Workflow
AI技术滥用
icon
Search documents
全红婵、孙颖莎成受害者!最新曝光
Xin Lang Cai Jing· 2025-08-19 17:14
Core Viewpoint - The proliferation of AI technology has enabled the "cloning" of specific individuals' voices, leading to civil infringement and potential criminal issues, particularly in the context of online marketing and live streaming [1][5]. Group 1: AI Voice Cloning in Marketing - Some social media influencers are using AI-cloned voices of Olympic champions, such as Quan Hongchan, to promote agricultural products, misleading fans into believing they are interacting with the actual athletes [3][5]. - A specific account on Douyin has posted 17 videos using AI to impersonate Quan Hongchan, achieving over 11,000 likes on one video, and selling 47,000 units of eggs linked to the promotion [3][5]. - Other Olympic champions, including Sun Yingsha and Wang Chuqin, have also been impersonated in similar marketing schemes [5]. Group 2: Legal and Ethical Concerns - The use of AI to clone voices raises significant legal concerns, including potential fraud and infringement of personal rights, as highlighted by experts [6][7]. - China's Civil Code now includes provisions for the protection of an individual's voice, equating it to portrait rights, thus making unauthorized use of a person's voice for AI cloning an infringement [6][7]. - Experts recommend that platforms implement stricter regulations and monitoring mechanisms to prevent the misuse of AI voice cloning technology [7]. Group 3: Regulatory Measures - In March, China's National Internet Information Office and other departments announced a regulation set to take effect in September 2025, requiring explicit labeling of AI-generated content [7]. - A nationwide campaign has been launched to address the misuse of AI technology, focusing on enhancing detection and verification capabilities on platforms [7].
央视曝光博主假冒全红婵卖土鸡蛋:大量粉丝以为是本人下单,还有人仿冒“孙颖莎、王楚钦高调为婵妹带货”
Qi Lu Wan Bao· 2025-08-19 01:00
Core Viewpoint - The widespread use of AI technology for voice cloning has led to significant legal issues, including civil infringement and potential criminal activities, as individuals exploit this technology for personal gain [1][17]. Group 1: AI Voice Cloning and Its Applications - AI voice cloning technology allows for the rapid and realistic imitation of any individual's voice, requiring only a short audio sample to produce a convincing clone [13][14]. - Some social media influencers are using AI-cloned voices of famous athletes, such as Olympic champions, to promote products, misleading fans into believing they are interacting with the actual individuals [2][4][8]. - Instances of AI voice cloning have resulted in significant sales, with one influencer reportedly selling 47,000 units of a product while impersonating an Olympic champion [4]. Group 2: Legal and Ethical Implications - The misuse of AI voice cloning not only deceives consumers but also infringes on the personal rights of the individuals whose voices are cloned, raising serious ethical concerns [9][19]. - Legal experts highlight that the Chinese Civil Code now explicitly protects individuals' voices, equating it to portrait rights, thus making unauthorized use of someone's voice a potential legal violation [17][19]. - The legal framework indicates that any use of a person's voice without consent constitutes infringement, emphasizing the need for clear permissions regarding voice cloning [19]. Group 3: Industry Response and Regulation - Experts suggest that platforms hosting AI voice cloning content should bear responsibility for monitoring and preventing misuse, as they can be held liable if they fail to act against infringing activities [20][22]. - The Chinese government has initiated measures to regulate AI technology misuse, including a new directive requiring clear labeling of AI-generated content, set to take effect in September 2025 [22]. - There is a call for platforms to establish robust mechanisms for reviewing and reporting AI voice cloning incidents to mitigate the spread of fraudulent content [22].
3500余款违规AI产品被处置!南都曾起底造假起号生意
Nan Fang Du Shi Bao· 2025-06-20 10:28
Group 1 - The "Clear and Bright: Rectification of AI Technology Abuse" initiative has been launched by the Central Cyberspace Administration of China since April, focusing on issues such as AI deepfakes and misleading AI content [1][2] - Over 3,500 AI products, including mini-programs and applications, have been dealt with, and more than 960,000 illegal information pieces have been cleared [2] - The next phase of the initiative will target seven prominent issues, including AI rumors and vulgar content, aiming to establish a technical monitoring system and a long-term working mechanism [2] Group 2 - Investigations revealed that criminals are using advanced AI techniques to mislead the public and quickly gain followers, later transitioning to selling products or courses [2][3] - The production of AI-generated content is becoming increasingly accessible, with individuals able to create videos easily without the need for traditional editing or on-camera appearances [3] - Some AI-generated video accounts have amassed significant followings, with individual videos achieving millions of views and strong monetization potential [3]
中央网信办深入开展“清朗·整治AI技术滥用”专项行动第一阶段工作
news flash· 2025-06-20 09:10
Core Viewpoint - The "Clear and Bright: Special Action to Rectify AI Technology Abuse" initiative, launched in April 2025, aims to address the misuse of AI technologies that infringe on public rights and mislead the public due to the lack of content identification [1] Group 1 - The Central Cyberspace Administration of China is focusing on issues such as AI deepfakes and the absence of content identification, which mislead the public [1] - The first phase of the initiative has led to the disposal of over 3,500 illegal AI products, including mini-programs, applications, and intelligent agents [1] - More than 960,000 pieces of illegal information have been cleared, and over 3,700 accounts have been disposed of, indicating significant progress in the initiative [1]
AI换脸、跨平台引流 反诈防线如何“破壁升级”
Huan Qiu Wang Zi Xun· 2025-06-16 22:15
Core Viewpoint - The article discusses the increasing prevalence and sophistication of telecom fraud in China, highlighting the collaborative efforts of various government and industry stakeholders to combat this issue through technology and public awareness initiatives [1][2][3]. Group 1: Industry Response - The Beijing Municipal Internet Information Office and other agencies launched the "Douyin Anti-Fraud Alliance" to enhance public awareness and participation in anti-fraud activities [1]. - The information and communication industry has introduced key technological tools, such as an anti-fraud electronic identification for apps, which has led to a significant reduction in fraud cases by up to 90% in pilot programs [2]. - Douyin's risk management team employs AI technology to improve fraud detection and prevention, blocking over 80,000 fraudulent accounts daily and intercepting more than 4 million suspicious posts and comments [4]. Group 2: Fraud Trends and Tactics - Telecom fraud is evolving with new tactics, including the use of AI for deep forgery and the creation of fraudulent applications, making traditional detection methods less effective [4]. - Major types of fraud include "order refund," "fake online loans," "fake investments," and impersonation of public officials, with a comprehensive strategy involving law enforcement to combat these issues [2][3]. - The fraud landscape is characterized by cross-platform operations, where criminals exploit information gaps between different platforms to target victims more effectively [3]. Group 3: Public Awareness and Education - Douyin has appointed several public figures as anti-fraud ambassadors to promote awareness and educate users about fraud prevention [5]. - The platform has introduced features like "customer service verification" and "dynamic verification codes" to help users verify information and protect themselves from scams [5]. - Public campaigns are being conducted across various cities to raise awareness about telecom fraud, emphasizing the need for collective efforts from government, industry, and users [5].
女子收到多条验证码未理会,隔天6万元没了,钱是怎么消失的?
Xin Lang Cai Jing· 2025-05-30 23:22
Core Viewpoint - The incident involving a woman losing 60,000 yuan due to a new type of telecom fraud highlights the hidden and technical nature of modern scams, emphasizing the need for awareness and preventive measures [2][19]. Group 1: How the Money Disappeared - The victim's loss may have originated from a Trojan program that remotely controlled her device, potentially installed through disguised messages or links [3]. - Criminals used the Trojan to obtain sensitive information such as bank card numbers and identification, allowing them to initiate transfers without the victim's active participation [4]. - Exploitation of "no-password payment" features on certain platforms enabled fraudsters to bypass secondary verification, facilitating unauthorized transactions [5]. Group 2: Warning Signs of Trojans - Users should be vigilant for signs such as sudden device lag or overheating, which may indicate a Trojan running in the background [6]. - Automatic redirection to unfamiliar websites or app download pages can signal malicious activity [7]. - An increase in unsolicited SMS verification codes, especially from banking or payment services, is a red flag [8]. Group 3: Emergency Response and Daily Prevention - Immediate actions include disconnecting from the internet to prevent the Trojan from communicating with external servers [9]. - Users should freeze their accounts by contacting their bank or using official apps [10]. - Reporting the incident and preserving evidence, such as messages and call logs, is crucial for police investigations [11]. Group 4: Daily Protective Measures - Avoid clicking on unknown links, even if they appear to come from acquaintances [12]. - Disable small-amount no-password payment options in payment settings [13]. - Regularly scan devices for viruses using reputable security software, particularly for Android users [14]. - Properly wipe data from old devices to prevent information leakage [15]. Group 5: Principles for Identifying Fraudulent Calls - Verify any calls claiming to be from banks or e-commerce platforms by hanging up and calling back using official numbers [16]. - Never disclose sensitive information such as verification codes or passwords, regardless of the caller's persuasion [17]. - Reject calls from suspicious numbers, especially those with international or virtual prefixes [18].
整理:4月30日欧盘美盘重要新闻汇总
news flash· 2025-04-30 15:10
Domestic News - The manufacturing Purchasing Managers' Index (PMI) for April is reported at 49.0%, a decrease of 1.5 percentage points from the previous month, indicating a decline in manufacturing activity [3] - The new Private Economy Promotion Law will come into effect on May 20, aiming to support the development of the private sector [4] - The total holdings of gold ETFs in the Chinese market have reached a historical high, as reported by the World Gold Council [6] - The People's Bank of China conducted a 12 billion yuan reverse repurchase operation using a fixed quantity and interest rate bidding method [11] International News - Traders are fully pricing in four rate cuts of 25 basis points by the Federal Reserve by the end of 2025 [1] - Global gold demand in Q1 reached the highest level for a first quarter since 2016, according to the World Gold Council [2] - The U.S. economy has contracted, with a reported GDP decline of 0.3% in the first quarter, marking the first economic shrinkage since 2022 [6]