The Common Thread
This is a member-only chapter. Log in with your Signal Over Noise membership email to continue.
Log in to readModule 2 · Section 7 of 7
The Common Thread
Every attack type in this module works by exploiting something you were trained to trust: familiar faces, familiar voices, professional writing, the fact that an email passed your spam filter. AI has undermined those signals, one by one.
The defences that still work are all process-based rather than perception-based. You cannot train yourself to identify a deepfake voice by listening harder. You can establish a rule that any unusual financial request requires a second verification through a channel you initiated — a phone call to a number from your own contact list, not a number provided in the suspicious message.
Module 3 covers a different angle: not attacks on you, but the risk of data flowing out through the AI tools you use every day.