Infiltron Social Responsibility

Thoughtless Protection

> Home Thoughtless Protection With a decentralized system, there is no central storage of biometric data. When users “enroll” a voice, they do so locally, and it is encrypted and stored on-device. The hackers would not only have to re-create the voice of the target, they would also have to have physical access to the […]