{"id":209151,"date":"2024-04-17T11:01:02","date_gmt":"2024-04-17T09:01:02","guid":{"rendered":"https:\/\/nextcloud.com\/?p=209151"},"modified":"2025-11-03T10:53:42","modified_gmt":"2025-11-03T09:53:42","slug":"how-to-protect-yourself-against-deepfake-scams","status":"publish","type":"post","link":"https:\/\/nextcloud.com\/de\/blog\/how-to-protect-yourself-against-deepfake-scams\/","title":{"rendered":"How to protect yourself against deepfake scams in video calls"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"1920\" height=\"1080\" src=\"https:\/\/nextcloud.com\/c\/uploads\/2024\/04\/How-to-protect-yourself-against-deepfakes-1.png\" alt=\"How to protect yourself against deepfakes\" class=\"wp-image-209219\" srcset=\"https:\/\/nextcloud.com\/c\/uploads\/2024\/04\/How-to-protect-yourself-against-deepfakes-1.png 1920w, https:\/\/nextcloud.com\/c\/uploads\/2024\/04\/How-to-protect-yourself-against-deepfakes-1-300x169.png 300w, https:\/\/nextcloud.com\/c\/uploads\/2024\/04\/How-to-protect-yourself-against-deepfakes-1-1024x576.png 1024w, https:\/\/nextcloud.com\/c\/uploads\/2024\/04\/How-to-protect-yourself-against-deepfakes-1-768x432.png 768w, https:\/\/nextcloud.com\/c\/uploads\/2024\/04\/How-to-protect-yourself-against-deepfakes-1-1536x864.png 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/figure>\n\n\n\n<p>Ongoing public concerns over real-time video scams has been the spur to gain global attention as we witness new major incidents taking place increasingly more. Take a Hong Kong MNC recently <a href=\"https:\/\/m.economictimes.com\/industry\/tech\/hong-kong-mnc-suffers-25-6-million-loss-in-deepfake-scam\/amp_articleshow\/107465111.cms\" target=\"_blank\" rel=\"noreferrer noopener\">falling prey to a scammer<\/a> in a colossal $25.6 million heist \u2014 the deepfake technology has already evolved enough to bring on a whole new brand of fraud.<\/p>\n\n\n\n<p>What remains is a call to action. Are there ways to protect yourself and your organization against con men posing as your boss, your business partner, or even your own mother? Let&#8217;s find out!<\/p>\n\n\n\n<p>First things first, let us start with the definition.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is a deepfake? <\/h2>\n\n\n\n<p>In case the definition of a deepfake is still unclear to some, a deepfake is content generated using deep learning techniques that is intended to look real, but is in fact fabricated. Artificial intelligence (AI) used to generate deepfakes typically employs generative models, for example, Generative Adversarial Networks (GANs) or auto-encoders.<\/p>\n\n\n\n<p>Deepfakes are used not only in video content, but also in audio recordings and images. The purpose of a deepfake is often to depict an individual or a group saying or doing something that they never did in reality. To produce content that appears convincing, the AI must use large datasets in its training. It allows the model to recognize and reproduce natural patterns present in content it is designed to mimic.<\/p>\n\n\n\n<p>While deepfake technology is a breakthrough with great potential in the film industry and game development, as well as a rising social media trend, it also opens dangerous opportunities for illegal use. The examples are numerous and include identity theft, evidence forging, <a href=\"https:\/\/www.nytimes.com\/2023\/02\/07\/technology\/artificial-intelligence-training-deepfake.html\" target=\"_blank\" rel=\"noreferrer noopener\">disinformation<\/a>, slander and biometric security bypass. In all cases, fraudsters typically leverage the depicted person\u2019s authority over the targeted individuals or personal connection to them, depending on the setting.<\/p>\n\n\n\n\n\n<h2 class=\"wp-block-heading\">Where can you encounter a deepfake?<\/h2>\n\n\n\n<p>Deepfakes are used to produce video, audio or image content, as a recorded media or a real-time stream. It can be a YouTube video, a \u2018leaked\u2019 recording in a social post, a phone call or a video conference \u2013 the opportunities are practically unlimited.<\/p>\n\n\n\n<p>Depending on the purpose, the format is picked accordingly. For example, political disinformation works best where mass engagement is possible, meaning that spreading it publicly via social media is the best tactic. Whereas seeking a private gain from a company or or individual requires a more intimate setting and often a personal conversation.<\/p>\n\n\n\n<p>When it comes to threats to your personal life, finance or security, we can narrow down the most dangerous deepfake scenarios to encounters with people you care about, trust , or report to. This can be a family member, a friend, or an authority figure at work such as your boss or a company executive.<\/p>\n\n\n\n<p>The setting will most likely be private: whether over a phone call or a video meeting. Personal meetings are much easier to execute and give the faker much more control over the situation. The conversation, whatever the background is, will lead you to an action under a sense of urgency or fear \u2013 most likely to transfer a sum of money. The tactic is to deceive your logic and common sense using fear, compassion or even ambition.<\/p>\n\n\n\n<p>As generative AI development drives a huge interest and investment, we are entering a dangerous zone: real-time video, the most sophisticated and convincing deepfake use case yet, still has a very little awareness.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Deepfakes in real-time video<\/h2>\n\n\n\n<p>Real-time video deepfakes generate manipulated video content in real-time for immediate application during live streams and video calls. Voice cloning and face swapping are the most frequently used techniques to compose a complete faked environment.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Face swapping<\/h3>\n\n\n\n<p>Face swapping is a common application of deepfakes, allowing the software to replace facial features of a target person with fake features, most often those of another person. With facial landmark detection and manipulation techniques, the blending appears seamless and hard to spot when caught unaware.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Voice cloning<\/h3>\n\n\n\n<p>In addition to looking convincing, a faker also needs to sound convincing. For this part, voice cloning is used. In voice cloning, the AI replicates the voice of the individual. A significant amount of high-quality audio data is required to train a voice cloning model, usually obtained from recordings of the target person speaking in various contexts and using different intonations.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Curiosity time: how does a deepfake setup actually work?<\/h3>\n\n\n\n<p>Deepfake technology is capable of impersonating real-life individuals and doing it in a real-time setting, making the result even more convincing (and terrifying!). But how does the software work in a way that we encounter deepfakes using familiar meeting platforms?<\/p>\n\n\n\n<p>Deepfake generation software can be integrated with streaming platforms and video conferencing tools in many ways:<\/p>\n\n\n\n<ul class=\"wp-block-list nc-list\">\n<li>It could function as a separate application that captures the video feed, processes it in real-time, and then sends the manipulated feed to the video conferencing software.<\/li>\n\n\n\n<li>Alternatively, it might be integrated directly into the video conferencing software as an optional feature or plugin.<\/li>\n\n\n\n<li>Another way, even more sophisticated and hard to detect is camera input, namely a virtual camera. Virtual camera intercepts the video feed from the physical camera of the faker. It then outputs the manipulated feed to the video conferencing software. The faker just picks the virtual camera as their camera input and voil\u00e0! (not funny, we know).<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">How to protect yourself against deepfakes?<\/h2>\n\n\n\n<p>Finally, to the most important part. How do you protect yourself against a deepfake, or at least get prepared to spot a fake boss making a sketchy request over video?<\/p>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\" style=\"grid-template-columns:43% auto\"><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" width=\"1054\" height=\"605\" src=\"https:\/\/nextcloud.com\/c\/uploads\/2023\/12\/nextcloud-hub7-talk-preview.png\" alt=\"Nextcloud Talk in Hub 7\" class=\"wp-image-190199 size-full\" srcset=\"https:\/\/nextcloud.com\/c\/uploads\/2023\/12\/nextcloud-hub7-talk-preview.png 1054w, https:\/\/nextcloud.com\/c\/uploads\/2023\/12\/nextcloud-hub7-talk-preview-300x172.png 300w, https:\/\/nextcloud.com\/c\/uploads\/2023\/12\/nextcloud-hub7-talk-preview-1003x576.png 1003w, https:\/\/nextcloud.com\/c\/uploads\/2023\/12\/nextcloud-hub7-talk-preview-768x441.png 768w\" sizes=\"(max-width: 1054px) 100vw, 1054px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>Privacy-first videoconferencing software is a key to safe meetings. Meet Nextcloud Talk, a powerful chatting and meeting platform that lets you regain control. <\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/nextcloud.com\/talk\/\" target=\"_blank\" rel=\"noreferrer noopener\">Learn more<\/a><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Watch out for red flags<\/h3>\n\n\n\n<p>AI face swapping technology maybe advanced, but it\u2019s not perfect. There are red flags you can spot, or at least learn to look out for when something seems off or unnatural:<\/p>\n\n\n\n<ul class=\"wp-block-list nc-list\">\n<li>Unrealistic facial expressions or movements, including unnatural eye movements, inappropriate blinking, and\/or weird lip sync.<\/li>\n\n\n\n<li>Inconsistencies in lighting and shadows that don\u2019t match the surroundings.<\/li>\n\n\n\n<li>Unnatural head or body movements, as well as visible blurring or pixelation around the face or neck.<\/li>\n\n\n\n<li>Inconsistent quality in audio and video and mismatch between the picture and the sound.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Suspicious? Be proactive<\/h3>\n\n\n\n<p>There are methods to help you fish out the red flags that generally won\u2019t make the conversation awkward if the person is in fact real.<\/p>\n\n\n\n<p>First, there\u2019s nothing more natural than a casual conversation. Engage in small talk: ask about their day, routine, questions about people you both know, etc. A complete stranger will struggle to be spontaneous and maintain the same personal connection. It\u2019s also easier to catch one off guard when they lose a sense of control.<\/p>\n\n\n\n<p>You can also use other video conferencing features: ask the person to share their screen and show you something related to your common tasks. This will be very difficult to replicate without access.<\/p>\n\n\n\n<p>Finally, once they make a suspicious request, you have more freedom to be alert openly \u2014 politely ask them to confirm their identity by providing some exclusive information or send you a confirmation message via a different channel.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Set up a passphrase<\/h3>\n\n\n\n<p>One more way to ensure confidence when it comes to sensitive topics is setting up a password or passphrase. This is an easy way to confirm the identity of the people you know, both at work and between family members, and it is equally effective via voice, video and text communication.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Verify identity outside of the meeting<\/h3>\n\n\n\n<p>If a faker poses as a person you know well, chances are you have more than one communication channel to reach out with. Use email, a messenger or a personal phone number to contact them and raise a question \u2014 the reason is valid.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Don\u2019t let them harvest your data<\/h3>\n\n\n\n<p>To replicate and manipulate a person\u2019s voice or image, AI needs a massive amount of data. This data is often gathered beforehand, during online calls and meetings. Features like Recording Consent in Nextcloud Talk may help you protect yourself and others from such a data haul.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full imageRoundShadow\"><img decoding=\"async\" width=\"1920\" height=\"1080\" src=\"https:\/\/nextcloud.com\/c\/uploads\/2024\/04\/giving-consent-before-joining-call-Nextcloud-how-to-avoid-deepfakes.jpg\" alt=\"Giving consent before joining call - Nextcloud Talk\" class=\"wp-image-209163\" srcset=\"https:\/\/nextcloud.com\/c\/uploads\/2024\/04\/giving-consent-before-joining-call-Nextcloud-how-to-avoid-deepfakes.jpg 1920w, https:\/\/nextcloud.com\/c\/uploads\/2024\/04\/giving-consent-before-joining-call-Nextcloud-how-to-avoid-deepfakes-300x169.jpg 300w, https:\/\/nextcloud.com\/c\/uploads\/2024\/04\/giving-consent-before-joining-call-Nextcloud-how-to-avoid-deepfakes-1024x576.jpg 1024w, https:\/\/nextcloud.com\/c\/uploads\/2024\/04\/giving-consent-before-joining-call-Nextcloud-how-to-avoid-deepfakes-768x432.jpg 768w, https:\/\/nextcloud.com\/c\/uploads\/2024\/04\/giving-consent-before-joining-call-Nextcloud-how-to-avoid-deepfakes-1536x864.jpg 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Use company software<\/h3>\n\n\n\n<p>It\u2019s unlikely for your real boss to set up a meeting via a platform you never use for work. And if they do, they must have a good reason! Don\u2019t be afraid to stand up to suspicious activity.<\/p>\n\n\n\n<p>Using company software means better <a href=\"https:\/\/nextcloud.com\/blog\/not-even-google-can-take-your-data-on-nextcloud\/\" target=\"_blank\" rel=\"noreferrer noopener\">control over the data<\/a> and compliance with privacy regulations. Even better \u2014 if you run it on premise! Should an incident happen, the company IT team can run an audit to retrieve the relevant data and investigate.<\/p>\n\n\n\n<p>Ensure secure access to your videoconferencing platform with settings like 2FA, strong passwords, data encryption, activity monitoring, and login restrictions. This applies to your personal settings and administrative controls.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Nextcloud Talk: video and chat with privacy in mind<\/h2>\n\n\n\n<p>Using a privacy-oriented, unified workspace with admin control in all apps makes sure your security protocols are in place to detect and prevent breaches. Nextcloud Hub provides a user friendly videoconferencing platform that keeps users happy to stay within company IT.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-vimeo wp-block-embed-vimeo wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Nextcloud Talk\" src=\"https:\/\/player.vimeo.com\/video\/576684156?dnt=1&amp;app_id=122963\" width=\"500\" height=\"281\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture; clipboard-write\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<p>How Nextcloud Talk protects your data:<\/p>\n\n\n\n<ul class=\"wp-block-list nc-list\">\n<li>AI-powered suspicious login detection<\/li>\n\n\n\n<li>Multi-layered encryption with end-to-end encrypted communication<\/li>\n\n\n\n<li>Brute-force protection<\/li>\n\n\n\n<li>Fully on premise, 100% open source<\/li>\n<\/ul>\n\n\n\n<p>Nextcloud is an open-source project backed by a strong community with proactive approach to vulnerability research and patching. It is designed to let you stay compliant with GDPR, CCPA, and the upcoming EU ePrivacy Regulation.<\/p>\n\n\n<section class=\"promo-section   full-width \" id=\"\" style=\"\" data-expiration=\"\">\n\t<div class=\"container\">\n\t\t<div class=\"row\">\n\t\t\t<div class=\"col-12\">\n\t\t\t\t<div class=\"text-block\">\n\t\t\t\t\t<div class=\"icon\"><img decoding=\"async\" src=\"https:\/\/nextcloud.com\/c\/uploads\/2023\/06\/download-solid-white.svg\" alt=\"Nextcloud - Get Nextcloud Hub\"\/><\/div><h2>Get Nextcloud Hub<\/h2><p>Download and install Nextcloud Hub here!<\/p>\n<a class=\"c-btn btn-white\" href=\"https:\/\/nextcloud.com\/install\/\" target=\"_blank\">Get Hub<\/a>\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>Read out guide to learn what deepfake scams are, how spot a scammer, and how to protect yourself with the right techniques and software.<\/p>\n","protected":false},"author":33,"featured_media":209219,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"publish_to_discourse":"","publish_post_category":"22","wpdc_auto_publish_overridden":"1","wpdc_topic_tags":"","wpdc_pin_topic":"","wpdc_pin_until":"","discourse_post_id":"","discourse_permalink":"","wpdc_publishing_response":"success","wpdc_publishing_error":"Embed url has already been taken","footnotes":""},"categories":[11,347,13],"tags":[],"class_list":["post-209151","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-privacy","category-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to protect yourself against deepfake scams in video calls - Nextcloud<\/title>\n<meta name=\"description\" content=\"Read out guide to learn what deepfake scams are, how spot a scammer, and how to protect yourself with the right techniques and software.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nextcloud.com\/de\/blog\/how-to-protect-yourself-against-deepfake-scams\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to protect yourself against deepfake scams in video calls - Nextcloud\" \/>\n<meta property=\"og:description\" content=\"Read out guide to learn what deepfake scams are, how spot a scammer, and how to protect yourself with the right techniques and software.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nextcloud.com\/de\/blog\/how-to-protect-yourself-against-deepfake-scams\/\" \/>\n<meta property=\"og:site_name\" content=\"Nextcloud\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Nextclouders\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-17T09:01:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-03T09:53:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nextcloud.com\/c\/uploads\/2024\/04\/How-to-protect-yourself-against-deepfakes-1-1024x576.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"576\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Mikhail Korotaev\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@nextclouders\" \/>\n<meta name=\"twitter:site\" content=\"@nextclouders\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mikhail Korotaev\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"8\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/nextcloud.com\/de\/blog\/how-to-protect-yourself-against-deepfake-scams\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/nextcloud.com\/de\/blog\/how-to-protect-yourself-against-deepfake-scams\/\"},\"author\":{\"name\":\"Mikhail Korotaev\",\"@id\":\"https:\/\/nextcloud.com\/de\/#\/schema\/person\/c4131c923c11769c06b82290f98f8ac8\"},\"headline\":\"How to protect yourself against deepfake scams in video calls\",\"datePublished\":\"2024-04-17T09:01:02+00:00\",\"dateModified\":\"2025-11-03T09:53:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/nextcloud.com\/de\/blog\/how-to-protect-yourself-against-deepfake-scams\/\"},\"wordCount\":1584,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/nextcloud.com\/de\/#organization\"},\"image\":{\"@id\":\"https:\/\/nextcloud.com\/de\/blog\/how-to-protect-yourself-against-deepfake-scams\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/nextcloud.com\/c\/uploads\/2024\/04\/How-to-protect-yourself-against-deepfakes-1.png\",\"articleSection\":[\"Blog\",\"Privacy\",\"Security\"],\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/nextcloud.com\/de\/blog\/how-to-protect-yourself-against-deepfake-scams\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/nextcloud.com\/de\/blog\/how-to-protect-yourself-against-deepfake-scams\/\",\"url\":\"https:\/\/nextcloud.com\/de\/blog\/how-to-protect-yourself-against-deepfake-scams\/\",\"name\":\"How to protect yourself against deepfake scams in video calls - Nextcloud\",\"isPartOf\":{\"@id\":\"https:\/\/nextcloud.com\/de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/nextcloud.com\/de\/blog\/how-to-protect-yourself-against-deepfake-scams\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/nextcloud.com\/de\/blog\/how-to-protect-yourself-against-deepfake-scams\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/nextcloud.com\/c\/uploads\/2024\/04\/How-to-protect-yourself-against-deepfakes-1.png\",\"datePublished\":\"2024-04-17T09:01:02+00:00\",\"dateModified\":\"2025-11-03T09:53:42+00:00\",\"description\":\"Read out guide to learn what deepfake scams are, how spot a scammer, and how to protect yourself with the right techniques and software.\",\"breadcrumb\":{\"@id\":\"https:\/\/nextcloud.com\/de\/blog\/how-to-protect-yourself-against-deepfake-scams\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/nextcloud.com\/de\/blog\/how-to-protect-yourself-against-deepfake-scams\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/nextcloud.com\/de\/blog\/how-to-protect-yourself-against-deepfake-scams\/#primaryimage\",\"url\":\"https:\/\/nextcloud.com\/c\/uploads\/2024\/04\/How-to-protect-yourself-against-deepfakes-1.png\",\"contentUrl\":\"https:\/\/nextcloud.com\/c\/uploads\/2024\/04\/How-to-protect-yourself-against-deepfakes-1.png\",\"width\":1920,\"height\":1080,\"caption\":\"How to protect yourself against deepfakes\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/nextcloud.com\/de\/blog\/how-to-protect-yourself-against-deepfake-scams\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/nextcloud.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to protect yourself against deepfake scams in video calls\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/nextcloud.com\/de\/#website\",\"url\":\"https:\/\/nextcloud.com\/de\/\",\"name\":\"Nextcloud\",\"description\":\"Regain control over your data\",\"publisher\":{\"@id\":\"https:\/\/nextcloud.com\/de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/nextcloud.com\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/nextcloud.com\/de\/#organization\",\"name\":\"Nextcloud\",\"url\":\"https:\/\/nextcloud.com\/de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/nextcloud.com\/de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/nextcloud.com\/c\/uploads\/2022\/10\/nextcloud-logo-blue-transparent.svg\",\"contentUrl\":\"https:\/\/nextcloud.com\/c\/uploads\/2022\/10\/nextcloud-logo-blue-transparent.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"Nextcloud\"},\"image\":{\"@id\":\"https:\/\/nextcloud.com\/de\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Nextclouders\/\",\"https:\/\/x.com\/nextclouders\",\"https:\/\/www.linkedin.com\/company\/10827569\/\",\"https:\/\/youtube.com\/nextcloud\",\"https:\/\/www.instagram.com\/nextclouders\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/nextcloud.com\/de\/#\/schema\/person\/c4131c923c11769c06b82290f98f8ac8\",\"name\":\"Mikhail Korotaev\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/nextcloud.com\/de\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/50239e6d041bd078acdbbdad43132efabac4ca0799ae3eb97ec30bc09b62e515?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/50239e6d041bd078acdbbdad43132efabac4ca0799ae3eb97ec30bc09b62e515?s=96&d=mm&r=g\",\"caption\":\"Mikhail Korotaev\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to protect yourself against deepfake scams in video calls - Nextcloud","description":"Read out guide to learn what deepfake scams are, how spot a scammer, and how to protect yourself with the right techniques and software.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nextcloud.com\/de\/blog\/how-to-protect-yourself-against-deepfake-scams\/","og_locale":"de_DE","og_type":"article","og_title":"How to protect yourself against deepfake scams in video calls - Nextcloud","og_description":"Read out guide to learn what deepfake scams are, how spot a scammer, and how to protect yourself with the right techniques and software.","og_url":"https:\/\/nextcloud.com\/de\/blog\/how-to-protect-yourself-against-deepfake-scams\/","og_site_name":"Nextcloud","article_publisher":"https:\/\/www.facebook.com\/Nextclouders\/","article_published_time":"2024-04-17T09:01:02+00:00","article_modified_time":"2025-11-03T09:53:42+00:00","og_image":[{"width":1024,"height":576,"url":"https:\/\/nextcloud.com\/c\/uploads\/2024\/04\/How-to-protect-yourself-against-deepfakes-1-1024x576.png","type":"image\/png"}],"author":"Mikhail Korotaev","twitter_card":"summary_large_image","twitter_creator":"@nextclouders","twitter_site":"@nextclouders","twitter_misc":{"Verfasst von":"Mikhail Korotaev","Gesch\u00e4tzte Lesezeit":"8\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nextcloud.com\/de\/blog\/how-to-protect-yourself-against-deepfake-scams\/#article","isPartOf":{"@id":"https:\/\/nextcloud.com\/de\/blog\/how-to-protect-yourself-against-deepfake-scams\/"},"author":{"name":"Mikhail Korotaev","@id":"https:\/\/nextcloud.com\/de\/#\/schema\/person\/c4131c923c11769c06b82290f98f8ac8"},"headline":"How to protect yourself against deepfake scams in video calls","datePublished":"2024-04-17T09:01:02+00:00","dateModified":"2025-11-03T09:53:42+00:00","mainEntityOfPage":{"@id":"https:\/\/nextcloud.com\/de\/blog\/how-to-protect-yourself-against-deepfake-scams\/"},"wordCount":1584,"commentCount":0,"publisher":{"@id":"https:\/\/nextcloud.com\/de\/#organization"},"image":{"@id":"https:\/\/nextcloud.com\/de\/blog\/how-to-protect-yourself-against-deepfake-scams\/#primaryimage"},"thumbnailUrl":"https:\/\/nextcloud.com\/c\/uploads\/2024\/04\/How-to-protect-yourself-against-deepfakes-1.png","articleSection":["Blog","Privacy","Security"],"inLanguage":"de","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nextcloud.com\/de\/blog\/how-to-protect-yourself-against-deepfake-scams\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nextcloud.com\/de\/blog\/how-to-protect-yourself-against-deepfake-scams\/","url":"https:\/\/nextcloud.com\/de\/blog\/how-to-protect-yourself-against-deepfake-scams\/","name":"How to protect yourself against deepfake scams in video calls - Nextcloud","isPartOf":{"@id":"https:\/\/nextcloud.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nextcloud.com\/de\/blog\/how-to-protect-yourself-against-deepfake-scams\/#primaryimage"},"image":{"@id":"https:\/\/nextcloud.com\/de\/blog\/how-to-protect-yourself-against-deepfake-scams\/#primaryimage"},"thumbnailUrl":"https:\/\/nextcloud.com\/c\/uploads\/2024\/04\/How-to-protect-yourself-against-deepfakes-1.png","datePublished":"2024-04-17T09:01:02+00:00","dateModified":"2025-11-03T09:53:42+00:00","description":"Read out guide to learn what deepfake scams are, how spot a scammer, and how to protect yourself with the right techniques and software.","breadcrumb":{"@id":"https:\/\/nextcloud.com\/de\/blog\/how-to-protect-yourself-against-deepfake-scams\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nextcloud.com\/de\/blog\/how-to-protect-yourself-against-deepfake-scams\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/nextcloud.com\/de\/blog\/how-to-protect-yourself-against-deepfake-scams\/#primaryimage","url":"https:\/\/nextcloud.com\/c\/uploads\/2024\/04\/How-to-protect-yourself-against-deepfakes-1.png","contentUrl":"https:\/\/nextcloud.com\/c\/uploads\/2024\/04\/How-to-protect-yourself-against-deepfakes-1.png","width":1920,"height":1080,"caption":"How to protect yourself against deepfakes"},{"@type":"BreadcrumbList","@id":"https:\/\/nextcloud.com\/de\/blog\/how-to-protect-yourself-against-deepfake-scams\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nextcloud.com\/de\/"},{"@type":"ListItem","position":2,"name":"How to protect yourself against deepfake scams in video calls"}]},{"@type":"WebSite","@id":"https:\/\/nextcloud.com\/de\/#website","url":"https:\/\/nextcloud.com\/de\/","name":"Nextcloud","description":"Regain control over your data","publisher":{"@id":"https:\/\/nextcloud.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nextcloud.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/nextcloud.com\/de\/#organization","name":"Nextcloud","url":"https:\/\/nextcloud.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/nextcloud.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/nextcloud.com\/c\/uploads\/2022\/10\/nextcloud-logo-blue-transparent.svg","contentUrl":"https:\/\/nextcloud.com\/c\/uploads\/2022\/10\/nextcloud-logo-blue-transparent.svg","width":"1024","height":"1024","caption":"Nextcloud"},"image":{"@id":"https:\/\/nextcloud.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Nextclouders\/","https:\/\/x.com\/nextclouders","https:\/\/www.linkedin.com\/company\/10827569\/","https:\/\/youtube.com\/nextcloud","https:\/\/www.instagram.com\/nextclouders\/"]},{"@type":"Person","@id":"https:\/\/nextcloud.com\/de\/#\/schema\/person\/c4131c923c11769c06b82290f98f8ac8","name":"Mikhail Korotaev","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/nextcloud.com\/de\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/50239e6d041bd078acdbbdad43132efabac4ca0799ae3eb97ec30bc09b62e515?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/50239e6d041bd078acdbbdad43132efabac4ca0799ae3eb97ec30bc09b62e515?s=96&d=mm&r=g","caption":"Mikhail Korotaev"}}]}},"featured_media_url":"https:\/\/nextcloud.com\/c\/uploads\/2024\/04\/How-to-protect-yourself-against-deepfakes-1.png","_links":{"self":[{"href":"https:\/\/nextcloud.com\/de\/wp-json\/wp\/v2\/posts\/209151","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nextcloud.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nextcloud.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nextcloud.com\/de\/wp-json\/wp\/v2\/users\/33"}],"replies":[{"embeddable":true,"href":"https:\/\/nextcloud.com\/de\/wp-json\/wp\/v2\/comments?post=209151"}],"version-history":[{"count":2,"href":"https:\/\/nextcloud.com\/de\/wp-json\/wp\/v2\/posts\/209151\/revisions"}],"predecessor-version":[{"id":348229,"href":"https:\/\/nextcloud.com\/de\/wp-json\/wp\/v2\/posts\/209151\/revisions\/348229"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nextcloud.com\/de\/wp-json\/wp\/v2\/media\/209219"}],"wp:attachment":[{"href":"https:\/\/nextcloud.com\/de\/wp-json\/wp\/v2\/media?parent=209151"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nextcloud.com\/de\/wp-json\/wp\/v2\/categories?post=209151"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nextcloud.com\/de\/wp-json\/wp\/v2\/tags?post=209151"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}