2024-11-23 –, Ngaio Marsh Theatre
With voice cloning now available to the masses, just how secure is your average voice authentication system? Come dive into the world of AI voice generation systems; learn how to clone someone's voice, as well as discussion surrounding the trends we are seeing in voice authentication systems and AI voice generation.
Ever-increasingly voice authentication is seen as the next step forward in a simplified user experience which also decreases costs for companies. Unfortunately, this same step can often be seen as a step backwards for user's security.
This presentation aims to discuss topics such as the over-reliance on a user's voice as a primary security boundary. A demonstration of tools available for cloning a user's voice (mine). Along with the current pitfalls with the use of voice authentication. Further to this, we also dive into practical voice cloning of users using their digital presence.
Audience members should be able to walk into this presentation with little to no
prerequisite knowledge and leave with the following:
- Knowledge of current voice cloning techniques
- Considerations around the usage of voice as a security boundary within their own applications
- A better awareness of where we see the voice authentication and AI voice generation sectors trending towards as well as the pitfalls associated with them
Ethan McKee-Harris, aka Skelmis, is a security consultant by trade. He spends his days hacking web applications and bypassing voice authentication systems. Beyond that, Ethan is an avid open source developer with experience on both sides of the metaphorical 'security fence'.