OpenAI’s video-generating app, Sora, has raised significant questions regarding
the safety and privacy of user’s biometric data, particularly with its “Cameo”
feature that creates realistic AI videos, or “deepfakes,” using a person’s face
and voice.
the safety and privacy of user’s biometric data, particularly with its “Cameo”
feature that creates realistic AI videos, or “deepfakes,” using a person’s face
and voice.
To power this functionality, OpenAI confirms it must store users’
facial and audio data. The company states this sensitive data is encrypted
during both storage and transmission, and uploaded cameo data is automatically
deleted after 30 days. Despite these assurances, privacy concerns remain. The
app’s ability to generate hyper-realistic videos has sparked fears about the
potential for misuse, such as the creation of unauthorized deepfakes or the
spread of misinformation.
facial and audio data. The company states this sensitive data is encrypted
during both storage and transmission, and uploaded cameo data is automatically
deleted after 30 days. Despite these assurances, privacy concerns remain. The
app’s ability to generate hyper-realistic videos has sparked fears about the
potential for misuse, such as the creation of unauthorized deepfakes or the
spread of misinformation.
OpenAI acknowledges a slight risk that the app could
produce inappropriate content, including sexual deepfakes, despite the
safeguards in place. In response to these risks, the company has implemented
measures to distinguish AI-generated content, including visible watermarks and
invisible C2PA metadata in every video created with Sora .
produce inappropriate content, including sexual deepfakes, despite the
safeguards in place. In response to these risks, the company has implemented
measures to distinguish AI-generated content, including visible watermarks and
invisible C2PA metadata in every video created with Sora .
The company emphasizes tha
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
This article has been indexed from CySecurity News – Latest Information Security and Hacking Incidents
Read the original article: