Headlines
  • Deepfakes use artificial intelligence (AI)-driven deep learning software to manipulate preexisting photographs, videos, or audio recordings of a person to create new, fake images, videos, and audio recordings.
  • AI technology has the ability to manipulate media and swap out a genuine person's voice and likeness for similar counter parts.
  • Deepfake creators use this fake substance to spread misinformation and other illegal activities.Deepfakes are frequently used on social networking sites to elicit heated responses or defame opponents.
  • One can identify AI created fake videos by identifying abnormal eye movement, Unnatural facial expressions, a lack of feeling, awkward-looking hand,body or posture,unnatural physical movement or form, unnatural coloring, Unreal-looking hair,teeth that don't appear natural, Blurring, inconsistent audio or noise, images that appear unnatural when slowed down, differences between hashtags blockchain-based digital fingerprints, reverse image searches.
  • Look for details,like stange background,orientation of teeth,handsclothing,asymmetrical facial features,use reverse image search tools.
  • Propagandist journalists are seen as the true journalists by autocratic rulers and populist leaders worldwide, as they serve as the government's cheerleaders.
  • Globally, populist and nationalist leaders passed draconian laws to punish journalists under the guise of "fake news" or "not in the national interest."
  • False or misleading informations are spread by organizations posing as legitimate media outlets in an attempt to twist public opinion in favor of a certain ideology.
  • On social media,watch out for fake messages and news.
  • Check Google Images for Authenticity. The Google Reverse Images search can helps you.
  • It Would Be Better to Ignore Social Media Messages that are forwarded from Unknown or Little-Known Sources.
  • It is a horrible crime to post obscene, morphed images of women on social media networks, sometimes even in pornographic websites, as retaliation.
  • If a fake message asks you to share something, you can quickly recognize it as fake messege.
  • Always Check Independent Fact Checking Sites if You Have Some Doubts About the Authenticity of Any Information or Picture or video.

More Details

”EVM’s Used in India are Fully Tamper Proof”

Political parties in India have the habit to oppose the Electronic Voting Machines (EVM) when the result is not on their favor.Political leaders expressed reservations over the use of EVMs.Controversial researchers from time to time observed that the EVMs are not tamper-proof.

An Electronic Voting Machine consists of two Units ( Control Unit and Balloting Unit) joined by a five-meter long cable. The Control Unit is with the Presiding Officer (in charge of a polling station) and the Balloting Unit is placed inside the makeshift voting compartment.The Polling Officer who in charge of the Control Unit will press the Ballot Button instead of issuing a ballot paper. This will enable the voter to cast his or her vote by pressing the blue button on the Balloting Unit against the candidate and symbol of his or her choice.

EVMs manufactured in 1989-90 were used on experimental basis for the first time in 16 Assembly Constituencies in the States of Madhya Pradesh, Rajasthan and the National Capital Territory of Delhi (NCT) at the Legislative Assembly Elections held in 1998.

According to Election Commission of India estimate,1.7 million EVMs were used during the last parliamentary election held in 2014. EVMs can record a maximum of 3840 votes. EVMs have the capacity to incorporate 64 candidates.In a Balloting Unit names of 16 candidates can be Incorporated.But if the number exceeds,a second Balloting Unit can be attached.But both capturing could not prevented totally by the use of EVMs.Miscreants of different political parties damage EVMs and EVMs are not tamper proof.Malfunctioning of electronic voting machines also delay the voting process.But,according to Chief Election Commission,EVMs used in India are fully tamper proof and stand no chance of being hacked from any external sources.

Related Article

Indian President Election 2022

On July 18, India will elect a new president.4,800 MPs and MLAs will vote to choose India's 15th pre ...
July 18, 2022

Freedom of Speech is Not Absolute…

Though the freedom of speech and expression guaranteed by article 19(1)(a) of the Indian Constitutio ...
July 7, 2022

The Source of a Good Investigative…

My sources are my friends.They have a lot of trust in me and freely give me vital information. Since ...
August 9, 2021

Journalists,Opposition Leaders the Target of Government…

According to Freedom House,governments in various countries are rapidly investing in sophisticated t ...
July 20, 2021

India Needs More Innovative Methods to…

Despite the legislative focus on child marriage, implementation has been inadequate in addressing th ...
July 17, 2021

Shettihalli Rosary Church the Abondoned Floating…

Shettihalli Rosary Church, commonly known as floating church, was built in 1860. It is a fascinating ...
July 16, 2021

Other Article

Video Report

Russian Shelling of Ukraine’s Zaporizhzhia Dam…

Ukraine's largest hydroelectric dam suffered severe damage from Russian shelling in late March. For ...
April 18, 2024
News & Views

Myanmar Border Guards, Soldiers and Civilians…

Nearly four dozen members of the Burmese junta-affiliated Border Guard Police and soldiers have fled ...
Pick of the Day
Video Report

Donors Pledge $2.13 billion Aid for…

The fighting in the Northeast African nation of Sudan is still going on, but worldwide donors have p ...
News & Views

Myanmar Junta Releases Thousands of Prisoners…

Myanmar prisons nationwide released over 3,000 prisoners on Wednesday, according to junta-controlled ...
Video Report

Egyptian Firm Offers People to Escape…

The Rafah border crossing from Gaza has been closed to the majority of Palestinians by Egypt ever si ...

[wp-rss-aggregator feeds="crime-more-world"]
Top

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use. <br> To find out more, including how to control cookies, see here: <a href="https://automattic.com/cookies"> Cookie Policy </a> more information

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

Close