{"id":10028,"date":"2024-02-14T13:20:29","date_gmt":"2024-02-14T13:20:29","guid":{"rendered":"https:\/\/dailyai.com\/?p=10028"},"modified":"2024-02-14T13:20:29","modified_gmt":"2024-02-14T13:20:29","slug":"ibm-security-shows-how-ai-can-hijack-audio-conversations","status":"publish","type":"post","link":"https:\/\/dailyai.com\/sv\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/","title":{"rendered":"IBM Security visar hur AI kan kapa ljudkonversationer"},"content":{"rendered":"<p><strong>IBM Security publicerade forskning p\u00e5 sin Security Intelligence-blogg f\u00f6r att visa hur AI-r\u00f6stkloner kan injiceras i en livekonversation utan att deltagarna inser det.<\/strong><\/p>\n<p>I takt med att tekniken f\u00f6r r\u00f6stkloning f\u00f6rb\u00e4ttras har vi sett <a href=\"https:\/\/dailyai.com\/sv\/2024\/01\/robocall-impersonating-joe-biden-surfaces-in-new-hampshire\/\">falska robotsamtal<\/a> som utger sig f\u00f6r att vara Joe Biden och bluffsamtal som utger sig f\u00f6r att vara en n\u00f6dst\u00e4lld familjemedlem som ber om pengar.<\/p>\n<p>Ljudet i dessa samtal l\u00e5ter bra, men bluffsamtalet \u00e4r ofta l\u00e4tt att avstyra genom att st\u00e4lla n\u00e5gra personliga fr\u00e5gor f\u00f6r att identifiera den som ringer som en bedragare.<\/p>\n<p>I sin avancerade \"proof of concept\"-attack har <a href=\"https:\/\/securityintelligence.com\/posts\/using-generative-ai-distort-live-audio-transactions\/\" target=\"_blank\" rel=\"noopener\">IBM:s s\u00e4kerhetsforskare<\/a> visade att en LLM i kombination med r\u00f6stkloning kunde fungera som en man i mitten f\u00f6r att kapa endast en viktig del av ett samtal, snarare \u00e4n hela samtalet.<\/p>\n<h2>S\u00e5 h\u00e4r fungerar det<\/h2>\n<p>Attacken kan ske via skadlig kod som installeras p\u00e5 offrens telefoner eller via en skadlig VoIP-tj\u00e4nst (Voice over IP). V\u00e4l p\u00e5 plats \u00f6vervakar programmet konversationen och beh\u00f6ver bara 3 sekunders ljud f\u00f6r att kunna klona b\u00e5da r\u00f6sterna.<\/p>\n<p>En tal-till-text-generator g\u00f6r det m\u00f6jligt f\u00f6r LLM att \u00f6vervaka samtalet f\u00f6r att f\u00f6rst\u00e5 sammanhanget i diskussionen. Programmet instruerades att vidarebefordra samtalsljudet som det \u00e4r men att \u00e4ndra samtalsljudet n\u00e4r en person beg\u00e4r bankkontouppgifter.<\/p>\n<p>N\u00e4r personen svarar med att ange sina bankkontouppgifter \u00e4ndrar r\u00f6stklonen ljudet s\u00e5 att det i st\u00e4llet inneh\u00e5ller bedragarens bankuppgifter. F\u00f6rdr\u00f6jningen i ljudet under modifieringen t\u00e4cks med lite fyllnadstal.<\/p>\n<p>H\u00e4r f\u00f6ljer en illustration av hur PoC-attacken (Proof of Concept) fungerar.<\/p>\n<figure id=\"attachment_10030\" aria-describedby=\"caption-attachment-10030\" style=\"width: 1278px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-10030\" src=\"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/hijacked-conversation.png\" alt=\"\" width=\"1278\" height=\"1136\" srcset=\"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/hijacked-conversation.png 1278w, https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/hijacked-conversation-300x267.png 300w, https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/hijacked-conversation-1024x910.png 1024w, https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/hijacked-conversation-768x683.png 768w, https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/hijacked-conversation-370x329.png 370w, https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/hijacked-conversation-800x711.png 800w, https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/hijacked-conversation-20x18.png 20w, https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/hijacked-conversation-740x658.png 740w, https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/hijacked-conversation-54x48.png 54w\" sizes=\"auto, (max-width: 1278px) 100vw, 1278px\" \/><figcaption id=\"caption-attachment-10030\" class=\"wp-caption-text\">Illustration av hur AI modifierar en del av samtalet. Omodifierad konversation i svart och modifierat ljud i r\u00f6tt. K\u00e4lla: Security Intelligence: Security Intelligence<\/figcaption><\/figure>\n<p>Eftersom LLM vidarebefordrar of\u00f6r\u00e4ndrat ljud under st\u00f6rre delen av samtalet \u00e4r det verkligen sv\u00e5rt att veta att hotet \u00e4r i spel.<\/p>\n<p>Forskarna sa att samma attack \"ocks\u00e5 skulle kunna \u00e4ndra medicinsk information, s\u00e5som blodgrupp och allergier i konversationer; den skulle kunna beordra en analytiker att s\u00e4lja eller k\u00f6pa en aktie; den skulle kunna instruera en pilot att omdirigera.\"<\/p>\n<p>Forskarna sa att \"att bygga denna PoC var f\u00f6rv\u00e5nansv\u00e4rt och skr\u00e4mmande l\u00e4tt.\" I takt med att intonationen och k\u00e4nslan hos r\u00f6stkloner f\u00f6rb\u00e4ttras och b\u00e4ttre h\u00e5rdvara minskar latensen, skulle den h\u00e4r typen av attack vara mycket sv\u00e5r att uppt\u00e4cka eller f\u00f6rhindra.<\/p>\n<p>Forskarna utvidgar konceptet till att omfatta mer \u00e4n att kapa en ljudkonversation och s\u00e4ger att med \"befintliga modeller som kan konvertera text till video \u00e4r det teoretiskt m\u00f6jligt att f\u00e5nga upp en livestreamad video, t.ex. nyheter p\u00e5 TV, och ers\u00e4tta originalinneh\u00e5llet med ett manipulerat inneh\u00e5ll\".<\/p>\n<p>Det kan vara s\u00e4krare att bara tro p\u00e5 dina \u00f6gon och \u00f6ron n\u00e4r du fysiskt befinner dig i n\u00e4rheten av den person du talar med.<\/p>","protected":false},"excerpt":{"rendered":"<p>IBM Security publicerade forskning p\u00e5 sin Security Intelligence-blogg f\u00f6r att visa hur AI-r\u00f6stkloner kan injiceras i en livekonversation utan att deltagarna inser det. I takt med att r\u00f6stkloningstekniken f\u00f6rb\u00e4ttras har vi sett falska robocalls som l\u00e5tsas vara Joe Biden och bluffsamtal som l\u00e5tsas vara en n\u00f6dst\u00e4lld familjemedlem som ber om pengar. Ljudet i dessa samtal l\u00e5ter bra, men bluffsamtalet \u00e4r ofta l\u00e4tt att avv\u00e4rja genom att st\u00e4lla n\u00e5gra personliga fr\u00e5gor f\u00f6r att identifiera den som ringer som en bedragare. I sin avancerade proof of concept-attack visade IBM Security-forskarna att en LLM i kombination med r\u00f6st<\/p>","protected":false},"author":6,"featured_media":10031,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[84],"tags":[163,94,107],"class_list":["post-10028","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-industry","tag-ai-risks","tag-deep-fakes","tag-generative-ai"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IBM Security shows how AI can hijack audio conversations | DailyAI<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dailyai.com\/sv\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/\" \/>\n<meta property=\"og:locale\" content=\"sv_SE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IBM Security shows how AI can hijack audio conversations | DailyAI\" \/>\n<meta property=\"og:description\" content=\"IBM Security published research on its Security Intelligence blog to show how AI voice clones could be injected into a live conversation without the participants realizing it. As voice cloning technology improves, we\u2019ve seen fake robocalls pretending to be Joe Biden and scam calls pretending to be a distressed family member asking for money. The audio in these calls sounds good, but the scam call is often easily thwarted by asking a few personal questions to identify the caller as an imposter. In their advanced proof of concept attack, the IBM Security researchers showed that an LLM coupled with voice\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dailyai.com\/sv\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/\" \/>\n<meta property=\"og:site_name\" content=\"DailyAI\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-14T13:20:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/AI-man-in-the-middle-call-hijack.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"384\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Eugene van der Watt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@DailyAIOfficial\" \/>\n<meta name=\"twitter:site\" content=\"@DailyAIOfficial\" \/>\n<meta name=\"twitter:label1\" content=\"Skriven av\" \/>\n\t<meta name=\"twitter:data1\" content=\"Eugene van der Watt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Ber\u00e4knad l\u00e4stid\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/\"},\"author\":{\"name\":\"Eugene van der Watt\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/#\\\/schema\\\/person\\\/7ce525c6d0c79838b7cc7cde96993cfa\"},\"headline\":\"IBM Security shows how AI can hijack audio conversations\",\"datePublished\":\"2024-02-14T13:20:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/\"},\"wordCount\":467,\"publisher\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/AI-man-in-the-middle-call-hijack.jpg\",\"keywords\":[\"AI risks\",\"Deep fakes\",\"Generative AI\"],\"articleSection\":[\"Industry\"],\"inLanguage\":\"sv-SE\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/\",\"url\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/\",\"name\":\"IBM Security shows how AI can hijack audio conversations | DailyAI\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/AI-man-in-the-middle-call-hijack.jpg\",\"datePublished\":\"2024-02-14T13:20:29+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/#breadcrumb\"},\"inLanguage\":\"sv-SE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/#primaryimage\",\"url\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/AI-man-in-the-middle-call-hijack.jpg\",\"contentUrl\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/AI-man-in-the-middle-call-hijack.jpg\",\"width\":1000,\"height\":384},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/02\\\/ibm-security-shows-how-ai-can-hijack-audio-conversations\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/dailyai.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IBM Security shows how AI can hijack audio conversations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/#website\",\"url\":\"https:\\\/\\\/dailyai.com\\\/\",\"name\":\"DailyAI\",\"description\":\"Your Daily Dose of AI News\",\"publisher\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/dailyai.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sv-SE\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/#organization\",\"name\":\"DailyAI\",\"url\":\"https:\\\/\\\/dailyai.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Daily-Ai_TL_colour.png\",\"contentUrl\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Daily-Ai_TL_colour.png\",\"width\":4501,\"height\":934,\"caption\":\"DailyAI\"},\"image\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/DailyAIOfficial\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/dailyaiofficial\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@DailyAIOfficial\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/#\\\/schema\\\/person\\\/7ce525c6d0c79838b7cc7cde96993cfa\",\"name\":\"Eugene van der Watt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/Eugine_Profile_Picture-96x96.png\",\"url\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/Eugine_Profile_Picture-96x96.png\",\"contentUrl\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/Eugine_Profile_Picture-96x96.png\",\"caption\":\"Eugene van der Watt\"},\"description\":\"Eugene comes from an electronic engineering background and loves all things tech. When he takes a break from consuming AI news you'll find him at the snooker table.\",\"sameAs\":[\"www.linkedin.com\\\/in\\\/eugene-van-der-watt-16828119\"],\"url\":\"https:\\\/\\\/dailyai.com\\\/sv\\\/author\\\/eugene\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IBM Security visar hur AI kan kapa ljudkonversationer | DailyAI","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dailyai.com\/sv\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/","og_locale":"sv_SE","og_type":"article","og_title":"IBM Security shows how AI can hijack audio conversations | DailyAI","og_description":"IBM Security published research on its Security Intelligence blog to show how AI voice clones could be injected into a live conversation without the participants realizing it. As voice cloning technology improves, we\u2019ve seen fake robocalls pretending to be Joe Biden and scam calls pretending to be a distressed family member asking for money. The audio in these calls sounds good, but the scam call is often easily thwarted by asking a few personal questions to identify the caller as an imposter. In their advanced proof of concept attack, the IBM Security researchers showed that an LLM coupled with voice","og_url":"https:\/\/dailyai.com\/sv\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/","og_site_name":"DailyAI","article_published_time":"2024-02-14T13:20:29+00:00","og_image":[{"width":1000,"height":384,"url":"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/AI-man-in-the-middle-call-hijack.jpg","type":"image\/jpeg"}],"author":"Eugene van der Watt","twitter_card":"summary_large_image","twitter_creator":"@DailyAIOfficial","twitter_site":"@DailyAIOfficial","twitter_misc":{"Skriven av":"Eugene van der Watt","Ber\u00e4knad l\u00e4stid":"3 minuter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/#article","isPartOf":{"@id":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/"},"author":{"name":"Eugene van der Watt","@id":"https:\/\/dailyai.com\/#\/schema\/person\/7ce525c6d0c79838b7cc7cde96993cfa"},"headline":"IBM Security shows how AI can hijack audio conversations","datePublished":"2024-02-14T13:20:29+00:00","mainEntityOfPage":{"@id":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/"},"wordCount":467,"publisher":{"@id":"https:\/\/dailyai.com\/#organization"},"image":{"@id":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/#primaryimage"},"thumbnailUrl":"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/AI-man-in-the-middle-call-hijack.jpg","keywords":["AI risks","Deep fakes","Generative AI"],"articleSection":["Industry"],"inLanguage":"sv-SE"},{"@type":"WebPage","@id":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/","url":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/","name":"IBM Security visar hur AI kan kapa ljudkonversationer | DailyAI","isPartOf":{"@id":"https:\/\/dailyai.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/#primaryimage"},"image":{"@id":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/#primaryimage"},"thumbnailUrl":"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/AI-man-in-the-middle-call-hijack.jpg","datePublished":"2024-02-14T13:20:29+00:00","breadcrumb":{"@id":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/#breadcrumb"},"inLanguage":"sv-SE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/"]}]},{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/#primaryimage","url":"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/AI-man-in-the-middle-call-hijack.jpg","contentUrl":"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/02\/AI-man-in-the-middle-call-hijack.jpg","width":1000,"height":384},{"@type":"BreadcrumbList","@id":"https:\/\/dailyai.com\/2024\/02\/ibm-security-shows-how-ai-can-hijack-audio-conversations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dailyai.com\/"},{"@type":"ListItem","position":2,"name":"IBM Security shows how AI can hijack audio conversations"}]},{"@type":"WebSite","@id":"https:\/\/dailyai.com\/#website","url":"https:\/\/dailyai.com\/","name":"DagligaAI","description":"Din dagliga dos av AI-nyheter","publisher":{"@id":"https:\/\/dailyai.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dailyai.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sv-SE"},{"@type":"Organization","@id":"https:\/\/dailyai.com\/#organization","name":"DagligaAI","url":"https:\/\/dailyai.com\/","logo":{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/dailyai.com\/#\/schema\/logo\/image\/","url":"https:\/\/dailyai.com\/wp-content\/uploads\/2023\/06\/Daily-Ai_TL_colour.png","contentUrl":"https:\/\/dailyai.com\/wp-content\/uploads\/2023\/06\/Daily-Ai_TL_colour.png","width":4501,"height":934,"caption":"DailyAI"},"image":{"@id":"https:\/\/dailyai.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/DailyAIOfficial","https:\/\/www.linkedin.com\/company\/dailyaiofficial\/","https:\/\/www.youtube.com\/@DailyAIOfficial"]},{"@type":"Person","@id":"https:\/\/dailyai.com\/#\/schema\/person\/7ce525c6d0c79838b7cc7cde96993cfa","name":"Eugene van der Watt","image":{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/dailyai.com\/wp-content\/uploads\/2023\/07\/Eugine_Profile_Picture-96x96.png","url":"https:\/\/dailyai.com\/wp-content\/uploads\/2023\/07\/Eugine_Profile_Picture-96x96.png","contentUrl":"https:\/\/dailyai.com\/wp-content\/uploads\/2023\/07\/Eugine_Profile_Picture-96x96.png","caption":"Eugene van der Watt"},"description":"Eugene kommer fr\u00e5n en bakgrund som elektronikingenj\u00f6r och \u00e4lskar allt som har med teknik att g\u00f6ra. N\u00e4r han tar en paus fr\u00e5n att konsumera AI-nyheter hittar du honom vid snookerbordet.","sameAs":["www.linkedin.com\/in\/eugene-van-der-watt-16828119"],"url":"https:\/\/dailyai.com\/sv\/author\/eugene\/"}]}},"_links":{"self":[{"href":"https:\/\/dailyai.com\/sv\/wp-json\/wp\/v2\/posts\/10028","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dailyai.com\/sv\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dailyai.com\/sv\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dailyai.com\/sv\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/dailyai.com\/sv\/wp-json\/wp\/v2\/comments?post=10028"}],"version-history":[{"count":3,"href":"https:\/\/dailyai.com\/sv\/wp-json\/wp\/v2\/posts\/10028\/revisions"}],"predecessor-version":[{"id":10033,"href":"https:\/\/dailyai.com\/sv\/wp-json\/wp\/v2\/posts\/10028\/revisions\/10033"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dailyai.com\/sv\/wp-json\/wp\/v2\/media\/10031"}],"wp:attachment":[{"href":"https:\/\/dailyai.com\/sv\/wp-json\/wp\/v2\/media?parent=10028"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dailyai.com\/sv\/wp-json\/wp\/v2\/categories?post=10028"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dailyai.com\/sv\/wp-json\/wp\/v2\/tags?post=10028"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}