{"id":12767,"date":"2023-10-10T07:46:56","date_gmt":"2023-10-10T07:46:56","guid":{"rendered":"https:\/\/bezpecnenanete.eset.com\/sk\/?p=12767"},"modified":"2024-03-19T07:47:35","modified_gmt":"2024-03-19T07:47:35","slug":"zneuzitie-hlasu-eset-experta-ako-dokaze-umela-inteligencia-vykonat-virtualny-unos","status":"publish","type":"post","link":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/aktuality\/zneuzitie-hlasu-eset-experta-ako-dokaze-umela-inteligencia-vykonat-virtualny-unos\/","title":{"rendered":"Zneu\u017eitie hlasu ESET experta: ako dok\u00e1\u017ee umel\u00e1 inteligencia vykona\u0165 virtu\u00e1lny \u00fanos?"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2023\/10\/voice-theft-1920x1080-2-1024x576.png\" alt=\"virtualny unos nahlaodvy obrazok ESET\" class=\"wp-image-12768\" srcset=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2023\/10\/voice-theft-1920x1080-2-1024x576.png 1024w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2023\/10\/voice-theft-1920x1080-2-300x169.png 300w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2023\/10\/voice-theft-1920x1080-2-768x432.png 768w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2023\/10\/voice-theft-1920x1080-2-1536x864.png 1536w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2023\/10\/voice-theft-1920x1080-2-370x208.png 370w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2023\/10\/voice-theft-1920x1080-2-1170x658.png 1170w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2023\/10\/voice-theft-1920x1080-2-972x546.png 972w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2023\/10\/voice-theft-1920x1080-2-760x428.png 760w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2023\/10\/voice-theft-1920x1080-2-270x152.png 270w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2023\/10\/voice-theft-1920x1080-2.png 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-dark-color has-text-color\">Neskoro v&nbsp;noci sme pri&nbsp;bezmy\u0161lienkovitom prech\u00e1dzan\u00ed obsahu na&nbsp;YouTube narazili na&nbsp;video, ktor\u00e9 objas\u0148ovalo desiv\u00fd <a href=\"https:\/\/bezpecnenanete.eset.com\/sk\/it-bezpecnost\/ako-nenaletiet-podvodnikom-na-internete\/\" target=\"_blank\" rel=\"noreferrer noopener\">podvod <\/a>vyu\u017e\u00edvaj\u00faci platformy hlasovej umelej inteligencie. Odhalilo sa v&nbsp;\u0148om potenci\u00e1lne zneu\u017eitie tejto technol\u00f3gie, v&nbsp;praxi zn\u00e1mej ako virtu\u00e1lny \u00fanos. Tento \u010dl\u00e1nok sa zaober\u00e1 koncepciou virtu\u00e1lnych \u00fanosov, pou\u017e\u00edvan\u00fdmi met\u00f3dami a&nbsp;d\u00f4sledkami toho, ako dok\u00e1\u017ee umel\u00e1 inteligencia vykona\u0165 virtu\u00e1lny \u00fanos.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-dark-color has-text-color\">Pochopenie virtu\u00e1lneho \u00fanosu<\/h2>\n\n\n\n<p class=\"has-text-dark-color has-text-color\">Virtu\u00e1lny \u00fanos je <strong>druh podvodu, ktor\u00fd vyu\u017e\u00edva strach a&nbsp;paniku vznikaj\u00facu z&nbsp;toho, ke\u010f sa niekto domnieva, \u017ee do\u0161lo k&nbsp;\u00fanosu jeho bl\u00edzkej osoby.<\/strong> Namiesto fyzick\u00e9ho \u00fanosu sa podvodn\u00edk sna\u017e\u00ed vyl\u00e1ka\u0165 peniaze alebo z\u00edska\u0165 nejak\u00fa v\u00fdhodu vytvoren\u00edm presved\u010divej il\u00fazie \u00fanosu.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-text-dark-color has-text-color\">Tradi\u010dn\u00e1 met\u00f3da s&nbsp;n\u00edzkou technickou n\u00e1ro\u010dnos\u0165ou<\/h3>\n\n\n\n<p class=\"has-text-dark-color has-text-color\">Jeden z&nbsp;be\u017enej\u0161\u00edch pr\u00edstupov k&nbsp;virtu\u00e1lnemu \u00fanosu spo\u010d\u00edva v&nbsp;podvrhnut\u00ed (tzv.&nbsp;spoofingu) telef\u00f3nneho \u010d\u00edsla obete. Podvodn\u00edk zavol\u00e1 \u010dlenovi rodiny obete alebo niektor\u00e9mu z&nbsp;jej priate\u013eov a&nbsp;v&nbsp;pozad\u00ed nasimuluje chaotick\u00fa a&nbsp;hlu\u010dn\u00fa atmosf\u00e9ru, aby sa zdalo, \u017ee obe\u0165 je v&nbsp;bezprostrednom nebezpe\u010denstve. Podvodn\u00edk potom po\u017eaduje v\u00fdkupn\u00e9 za&nbsp;bezpe\u010dn\u00fd n\u00e1vrat obete domov.<\/p>\n\n\n\n<p class=\"has-text-dark-color has-bd-color-background-color has-text-color has-background\"><em>SPOOFING: <\/em><em>F<\/em><em>al\u0161ovanie identity odosielate\u013ea (v&nbsp;angli\u010dtine \u201espoofing\u201c) je roz\u0161\u00edrenou technikou, pri ktorej \u00fato\u010dn\u00edk \u00famyselne men\u00ed meno alebo e\u2011mailov\u00fa adresu&nbsp;odosielate\u013ea v&nbsp;snahe oklama\u0165 pr\u00edjemcu e\u2011mailu.&nbsp;Spoofing sa pou\u017e\u00edva aj na&nbsp;fal\u0161ovanie identity volaj\u00faceho, na&nbsp;utajenie polohy podvodn\u00edka&nbsp;\u010di&nbsp;dokonca na&nbsp;napodob\u0148ovanie telef\u00f3nneho \u010d\u00edsla d\u00f4veryhodnej organiz\u00e1cie.<\/em><\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color\">Na&nbsp;zv\u00fd\u0161enie d\u00f4veryhodnosti podvodu<strong> p\u00e1chatelia \u010dasto vyu\u017e\u00edvaj\u00fa inform\u00e1cie z&nbsp;verejne dostupn\u00fdch zdrojov na&nbsp;zhroma\u017e\u010fovanie \u00fadajov o&nbsp;obeti<\/strong> a&nbsp;jej bl\u00edzkych. Tieto inform\u00e1cie pom\u00e1haj\u00fa podvodn\u00edkom vytvori\u0165 spo\u013eahlivej\u0161ie klamstvo, napr\u00edklad sa zameriavaj\u00fa na&nbsp;osoby, o&nbsp;ktor\u00fdch vedia, \u017ee cestuj\u00fa alebo s\u00fa mimo domova, a&nbsp;sleduj\u00fa ich \u00fa\u010dty na&nbsp;soci\u00e1lnych sie\u0165ach.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-text-dark-color has-text-color\">\u0160pi\u010dkov\u00e9 klonovanie hlasu<\/h3>\n\n\n\n<p class=\"has-text-dark-color has-text-color\">Pokro\u010dilej\u0161ia a&nbsp;dokonalej\u0161ia verzia virtu\u00e1lneho \u00fanosu pozost\u00e1va zo&nbsp;z\u00edskania vzoriek hlasu obete a&nbsp;z&nbsp;pou\u017eitia platforiem umelej inteligencie na&nbsp;vytvorenie hlasov\u00e9ho klonu. Podvodn\u00edk potom m\u00f4\u017ee zavola\u0165 rodine alebo priate\u013eom obete, vyd\u00e1va\u0165 sa za \u0148u a&nbsp;\u017eiada\u0165 znepokojiv\u00e9 po\u017eiadavky.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-dark-color has-text-color\">Realizovate\u013enos\u0165 klonovania hlasu<\/h2>\n\n\n\n<p class=\"has-text-dark-color has-text-color\">Rozhodli sme sa experimentova\u0165 s&nbsp;bezplatn\u00fdm softv\u00e9rom na&nbsp;\u00fapravu vide\u00ed a&nbsp;zvuku s&nbsp;podporou umelej inteligencie, aby sme demon\u0161trovali uskuto\u010dnite\u013enos\u0165 hlasov\u00e9ho klonovania. Nahr\u00e1van\u00edm \u00fatr\u017ekov hlasu Jakea Moora (glob\u00e1lny bezpe\u010dnostn\u00fd expert spolo\u010dnosti ESET) sme sa pok\u00fasili vytvori\u0165 jeho presved\u010div\u00fd klon.<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color\">Pomocou softv\u00e9ru sme nahrali Jakeov hlas z&nbsp;r\u00f4znych vide\u00ed dostupn\u00fdch online. N\u00e1stroj vygeneroval zvukov\u00fd s\u00fabor a&nbsp;prepis, ktor\u00fd sme n\u00e1sledne odoslali slu\u017ebe na&nbsp;klonovanie hlasu zalo\u017eenej na&nbsp;umelej inteligencii. Hoci sme oh\u013eadom \u00faspe\u0161nosti experimentu boli skeptick\u00ed, do&nbsp;24&nbsp;hod\u00edn n\u00e1m pri\u0161lo e-mailov\u00e9 ozn\u00e1menie, \u017ee hlasov\u00fd klon je pripraven\u00fd na&nbsp;pou\u017eitie.<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color\">A&nbsp;tu s\u00fa v\u00fdsledky:<\/p>\n\n\n\n<iframe loading=\"lazy\" width=\"560\" height=\"515\" src=\"https:\/\/www.youtube.com\/embed\/aHF5doD1ZxU?si=YefNGkU5qFefY4tG\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\n\n\n\n<p class=\"has-bd-color-background-color has-background\"><em>AUDIO DOWNLOAD:&nbsp;<\/em><a href=\"https:\/\/web-assets.esetstatic.com\/wls\/2023\/07\/jake-s-ai-generated-fake-plea.mpeg\">Jake&#8217;s AI generated fake plea<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-dark-color has-text-color\">Obmedzenia a&nbsp;mo\u017en\u00e9 zneu\u017eitie<\/h2>\n\n\n\n<p class=\"has-text-dark-color has-text-color\">Hoci prv\u00fd pokus o&nbsp;klonovanie hlasu vykazoval nedostatky v&nbsp;tempe a&nbsp;t\u00f3ne, ako aj&nbsp;obmedzen\u00fa slovn\u00fa z\u00e1sobu, potenci\u00e1l na&nbsp;nekal\u00e9 vyu\u017eitie tejto technol\u00f3gie zost\u00e1va zrejm\u00fd. Zlo\u010dinci by mohli vyu\u017ei\u0165 virtu\u00e1lny \u00fanos zasielan\u00edm hlasov\u00fdch spr\u00e1v, ktor\u00e9 by obsahovali osobn\u00e9 inform\u00e1cie z\u00edskan\u00e9 prostredn\u00edctvom techn\u00edk OSINT (z&nbsp;verejne dostupn\u00fdch zdrojov na&nbsp;zhroma\u017e\u010fovanie \u00fadajov o&nbsp;obeti a&nbsp;jej bl\u00edzkych), \u010d\u00edm by podvod nabral na&nbsp;presved\u010divosti.<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color\">Okrem toho by sa vysokopostaven\u00e9 osoby, ako napr\u00edklad v\u00fdkonn\u00ed riaditelia technologick\u00fdch spolo\u010dnost\u00ed, mohli sta\u0165 ter\u010dom kr\u00e1de\u017ee hlasu vzh\u013eadom na&nbsp;ich verejn\u00e9 p\u00f4sobenie. Odcudzen\u00edm ich hlasov by mohli podvodn\u00edci manipulova\u0165 zamestnancov organiz\u00e1cie s&nbsp;cie\u013eom prin\u00fati\u0165 ich vykon\u00e1va\u0165 nekal\u00e9 aktivity. V&nbsp;kombin\u00e1cii <strong>s&nbsp;\u010fal\u0161\u00edmi taktikami soci\u00e1lneho in\u017einierstva by sa tak virtu\u00e1lny \u00fanos mohol sta\u0165 siln\u00fdm n\u00e1strojom<\/strong> a&nbsp;z\u00e1rove\u0148 n\u00e1ro\u010dn\u00fdm probl\u00e9mom, proti ktor\u00e9mu je potrebn\u00e9 bojova\u0165, ke\u010f\u017ee technol\u00f3gie sa neust\u00e1le zdokona\u013euj\u00fa.<\/p>\n\n\n\n<p class=\"has-text-link-color has-bd-color-background-color has-text-color has-background\"><em>ODPOR\u00da\u010cAN\u00dd \u010cL\u00c1NOK: <\/em><a href=\"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/pohlady-do-buducnosti\/umela-inteligencia-nestaci-klucom-ku-kybernetickej-bezpecnosti-je-spolupraca-technologii-a-ludskej-odbornosti\/\" target=\"_blank\" rel=\"noreferrer noopener\">Umel\u00e1 inteligencia nesta\u010d\u00ed. K\u013e\u00fa\u010dom ku kybernetickej bezpe\u010dnosti je spolupr\u00e1ca technol\u00f3gi\u00ed a \u013eudskej odbornosti<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-dark-color has-text-color\">D\u00f4vod na&nbsp;obavy?<\/h2>\n\n\n\n<p class=\"has-text-dark-color has-text-color\">T\u00e1to nov\u00e1 modifik\u00e1cia existuj\u00facej techniky virtu\u00e1lneho \u00fanosu, prostredn\u00edctvom ktorej podvodn\u00edci vytv\u00e1raj\u00fa il\u00faziu \u00fanosu bez toho, aby niekoho fyzicky vzali, predstavuje znepokojuj\u00faci v\u00fdvoj v&nbsp;oblasti po\u010d\u00edta\u010dovej kriminality. Zneu\u017e\u00edvanie platforiem hlasovej umelej inteligencie na&nbsp;klonovanie hlasov vyvol\u00e1va v\u00e1\u017ene etick\u00e9 a&nbsp;bezpe\u010dnostn\u00e9 obavy.<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color\">Vzh\u013eadom na&nbsp;technologick\u00fd pokrok je pre&nbsp;jednotlivcov, organiz\u00e1cie a&nbsp;v\u00fdvoj\u00e1rov platforiem s&nbsp;umelou inteligenciou ve\u013emi d\u00f4le\u017eit\u00e9, aby boli ostra\u017eit\u00ed, pokia\u013e ide o&nbsp;mo\u017en\u00e9 zneu\u017eitie klonovania hlasu a&nbsp;in\u00fdch podobn\u00fdch pr\u00edpadov. <strong>Zabezpe\u010denie osobn\u00fdch \u00fadajov, obozretnos\u0165 pri&nbsp;p\u00f4soben\u00ed v&nbsp;online priestore a&nbsp;implement\u00e1cia spo\u013eahliv\u00fdch bezpe\u010dnostn\u00fdch opatren\u00ed a&nbsp;\u0161kolen\u00ed m\u00f4\u017ee pom\u00f4c\u0165 zmierni\u0165 rizik\u00e1 spojen\u00e9 s&nbsp;virtu\u00e1lnymi \u00fanosmi <\/strong>a&nbsp;ochr\u00e1ni\u0165 pred neopr\u00e1vnen\u00fdmi pokusmi o&nbsp;klonovanie hlasu.<\/p>\n\n\n\n<p class=\"has-text-dark-color has-bd-color-background-color has-text-color has-background\">Zaujal v\u00e1s tento \u010dl\u00e1nok?&nbsp;<strong><a href=\"https:\/\/bezpecnenanete.eset.com\/sk\/newsletter-bezpecne-na-nete\/\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-text-link-color\">Prihl\u00e1ste sa na odber&nbsp;<\/mark><\/a><\/strong>n\u00e1\u0161ho newslettra a z\u00edskajte ka\u017ed\u00fd mesiac praktick\u00e9 rady o bezpe\u010dnosti na internete.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p class=\"has-text-dark-color has-text-color\">Spracoval: t\u00edm ESET<br>Zdroj: WeLiveSSecurity &#8211; Raj Kapoor: <a href=\"https:\/\/www.welivesecurity.com\/en\/cybercrime\/the-grand-theft-of-jake-moores-voice-the-concept-of-a-virtual-kidnap\/\">The grand theft of Jake Moore\u2019s voice: The concept of a virtual kidnap<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hoci e\u0161te st\u00e1le nie je dokonal\u00e9, klonovanie hlasu m\u00f4\u017ee ma\u0165 nebezpe\u010dn\u00e9 d\u00f4sledky.<\/p>\n","protected":false},"author":5,"featured_media":12792,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[274,165,167],"tags":[300],"class_list":["post-12767","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-aktuality","category-cybernews","category-digitalne-hrozby","tag-deepfake"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Dok\u00e1\u017ee umel\u00e1 inteligencia vykona\u0165 virtu\u00e1lny \u00fanos? | ESET<\/title>\n<meta name=\"description\" content=\"Umel\u00e1 inteligencia dok\u00e1\u017ee vytvori\u0165 podvody s fal\u0161ovan\u00edm identity \u010dloveka. Klonovanie hlasu m\u00f4\u017ee ma\u0165 nebezpe\u010dn\u00e9 d\u00f4sledky.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/aktuality\/zneuzitie-hlasu-eset-experta-ako-dokaze-umela-inteligencia-vykonat-virtualny-unos\/\" \/>\n<meta property=\"og:locale\" content=\"sk_SK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Dok\u00e1\u017ee umel\u00e1 inteligencia vykona\u0165 virtu\u00e1lny \u00fanos? | ESET\" \/>\n<meta property=\"og:description\" content=\"Umel\u00e1 inteligencia dok\u00e1\u017ee vytvori\u0165 podvody s fal\u0161ovan\u00edm identity \u010dloveka. Klonovanie hlasu m\u00f4\u017ee ma\u0165 nebezpe\u010dn\u00e9 d\u00f4sledky.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/aktuality\/zneuzitie-hlasu-eset-experta-ako-dokaze-umela-inteligencia-vykonat-virtualny-unos\/\" \/>\n<meta property=\"og:site_name\" content=\"Bezpe\u010dne na nete | ESET\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ESETnaSlovensku\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-10T07:46:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-19T07:47:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2023\/10\/voice-theft-1920x1080-2-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"ESET User\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Autor\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET User\" \/>\n\t<meta name=\"twitter:label2\" content=\"Predpokladan\u00fd \u010das \u010d\u00edtania\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 min\u00faty\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/cybernews\\\/aktuality\\\/zneuzitie-hlasu-eset-experta-ako-dokaze-umela-inteligencia-vykonat-virtualny-unos\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/cybernews\\\/aktuality\\\/zneuzitie-hlasu-eset-experta-ako-dokaze-umela-inteligencia-vykonat-virtualny-unos\\\/\"},\"author\":{\"name\":\"ESET User\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#\\\/schema\\\/person\\\/dea8a7aed2893ceadc39b5e354c5b05e\"},\"headline\":\"Zneu\u017eitie hlasu ESET experta: ako dok\u00e1\u017ee umel\u00e1 inteligencia vykona\u0165 virtu\u00e1lny \u00fanos?\",\"datePublished\":\"2023-10-10T07:46:56+00:00\",\"dateModified\":\"2024-03-19T07:47:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/cybernews\\\/aktuality\\\/zneuzitie-hlasu-eset-experta-ako-dokaze-umela-inteligencia-vykonat-virtualny-unos\\\/\"},\"wordCount\":1041,\"publisher\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/cybernews\\\/aktuality\\\/zneuzitie-hlasu-eset-experta-ako-dokaze-umela-inteligencia-vykonat-virtualny-unos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/voice-theft-1920x1080-2-1.png\",\"keywords\":[\"Deepfake\"],\"articleSection\":[\"Aktuality\",\"Cybernews\",\"Digit\u00e1lne hrozby\"],\"inLanguage\":\"sk-SK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/cybernews\\\/aktuality\\\/zneuzitie-hlasu-eset-experta-ako-dokaze-umela-inteligencia-vykonat-virtualny-unos\\\/\",\"url\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/cybernews\\\/aktuality\\\/zneuzitie-hlasu-eset-experta-ako-dokaze-umela-inteligencia-vykonat-virtualny-unos\\\/\",\"name\":\"Dok\u00e1\u017ee umel\u00e1 inteligencia vykona\u0165 virtu\u00e1lny \u00fanos? | ESET\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/cybernews\\\/aktuality\\\/zneuzitie-hlasu-eset-experta-ako-dokaze-umela-inteligencia-vykonat-virtualny-unos\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/cybernews\\\/aktuality\\\/zneuzitie-hlasu-eset-experta-ako-dokaze-umela-inteligencia-vykonat-virtualny-unos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/voice-theft-1920x1080-2-1.png\",\"datePublished\":\"2023-10-10T07:46:56+00:00\",\"dateModified\":\"2024-03-19T07:47:35+00:00\",\"description\":\"Umel\u00e1 inteligencia dok\u00e1\u017ee vytvori\u0165 podvody s fal\u0161ovan\u00edm identity \u010dloveka. Klonovanie hlasu m\u00f4\u017ee ma\u0165 nebezpe\u010dn\u00e9 d\u00f4sledky.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/cybernews\\\/aktuality\\\/zneuzitie-hlasu-eset-experta-ako-dokaze-umela-inteligencia-vykonat-virtualny-unos\\\/#breadcrumb\"},\"inLanguage\":\"sk-SK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/cybernews\\\/aktuality\\\/zneuzitie-hlasu-eset-experta-ako-dokaze-umela-inteligencia-vykonat-virtualny-unos\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/cybernews\\\/aktuality\\\/zneuzitie-hlasu-eset-experta-ako-dokaze-umela-inteligencia-vykonat-virtualny-unos\\\/#primaryimage\",\"url\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/voice-theft-1920x1080-2-1.png\",\"contentUrl\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/voice-theft-1920x1080-2-1.png\",\"width\":1920,\"height\":1080,\"caption\":\"virtualny unos ilustracny obrazok ESET\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/cybernews\\\/aktuality\\\/zneuzitie-hlasu-eset-experta-ako-dokaze-umela-inteligencia-vykonat-virtualny-unos\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Domovsk\u00e1 str\u00e1nka\",\"item\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Zneu\u017eitie hlasu ESET experta: ako dok\u00e1\u017ee umel\u00e1 inteligencia vykona\u0165 virtu\u00e1lny \u00fanos?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#website\",\"url\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/\",\"name\":\"Bezpe\u010dne na nete | ESET\",\"description\":\"Praktick\u00e9 rady, ako rozpozna\u0165 digit\u00e1lne hrozby.\",\"publisher\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sk-SK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#organization\",\"name\":\"Bezpe\u010dne na nete | ESET\",\"url\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/bnn.svg\",\"contentUrl\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/bnn.svg\",\"caption\":\"Bezpe\u010dne na nete | ESET\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ESETnaSlovensku\\\/\",\"https:\\\/\\\/www.instagram.com\\\/eset_slovensko\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/eset\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCtuph4SwEvitc5T-0cE1FuA\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#\\\/schema\\\/person\\\/dea8a7aed2893ceadc39b5e354c5b05e\",\"name\":\"ESET User\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/29915b098f8f9677cc5796ee2dd2358dd215824ff925345fe845a1eaf50bbb0d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/29915b098f8f9677cc5796ee2dd2358dd215824ff925345fe845a1eaf50bbb0d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/29915b098f8f9677cc5796ee2dd2358dd215824ff925345fe845a1eaf50bbb0d?s=96&d=mm&r=g\",\"caption\":\"ESET User\"},\"url\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/author\\\/esetuser\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Dok\u00e1\u017ee umel\u00e1 inteligencia vykona\u0165 virtu\u00e1lny \u00fanos? | ESET","description":"Umel\u00e1 inteligencia dok\u00e1\u017ee vytvori\u0165 podvody s fal\u0161ovan\u00edm identity \u010dloveka. Klonovanie hlasu m\u00f4\u017ee ma\u0165 nebezpe\u010dn\u00e9 d\u00f4sledky.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/aktuality\/zneuzitie-hlasu-eset-experta-ako-dokaze-umela-inteligencia-vykonat-virtualny-unos\/","og_locale":"sk_SK","og_type":"article","og_title":"Dok\u00e1\u017ee umel\u00e1 inteligencia vykona\u0165 virtu\u00e1lny \u00fanos? | ESET","og_description":"Umel\u00e1 inteligencia dok\u00e1\u017ee vytvori\u0165 podvody s fal\u0161ovan\u00edm identity \u010dloveka. Klonovanie hlasu m\u00f4\u017ee ma\u0165 nebezpe\u010dn\u00e9 d\u00f4sledky.","og_url":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/aktuality\/zneuzitie-hlasu-eset-experta-ako-dokaze-umela-inteligencia-vykonat-virtualny-unos\/","og_site_name":"Bezpe\u010dne na nete | ESET","article_publisher":"https:\/\/www.facebook.com\/ESETnaSlovensku\/","article_published_time":"2023-10-10T07:46:56+00:00","article_modified_time":"2024-03-19T07:47:35+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2023\/10\/voice-theft-1920x1080-2-1.png","type":"image\/png"}],"author":"ESET User","twitter_card":"summary_large_image","twitter_misc":{"Autor":"ESET User","Predpokladan\u00fd \u010das \u010d\u00edtania":"4 min\u00faty"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/aktuality\/zneuzitie-hlasu-eset-experta-ako-dokaze-umela-inteligencia-vykonat-virtualny-unos\/#article","isPartOf":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/aktuality\/zneuzitie-hlasu-eset-experta-ako-dokaze-umela-inteligencia-vykonat-virtualny-unos\/"},"author":{"name":"ESET User","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#\/schema\/person\/dea8a7aed2893ceadc39b5e354c5b05e"},"headline":"Zneu\u017eitie hlasu ESET experta: ako dok\u00e1\u017ee umel\u00e1 inteligencia vykona\u0165 virtu\u00e1lny \u00fanos?","datePublished":"2023-10-10T07:46:56+00:00","dateModified":"2024-03-19T07:47:35+00:00","mainEntityOfPage":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/aktuality\/zneuzitie-hlasu-eset-experta-ako-dokaze-umela-inteligencia-vykonat-virtualny-unos\/"},"wordCount":1041,"publisher":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#organization"},"image":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/aktuality\/zneuzitie-hlasu-eset-experta-ako-dokaze-umela-inteligencia-vykonat-virtualny-unos\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2023\/10\/voice-theft-1920x1080-2-1.png","keywords":["Deepfake"],"articleSection":["Aktuality","Cybernews","Digit\u00e1lne hrozby"],"inLanguage":"sk-SK"},{"@type":"WebPage","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/aktuality\/zneuzitie-hlasu-eset-experta-ako-dokaze-umela-inteligencia-vykonat-virtualny-unos\/","url":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/aktuality\/zneuzitie-hlasu-eset-experta-ako-dokaze-umela-inteligencia-vykonat-virtualny-unos\/","name":"Dok\u00e1\u017ee umel\u00e1 inteligencia vykona\u0165 virtu\u00e1lny \u00fanos? | ESET","isPartOf":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/aktuality\/zneuzitie-hlasu-eset-experta-ako-dokaze-umela-inteligencia-vykonat-virtualny-unos\/#primaryimage"},"image":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/aktuality\/zneuzitie-hlasu-eset-experta-ako-dokaze-umela-inteligencia-vykonat-virtualny-unos\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2023\/10\/voice-theft-1920x1080-2-1.png","datePublished":"2023-10-10T07:46:56+00:00","dateModified":"2024-03-19T07:47:35+00:00","description":"Umel\u00e1 inteligencia dok\u00e1\u017ee vytvori\u0165 podvody s fal\u0161ovan\u00edm identity \u010dloveka. Klonovanie hlasu m\u00f4\u017ee ma\u0165 nebezpe\u010dn\u00e9 d\u00f4sledky.","breadcrumb":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/aktuality\/zneuzitie-hlasu-eset-experta-ako-dokaze-umela-inteligencia-vykonat-virtualny-unos\/#breadcrumb"},"inLanguage":"sk-SK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/aktuality\/zneuzitie-hlasu-eset-experta-ako-dokaze-umela-inteligencia-vykonat-virtualny-unos\/"]}]},{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/aktuality\/zneuzitie-hlasu-eset-experta-ako-dokaze-umela-inteligencia-vykonat-virtualny-unos\/#primaryimage","url":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2023\/10\/voice-theft-1920x1080-2-1.png","contentUrl":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2023\/10\/voice-theft-1920x1080-2-1.png","width":1920,"height":1080,"caption":"virtualny unos ilustracny obrazok ESET"},{"@type":"BreadcrumbList","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/aktuality\/zneuzitie-hlasu-eset-experta-ako-dokaze-umela-inteligencia-vykonat-virtualny-unos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Domovsk\u00e1 str\u00e1nka","item":"https:\/\/bezpecnenanete.eset.com\/sk\/"},{"@type":"ListItem","position":2,"name":"Zneu\u017eitie hlasu ESET experta: ako dok\u00e1\u017ee umel\u00e1 inteligencia vykona\u0165 virtu\u00e1lny \u00fanos?"}]},{"@type":"WebSite","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#website","url":"https:\/\/bezpecnenanete.eset.com\/sk\/","name":"Bezpe\u010dne na nete | ESET","description":"Praktick\u00e9 rady, ako rozpozna\u0165 digit\u00e1lne hrozby.","publisher":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bezpecnenanete.eset.com\/sk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sk-SK"},{"@type":"Organization","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#organization","name":"Bezpe\u010dne na nete | ESET","url":"https:\/\/bezpecnenanete.eset.com\/sk\/","logo":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#\/schema\/logo\/image\/","url":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2022\/10\/bnn.svg","contentUrl":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2022\/10\/bnn.svg","caption":"Bezpe\u010dne na nete | ESET"},"image":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ESETnaSlovensku\/","https:\/\/www.instagram.com\/eset_slovensko\/","https:\/\/www.linkedin.com\/company\/eset","https:\/\/www.youtube.com\/channel\/UCtuph4SwEvitc5T-0cE1FuA"]},{"@type":"Person","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#\/schema\/person\/dea8a7aed2893ceadc39b5e354c5b05e","name":"ESET User","image":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/secure.gravatar.com\/avatar\/29915b098f8f9677cc5796ee2dd2358dd215824ff925345fe845a1eaf50bbb0d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/29915b098f8f9677cc5796ee2dd2358dd215824ff925345fe845a1eaf50bbb0d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/29915b098f8f9677cc5796ee2dd2358dd215824ff925345fe845a1eaf50bbb0d?s=96&d=mm&r=g","caption":"ESET User"},"url":"https:\/\/bezpecnenanete.eset.com\/sk\/author\/esetuser\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/posts\/12767","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/comments?post=12767"}],"version-history":[{"count":6,"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/posts\/12767\/revisions"}],"predecessor-version":[{"id":12793,"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/posts\/12767\/revisions\/12793"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/media\/12792"}],"wp:attachment":[{"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/media?parent=12767"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/categories?post=12767"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/tags?post=12767"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}