Editing How to protect yourself and others from covert modeling
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 84: | Line 84: | ||
* Create a '''fact-finding taskforce''' for determining if implementations of '''[[digital sound-alikes]]-technology''' are available to '''criminals''' and is it being used to commit crimes. | * Create a '''fact-finding taskforce''' for determining if implementations of '''[[digital sound-alikes]]-technology''' are available to '''criminals''' and is it being used to commit crimes. | ||
== How to protect judiciaries from covert modeling == | == How to protect our judiciaries from covert modeling == | ||
'''[[Digital look-alikes]]''' and '''[[digital sound-alikes]]''' technologies prompt some changes to '''[[w:Rules of evidence|w:rules of evidence]]''' and updates to what should be '''deemed deniable'''. | '''[[Digital look-alikes]]''' and '''[[digital sound-alikes]]''' technologies prompt some changes to '''[[w:Rules of evidence|w:rules of evidence]]''' and updates to what should be '''deemed deniable'''. |