Risky Bulletin Newsletter
January 14, 2026
Risky Bulletin: Voice cloning defenses still weak, can be bypassed
Presented by
News Editor
Modern security systems designed to protect user voices from getting cloned are still weak and can be bypassed with the proper tools.
These systems work by injecting random noise in voice audio recordings in order to prevent AI-based cloning technology from copying a user's voice. Voice cloning attacks are still possible, but they produce low quality output that can be easily detected and flagged by both manual reviewers and automated systems.
But three researchers from the University of Texas, in San Antonio, say that these systems are not complex enough and can be easily bypassed if attackers account for the added noise.