Skip to content
Vinthony

Deepfakes and disinformation

The synthetic media problem has crossed the threshold where casual inspection isn't enough to spot a fake. Defence shifts from inspection to verification, from speed to slowing down, from sharing to checking. This is the working version of how to navigate a media environment where the artifact can no longer be trusted on its own.

Where the capability is today

Voice cloning from a few seconds of audio is widely available and convincing. Video deepfakes of public figures are good enough to fool casual viewers, particularly in low-resolution social-media playback. Image generation produces realistic photos of people who don't exist, and increasingly convincing edits of people who do.

All of these are improving rapidly. We'd label the current state as ‘moderate evidence of widespread capability’ under our evidence policy, and the future trajectory as ‘speculative on timing, near-certain on direction.’

Three threat categories

  1. Financial fraud. Voice clones impersonating relatives or executives requesting urgent transfers. The most common direct-harm version today. Defensible with verification protocols.
  2. Reputational attack. Image or voice deepfakes of an individual, used for harassment, blackmail, or smear campaigns. Most concerning for women, public figures, and people in contentious public roles. Often involves intimate imagery.
  3. Civic / political / market manipulation. Deepfakes of public figures shaping elections, markets, or international relations. Harder to defend individually; partially mitigated by media literacy and slower reading.

Verification over inspection

The reliable defensive shift is from looking at the artifact to checking its provenance. Three working filters:

For high-stakes claims, additional checks: reverse image search; check the named source independently; look for reporting from outlets with reputational accountability rather than viral accounts.

Personal defences

The practical protocol for individuals:

Sharing discipline

The cheapest civic move you can make: don't share things you haven't verified.

Use the AI claim evaluation worksheetfor any confident claim about AI, deepfakes, or politics that's about to change your behaviour or your shares.

Common mistakes

  1. Trusting your ability to spot deepfakes by inspection.
  2. Sharing emotionally-charged content within five minutes of seeing it.
  3. Treating one social media account as a corroborated source.
  4. Not having a family verification protocol.
  5. Underestimating the threat of voice cloning from public audio.
  6. Ignoring requests to verify because ‘they'd never fool me.’
  7. Forwarding a viral ‘leaked’ clip without checking the date.

FAQ

How can I spot a deepfake?
Increasingly, you can't — at least not by inspection alone. Video and audio deepfakes have improved past the ‘obvious uncanny valley’ stage for most viewers. The defensive move shifts from detection (looking at the artifact) to verification (checking the source and provenance). Don't trust a single video; trust corroboration across sources.
What's the realistic threat to me personally?
Three categories. (1) Financial fraud — voice clones impersonating relatives requesting urgent money. (2) Reputational attack — image or voice deepfakes of you used to harass or extort. (3) Political / civic manipulation — deepfakes of public figures shaping elections or markets. The first two have specific defences; the third is harder to address individually.
How do I protect family from deepfake voice scams?
Agree a verbal password or fact-check question with close family that you'd use to verify identity in an urgent phone call. ‘What did we have for dinner on Mum's birthday last year’ — something an attacker can't research from public information. Most voice-clone scams fail when verification is requested.
Is platform moderation solving this?
Slowly, partially, unreliably. Platform incentives don't fully align with truth labelling, and enforcement is patchy across regions and topics. Civic verification will probably remain a personal-skill issue for the foreseeable future. Don't outsource judgment to platforms.
Should I stop sharing on social media?
Calibrate by what you'd be okay seeing weaponised. Voice content (podcasts, voice notes shared widely) and video are higher-risk than text or still images. You don't have to disappear; you can be intentional about what synthetic-media-attack-surface you give.
What about ‘news’ disinformation?
Most disinformation that affects political and financial decisions isn't deepfaked imagery — it's plain text that's emotionally engineered. Source diversification (don't read only one tribe), reading the strongest critic of any claim you're about to act on, and slowing down before sharing all help.