Security through data

CONTENT

  • Home
  • Blog
  • Data
  • Directory
  • Events
  • Tutorials

FEATURED

  • CyberAlerts
  • CyberDecoded
  • CyberWeekly
  • CyberStory
  • CyberTips

COMPANY

  • About us
  • Advertise
  • Legal & Policy
Cybermaterial
  • CATEGORIES
    • Alerts
    • APIs
    • Apps
    • Blog
    • Cyber101
    • Documents
    • Entertainment
    • Learning
    • Quotes
    • Stats
    • Tools
No Result
View All Result
Contact Us
Newsletter
Cybermaterial
  • CATEGORIES
    • Alerts
    • APIs
    • Apps
    • Blog
    • Cyber101
    • Documents
    • Entertainment
    • Learning
    • Quotes
    • Stats
    • Tools
No Result
View All Result
Contact Us
Newsletter
Cybermaterial
No Result
View All Result

Facsimile

by Erin L. Snyder

in Books, Learning
2 min read

What if a digital profile you created had a mind of its own? In FASCIMILE, that’s exactly the case — an intelligent sci-fi novel with DEEPFAKE technology at the center. Learn more!

“At AuroroTech, we record your actions and your words, then transform that data into a lifelike simulation. After that, the possibilities are endless. Imagine meeting yourself, being able to experience what others truly see and hear when they talk to you. Imagine if your friends and family could always keep in touch, no matter how busy you are. Imagine if in a hundred years from now, a part of you remains for future generations to interact with.”

When Persephone Kilard signed up and strapped on the miniature recorder, all she wanted was a social networking service that would take the actual work of socializing off of her hands. Fringe religious groups could wax poetic about deeper meanings and universal truths; she just wanted to make her life a little easier.

After all, the simulation was only supposed to be her reflection, not her soul.

But there was one small glitch. Suddenly Persephone’s digital profile has a mind of its own. Face to face with herself, Persephone is forced to confront questions about the nature of identity that she’d rather avoid. She’d better figure it out quickly, though, because hers isn’t the only mind lurking in AuroroTech’s drives and networks.

Somewhere, hidden in the code, a simulated ghost is watching her while the border between reality and replica unravels. The virtual danger is becoming all too real, and both versions of Persephone need to uncover the truth if either is going to have a chance to survive.

Get your copy now

*Disclaimer: As an Amazon Associate we earn from qualifying purchases.
Tags: Deepfake-booksDeepFakesFascimile
14
VIEWS

Recommended Books

Book: Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails
Books

Book: Email Forensics: Eliminating Spam, Scams and Phishing

Book: Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails
Books

Book: Phishing: Detection, Analysis And Prevention

Book: Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails
Books

Book: Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails

Worm: The First Digital World War
Books

Worm: The First Digital World War

Prev Next

MORE

Quantum Computing

Lexicon: Brain

Stats

65% of all phishing emails were impersonating different Amazon shipping related notifications.

Documents

SANS Faculty Free Tools

Memes

Meme: Amazon shopping

ADVERTISEMENT

Tags

Books Cyber Definition Cybersecurity Hackers Malware Memes Movies Quantum Computing Software Word of the day

© 2021 | CyberMaterial | All rights reserved.

SECURITY THROUGH DATA

No Result
View All Result
  • Home
  • Blog
  • Data
  • Directory
  • Events
  • Tutorials
  • CyberDecoded
  • Stats
  • CyberStory
  • CyberTips
  • Cyber Weekly

© 2020 CyberMaterial - Cyber Decoded.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.