{"id":13024,"date":"2020-05-05T18:00:18","date_gmt":"2020-05-05T17:00:18","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=13024"},"modified":"2020-05-05T15:29:01","modified_gmt":"2020-05-05T14:29:01","slug":"deep-dive-into-deepfake-how-to-face-increasingly-believable-fake-news-1-2","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/05\/deep-dive-into-deepfake-how-to-face-increasingly-believable-fake-news-1-2\/","title":{"rendered":"Deep dive into deepfake &#8211; How to face increasingly believable fake news? (1\/2)"},"content":{"rendered":"<p style=\"text-align: justify;\"><strong>Online media and social networks expand the attack surface usable by the malicious actors, and deepfakes are the ultimate weapon. Well-known as a disinformation tool for the society, they bring about other risks to be considered by businesses. <\/strong><\/p>\n<p style=\"text-align: justify;\">The recent events linked to the COVID-19 outbreak have proven the necessity of acceding to reliable and true news for all the society. More than the epidemic, we have witnessed an \u00ab\u00a0<strong>infodemic<\/strong>\u00a0\u00bb, rapid spread of false or misleading information on the social networks, raising the question of the trust given to the platforms relaying the news and of the authenticity of the information they pass on.<\/p>\n<p>&nbsp;<\/p>\n<figure id=\"post-13025 media-13025\" class=\"align-none\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-13025 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/05\/Capture.png\" alt=\"\" width=\"1000\" height=\"213\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/05\/Capture.png 1000w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/05\/Capture-437x93.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/05\/Capture-71x15.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/05\/Capture-768x164.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">The use of deepfakes is a topical phenomenon affecting <strong>firstly the general public<\/strong>. It is inherently linked to the importance gained by the social and online media in our daily life.<\/p>\n<p style=\"text-align: justify;\">In September 2019, we counted near 15,000 deepfake videos online, twice more than in December 2018. If 96% of these videos were pornographic deepfakes posted on specialised websites, the extent of the affected topics has however increased to reach all the famous social networks (YouTube, Vimeo, Dailymotion).\u00a0 Amongst the deepfakes posted on YouTube, <strong>20% already represented politicians, business owners and journalists<\/strong><a href=\"#_ftn1\" name=\"_ftnref1\">[1]<\/a>. Their <strong>disinformation power<\/strong> on the general public allows them to <strong>influence major political and societal events <\/strong>from the moment they star famous personalities.<\/p>\n<p style=\"text-align: justify;\">Deepfakes keep getting better, while the tools to generate them become more accessible (such as Lyrebird, for the audio deepfakes, Zao, for face-swapping, and the most recent one, Avatarify, integrated to Zoom and Skype, for the video). <strong>Their harmful power weighs more and more not only on public actors and organisations, but also on private ones, and must be taken into account in every business sector.<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<h2>A RISK WORTH CONSIDERING FOR BUSINESSES<\/h2>\n<p style=\"text-align: justify;\">Deepfakes can also be used against businesses. They offer a new playground for malicious actors, particularly through two means of action:<\/p>\n<ul>\n<li style=\"text-align: justify;\"><strong>The improvement of Fake president frauds, <\/strong>whose impacts and probability are increased by deepfakes. The fraud becomes more credible thanks to photos, videos and audios copying the person who is impersonated. The targeted collaborators therefore consider these contents as an authentication in itself of the interlocutor, and the chances of successful attacks are increased \u2013 which is an incentive to ask for larger sums. Besides, the tools to generate deepfakes being accessible to the large public, the use of these frauds by malicious people increases.<\/li>\n<li style=\"text-align: justify;\"><strong>The undermining of the business <\/strong>through relayed false information can strongly damage its image, leading to a certain number of consequences, notably financial and legal. We can wonder what would be the impacts of an ExCom member\u2019s video speech sharing fake results or strategic orientations on the price of his firm\u2019s share or on the trust of its prospects; or those of the disclosure of a product anomaly on the direct order intake. Moreover, denying the rumours is harder when deepfakes are used. Today, many businesses still feel afar from the subject: <strong>How many have already wondered what would the impacts of a deepfake be on their activities?<\/strong><\/li>\n<\/ul>\n<p><strong>\u00a0<\/strong><\/p>\n<figure id=\"post-13027 media-13027\" class=\"align-none\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-13027 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/05\/Image5.png\" alt=\"\" width=\"880\" height=\"701\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/05\/Image5.png 880w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/05\/Image5-240x191.png 240w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/05\/Image5-49x39.png 49w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/05\/Image5-768x612.png 768w\" sizes=\"auto, (max-width: 880px) 100vw, 880px\" \/><\/figure>\n<p><strong>\u00a0<\/strong><\/p>\n<h2>A legal framework IN PROGRESS<\/h2>\n<p style=\"text-align: justify;\">The states start putting together an answer to the deepfake concern and legislating to regulate their diffusion. Some countries such as <strong>China<\/strong> criminalise the diffusion of deepfakes without notifying the audience about it (since the 1<sup>st<\/sup> of January 2020). In the <strong>United States<\/strong>, the treatment of the deepfakes\u2019 question is speeding up as the presidential election of November 2020 approaches, and it is dealt with both at the federal level (bills prohibiting the diffusion of deepfakes in California, Virginia and Texas) and at the national one (the DEEPFAKE Accountability Act<a href=\"#_ftn2\" name=\"_ftnref2\"><em><strong>[2]<\/strong><\/em><\/a> \u00a0is being discussed by the Congress to \u201ccombat the spread of disinformation through restrictions on deep-fake video alteration technology\u201d). In <strong>France, <\/strong>the question of deepfakes is included in the law of the 22<sup>nd<\/sup> of December 2019, related to the fight against the manipulation of information \u2013 and is therefore not dealt with specifically.<\/p>\n<p style=\"text-align: justify;\">These legal frameworks remain dawning and heterogeneous, and only represent one part of the answer to provide to this technology. <strong>More than condemning their malicious use, the issue is mostly to be able to detect and avoid them. <\/strong><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">In this first part, we have given an overview of the risks presented by deepfakes for the businesses. In the second part of the article, we will focus on the technical and organisational means available today to safeguard oneself.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\">[1]<\/a> Study published by Deeptrace in September 2019.<\/p>\n<p><a href=\"#_ftnref2\" name=\"_ftn2\">[2]<\/a> <em>Defending Each and Every Person from False Appearances by Keeping Exploitation Subject to Accountability Act.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Online media and social networks expand the attack surface usable by the malicious actors, and deepfakes are the ultimate weapon. Well-known as a disinformation tool for the society, they bring about other risks to be considered by businesses. The recent&#8230;<\/p>\n","protected":false},"author":149,"featured_media":12946,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3270,2777,3272],"tags":[3498,3431,3352,2796,2877],"coauthors":[3195,3492,3491],"class_list":["post-13024","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberrisk-management-strategy-en","category-cybersecurity-digital-trust","category-digital-identity-en","tag-deepfakes-en","tag-fraud","tag-media-en","tag-risk","tag-strategy"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Deep dive into deepfake - How to face increasingly believable fake news? (1\/2) - RiskInsight<\/title>\n<meta name=\"description\" content=\"Online media and social networks expand the attack surface usable by the malicious actors, and deepfakes are the ultimate weapon. Well-known as a disinformation tool for the society, they bring about other risks to be considered by businesses.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/05\/deep-dive-into-deepfake-how-to-face-increasingly-believable-fake-news-1-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Deep dive into deepfake - How to face increasingly believable fake news? (1\/2) - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Online media and social networks expand the attack surface usable by the malicious actors, and deepfakes are the ultimate weapon. Well-known as a disinformation tool for the society, they bring about other risks to be considered by businesses.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/05\/deep-dive-into-deepfake-how-to-face-increasingly-believable-fake-news-1-2\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-05T17:00:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/04\/Fotolia_78673393_Subscription_Monthly_M.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1378\" \/>\n\t<meta property=\"og:image:height\" content=\"1378\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Nour Amara, Pierre Caussanel\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nour Amara, Pierre Caussanel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/05\/deep-dive-into-deepfake-how-to-face-increasingly-believable-fake-news-1-2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/05\/deep-dive-into-deepfake-how-to-face-increasingly-believable-fake-news-1-2\/\"},\"author\":{\"name\":\"Carole Meyziat\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/da8b29640acc0c9bd2f93acd212dfd3f\"},\"headline\":\"Deep dive into deepfake &#8211; How to face increasingly believable fake news? (1\/2)\",\"datePublished\":\"2020-05-05T17:00:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/05\/deep-dive-into-deepfake-how-to-face-increasingly-believable-fake-news-1-2\/\"},\"wordCount\":759,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/05\/deep-dive-into-deepfake-how-to-face-increasingly-believable-fake-news-1-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/04\/Fotolia_78673393_Subscription_Monthly_M.jpg\",\"keywords\":[\"deepfakes\",\"fraud\",\"media\",\"risk\",\"Strategy\"],\"articleSection\":[\"Cyberrisk Management &amp; Strategy\",\"Cybersecurity &amp; Digital Trust\",\"Digital Identity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/05\/deep-dive-into-deepfake-how-to-face-increasingly-believable-fake-news-1-2\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/05\/deep-dive-into-deepfake-how-to-face-increasingly-believable-fake-news-1-2\/\",\"name\":\"Deep dive into deepfake - How to face increasingly believable fake news? (1\/2) - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/05\/deep-dive-into-deepfake-how-to-face-increasingly-believable-fake-news-1-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/05\/deep-dive-into-deepfake-how-to-face-increasingly-believable-fake-news-1-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/04\/Fotolia_78673393_Subscription_Monthly_M.jpg\",\"datePublished\":\"2020-05-05T17:00:18+00:00\",\"description\":\"Online media and social networks expand the attack surface usable by the malicious actors, and deepfakes are the ultimate weapon. Well-known as a disinformation tool for the society, they bring about other risks to be considered by businesses.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/05\/deep-dive-into-deepfake-how-to-face-increasingly-believable-fake-news-1-2\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/05\/deep-dive-into-deepfake-how-to-face-increasingly-believable-fake-news-1-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/05\/deep-dive-into-deepfake-how-to-face-increasingly-believable-fake-news-1-2\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/04\/Fotolia_78673393_Subscription_Monthly_M.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/04\/Fotolia_78673393_Subscription_Monthly_M.jpg\",\"width\":1378,\"height\":1378,\"caption\":\"computer infection design, vector illustration eps10 graphic\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/05\/deep-dive-into-deepfake-how-to-face-increasingly-believable-fake-news-1-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Deep dive into deepfake &#8211; How to face increasingly believable fake news? (1\/2)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/da8b29640acc0c9bd2f93acd212dfd3f\",\"name\":\"Carole Meyziat\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/carole-meyziat\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Deep dive into deepfake - How to face increasingly believable fake news? (1\/2) - RiskInsight","description":"Online media and social networks expand the attack surface usable by the malicious actors, and deepfakes are the ultimate weapon. Well-known as a disinformation tool for the society, they bring about other risks to be considered by businesses.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/05\/deep-dive-into-deepfake-how-to-face-increasingly-believable-fake-news-1-2\/","og_locale":"en_US","og_type":"article","og_title":"Deep dive into deepfake - How to face increasingly believable fake news? (1\/2) - RiskInsight","og_description":"Online media and social networks expand the attack surface usable by the malicious actors, and deepfakes are the ultimate weapon. Well-known as a disinformation tool for the society, they bring about other risks to be considered by businesses.","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/05\/deep-dive-into-deepfake-how-to-face-increasingly-believable-fake-news-1-2\/","og_site_name":"RiskInsight","article_published_time":"2020-05-05T17:00:18+00:00","og_image":[{"width":1378,"height":1378,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/04\/Fotolia_78673393_Subscription_Monthly_M.jpg","type":"image\/jpeg"}],"author":"Nour Amara, Pierre Caussanel","twitter_misc":{"Written by":"Nour Amara, Pierre Caussanel","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/05\/deep-dive-into-deepfake-how-to-face-increasingly-believable-fake-news-1-2\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/05\/deep-dive-into-deepfake-how-to-face-increasingly-believable-fake-news-1-2\/"},"author":{"name":"Carole Meyziat","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/da8b29640acc0c9bd2f93acd212dfd3f"},"headline":"Deep dive into deepfake &#8211; How to face increasingly believable fake news? (1\/2)","datePublished":"2020-05-05T17:00:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/05\/deep-dive-into-deepfake-how-to-face-increasingly-believable-fake-news-1-2\/"},"wordCount":759,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/05\/deep-dive-into-deepfake-how-to-face-increasingly-believable-fake-news-1-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/04\/Fotolia_78673393_Subscription_Monthly_M.jpg","keywords":["deepfakes","fraud","media","risk","Strategy"],"articleSection":["Cyberrisk Management &amp; Strategy","Cybersecurity &amp; Digital Trust","Digital Identity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/05\/deep-dive-into-deepfake-how-to-face-increasingly-believable-fake-news-1-2\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/05\/deep-dive-into-deepfake-how-to-face-increasingly-believable-fake-news-1-2\/","name":"Deep dive into deepfake - How to face increasingly believable fake news? (1\/2) - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/05\/deep-dive-into-deepfake-how-to-face-increasingly-believable-fake-news-1-2\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/05\/deep-dive-into-deepfake-how-to-face-increasingly-believable-fake-news-1-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/04\/Fotolia_78673393_Subscription_Monthly_M.jpg","datePublished":"2020-05-05T17:00:18+00:00","description":"Online media and social networks expand the attack surface usable by the malicious actors, and deepfakes are the ultimate weapon. Well-known as a disinformation tool for the society, they bring about other risks to be considered by businesses.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/05\/deep-dive-into-deepfake-how-to-face-increasingly-believable-fake-news-1-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2020\/05\/deep-dive-into-deepfake-how-to-face-increasingly-believable-fake-news-1-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/05\/deep-dive-into-deepfake-how-to-face-increasingly-believable-fake-news-1-2\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/04\/Fotolia_78673393_Subscription_Monthly_M.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/04\/Fotolia_78673393_Subscription_Monthly_M.jpg","width":1378,"height":1378,"caption":"computer infection design, vector illustration eps10 graphic"},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/05\/deep-dive-into-deepfake-how-to-face-increasingly-believable-fake-news-1-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Deep dive into deepfake &#8211; How to face increasingly believable fake news? (1\/2)"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/da8b29640acc0c9bd2f93acd212dfd3f","name":"Carole Meyziat","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/carole-meyziat\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/13024","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/149"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=13024"}],"version-history":[{"count":5,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/13024\/revisions"}],"predecessor-version":[{"id":13037,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/13024\/revisions\/13037"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/12946"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=13024"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=13024"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=13024"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=13024"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}