{"id":27032,"date":"2022-07-21T15:41:00","date_gmt":"2022-07-21T13:41:00","guid":{"rendered":"https:\/\/perseus.de\/deep-fakes-reality-vs-manipulation\/"},"modified":"2026-03-30T14:46:53","modified_gmt":"2026-03-30T12:46:53","slug":"deep-fakes-reality-vs-manipulation","status":"publish","type":"post","link":"https:\/\/perseus.de\/en\/deep-fakes-reality-vs-manipulation\/","title":{"rendered":"Deep Fakes \u2013 Reality vs Manipulation"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"27032\" class=\"elementor elementor-27032 elementor-3357\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ba0588 e-flex e-con-boxed e-con e-parent\" data-id=\"2ba0588\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6459d3d elementor-widget elementor-widget-image\" data-id=\"6459d3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"432\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Giffey-Klitschko-768x432-1.webp\" class=\"attachment-medium_large size-medium_large wp-image-27031\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Giffey-Klitschko-768x432-1.webp 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Giffey-Klitschko-768x432-1-300x169.webp 300w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: S\u00fcddeutsche Zeitung \/ dpa<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5e2bc6fb e-flex e-con-boxed e-con e-parent\" data-id=\"5e2bc6fb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-65a1966 e-con-full e-flex e-con e-child\" data-id=\"65a1966\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-293f8f9 e-con-full e-flex e-con e-child\" data-id=\"293f8f9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-570f983 elementor-widget elementor-widget-text-editor\" data-id=\"570f983\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6>21.07.2022<\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c8aa736 elementor-widget elementor-widget-heading\" data-id=\"c8aa736\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Deep Fakes \u2013 Reality vs Manipulation\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8965382 elementor-widget elementor-widget-text-editor\" data-id=\"8965382\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>News| Cybercrime | Attack Vectors<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-00c22a8 e-con-full e-flex e-con e-child\" data-id=\"00c22a8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5791d1b elementor-widget elementor-widget-text-editor\" data-id=\"5791d1b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>This news has made waves. Kiev&#8217;s mayor Vitali Klitschko calls Berlin&#8217;s mayor Franziska Giffey. That&#8217;s what it looked like at first glance. In reality, however, the video call was fake. At first, it was not entirely clear whether it was a so-called deep fake or a very professionally made montage of different recordings. In the meantime, however, it is known that a Russian comedian duo is responsible for the incident.     <\/strong><\/p><p> <\/p><p>Even though this incident is unlikely to be deep fakes, there is a certain risk posed by this technology. In the following article, we explain what deep fakes actually are, how they occur, when they become dangerous and how to recognize them. Enjoy reading.  <\/p><p><strong> <\/strong><\/p><h4><strong>What exactly happened?<\/strong><\/h4><p>At the end of June, the mayor of Berlin received a video call from Kiev&#8217;s mayor Vitali Klitschko. It was not apparent at first glance that the call was a fake. According to Franziska Giffey, facial expressions and gestures matched. The mouth movements were also correct. She only had doubts because of the course of the conversation. When the topic of holding a Christopher Street Day in Kiev came up, Franziska Giffey suspected that something could not be right and broke off the conversation. The same game was repeated in Budapest, Madrid, Vienna and perhaps in other European cities.      <\/p><p><strong> <\/strong><\/p><h4><strong>How could it have come to this?<\/strong><\/h4><p>It is now known that a Russian comedian duo is responsible for the fake video calls. They used social engineering methods to gain access to the town hall and to be able to make the video call. Social engineering is about collecting information about people and ultimately using it so cleverly that a relationship of trust is created and sensitive information is passed on. According to the two perpetrators, this procedure is &#8220;very simple&#8221; and &#8220;works every time&#8221;.   <\/p><p>They do not provide any information about how the video was actually made. The only information they shared about their attack is that it is not a deep fake. <\/p><p><strong> <\/strong><\/p><h4><strong>But what is a deep fake?<\/strong><\/h4><p>The term &#8220;deep fake&#8221; comes from English and is made up of the words deep learning and fake. These are fakes that are created with the help of artificial intelligence from images, audio and film recordings. There are several forms of deep fakes, some of which can happen in real time:  <\/p><ul><li>Face swapping &#8220;swaps faces for each other&#8221; \u2192 Faces are swapped for each other, so that people are depicted in completely different situations and contexts.<\/li><li>Voice swapping &#8220;Lets people speak different texts&#8221; \u2192 audio content is adjusted to give the impression that the person being portrayed is speaking a different text.<\/li><li>Body Puppetry &#8220;Changed Movements of Persons&#8221; \u2192 Complete movement sequences are transferred to other people.<\/li><\/ul><p><strong> <\/strong><\/p><h4><strong>How to create deep fakes<\/strong><\/h4><p>It has never been as easy to create deep fakes as it is today: Countless apps and programs such as Reface or DeepFaceLab make it possible to create deep fakes in just a few steps. FakeApp is even available to its users for free, and the Avatarify program allows its users to transform into a completely different person (avatar) and thus appear in real-time in video chats with Skype, Zoom, and Teams. <\/p><p>As mentioned earlier, artificial intelligence is used to create deep fakes. Neural networks and algorithms analyze existing audio, image and video material of the person to be imitated and create new content. The more original material of a person there is, the more realistic the result seems. If the AI-powered applications have material from a person from different situations, perspectives and media formats at their disposal, they quickly learn the essential properties. The AI can then transfer these properties to other materials without changing the environment.    <\/p><p> <\/p><p><img decoding=\"async\" class=\"alignnone wp-image-3359 size-full\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Group-5.png\" alt=\"\" width=\"552\" height=\"173\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Group-5.png 552w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Group-5-300x94.png 300w\" sizes=\"(max-width: 552px) 100vw, 552px\" \/><\/p><p> <\/p><p><strong> <\/strong><\/p><h4><strong>What are deep fakes used for?<\/strong><\/h4><p>The example of fake mayor calls presented illustrates possible areas of application very well. Even if it is not a deep fake \u2013 according to the perpetrators \u2013 the motivation is clearly visible. The comedians call it &#8220;entertainment&#8221; and &#8220;entertainment&#8221;. The victims, on the other hand, speak of &#8220;<a href=\"https:\/\/www.zeit.de\/news\/2022-06\/25\/giffey-nach-fake-anruf-kuenftig-misstrauischer-sein?utm_referrer=https%3A%2F%2Fwww.google.com%2F\">modern warfare<\/a>&#8220;. That describes the situation very well. Deep fakes are often used for entertainment purposes, as it can be amusing to put well-known personalities in obscure and embarrassing situations.     <\/p><p>However, this technique can also quickly turn into the opposite and lead to people being discredited or disinformation and propaganda being spread.<\/p><p><strong> <\/strong><\/p><h4><strong>Why are they so dangerous<\/strong><\/h4><p>The <a href=\"https:\/\/www.bundesregierung.de\/breg-de\/themen\/umgang-mit-desinformation\/deep-fakes-1876736\">German government<\/a> also warns that deep fakes can pose a great danger to society and politics. Especially when it is used to influence political processes and public opinion. <\/p><p>Due to technical developments, it is possible that it is no longer a challenge to create deep fakes, even for laymen and beginners. In addition, the computing power and performance of artificial intelligence are constantly increasing. As a result, the quality of deep fakes improves rapidly. It is becoming increasingly difficult to distinguish truth from manipulation.   <\/p><p><strong> <\/strong><\/p><h4><strong>How to Spot Deep Fakes<\/strong><\/h4><p>Deep fakes will certainly not accompany you in everyday life. The use of deep fakes is indeed very specific and situation-dependent. But especially when political, socio-critical or explosive aspects are addressed and video material is used for reporting, it can be worthwhile to take a closer look. As in many other cases, you should first listen to your gut feeling. If you see a video of a person or listen to an audio recording of them and the behavior or what is said seems strange to you or is completely contrary to the &#8220;normal&#8221; appearance and behavior of the person, it may be manipulation.    <\/p><p><span style=\"font-size: 1rem;\">As mentioned, it can be quite difficult to detect deep fakes or forgeries and manipulations in general due to technical progress. However, the following aspects should be noted: <\/span><\/p><p><span style=\"font-size: 1rem;\"> <\/span><\/p><ul><li>Quality: Can you see a difference in quality? Are parts of the image significantly worse or better than the rest of the material? For example, is the face depicted much sharper than the rest of the body? If so, it may be that the shot or image was composed of different elements.   <\/li><li>Consistency: People&#8217;s faces are unique and have certain characteristics. In addition, the appearance varies from day to day. So make sure that the shots are consistent and that the person is always portrayed in the same way. If clearly recognizable features suddenly disappear, there could be manipulation.   <\/li><li>Change of perspective: Artificially created shots often work very well when the person is shown frontally. It can become more critical if the person tilts their head or changes the angle. If the image appears less sharp and not as clear, you can also assume that it is a manipulation.  <\/li><\/ul><p><strong> <\/strong><\/p><p><strong>You can read more information about deep fakes here:  <\/strong><\/p><ul><li><a href=\"https:\/\/www.bundesregierung.de\/breg-de\/themen\/umgang-mit-desinformation\/deep-fakes-1876736\">Federal Government &#8220;Deep Fakes&#8221;<\/a><\/li><li><a href=\"https:\/\/www.bsi.bund.de\/DE\/Themen\/Unternehmen-und-Organisationen\/Informationen-und-Empfehlungen\/Kuenstliche-Intelligenz\/Deepfakes\/deepfakes_node.html\">BSI &#8220;Deep Fakes and Countermeasures&#8221;<\/a><\/li><\/ul><p> <\/p><p>Have you already come into contact with deep fakes and would like to share your experiences with us? Please feel free to contact us. We look forward to the exchange.  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4d84bbc e-flex e-con-boxed e-con e-parent\" data-id=\"4d84bbc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-05a335d elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"05a335d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Ransomware attacks are ubiquitous. Whether through media coverage, stories from the work environment or acquaintances \u2013 there is no getting around the topic of cybercrime and especially ransomware. However, the increasing presence has a fact-based origin.  <\/p>\n","protected":false},"author":3,"featured_media":27031,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[60],"tags":[],"class_list":["post-27032","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Deep Fakes \u2013 Reality vs Manipulation - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/en\/deep-fakes-reality-vs-manipulation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Deep Fakes \u2013 Reality vs Manipulation - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Ransomware attacks are ubiquitous. Whether through media coverage, stories from the work environment or acquaintances \u2013 there is no getting around the topic of cybercrime and especially ransomware. However, the increasing presence has a fact-based origin.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/en\/deep-fakes-reality-vs-manipulation\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-21T13:41:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-30T12:46:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Giffey-Klitschko-768x432-1.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"768\" \/>\n\t<meta property=\"og:image:height\" content=\"432\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/deep-fakes-reality-vs-manipulation\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/deep-fakes-reality-vs-manipulation\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"Deep Fakes \u2013 Reality vs Manipulation\",\"datePublished\":\"2022-07-21T13:41:00+00:00\",\"dateModified\":\"2026-03-30T12:46:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/deep-fakes-reality-vs-manipulation\\\/\"},\"wordCount\":1166,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/deep-fakes-reality-vs-manipulation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Giffey-Klitschko-768x432-1.webp\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/deep-fakes-reality-vs-manipulation\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/deep-fakes-reality-vs-manipulation\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/deep-fakes-reality-vs-manipulation\\\/\",\"name\":\"Deep Fakes \u2013 Reality vs Manipulation - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/deep-fakes-reality-vs-manipulation\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/deep-fakes-reality-vs-manipulation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Giffey-Klitschko-768x432-1.webp\",\"datePublished\":\"2022-07-21T13:41:00+00:00\",\"dateModified\":\"2026-03-30T12:46:53+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/deep-fakes-reality-vs-manipulation\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/deep-fakes-reality-vs-manipulation\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/deep-fakes-reality-vs-manipulation\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Giffey-Klitschko-768x432-1.webp\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Giffey-Klitschko-768x432-1.webp\",\"width\":768,\"height\":432},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/deep-fakes-reality-vs-manipulation\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Deep Fakes \u2013 Reality vs Manipulation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Deep Fakes \u2013 Reality vs Manipulation - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/en\/deep-fakes-reality-vs-manipulation\/","og_locale":"en_US","og_type":"article","og_title":"Deep Fakes \u2013 Reality vs Manipulation - Perseus Technologies","og_description":"Ransomware attacks are ubiquitous. Whether through media coverage, stories from the work environment or acquaintances \u2013 there is no getting around the topic of cybercrime and especially ransomware. However, the increasing presence has a fact-based origin.","og_url":"https:\/\/perseus.de\/en\/deep-fakes-reality-vs-manipulation\/","og_site_name":"Perseus Technologies","article_published_time":"2022-07-21T13:41:00+00:00","article_modified_time":"2026-03-30T12:46:53+00:00","og_image":[{"width":768,"height":432,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Giffey-Klitschko-768x432-1.webp","type":"image\/webp"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Xenia Silbe","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/en\/deep-fakes-reality-vs-manipulation\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/en\/deep-fakes-reality-vs-manipulation\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"Deep Fakes \u2013 Reality vs Manipulation","datePublished":"2022-07-21T13:41:00+00:00","dateModified":"2026-03-30T12:46:53+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/en\/deep-fakes-reality-vs-manipulation\/"},"wordCount":1166,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/en\/deep-fakes-reality-vs-manipulation\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Giffey-Klitschko-768x432-1.webp","articleSection":["Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/en\/deep-fakes-reality-vs-manipulation\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/en\/deep-fakes-reality-vs-manipulation\/","url":"https:\/\/perseus.de\/en\/deep-fakes-reality-vs-manipulation\/","name":"Deep Fakes \u2013 Reality vs Manipulation - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/en\/deep-fakes-reality-vs-manipulation\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/en\/deep-fakes-reality-vs-manipulation\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Giffey-Klitschko-768x432-1.webp","datePublished":"2022-07-21T13:41:00+00:00","dateModified":"2026-03-30T12:46:53+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/en\/deep-fakes-reality-vs-manipulation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/en\/deep-fakes-reality-vs-manipulation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/en\/deep-fakes-reality-vs-manipulation\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Giffey-Klitschko-768x432-1.webp","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Giffey-Klitschko-768x432-1.webp","width":768,"height":432},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/en\/deep-fakes-reality-vs-manipulation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Deep Fakes \u2013 Reality vs Manipulation"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/en\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27032","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/comments?post=27032"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27032\/revisions"}],"predecessor-version":[{"id":27033,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27032\/revisions\/27033"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media\/27031"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media?parent=27032"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/categories?post=27032"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/tags?post=27032"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}