Scammers Only Need 30 Seconds of Video to Clone You
Training a convincing voice model now needs as little as thirty seconds of audio, which public videos, podcasts and recorded calls provide in abundance. Open profiles reveal who reports to whom, so attackers can pair cloned voices with organisational charts and pressure staff into authorising payments or sharing access. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..