=10028"},"modified":"2024-02-14T13:20:29","modified_gmt":"2024-02-14T13:20:29","slug":"ibm-security-shows-how-ai-can-hijack-audio-conversations","status":"publish","type":"post","link":"https:\/\/dailyai.com\/pt\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/","title":{"rendered":"A IBM Security mostra como a IA pode sequestrar conversas \u00e1udio"},"content":{"rendered":"<p><strong>A IBM Security publicou uma investiga\u00e7\u00e3o no seu blogue Security Intelligence que mostra como os clones de voz de IA podem ser injectados numa conversa em direto sem que os participantes se apercebam.<\/strong><\/p>\n<p>\u00c0 medida que a tecnologia de clonagem de voz melhora, temos visto <a href=\"https:\/\/dailyai.com\/pt\/2024\/01\/robocall-impersonating-joe-biden-surfaces-in-new-hampshire\/\">chamadas autom\u00e1ticas falsas<\/a> fingindo ser Joe Biden e chamadas fraudulentas fingindo ser um familiar em dificuldades a pedir dinheiro.<\/p>\n<p>O \u00e1udio destas chamadas soa bem, mas a chamada fraudulenta \u00e9 muitas vezes facilmente frustrada se forem feitas algumas perguntas pessoais para identificar o autor da chamada como um impostor.<\/p>\n<p>No seu ataque avan\u00e7ado de prova de conceito, os <a href=\"https:\/\/securityintelligence.com\/posts\/using-generative-ai-distort-live-audio-transactions\/\" target=\"_blank\" rel=\"noopener\">Investigadores de seguran\u00e7a da IBM<\/a> demonstraram que um LLM associado a uma clonagem de voz poderia atuar como um \"man-in-the-middle\" para sequestrar apenas uma parte crucial de uma conversa, em vez de toda a chamada.<\/p>\n<h2>Como funciona<\/h2>\n<p>O ataque pode ser efectuado atrav\u00e9s de malware instalado nos telefones das v\u00edtimas ou de um servi\u00e7o de voz sobre IP (VoIP) malicioso e comprometido. Uma vez instalado, o programa monitoriza a conversa e s\u00f3 precisa de 3 segundos de \u00e1udio para poder clonar ambas as vozes.<\/p>\n<p>Um gerador de fala para texto permite ao LLM monitorizar a conversa para compreender o contexto da discuss\u00e3o. O programa foi instru\u00eddo para transmitir o \u00e1udio da conversa tal como est\u00e1, mas para modificar o \u00e1udio da chamada sempre que uma pessoa pedisse detalhes da conta banc\u00e1ria.<\/p>\n<p>Quando a pessoa responde para fornecer os dados da sua conta banc\u00e1ria, o clone de voz modifica o \u00e1udio para fornecer os dados banc\u00e1rios do burl\u00e3o. A lat\u00eancia no \u00e1udio durante a modifica\u00e7\u00e3o \u00e9 coberta com algum discurso de preenchimento.<\/p>\n<p>Eis uma ilustra\u00e7\u00e3o de como funciona o ataque de prova de conceito (PoC).<\/p>\n<figure id=\"attachment_10030\" aria-describedby=\"caption-attachment-10030\" style=\"width: 1278px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-10030\" src=\"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/hijacked-conversation.png\" alt=\"\" width=\"1278\" height=\"1136\" srcset=\"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/hijacked-conversation.png 1278w, https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/hijacked-conversation-300x267.png 300w, https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/hijacked-conversation-1024x910.png 1024w, https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/hijacked-conversation-768x683.png 768w, https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/hijacked-conversation-370x329.png 370w, https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/hijacked-conversation-800x711.png 800w, https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/hijacked-conversation-20x18.png 20w, https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/hijacked-conversation-740x658.png 740w, https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/hijacked-conversation-54x48.png 54w\" sizes=\"auto, (max-width: 1278px) 100vw, 1278px\" \/><figcaption id=\"caption-attachment-10030\" class=\"wp-caption-text\">Ilustra\u00e7\u00e3o de como a IA modifica uma parte da conversa. Conversa n\u00e3o modificada a preto e \u00e1udio modificado indicado a vermelho. Fonte: Intelig\u00eancia de Seguran\u00e7a<\/figcaption><\/figure>\n<p>Como o LLM est\u00e1 a transmitir \u00e1udio n\u00e3o modificado durante a maior parte da chamada, \u00e9 realmente dif\u00edcil saber que a amea\u00e7a est\u00e1 em jogo.<\/p>\n<p>Segundo os investigadores, o mesmo ataque \"poderia tamb\u00e9m modificar informa\u00e7\u00f5es m\u00e9dicas, como o tipo de sangue e as alergias nas conversas; poderia ordenar a um analista que vendesse ou comprasse ac\u00e7\u00f5es; poderia dar instru\u00e7\u00f5es a um piloto para mudar de rota\".<\/p>\n<p>Os investigadores afirmaram que \"construir este PoC foi surpreendentemente e assustadoramente f\u00e1cil\". \u00c0 medida que a entoa\u00e7\u00e3o e a emo\u00e7\u00e3o dos clones de voz melhoram e que um melhor hardware reduz a lat\u00eancia, este tipo de ataque seria realmente dif\u00edcil de detetar ou prevenir.<\/p>\n<p>Alargando o conceito para al\u00e9m do sequestro de uma conversa \u00e1udio, os investigadores afirmaram que, com \"os modelos existentes que podem converter texto em v\u00eddeo, \u00e9 teoricamente poss\u00edvel intercetar um v\u00eddeo transmitido em direto, como um notici\u00e1rio na televis\u00e3o, e substituir o conte\u00fado original por um manipulado\".<\/p>\n<p>Pode ser mais seguro acreditar apenas nos seus olhos e ouvidos quando est\u00e1 fisicamente na presen\u00e7a da pessoa com quem est\u00e1 a falar.<\/p>","protected":false},"excerpt":{"rendered":"<p>A IBM Security publicou uma investiga\u00e7\u00e3o no seu blogue Security Intelligence que mostra como os clones de voz de IA podem ser injectados numa conversa em direto sem que os participantes se apercebam. \u00c0 medida que a tecnologia de clonagem de voz melhora, temos visto falsas chamadas rob\u00f3ticas que fingem ser Joe Biden e chamadas fraudulentas que fingem ser um familiar em dificuldades a pedir dinheiro. O \u00e1udio destas chamadas soa bem, mas a chamada fraudulenta \u00e9 muitas vezes facilmente frustrada se forem feitas algumas perguntas pessoais para identificar o autor da chamada como um impostor. No seu ataque avan\u00e7ado de prova de conceito, os investigadores da IBM Security mostraram que um LLM associado \u00e0 voz<\/p>","protected":false},"author":6,"featured_media":10031,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[84],"tags":[163,94,107],"class_list":["post-10028","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-industry","tag-ai-risks","tag-deep-fakes","tag-generative-ai"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IBM Security shows how AI can hijack audio conversations | DailyAI<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dailyai.com\/pt\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/\" \/>\n<meta property=\"og:locale\" content=\"pt_PT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IBM Security shows how AI can hijack audio conversations | DailyAI\" \/>\n<meta property=\"og:description\" content=\"IBM Security published research on its Security Intelligence blog to show how AI voice clones could be injected into a live conversation without the participants realizing it. As voice cloning technology improves, we\u2019ve seen fake robocalls pretending to be Joe Biden and scam calls pretending to be a distressed family member asking for money. The audio in these calls sounds good, but the scam call is often easily thwarted by asking a few personal questions to identify the caller as an imposter. In their advanced proof of concept attack, the IBM Security researchers showed that an LLM coupled with voice\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dailyai.com\/pt\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/\" \/>\n<meta property=\"og:site_name\" content=\"DailyAI\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-14T13:20:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/AI-man-in-the-middle-call-hijack.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"384\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Eugene van der Watt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@DailyAIOfficial\" \/>\n<meta name=\"twitter:site\" content=\"@DailyAIOfficial\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Eugene van der Watt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo estimado de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/\"},\"author\":{\"name\":\"Eugene van der Watt\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/#\\\/schema\\\/person\\\/7ce525c6d0c79838b7cc7cde96993cfa\"},\"headline\":\"IBM Security shows how AI can hijack audio conversations\",\"datePublished\":\"2024-02-14T13:20:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/\"},\"wordCount\":467,\"publisher\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/AI-man-in-the-middle-call-hijack.jpg\",\"keywords\":[\"AI risks\",\"Deep fakes\",\"Generative AI\"],\"articleSection\":[\"Industry\"],\"inLanguage\":\"pt-PT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/\",\"url\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/\",\"name\":\"IBM Security shows how AI can hijack audio conversations | DailyAI\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/AI-man-in-the-middle-call-hijack.jpg\",\"datePublished\":\"2024-02-14T13:20:29+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/#breadcrumb\"},\"inLanguage\":\"pt-PT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/#primaryimage\",\"url\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/AI-man-in-the-middle-call-hijack.jpg\",\"contentUrl\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/AI-man-in-the-middle-call-hijack.jpg\",\"width\":1000,\"height\":384},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/dailyai.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IBM Security shows how AI can hijack audio conversations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/#website\",\"url\":\"https:\\\/\\\/dailyai.com\\\/\",\"name\":\"DailyAI\",\"description\":\"Your Daily Dose of AI News\",\"publisher\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/dailyai.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-PT\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/#organization\",\"name\":\"DailyAI\",\"url\":\"https:\\\/\\\/dailyai.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Daily-Ai_TL_colour.png\",\"contentUrl\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Daily-Ai_TL_colour.png\",\"width\":4501,\"height\":934,\"caption\":\"DailyAI\"},\"image\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/DailyAIOfficial\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/dailyaiofficial\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@DailyAIOfficial\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/#\\\/schema\\\/person\\\/7ce525c6d0c79838b7cc7cde96993cfa\",\"name\":\"Eugene van der Watt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/Eugine_Profile_Picture-96x96.png\",\"url\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/Eugine_Profile_Picture-96x96.png\",\"contentUrl\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/Eugine_Profile_Picture-96x96.png\",\"caption\":\"Eugene van der Watt\"},\"description\":\"Eugene comes from an electronic engineering background and loves all things tech. When he takes a break from consuming AI news you'll find him at the snooker table.\",\"sameAs\":[\"www.linkedin.com\\\/in\\\/eugene-van-der-watt-16828119\"],\"url\":\"https:\\\/\\\/dailyai.com\\\/pt\\\/author\\\/eugene\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IBM Security mostra como a IA pode sequestrar conversas \u00e1udio | DailyAI","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dailyai.com\/pt\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/","og_locale":"pt_PT","og_type":"article","og_title":"IBM Security shows how AI can hijack audio conversations | DailyAI","og_description":"IBM Security published research on its Security Intelligence blog to show how AI voice clones could be injected into a live conversation without the participants realizing it. As voice cloning technology improves, we\u2019ve seen fake robocalls pretending to be Joe Biden and scam calls pretending to be a distressed family member asking for money. The audio in these calls sounds good, but the scam call is often easily thwarted by asking a few personal questions to identify the caller as an imposter. In their advanced proof of concept attack, the IBM Security researchers showed that an LLM coupled with voice","og_url":"https:\/\/dailyai.com\/pt\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/","og_site_name":"DailyAI","article_published_time":"2024-02-14T13:20:29+00:00","og_image":[{"width":1000,"height":384,"url":"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/AI-man-in-the-middle-call-hijack.jpg","type":"image\/jpeg"}],"author":"Eugene van der Watt","twitter_card":"summary_large_image","twitter_creator":"@DailyAIOfficial","twitter_site":"@DailyAIOfficial","twitter_misc":{"Escrito por":"Eugene van der Watt","Tempo estimado de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/#article","isPartOf":{"@id":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/"},"author":{"name":"Eugene van der Watt","@id":"https:\/\/dailyai.com\/#\/schema\/person\/7ce525c6d0c79838b7cc7cde96993cfa"},"headline":"IBM Security shows how AI can hijack audio conversations","datePublished":"2024-02-14T13:20:29+00:00","mainEntityOfPage":{"@id":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/"},"wordCount":467,"publisher":{"@id":"https:\/\/dailyai.com\/#organization"},"image":{"@id":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/#primaryimage"},"thumbnailUrl":"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/AI-man-in-the-middle-call-hijack.jpg","keywords":["AI risks","Deep fakes","Generative AI"],"articleSection":["Industry"],"inLanguage":"pt-PT"},{"@type":"WebPage","@id":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/","url":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/","name":"IBM Security mostra como a IA pode sequestrar conversas \u00e1udio | DailyAI","isPartOf":{"@id":"https:\/\/dailyai.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/#primaryimage"},"image":{"@id":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/#primaryimage"},"thumbnailUrl":"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/AI-man-in-the-middle-call-hijack.jpg","datePublished":"2024-02-14T13:20:29+00:00","breadcrumb":{"@id":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/#breadcrumb"},"inLanguage":"pt-PT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/"]}]},{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/#primaryimage","url":"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/AI-man-in-the-middle-call-hijack.jpg","contentUrl":"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/AI-man-in-the-middle-call-hijack.jpg","width":1000,"height":384},{"@type":"BreadcrumbList","@id":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dailyai.com\/"},{"@type":"ListItem","position":2,"name":"IBM Security shows how AI can hijack audio conversations"}]},{"@type":"WebSite","@id":"https:\/\/dailyai.com\/#website","url":"https:\/\/dailyai.com\/","name":"DailyAI","description":"A sua dose di\u00e1ria de not\u00edcias sobre IA","publisher":{"@id":"https:\/\/dailyai.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dailyai.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-PT"},{"@type":"Organization","@id":"https:\/\/dailyai.com\/#organization","name":"DailyAI","url":"https:\/\/dailyai.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/dailyai.com\/#\/schema\/logo\/image\/","url":"https:\/\/dailyai.com\/wp-content\/uploads\/2023\/06\/Daily-Ai_TL_colour.png","contentUrl":"https:\/\/dailyai.com\/wp-content\/uploads\/2023\/06\/Daily-Ai_TL_colour.png","width":4501,"height":934,"caption":"DailyAI"},"image":{"@id":"https:\/\/dailyai.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/DailyAIOfficial","https:\/\/www.linkedin.com\/company\/dailyaiofficial\/","https:\/\/www.youtube.com\/@DailyAIOfficial"]},{"@type":"Person","@id":"https:\/\/dailyai.com\/#\/schema\/person\/7ce525c6d0c79838b7cc7cde96993cfa","name":"Eugene van der Watt","image":{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/dailyai.com\/wp-content\/uploads\/2023\/07\/Eugine_Profile_Picture-96x96.png","url":"https:\/\/dailyai.com\/wp-content\/uploads\/2023\/07\/Eugine_Profile_Picture-96x96.png","contentUrl":"https:\/\/dailyai.com\/wp-content\/uploads\/2023\/07\/Eugine_Profile_Picture-96x96.png","caption":"Eugene van der Watt"},"description":"Eugene vem de uma forma\u00e7\u00e3o em engenharia eletr\u00f3nica e adora tudo o que \u00e9 tecnologia. Quando faz uma pausa no consumo de not\u00edcias sobre IA, pode encontr\u00e1-lo \u00e0 mesa de snooker.","sameAs":["www.linkedin.com\/in\/eugene-van-der-watt-16828119"],"url":"https:\/\/dailyai.com\/pt\/author\/eugene\/"}]}},"_links":{"self":[{"href":"https:\/\/dailyai.com\/pt\/wp-json\/wp\/v2\/posts\/10028","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dailyai.com\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dailyai.com\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dailyai.com\/pt\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/dailyai.com\/pt\/wp-json\/wp\/v2\/comments?post=10028"}],"version-history":[{"count":3,"href":"https:\/\/dailyai.com\/pt\/wp-json\/wp\/v2\/posts\/10028\/revisions"}],"predecessor-version":[{"id":10033,"href":"https:\/\/dailyai.com\/pt\/wp-json\/wp\/v2\/posts\/10028\/revisions\/10033"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dailyai.com\/pt\/wp-json\/wp\/v2\/media\/10031"}],"wp:attachment":[{"href":"https:\/\/dailyai.com\/pt\/wp-json\/wp\/v2\/media?parent=10028"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dailyai.com\/pt\/wp-json\/wp\/v2\/categories?post=10028"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dailyai.com\/pt\/wp-json\/wp\/v2\/tags?post=10028"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}