a16z Podcast - The Deepfake Dilemma: The Technology, Policy, and Economy
Episode Date: October 11, 2024Deepfakes—AI-generated fake videos and voices—have become a widespread concern across politics, social media, and more. As they become easier to create, the threat grows. But so do the tools to de...tect them.In this episode, Vijay Balasubramaniyan, cofounder and CEO of Pindrop, joins a16z’s Martin Casado to discuss how deepfakes work, how easily they can be made, and what defenses we have. They’ll also explore the role of policy and regulation in this rapidly changing space.Have we lost control of the truth? Listen to find out.Resources:Find Vijay on Twitter: https://x.com/vijay_voiceFind Martin on Twitter: https://x.com/martin_casadoStay Updated: Let us know what you think: https://ratethispodcast.com/a16zFind a16z on Twitter: https://twitter.com/a16zFind a16z on LinkedIn: https://www.linkedin.com/company/a16zSubscribe on your favorite podcast app: https://a16z.simplecast.com/Follow our host: https://twitter.com/stephsmithioPlease note that the content here is for informational purposes only; should NOT be taken as legal, business, tax, or investment advice or be used to evaluate any investment or security; and is not directed at any investors or potential investors in any a16z fund. a16z and its affiliates may maintain investments in the companies discussed. For more details please see a16z.com/disclosures.
Transcript
Discussion (0)
At the end of last year, there were 120 tools with which you can clone someone's voice.
And by March of this year, it's become 350.
Being able to identify what is real is going to become really important,
especially because now you can do all of these things at scale.
One of the reasons that spam works and deepfakes work is the marginal cost of the next call is so low
that you can do is these things in mass.
It's way cheaper to detect deepfakes.
We've had 10,000 years of evolution.
The way we produce speech has vocal cords,
has the diaphragm, has your lips and your mouth and your nasal cavity.
It's really hard for these systems to replicate all of that.
Deep fake, a portmanteau of deep learning and fake,
that started making its way into the public consciousness in 2018,
but is now fully in the zeitgeist.
We are seeing an alarming rise of deep fakes.
Deep fakes are becoming increasingly easy to make.
Deep fake videos are everywhere now.
Deep fake robocaller with someone using President Biden's voice.
Deepfake of President Zelensky.
Deepfake. Deepfakes. Deepfakes.
We've seen deep fakes across social media, commerce, sports, and of course, politics.
And at the rate that they're appearing,
deep fakes might sound like an impossible problem to tackle.
But it turns out that despite the decreasing barrier to creation,
our defender tool chest is even more robust.
So in today's episode, we'll discuss that with someone who's been thinking about voice security
for much longer than the average Twitter user, or even high-ranking politician,
wondering where this all goes.
Today, Vijay Balasupamani, co-founder and CEO of Pindrop,
joins A16C general partner Martine Casado to break down the technology, the policy,
and the economy of deepfigs.
Together, they'll discuss questions like,
just how easy is it to create a deepfig today?
Like, how many seconds of audio do you need
and how many tools are available?
But also, can we detect these things?
And if so, is the cost realistic?
Plus, what does good regulation look like here
in a space where we so quickly?
And have we lost a grip on the truth?
Listen in to find out.
But first, let's kick things off with how Vijay got here.
As a reminder, the content here is for informational purposes only, should not be taken as legal, business, tax, or investment advice, or be used to evaluate any investment or security, and is not directed at any investors or potential investors in any A16Z fund.
Please note that A16Z and its affiliates may also maintain investments in the companies discussed in this podcast.
For more details, including a link to our investments, please see A16c.com slash disclosures.
I've been playing in the voice space for a really long time.
I'm going to date myself, but I started working at Siemens.
And at Zemans, we were working in landline switches and EWSD switches and things like that.
And so that's where I started.
I also worked at Google and there I was working on the scalability algorithms for video chat.
And so that's where I got introduced to a lot of the voiceover IP.
side of things. And then I came to do my PhD from Georgia Tech. And so there, I naturally got super
interested in voice security. And ultimately, Pindrop, which is the company that I started,
was my PhD thesis, very similar to the way you started off your life as well. But it turned out
to be something pretty meaningful. And ever since then, it's been incredible what's happened in
this space. This is why I'm so excited to have you on this podcast.
podcast. To many, deep fakes are this new emergent thing, but you've actually been in the
voice fraud detection space for a very long time. So it's going to be great to see your
perspective on how things are different now and how things are more of the same. And so maybe
to provide a bit of context to get started from deep fakes, they've entered the zeitgeist,
maybe talk through what they are when we say deep fakes and why we're talking so much about
them. We've been doing deep fake detection for like now seven years. And even before that, you have
people manipulating audio and manipulating video. And you saw that with Nancy Pelosi slurring in a
speech, all they did was slow down the audio. It wasn't a deep fake. It was actually a cheap fake,
right? And so that is actually what's existed for a really long time. What changed is the ability to use
what are known as generative adversarial networks
to constantly improve things like voice cloning
or video cloning
or essentially try to get the likeness of a person really close.
So it's essentially two systems competing against each other
and the objective function is
I'm going to get really close to Martin's voice and Martin's face
and then the other system is trying to figure out
okay, what are the anomalies?
Can I still detect that it's,
a machine as opposed to a human.
So it's almost like a reverse Turing test.
And so what ended up happening is once you start creating these GANS, which are used in
a lot of these spaces when you run them across multiple iterations, the system becomes
really, really good because you train a deep learning neural network and that's where the
deep fake comes from.
And they became so good that lots of people have extreme difficulty differentiating between
what is human and what is machine?
So let's break this down a little bit
because I think that deep fakes are more talked about
now than they were in the past, right?
Yeah.
And so clearly this seems to have coincided
with the generative AI wave.
And so do you think it's fair to say
that there's a new type of deep fake
that is drafted on the generative AI wave
and therefore we need to have a different posture
or is it just the same
but brought to people's attention
because of generative AI.
Generative AI has allowed for combinations of wonderful things.
But when we started, there was just one tool that could clone your voice, right?
It was called Liabird, incredible tool.
It was used for lots of great applications.
At the end of last year, there were 120 tools with which you can clone someone's voice.
And by March of this year, it's become 350.
And there's a lot of open source tools that you can use.
use to essentially mimic someone's voice or to mimic someone's likeness and that's the ease
with which this has happened. Essentially, the cost of doing this has become close to zero because
all it requires for me to clone your voice, Martin now, requires about three to five seconds of
your audio and if I want a really high quality deep fake, it requires about 15 seconds of audio. Compare this
to before the generative AI boom
where John Legend
wanted to become the voice
of Google Home
and he spent like
close to 20 hours
recording him saying
a whole bunch of things
so that Google Home could say
in San Francisco
the weather is 37 degrees or whatever
so the fact is that he had to go into a studio
spend 20 odd hours
recording his voice
in order for you to do that
compared to 15 seconds
and 300 different tools available to do it.
It almost feels to me that we need like new terms
because this idea of cloning voices has been around for a while.
I don't know if you remember this, Vijay,
but this wasn't too long ago when I was in Japan
and I got this call from my parents, which I never do.
And my mom's like, where are you right now?
And I'm like, I'm in Japan.
And my mom's like, no, you're not.
And I'm like, yes, I am.
She says, hold on, let me get your father.
So my dad jumps on the line.
And he's like, where are you?
I'm in Japan.
He's like, I just talked to you.
You were in prison.
And I'm leaving to go bring $10,000 of bail money to you.
I'm like, what are you talking about?
And he's like, listen, someone called and said that you had a car accident and you're a bit
muffled because you were hurt and that I needed to bring cash to a certain area.
And like, your mom just thought to call you while I was heading out the door, right?
So, of course, we called the police after this, and they said this is a well-known scam that's been going on for a very long time, and it's probably just someone that tried to sound like you and muffling their voice, right?
And so it seems that calling somebody and obfuscating the voice to trick people has been around for a very long time.
So maybe just from your perspective, do we need a new term for these generative AI fakes because they're somehow funny.
fundamentally different? Or is this just more of the same? And we shouldn't really worry too much
about it because we've been dealing with it for a long time. Yeah. So it's interesting. It happened
to you in Japan, man, because the origin of that scam, early on, I went with the Andresen Horowitz
contingency to Japan. This was way back. This was like close to eight, nine years back.
When I was talking about voice fraud, the Japanese audience talked to me about Oriori
Sagi, which has helped me grandma. So it's, again,
Exactly that. At that point in time, it had started costing Japan close to half a billion dollars in people losing their life savings to the scams. Right. So in Japan, half a billion dollars close to eight, nine years back. So the mode of operation is not different, right? Get vulnerable populations, right? To get into an urgent situation, believe they have to do it. Otherwise, it's disastrous. And they will come.
comply. What's changed is the scale and the ability to actually mimic your voice. The fact is that
now you have so many tools that anyone can do it super easily. Two, before, if you had some
sort of an accent and things like that, they couldn't quite mimic your real voice. But now,
because it's 15 seconds, your grandson could have a 15 second TikTok video and that's all
it's required, not even 15 seconds, with five seconds, and depending upon the demographic,
you can get a pretty good clone. So what's changed is the ability to scale this. And then these
fraudsters are combining these text to speech systems with LLM models. So now you have a system
that you're saying, okay, when the person says something, respond back in a particular way
crafted by the LLM. And here is the crazy thing, right? In LLM's hallucination is a problem. So the fact
that you're making shit up
is a bad idea.
But if you have to make shit up
to convince someone,
it was great and doing that.
That's right.
Yeah, and it's crazy.
We see fraud
where the LLM is coming up
with crazy ways
to convince you
that something bad is happening.
Wow, wow, wow.
I want to get into next,
are we all doomed?
Is it possible to detect these things like that?
But before we do that,
it'd be great since you probably
are the world's expert on voice fraud.
You've probably seen more
types of voice fraud than any single person on the planet. We know of the Oriori Sagi, which is
basically what I got hit with. Can you maybe talk to some other uses of deep fakes that are prevalent
today? Yeah. So, you know, deep fakes existed. But if you think about deep fakes affecting and
deep fakes right now, you can see, right? In the political spectrum, they're there, right? So
election misinformation with President Biden's campaign happened. We were the ones who caught it and
identified it and things like that. What was the specifics?
Are you allowed to talk about it?
Yeah, no, no, for sure.
What happened is early on this year.
And if you think about deepfakes, they affect three big areas, commerce, media, and communication, right?
And so this is news media, social media.
So what happened is at the beginning of an election year, you had the first case of election interference with everyone during the Republican primary in New Hampshire got a phone call that said, hey, you know what?
your vote doesn't count this Tuesday. Don't vote right now. Come vote in November. And this was made in the voice of the president of the free world, right? President Biden, right? That's the craziness. They went for the highest profile target. And you should listen to the audio. It's incredible. It is like President Biden. And they've interspersed it with things that President Biden says. Like what a bunch of malarkey and things like that. So that came out. And people are like, okay, is this really President Biden?
And so not only did we come in and say this was a deep fake, we have something called source tracing, which tells us which AI application was used to create this deep fake.
So we identified the deep fake.
And then we worked with that AI application.
They're an incredible company.
We worked with them.
And they immediately found the person who used that script and shut them down.
So they couldn't create any other problem.
So this is a great example of different good companies coming together to shut down a problem.
And so we worked with them. They shut it down. And then later on, regulation kicked in and they find the telco providers who distributed these calls. They find the political analyst who intentionally created these deep fakes. But that was the first case of political misinformation. You see this a lot right now. Was that this year?
Yeah, it was this year. It was in January of this year. That's amazing. Okay, we've got politics. We've got bilking old people.
Maybe one more good anecdote before we get into whether we can detect these things.
The one thing that's really close home is in commerce, right?
Like financial institutions.
Even though generative AI came out in 2022, in 2023, we were seeing essentially one deep fake a month in some customer, right?
So it was just one deep fake a month and some customer would face it.
It wasn't a widespread problem.
But this year, we've now seen one.
deep fake per customer per day.
So it has rapidly exploded and we have certain customers like really big banks who are getting
a deep fake every three hours.
Like it's insane the speed.
So there has been a 1,400% increase in the amount of deep fakes we've seen this year in
the first six months compared to all of last year.
And the year is not even over.
Wow. All right. So we have these deep fakes. They are super prevalent. They are impacting politics and e-commerce. Can you talk to whether these things are detectable at all? Is this the beginning of the end? Or where are we? Martin, you've lived through many such cycles where initially it feels like the sky is falling. Online fraud, email, spam. There's a whole bunch of them. But the situation is the same. They're completely detectable.
Right now, we're detecting them with 99% detection rate with a 1% false positive rate.
So extremely high accuracy on being able to detect them.
Just to put this in conduct, what are numbers from identifying voice?
Not fraud, just like whether it's my voice.
So it's roughly about one in every 100,000 to one in every million, right?
That's the ratio.
So it's much higher precision for sure and much higher specificity.
But, yeah, deepfakes, you're detecting with a 99% accuracy.
And so these things, you're able to do.
detect very, very comfortably. And the reason you're able to detect it is because when you think
about even something like voice, you have 8,000 samples of your voice every single second,
even in the lowest fidelity channel, which is the contact center. And so you can actually
see how the voice changes over time, 8,000 times a second. And what we find is these deep
systems either on the frequency domain
suspectually or on the time domain
make mistakes and they make a lot of mistakes
and the reason they make mistakes and still it's very clear
is because think about it your human year
can't look at anomalies 8,000 times a second
if it did you'd go mad right like you'd have some serious problems
so that's the reason like it's beautiful to your year
you think it's martin speaking on the other end
but that's where you can use good AI
which can actually look at things 8,000 times a second
or like when we're doing most online conferencing
like this podcast, it's usually 16,000.
So then you have 16,000 samples of your voice.
And if you're doing music,
you have 44,000 samples of the musician's voice every single second.
So there's so much data and so many anomalies
that you can actually detect these pretty comfortably.
I see a lot of proposals, particularly for,
from policy circles of using things like watermarking or cryptography,
which has always seemed a strange idea to me,
because you're asking criminals to comply by something.
So I don't know, like, how do you view more active measures to like self-identify
either legit or illegitimate traffic?
Yeah, see, this is why you're in security, Martin.
And almost immediately you realize that most attackers will not comply
to you putting in a watermark.
But even without putting in a watermark, right,
like even if you didn't have an active adversary,
like the President Biden robocall that I referenced before,
when it finally showed up,
the system that actually generated it had a watermark in it.
But when they tested it against that watermark,
they only were able to extract 2%.
Oh, interesting.
So you mean the original Biden call had a watermark?
Because it was generated by an AI app
that included a watermark.
And then they copied.
And 90% of that watermark went away,
largely because when you take that audio,
play it across air,
play it across telephony channels,
they're bits and bites,
they get stripped away.
And so once they get stripped away,
and audio is a very sparse channel.
So even if you add it over and over again,
it's not possible to do it.
So these watermarking techniques,
I mean, they're a great technique.
You always think about defense in depth
where they're present, you'll be able to identify a whole lot more genuine stuff as a result of these watermarks,
but attackers are not going to comply it. When you get videos, like we are now working with news media organizations,
and 90% of the videos and audios they get from, for example, the Israel-Hamas war are fake. How many?
90% of them are fake. What? Yeah. I guess I should be so surprised, but they're all made up. They're a
different war. Some of them are cheap-fakes. Some of them are actually deep-fakes. Some of them are
cludged together. And so being able to identify what is real is going to become really important,
especially because now you can do all of these things at scale.
Can you draw how the meteration in AI technology impacts this? Because clearly something
happened in the last year to make this economic for attackers, which were seeing a rise.
and clearly it's going to keep getting better.
And so do you have a mental model for why this doesn't become a serious problem in the future
or does it become a serious problem in the future?
So one of the things that we talk about is any deepfix system should have strong resilience built in it.
So it should not just be good about detecting deepfakes right now.
It should be able to detect what we call zero-day deepfakes.
a new system gets created
how do you detect that deep fake
and essentially the mental model
is the following one
deep fake architectures
are not simple monolithic systems
they have like several components
within them and what ends up
happening is each of these components
tend to leave behind artifacts
we call this a fake print so they all
leave behind things that they do
poorly right and so
when you actually create a new system
you often find they've pulled together
pieces of other systems and those leave behind their older fake prints.
And so you can actually detect newer systems because they usually only improvise on one
component.
The second is we actually run GANS so you get these GANS to compete.
Like we create our own deep fake detection system.
Now we say, how do you beat that?
And we have multiple iterations of them running and we're constantly running them.
Sorry, I just want to make sure that I understand here.
So you're creating your own deep fake system using the approach you,
talked about before, which is the general adversarial
network. So then you can create a good deep fake
and then you can create a detection for that.
Is that right? Exactly. And then
you beat that detection system
and you run that iteration, iteration,
iteration, iteration. And then what you
find is actually something
really interesting, which is
if a deep fake system
has to serve two masters,
that is, one, I need
to make the speech legible and
sound as much like Martin.
And two, I need to
deceive a deep fake detection system, those two objective functions start diverging.
So for example, I could start adding noise and noise is a great way to avoid you from
understanding my limitations. But if I start adding too much noise, I can't hear it. So for example,
we were called into one of these deep fakes where LeBron James apparently was saying bad things
about the coach during the Paris Olympics. It wasn't LeBron James. It was a deep fakes. It was a deep
fake. We actually provided his management team the necessary detail so that in X it could be
labeled as AI generated content. And so we did that. But if you look at the audio, there was a lot
of noise introduced into it, right, to try and avoid detection. But lots of people couldn't even hear
the audio. They were like, this is really. And so that's where you start seeing these systems
diverge. And this is where I have confidence in our ability to detect it, right? Which is
you run these GANS you know the architectures that these deep fake generation systems are created
and ultimately you start seeing divergences in one of the objective functions so either you as a human
will be able to detect something's off or we as a system will be able to detect something's off
awesome one of the reasons that spam works and deep fakes work is the marginal cost of the next
call is so low that you can do these things in mass right like the marginal cost of the next
spam email or whatever.
Do you have even just the most vague sense of
if it takes me a dollar to generate end deepfakes,
how much does it cost to detect end deepfakes?
Is it one to one?
Is it 1 to 10 to 1?
Is it 100 to 1?
It's way cheaper to detect deepfakes, right?
Because if you think about it,
like what we've seen is the closest example
is Apple released its model
that could run on device.
And even that model,
which is a small model,
in order to do lots of things like voice to text and things like that,
our model is about 100 times smaller than that.
So it's so much faster in detecting deep fix.
So the ratio is about 100th right now,
and we're constantly figuring out ways to make it even cheaper,
but it's 100th that of generation.
Wow, I see.
So to detect it is two orders of magnitude cheaper than creation,
which means in order for anybody
to economically get
listen if there is no defense there's no defense
but if there is a defense it requires the bad guys
to have two orders of magnitude
more resources which
is actually pretty dramatic
given normally you go for parity
on these things because there tends to be a lot more
good people than bad people
and that's the thing you have two orders of magnitude
and then the fact is that once you know what a deep fake
looks like unless they re-architect
the entire system and the only
companies that re-architect
full pipelines and the last time this was done is back in 2015 when Google released
Tacotron where they re-architected several pieces of the pipeline it's a very expensive
proposition is the intuitive reason that the cost is so much cheaper to detect is this you just have
to do less stuff like the person generated the deep fake has to like sound like a human be passable
to a human and evade this and so that's just more things than detecting it which just can be
a much more narrow focus so it'll always be cheaper to detect and then
And you don't see a period in time where the AI is so good, no deep fake mechanism can detect it.
You don't see that.
We don't see that because either you become so good at avoiding detection that you actually start becoming worse at producing human generated speech.
Or you're producing human generated speech.
And unless you actually create a physical representation of a human, because we've had 10,000 years of evolution, the way we produce speech,
has vocal cords, has the diaphragm, has your lips and your mouth and your nasal cavity,
all of that physical attributes. So think about the fact that your voice is resonating through
folds of your vocal chord and these are subtle things that have changed over time.
It's all of what has taken you to become you and somebody might have punched you in the throat
at some point in time that's created some kind of thing. There's so much thing that happens
it's really hard for these systems to replicate all of that.
They have generic models, and those generic models are good.
You can also think about the more we learn about your voice, Martin,
the better we can get at knowing where your voice is deviating.
Now, I have an incentive as a good guy to work with you on that, right?
So, like, you'll have access to data where the bad people may not have access to data,
and it totally makes sense.
Yeah.
It seems to me like the spam lessons learn apply here,
which is spam can be very effective for attackers.
Very effective. Defenses can also be incredibly effective, however you have to put them in place.
And so it's the same situation here, which is be sure you have a strategy for deep fake detection,
but if you do, you'll be okay. That's exactly right. And I think it has to be in each of the areas,
right? Like when you think about deep fakes, you have incredible AI applications that are doing
wonderful things in each of these cases. You know, the voice cloning apps, they've actually given
voices to people who have throat cancer and things like that. Not just throat cancer, people,
who have been put behind bars because of a bad political regime
are now getting to spread their message.
So they're doing some incredible stuff
that you couldn't do otherwise.
But in each of those situations,
it was with the consent of the user
who wanted their voice recreated, right?
And so that notion that the source AI applications
need to make sure that the people using their platform
actually are the people who want to use their platform.
That's part A.
And this is where,
the partnerships that you talked about with the actual generation companies comes in so that
you can help them for the legitimate use cases as well as sniffing out the illegitimate one. Is that
right? Absolutely. 11 labs. Incredible. The amount of work they're doing to create voices
ethically and safely and carefully is incredible. They're trying to get lots of great tools out
there. We're partnering with them. They're making their data sets accessible to us. There are
Companies like that, right, another company called Re-speecher that did a lot of the Hollywood movies.
So all of these companies are starting to partner in order to be able to do this in the right way.
And it's similar to a lot of what happened in the fraud situation back in the 2000s or the email spam situation back in the 2000s.
I want to shift over to policy.
I've done a lot of policy discussions lately in California as well as at the federal level.
And here's my summary of how our existing policymakers think about AI.
A, they're scared and they want to regulate it.
B, they don't know why they're scared.
And C, with one exception, which is none of them want deepfakes of themselves.
I found like a primary motivation around regulating AI is just this fear of political deepfakes, honestly.
And these are in pretty legit face-to-face conversations.
And so have you given thought to what guidance you would give to policymakers?
as many of who listen to this podcast
and how they should think about any regulations or rules around this
and maybe how it intersects with things like innovation and free speech, et cetera.
I mean, it's a complicated topic.
I think the simple one-liner answer is they should make it really difficult for threat actors
and really flexible for creators, right?
That's the ultimate difference.
And history is rife with a lot of great ways, right?
Like, you live through the email days where the Can Spam Act was a great way, but it came in combination with better ML technologies.
I'm of that generation too, but maybe you just walk through how Can Spam works.
I think it's a good analog.
You probably know more about the Can Spam Act, but the Can Spam Act is one where anyone who's providing unsolicited marketing has to be clear on its headers, has to allow you to opt out, all of those things.
and if you don't follow this very strict set of policies, you can be fined.
And you also have great detection technologies that allow you to detect these spams, right?
Now that you follow a particular standard, especially when you're doing unsolicited marketing
or you're trying to do bad things like pornography, you have detection, AIML technologies that can detect you well.
The same thing happened when banks went online.
You had a lot of online fraud.
And if you remember, the Know Your Customer Act and the Anti-Mundly Laundering Acts came in there.
So the onus was you as a organization have to know your customer.
That's the guarantee.
And so you need technology.
After that, you can do what you want.
What was really good about both of those cases is they got really specific on one.
What can the technology detect?
Because if the technology can't detect it, you can't litigate, you can't find the people
who are misusing it and so on.
So what can the technology detect?
And two, how do I make it really specific on what you can and cannot do in order to be able to do this?
And so I think those two were great examples of how we should think about litigation.
And in deep fake, there is this very clear thing, right?
Like you have free speech.
But for the longest time, any time you used free speech for fraud or you were trying to incite violence or you were trying to do obscene things.
These are clear places where the free speech guarantees go away.
So I think if you're doing that, you should be fined.
And you should have laws that protect you against that.
And that's the model I like think of.
Awesome.
So I'm going to add just one thing from CanSpan that I think that you've touched on.
But I was actually working on email security there.
So I think that this is highlighted.
I want to see if like you agree with this kind of characterization.
So the first one is for illegal use, policy doesn't really help.
because people aren't going to comply and they're going to do whatever they want and they're doing
something criminal anyways. And so for that, we just rely on the most technical solution.
You can make recommendations. But for strictly illegal users, you have to rely on technology.
No policy is going to keep you safe. But then there's this kind of gray area of unwanted stuff,
right? And the unwanted stuff, you didn't ask for it. It may not be illegal, but it's super annoying
and it's unwanted and it can fill your inbox. And for those, you can put in rules because of somebody
crosses those rules, you can litigate them, or you can opt out of it. And so it regulates
unwanted. I can see that definitely happening here. And then, of course, there's the wanted
stuff which doesn't require any regulation. Is that a fair characterization? That's a really
good characterization. I think you've said it really, really well. And the only other thing that
I'll say is right now, because we consume things through a lot of platforms, platforms should be
held accountable at some level to clearly demarcating what is real and what is not.
because otherwise it's going to be really hard
for the average consumer
to know that this is
AI generated versus this is not.
So I think there's a certain amount of
accountability there. Because the
technology is where it is, putting the
onus on the platforms to do
best practices, just like we did for
spam, right? Like I rely on
Microsoft and Google for the spam
detection doing the same type of thing for the platform.
It sounds like a very sensible recommendation.
Yeah. All right, great.
So let's just go ahead and wrap this up.
So key point number one is deep fakes have been around for a long time.
We probably need a new name for this new generation.
And this isn't just like some hypothetical thing, but you're seeing a massive increase.
You said as much as one per day.
And the cost to generate has gone way down.
Good news is that these things are eminently detectable.
And in your opinion, will always be detectable if you have a solution in place.
And then as a result, I think any policy should.
provide the guidance and maybe accountability for the platforms to detect it because we can actually
detect it. And so, listen, it's something for people to know about, but it's not the end of the
world. And policymakers don't have to regulate all of AI for this one specific use case. Is this a fair
synopsis? This is a beautiful synopsis, Martin. You've captured it really well.
All right, that is all for today. If you did make it this far, first of all, thank you.
We put a lot of thought into each of these episodes, whether it's guests, the calendar Tetris,
the cycles with our amazing editor Tommy until the music is just right.
So if you like what we put together, consider dropping us a line at rate thispodcast.com slash A16C.
And let us know what your favorite episode is.
It'll make my day, and I'm sure Tommy's too.
We'll catch you on the flip side.