Reference Quote

So, is 100-percent detection of deepfakes hopeless? In the very long term, 100-percent detection may be possible with a totally different approach — to authenticate every photo and video ever taken by every camera or phone using blockchain technology (which guarantees that an original has never been altered), at the time of capture. Then any photo loaded to a website must show its blockchain authentication. This process will eliminate deepfakes. However, this “upgrade” will not arrive by 2041, as it requires all devices to use it (like all AV receivers use Dolby Digital today), and blockchain needs to become fast enough to process this at scale.

Similar Quotes

Quote search results. More quotes will automatically load as you scroll down, or you can use the load more buttons.

Discovering that a fraud exists is only the first step. It has to be proved and the proof has to be absolutely watertight.

Unlimited Quote Collections

Organize your favorite quotes without limits. Create themed collections for every occasion with Premium.

A picture is worth 1,000 denials.

The fact is that pictures which are unlike reality ought not be approved, and even if they are technically fine, this is no reason why they should offhand be judged to be correct, if their subject is lacking in the principles of reality carried out with no violations.

Everyone who wishes to help bring the world out of the economic woes will line up to get a chip implanted! It's safe, simple and already available. It's been tested on animals for years. One little chip under the skin and everyone can be identified and conduct business electronically! No more theft, bad checks, waiting for checks to clear, stolen credit cards, armored cars, stolen ID, waiting lines at stores or airports, etc. Just little archways to walk through that can quickly scan who you are and automatically deduct the “cash” from your account or verify your identity! Simple! Anyone who resists this “obvious solution” will be an enemy of the state. Oh, and one more minor insignificant thing. No more privacy or independence. Big brother will be watching everything.

2.223 In order to discover whether the picture is true or false we must compare it with reality. 2.224 It cannot be discovered from the picture alone whether it is true or false. 2.225 There is no picture which is a priori true.

Share Your Favorite Quotes

Know a quote that's missing? Help grow our collection.

When something is good it will be counterfeited. It is only an unsuccessful product that will not have a fake.

...we know instantly whenever anyone touches our data—and who touched it. That’s the best one can hope for in a technologically advanced society.

It’s easy for you to tell what it’s a photo of, but to program a function that inputs nothing but the colors of all the pixels of an image and outputs an accurate caption such as “A group of young people playing a game of frisbee” had eluded all the world’s AI researchers for decades. Yet a team at Google led by Ilya Sutskever did precisely that in 2014. Input a different set of pixel colors, and it replies “A herd of elephants walking across a dry grass field,” again correctly. How did they do it? Deep Blue–style, by programming handcrafted algorithms for detecting frisbees, faces and the like? No, by creating a relatively simple neural network with no knowledge whatsoever about the physical world or its contents, and then letting it learn by exposing it to massive amounts of data. AI visionary Jeff Hawkins wrote in 2004 that “no computer can…see as well as a mouse,” but those days are now long gone.

Unfortunately, the public is all gaga over the idea of replacing a card swipe with an NFC pass-over using a smartphone. Go ahead and believe that. But if you think it is also hacker-proof, you'll be in for a surprise. It's no safer than using the mattress to stash cash. At some point, you can expect to be robbed blind.

The vast ineptitude of his pretense would be a convincing proof that this was no fraud.

We don't believe it's possible to protect digital content … What's new is this amazingly efficient distribution system for stolen property called the Internet — and no one's gonna shut down the Internet. And it only takes one stolen copy to be on the Internet. And the way we expressed it to them is: Pick one lock — open every door. It only takes one person to pick a lock. Worst case: Somebody just takes the analog outputs of their CD player and rerecords it — puts it on the Internet. You'll never stop that. So what you have to do is compete with it.

PREMIUM FEATURE
Advanced Search Filters

Filter search results by source, date, and more with our premium search tools.

Encrypted digital watermarking,” explains Balthazar. “Information gets hidden in information, like a code inside the pixels. Only visible with the right kind of key. It’s called steganography. Here,” pointing at the cylinder, “they’re using a similar technique, but done at the nano-level, with DNA as the information carrier. GFP is green fluorescent protein, in this case jellyfish genes woven into the atoms of the metal. The heat from your hand is the key.

Loading more quotes...

Loading...