Skip to main content

What is deepfake technology?


 

Technology is doing just as much damage to human life as it is to development Another cursed technology name in this technology world is deepfake. The meaning or explanation is hidden in the name of this technology of making the truth a lie and the lie a truth.


What is the proper  definition of deepfake technology?  

It is called deepfake because it can disprove the truth very deeply and accurately. Deepfake technology can become a curse of human life by using artificial intelligence and machine learning. This technology can use artificial intelligence and machine learning to mimic someone's appearance, behavior and speech in a video. What could not be done so far can now be done with this technology. So far we have seen that only pictures of someone else could be attached to someone else's body.


But with the advent of deepfake technology, videos can now be made by attaching one person's body to another's face. It can even change the shape of the face associated with the movement of the person in the video. Which is a terror for mankind and the whole technology world. This technology is capable of bridging social conflicts to political conflicts and even international conflicts.This technology can easily mislead people with fake statements by falsifying the messages of politicians. 


What is the major consequences of this technology?  

Making pornography videos from anyone, using defamation, spreading confusion and distrust, and even marital discord can be used by anyone. Which is very sad. Online, that is, taking pictures of girls from social media and using fake technology to make fake porn videos can demand a large amount of money. So this technology can become a curse in anyone's life.


And I want to tell those who think you can harm others by using this technology that no one gets a day off unjustly. A few days ago, a 17-year-old boy hacked Twitter but was eventually caught by the police. So you will not be happy thinking that you will harm others and law enforcement will not find you. Just as it is very easy to commit a crime in the virtual world, it is also very easy to catch a criminal. So be careful! Revenge of nature.



How to protect me from this technology?

Do not share your picture with anyone on social media. Maybe one day you will have to pay the ultimate price if it goes to the wrong people. In addition to using technology we need to be very aware We should always be vigilant about the fact that such technology can be misused by ignorant people. And you must share your own pictures and videos wherever you are. Who knows, it may fill your life with darkness.






Comments

Popular posts from this blog

What should the processor look at?

The things that we all should keep an eye on are the processor or not; 1. Clock speed 2. Number of course 3. cache memory 4. FBS 1. Clock Speed: It is also called GH2. All processors are written on. Clock speed means how fast your computer can work. That's what this signal means. The speed of the processor is known through this clock speed, how fast the calculation can be done. 2. Number of Cores: The more cores the processor has, the faster the processor can work. If I give an example to explain the matter, I hope you can understand it very easily. Suppose if a person had many hands, then he could do many things at the same time. That is, if we go to the market and buy a smartphone, then we will see what the configurations of the phone are. If we look closely at the configuration of the smartphone, we will see that Dual Core Processor, Quad Core Processor, Octa core processor, Hexa core processor, Deca core processor. This means that the dual core processor has two arms or cores, ...

How to create a google account from a Android mobile?

 I don't believe a long introduction. I don’t want to bore you.  Today I will teach how to create a google account very flexibly from an android device.  Firstly open a browser like Opera, Firefox, Google Chrome or any other it doesn't matter in that and then type create a Gmail account or  click here After clicking here then click on  create an account  option. Write here your first name and last name exactly. Then write an email address uniquely which did not use in the network or google database. After completing the write a unique email address subsequently you will write a password like  @hga34#@ !. This password format is very effective and efficient against brute force or any other intelligence attack. Now click on the next button  Select your country from here      Enter your mobile number in the orange colour selected blank field. Now enter a recovery email address in the selected field. Anytime if your email address passwo...

What is transmission media? Introduction to different types of data transmission cables

Transmission media: When a PC communicates or wants to communicate with another PC, it has to take the help of some transmission media. The most commonly used media in the network are twisted pair cable, coaxial cable, fiber optic cable. Nowadays, the use of optical fiber is increasing greatly. Radio wave, microwave and infrared technologies are prominent among wireless media. Among these mediums, optical fiber has the highest data transfer speed. The type of medium used in a network depends on the type and location of that network. The connection system for exchanging information between the sender and the remote receiving end is called a channel. The means or methods used to implement the channel are called media. such as-- (i) Cable or wire. (ii) Common telephone lines. (ii) Radio waves. (iv) Microwave. (v) Geo-satellite systems etc. Cable or Wire: Cable is an important medium in data communication. Cables are generally used for data transfer over short range networking such as LAN...