CINXE.COM
2023 State Of Deepfakes: Realities, Threats, And Impact
<!doctype html> <html lang="en"> <head><script type="text/javascript" src="https://web-static.archive.org/_static/js/bundle-playback.js?v=7YQSqjSh" charset="utf-8"></script> <script type="text/javascript" src="https://web-static.archive.org/_static/js/wombat.js?v=txqj7nKC" charset="utf-8"></script> <script>window.RufflePlayer=window.RufflePlayer||{};window.RufflePlayer.config={"autoplay":"on","unmuteOverlay":"hidden"};</script> <script type="text/javascript" src="https://web-static.archive.org/_static/js/ruffle/ruffle.js"></script> <script type="text/javascript"> __wm.init("https://web.archive.org/web"); __wm.wombat("https://www.homesecurityheroes.com/state-of-deepfakes/","20240215223210","https://web.archive.org/","web","https://web-static.archive.org/_static/", "1708036330"); </script> <link rel="stylesheet" type="text/css" href="https://web-static.archive.org/_static/css/banner-styles.css?v=p7PEIJWi" /> <link rel="stylesheet" type="text/css" href="https://web-static.archive.org/_static/css/iconochive.css?v=3PDvdIFv" /> <!-- End Wayback Rewrite JS Include --> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="profile" href="https://gmpg.org/xfn/11"> <title>2023 State Of Deepfakes: Realities, Threats, And Impact</title> <meta name="description" content="Our 2023 report explores deepfake tech & aims to empower responsible navigation through thorough research on 95,820 videos, 85 channels, and 100 websites."> <meta name="robots" content="index, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1"> <meta property="og:image" content="/web/20240215223210im_/https://www.homesecurityheroes.com/state-of-deepfakes/assets/images/feature-image.png"/> <meta property="og:image:type" content="image/png"/> <meta property="og:image:width" content="1200"/> <meta property="og:image:height" content="628"/> <meta name="twitter:card" content="summary_large_image"/> <meta name="twitter:image" content="/web/20240215223210im_/https://www.homesecurityheroes.com/state-of-deepfakes/assets/images/feature-image.png"/> <meta name="twitter:site" content="@HomeSecHeroes"/> <link rel="apple-touch-icon" sizes="180x180" href="/web/20240215223210im_/https://www.homesecurityheroes.com/state-of-deepfakes/apple-touch-icon.png"> <link rel="icon" type="image/png" sizes="32x32" href="/web/20240215223210im_/https://www.homesecurityheroes.com/state-of-deepfakes/favicon-32x32.png"> <link rel="icon" type="image/png" sizes="16x16" href="/web/20240215223210im_/https://www.homesecurityheroes.com/state-of-deepfakes/favicon-16x16.png"> <link rel="manifest" href="site.webmanifest"> <link rel="preload" href="assets/fonts/generalsans-medium.woff2" as="font" type="font/woff2" crossorigin> <link rel="preload" href="assets/fonts/generalsans-mediumitalic.woff2" as="font" type="font/woff2" crossorigin> <link rel="preload" href="assets/fonts/monasans-light.woff2" as="font" type="font/woff2" crossorigin> <link rel="preload" href="assets/fonts/monasans-lightitalic.woff2" as="font" type="font/woff2" crossorigin> <link rel="preload" href="assets/fonts/monasans-regular.woff2" as="font" type="font/woff2" crossorigin> <link rel="preload" href="assets/fonts/monasans-italic.woff2" as="font" type="font/woff2" crossorigin> <link rel="preload" href="assets/fonts/monasans-medium.woff2" as="font" type="font/woff2" crossorigin> <link rel="preload" href="assets/fonts/monasans-mediumitalic.woff2" as="font" type="font/woff2" crossorigin> <link rel="preload" href="assets/fonts/monasans-semibold.woff2" as="font" type="font/woff2" crossorigin> <link rel="preload" href="assets/fonts/monasans-semibolditalic.woff2" as="font" type="font/woff2" crossorigin> <link rel="preload" href="assets/fonts/monasans-bold.woff2" as="font" type="font/woff2" crossorigin> <link rel="preload" href="assets/fonts/monasans-bolditalic.woff2" as="font" type="font/woff2" crossorigin> <link rel="stylesheet" href="https://web.archive.org/web/20240215223210cs_/https://cdnjs.cloudflare.com/ajax/libs/animate.css/4.1.1/animate.min.css"> <link rel="stylesheet" href="/web/20240215223210cs_/https://www.homesecurityheroes.com/state-of-deepfakes/assets/css/plugins.min.css?v=1.0.8.2"> <link rel="stylesheet" href="/web/20240215223210cs_/https://www.homesecurityheroes.com/state-of-deepfakes/assets/css/theme.css?v=1.0.8.2"> <script src="/web/20240215223210js_/https://www.homesecurityheroes.com/state-of-deepfakes/assets/js/jquery-3.6.0.min.js"></script> </head> <body> <header id="header"> <div class="container d-xl-flex align-items-center justify-content-between"> <div class="d-flex align-items-center justify-content-between"> <a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/"> <img src="/web/20240215223210im_/https://www.homesecurityheroes.com/state-of-deepfakes/assets/svg/logo-white.svg" alt="logo"> </a> <button type="button" data-bs-toggle="collapse" data-bs-target="#nav" class="button-unstyled toggle-nav collapsed d-xl-none"> <span> </span> <span> </span> <span> </span> </button> </div> <nav id="nav" class="collapse d-xl-block"> <ul class="nav"> <li class="menu-item-has-children"> <a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/">ID Theft Services</a> <button type="button" class="toggle"> </button> <ul class="sub-menu"> <li> <a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/aura-reviews/">Aura Reviews</a> <button type="button" class="toggle"> </button> <ul> <li> <a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/aura-alternatives/">Aura Alternatives</a> <button type="button" class="toggle"> </button> <ul> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/compare/aura-vs-identity-guard/">Aura vs Identity Guard</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/compare/aura-vs-lifelock/">Aura Vs LifeLock<span>HOT</span></a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/compare/aura-vs-identityforce/">Aura vs. IdentityForce</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/compare/aura-vs-idshield/">Aura vs IDShield</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/compare/aura-vs-infoarmor/">Aura vs Allstate (InfoArmor)</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/compare/aura-vs-complete-id/">Aura Vs. Costco Complete ID</a></li> </ul> </li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/aura-promo-code/">Aura Promo Codes and Discounts</a></li> </ul> </li> <li> <a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/lifelock-reviews/">LifeLock Reviews</a> <button type="button" class="toggle"> </button> <ul> <li> <a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/lifelock-competitors/">LifeLock Alternatives</a> <button type="button" class="toggle"> </button> <ul> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/compare/idshield-vs-lifelock/">LifeLock vs IDShield</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/compare/costco-complete-id-vs-lifelock/">LifeLock vs Complete ID</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/compare/lifelock-vs-zander/">LifeLock vs Zander</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/compare/lifelock-vs-experian/">LifeLock vs Experian IdentityWorks</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/compare/lifelock-vs-infoarmor/">LifeLock vs InfoArmor</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/compare/lifelock-vs-discover/">LifeLock vs Discover</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/compare/lifelock-vs-cyberscout/">LifeLock vs CyberScout</a></li> </ul> </li> </ul> </li> <li> <a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/identity-guard-reviews/">Identity Guard Reviews</a> <button type="button" class="toggle"> </button> <ul> <li> <a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/identity-guard-alternatives/">Identity Guard Alternatives</a> <button type="button" class="toggle"> </button> <ul> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/compare/identity-guard-vs-lifelock/">Identity Guard vs LifeLock</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/compare/identity-guard-vs-idshield/">Identity Guard vs IDShield</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/compare/identityforce-vs-identity-guard/">Identity Guard vs IdentityForce</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/compare/identity-guard-vs-zander/">Identity Guard vs Zander</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/compare/costco-complete-id-vs-identity-guard/">Identity Guard vs Costco Complete ID</a></li> </ul> </li> </ul> </li> <li> <a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/identityforce-reviews/">IdentityForce Review</a> <button type="button" class="toggle"> </button> <ul> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/identityforce-alternatives/">IdentityForce Alternatives</a></li> </ul> </li> <li> <a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/idshield-reviews/">IDShield Reviews</a> <button type="button" class="toggle"> </button> <ul> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/idshield-alternatives/">IDShield Alternatives</a></li> </ul> </li> <li> <a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/best-identity-theft-protection-services-reviews/">Best Identity Theft Protection Services</a> <button type="button" class="toggle"> </button> <ul> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/best-identity-theft-protection-for-seniors/">Best Identity Theft Protection For Seniors</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/best-dark-web-monitoring-services/">Best Dark Web Monitoring Services</a></li> </ul> </li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/compare/">Comparisons</a></li> <li> <a>Other Companies</a> <button type="button" class="toggle"> </button> <ul> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/allstate-review/">Allstate</a> </li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/all-clear-id-reviews/">All Clear ID</a></li> <li> <a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/complete-id-reviews/">Costco Complete ID</a> <button type="button" class="toggle"> </button> <ul> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/the-best-alternatives-to-costco-complete-id/">Complete ID Alternatives</a></li> </ul> </li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/experian-creditworks-review/">CreditWorks</a> </li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/identityiq-review/">IdentityIQ</a> </li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/experian-identityworks-review/">IdentityWorks</a> </li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/idnotify-experian-reviews/">IDNotify</a> </li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/idx-review/">IDX</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/id-resolve-review/">ID Resolve</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/id-watchdog-reviews/">ID Watchdog</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/myfico-review/">myFICO</a> </li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/privacyguard-review/">PrivacyGuard</a> </li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/protectmyid-review/">ProtectMyID</a> </li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/reliashield-review/">ReliaShield</a> </li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/equifax-complete-review/">Equifax Complete</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/zander-reviews/">Zander</a> </li> </ul> </li> </ul> </li> <li class="menu-item-has-children"> <a>Best Practices</a> <button type="button" class="toggle"> </button> <ul class="sub-menu"> <li> <a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/how-to-protect-yourself/">How to Protect Yourself</a> <button type="button" class="toggle"> </button> <ul> <li> <a>About Identity Theft</a> <button type="button" class="toggle"> </button> <ul> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/how-to-steal-someones-identity/">How Easy to Steal Your Identity</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/famous-identity-theft-cases/">Famous Identity Theft Cases</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/synthetic-identity-theft/">Synthetic Identity Theft</a></li> <li><a href="#">How to Respond to Identity Theft</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/what-are-data-brokers/">Data Brokers</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/review-of-identity-thief-movie/">Review of Identity Thief Movie</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-facts/">Identity Theft Facts</a> </li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/consequences-identity-theft/">Consequences of Being Victim of ID Theft</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-us-statistics/">America’s Identity Theft Statistics</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-fastest-growing-crime-america/">Fastest Growing Crime in America</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/types-identity-theft-penalties/">Thinking of Stealing Identity?</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/expert-answers-important-online-questions/">Answers to Online Security Questions</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/states-affected-cybercrimes/">States that are Mostly Affected by Cyber Crimes</a></li> </ul> </li> <li> <a>Data Breaches</a> <button type="button" class="toggle"> </button> <ul> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/moveit-data-breach/">MOVEit Data Breach</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/what-do-i-do-in-case-of-a-data-breach/">What Do I Do in Case of a Data Breach?</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/biggest-data-breaches/">10 Biggest Data Breaches</a></li> </ul> </li> <li> <a>Identity Theft Prevention</a> <button type="button" class="toggle"> </button> <ul> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/how-to-check-if-someone-is-using-my-identity/">How to Check if Someone Is Using Your Identity</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/how-prevent-password-stolen/">How to Prevent your Password from Being Stolen</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/how-protect-identity-online/">How To Protect Your Identity Online</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/drivers-license-identity-theft-prevention/">Driver’s License Identity Theft</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/warning-signs-identity-stolen/">Warning Signs that Your Identity Has Been Stolen</a></li> </ul> </li> <li> <a>How to Respond to Identity Theft</a> <button type="button" class="toggle"> </button> <ul> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/how-to-report-identity-theft/">How to Report Identity Theft</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/have-i-been-hacked-what-can-i-do-to-recover/">Have I Been Hacked?</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/what-to-do-identity-stolen/">Things You Do if Your Identity Has Been Stolen</a></li> </ul> </li> <li> <a href="#">Physical Threats</a> <button type="button" class="toggle"> </button> <ul> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/what-to-do-when-lose-wallet/">Lost Your Wallet?</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/what-is-shoulder-surfing/">What Is Shoulder Surfing?</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/gear-to-prevent-your-wallet-stolen/">Gear to Prevent Your Wallet from Being Stolen</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/dumpster-diving-identity-theft/">Identity Theft From Dumpster Diving</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/homemade-self-defense-weapons/">Homemade Weapon Ideas</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/how-to-get-up-from-fall-without-kneeling/">Ways to Get Up from a Fall Without Kneeling</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/systems-hacked/">Can Home Security Systems be Hacked?</a></li> </ul> </li> <li> <a href="#">Protect Your Accounts</a> <button type="button" class="toggle"> </button> <ul> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/someone-opened-a-facebook-profile-with-my-identity/">Someone Opened a Facebook Profile</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/someone-opened-an-instagram-profile-with-my-identity/">Someone Opened an Instagram Profile</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/protect-social-media-accounts-hacked/">Protect Your Social Media Accounts</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/how-to-make-a-strong-password/">How to Make a Strong Password</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/how-prevent-password-stolen/">How to Prevent your Password from Being Stolen</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/internet-best-practices/">Keep Yourself and Your Family Safe on the Internet</a></li> </ul> </li> <li> <a>Protect Your Credit</a> <button type="button" class="toggle"> </button> <ul> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/check-fraud/">Check Fraud</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/what-is-credit-monitoring/">What Is Credit Monitoring?</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/a-family-member-opened-a-credit-card-in-my-name/">Family Member Opened a Credit Card</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/mobile-banking-app-security/">Mobile Banking App Security</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/how-to-remove-hard-inquiries-from-credit-report/">How to Remove Credit Card Hard Inquiries</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/what-to-do-lost-credit-card/">Must Do ThingsAfter Losing Your Credit Card</a></li> </ul> </li> <li> <a>Protect Your Family</a> <button type="button" class="toggle"> </button> <ul> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/how-protect-child-identity-online/">How to Protect Your Child’s Identity Online</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/how-protect-seniors-getting-scammed/">How to Protect Seniors from Getting Scammed</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/what-is-identity-theft-insurance-do-you-really-need-it/">What Is Identity Theft Insurance?</a></li> </ul> </li> <li> <a href="#">Protect Your Finances</a> <button type="button" class="toggle"> </button> <ul> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/what-can-someone-do-with-your-bank-account-number/">What Can Someone Do With Your Bank Account Number?</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/how-to-protect-your-bank-account-from-identity-theft/">How to Protect Your Bank Account From Identity Theft</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/shopping-tips-avoid-cyber-scams/">Shopping Tips to Avoid Cyber Scams</a></li> </ul> </li> <li> <a>Protect Your Information</a> <button type="button" class="toggle"> </button> <ul> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/what-personally-identifiable-information/">What is Personally Identifiable Information (PII)</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/dangers-posting-picture-information-online/">Dangers Of Posting Your Pictures Online</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/anna-sorkin/">You Could Be Victimized By Someone Like Anna Sorokin</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/someone-stole-my-drivers-license/">Someone Stole My Driver’s License</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/what-can-someone-do-with-my-social-security-number/">What Can Someone Do With My Social Security Number?</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-recovery/">Identity Theft Recovery</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/what-information-hides-in-your-ip-address/">What Information Hides in Your IP Address?</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/how-to-freeze-your-social-security-number/">How To “Freeze” Your Social Security Number</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/how-to-identify-a-fake-text-message/">How to Identify a Fake Text Message</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/how-do-i-remove-my-personal-information-from-the-internet/">Remove Personal Information from the Internet</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/deepfakes/">Deepfakes and the Future of Identity Theft</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/how-to-get-replacement-social-security-card/">Guide on Social Security Card Replacement</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/what-to-do-identity-theft-social-security-number/">SSN Identity Theft</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/online-privacy-and-security/">Why You Should Be More Concerned of Your Privacy</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/how-to-dispose-of-documents-properly/">How to Dispose of Documents Properly</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/be-wary-of-online-friends/">Be Wary of Online “Friends”</a></li> </ul> </li> <li> <a>Secure Your Devices</a> <button type="button" class="toggle"> </button> <ul> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/risks-of-public-wi-fi/">What Are the Risks of Using Public Wi-Fi?</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/cyberattacks-you-need-to-be-aware-of/">Cyberattacks You Need To Be Aware Of in 2023</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/keyloggers/">What Is Keyloggers</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/how-do-i-know-if-my-device-has-malware-or-spyware/">Is My Device Have Malware or Spyware?</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/how-to-stop-scam-callers/">How to Stop Scam Callers</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/what-is-a-vpn-and-how-to-use-it/">What is a VPN and How to Use It?</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/how-do-hackers-hack-your-phone/">How Do Hackers Hack Your Phone?</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/what-is-malspam/">What Is Malspam? How Do You Prevent It?</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/how-can-i-protect-myself-from-ransomware/">How Can I Protect Myself from Ransomware?</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/how-necessary-is-an-antivirus-program/">How Necessary is an Antivirus Program?</a></li> </ul> </li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-quiz/">Are You The Perfect Victim Of Identity Theft?</a></li> </ul> </li> <li> <a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/dark-web-information/">Dark Web</a> <button type="button" class="toggle"> </button> <ul> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/the-secrets-of-the-dark-web/">I Searched The Dark Web for Breached Data</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/what-can-i-do-if-my-data-ends-up-on-the-dark-web/">What Can I Do if My Data Ends Up On the Dark Web?</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/dark-web/">The Dark Web: What Is It & How Hackers Sell Your Identity on It for Pennies</a></li> </ul> </li> <li> <a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/scams/">Scams</a> <button type="button" class="toggle"> </button> <ul> <li> <a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/scams/ecommerce/">eCommerce Scams</a> <button type="button" class="toggle"> </button> <ul> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/pet-adoption-scams/">Pet Adoption Scams</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/amazon-review-scams/">Amazon Review Scams</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/amazon-scams/">Amazon Scams</a></li> </ul> </li> <li> <a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/scams/financial/">Financial Scams</a> <button type="button" class="toggle"> </button> <ul> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/western-union-scams/">Western Union Scams</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/utility-bill-scams/">Utility Bill Scams</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/student-loan-scams/">Student Loan Scams</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/cryptocurrency-scams/">Cryptocurrency Scams</a> </li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/hospital-bill-scams/">Hospital Bill Scams</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/debt-collector-scams/">Debt Collector Scams</a> </li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/paypal-scams/">PayPal Scams</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/zelle-scams/">Zelle Scams</a></li> <li> <a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/tax-fraud-scams/">Tax Scams</a> <button type="button" class="toggle"> </button> <ul> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/how-does-tax-identity-theft-occur/">How Does Tax Identity Theft Occur?</a></li> </ul> </li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/what-is-a-payday-loan-scam-and-how-can-you-avoid-them/">Payday Loan Scams</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/investment-scams/">Investment Scams</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/credit-score-scams/">Credit Score Scams</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/credit-card-scams/">Credit Card Scams</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/credit-repair-scams/">Credit Repair Scams</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/cash-app-scams/">Cash App Scams</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/venmo-scams/">Venmo Scams</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/how-to-spot-and-avoid-gift-card-scams/">Gift Card Scams</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/how-to-recognize-and-avoid-multilevel-marketing-scams/">Multilevel Marketing Scams</a></li> </ul> </li> <li> <a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/scams/smartphone/">Smartphone Scams</a> <button type="button" class="toggle"> </button> <ul> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/what-are-phone-scams/">Phone Scams</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/phone-number-porting-scams/">Phone Number Porting Scams</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/everything-you-need-to-know-about-caller-id-spoofing/">Caller ID Spoofing</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/should-you-worry-about-phone-cloning/">Phone Cloning</a></li> </ul> </li> <li> <a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/scams/social-media-and-messaging/">Social Media and Messaging Scams</a> <button type="button" class="toggle"> </button> <ul> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/social-media-scams/">Social Media Scams</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/craigslist-scams/">Craigslist Scams</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/reddit-scams/">Reddit Scams</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/youtube-scams/">YouTube Scams</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/text-message-scams/">Text Message Scams</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/signal-app-scams/">Signal App Scams</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/telegram-app-scams/">Telegram App Scams</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/discord-scams/">Discord Scams</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/business-email-compromise-scams/">Business Email Compromise (BEC) Scams</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/whatsapp-scams/">WhatsApp Scams</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/snapchat-scams/">Snapchat Scams</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/instagram-scams/">Instagram Scams</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/twitter-scams/">Twitter Scams</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/facebook-marketplace-scams/">Facebook Marketplace Scams</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/avoiding-email-scams/">Avoiding Email Scams</a> </li> </ul> </li> </ul> </li> </ul> </li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/blogs/" tabindex="0">Blog</a></li> <li class="menu-item-has-children"> <a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/about/">About</a> <button type="button" class="toggle"> </button> <ul> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/our-testing-process/">Our Testing Process</a></li> </ul> </li> <li class="menu-item-has-children"> <a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/ai-password-cracking/">Password Checker</a> <button type="button" class="toggle"> </button> <ul> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/ai-deepfakes-in-2024-election/">AI Deepfakes in 2024 Election</a></li> </ul> </li> </ul> </nav> </div> </header> <main id="main"> <section id="welcome"> <div class="container"> <div class="welcome__text"> <h1 class="animate" data-animate="fadeInUp"> <span class="ln-1">2023</span> <span class="ln-2">STATE OF</span> <span class="ln-3">DEEPFAKES</span> </h1> <p class="animate" data-animate="fadeInUp">Realities, Threats, and Impact</p> </div> </div> <p>Photo by Kirill Balobanov / Unplash</p> </section> <section id="about"> <div class="container"> <div class="text"> <p>In an era of rapid technological progress, deepfakes have become a concern in digital development. This report is a milestone in an ongoing series that thoroughly examines the ins and outs of deepfake technology, revealing its evolving capabilities and imminent threats.</p> <p>Through rigorous research, we aim to empower individuals and organizations with the knowledge to responsibly navigate the complex world of deepfakes. Our work stems from a comprehensive analysis of 95,820 deepfake videos, 85 dedicated channels across online platforms, and a meticulous review of over 100 websites linked to the deepfake ecosystem.</p> <p>This 2023 state of deepfakes: realities, threats, and impact review is a powerful tool for fostering awareness of deepfake technology and protecting the masses from its negative effects. Join us as we uncover the layers of the state of deepfakes, revealing realities, highlighting threats, and exploring the technology's profound impact.</p> </div> </div> </section> <section class="s-toc"> <div class="container d-xl-flex justify-content-end"> <div class="section-wrapper"> <h2 class="animate" data-animate="fadeInUp"><strong>TABLE</strong> OF CONTENTS</h2> <ul class="menu"> <li><a href="#key-findings">I. Key Findings</a></li> <li><a href="#overview-of-current-state">II. Overview of Current State</a></li> <li><a href="#targeted-individuals">III. Targeted Individuals</a></li> <li><a href="#advancements-in-deepfake-techonology">IV. Advancements in Deepfake Technology</a></li> <li><a href="#deepfake-porn-survey">V. Deepfake Porn Survey: Awareness, Attitudes, & Impact</a></li> <li><a href="#concluding-remarks">VI. Concluding Remarks</a></li> <li><a href="#appendix">VII. Appendix</a></li> </ul> </div> </div> </section> <div id="container" class="container d-xl-flex align-items-start"> <div id="toc"> <h4>Table of Contents</h4> <ul class="menu"> <li><a href="#key-findings">Key Findings</a></li> <li><a href="#overview-of-current-state">Overview of Current State</a></li> <li><a href="#targeted-individuals">Targeted Individuals</a></li> <li><a href="#advancements-in-deepfake-techonology">Advancements in Deepfake <br/>Techonology</a></li> <li><a href="#deepfake-porn-survey">Deepfake Porn Survey: <br/>Awareness, Attitudes, and Impact</a></li> <li><a href="#concluding-remarks">Concluding Remarks</a></li> <li><a href="#appendix">Appendix</a></li> </ul> </div> <div class="section-wrapper" data-bs-spy="scroll" data-bs-target="#toc"> <section id="key-findings" class="s-key-findings"> <h2 class="animate" data-animate="fadeInUp"><strong>KEY</strong> FINDINGS</h2> <div class="row"> <div class="col-lg-4 col-sm-6"> <div class="item"> <span class="number">01.</span> <p>The total number of deepfake videos online in 2023 is <strong>95,820</strong>, representing a <strong>550%</strong> increase over 2019.</p> </div> </div> <div class="col-lg-4 col-sm-6"> <div class="item"> <span class="number">02.</span> <p>Deepfake pornography makes up <strong>98%</strong> of all deepfake videos online.</p> </div> </div> <div class="col-lg-4 col-sm-6"> <div class="item"> <span class="number">03.</span> <p><strong>99%</strong> of the individuals targeted in deepfake pornography are women.</p> </div> </div> <div class="col-lg-4 col-sm-6"> <div class="item"> <span class="number">04.</span> <p>South Korean singers and actresses constitute <strong>53%</strong> of the individuals featured in deepfake pornography and are the most commonly targeted group.</p> </div> </div> <div class="col-lg-4 col-sm-6"> <div class="item"> <span class="number">05.</span> <p><strong>94%</strong> of those featured in deepfake pornography videos work in the entertainment industry.</p> </div> </div> <div class="col-lg-4 col-sm-6"> <div class="item"> <span class="number">06.</span> <p><strong>One in every three</strong> deepfake tools allow users to create deepfake pornography.</p> </div> </div> <div class="col-lg-4 col-sm-6"> <div class="item"> <span class="number">07.</span> <p>It now takes less than <strong>25 minutes</strong> and costs <strong>$0</strong> to create a 60-second deepfake pornographic video of anyone using just one clear face image.</p> </div> </div> <div class="col-lg-4 col-sm-6"> <div class="item"> <span class="number">08.</span> <p><strong>48%</strong> of surveyed US men have seen deepfake pornography at least once.</p> </div> </div> <div class="col-lg-4 col-sm-6"> <div class="item"> <span class="number">09.</span> <p><strong>74%</strong> of deepfake pornography users don't feel guilty about it.</p> </div> </div> </div> <div class="btn-wrap"> <a href="assets/pdf/state-of-deepfake-infographic-2023.pdf" target="_blank" rel="noopener noreferrer">See full infographic here</a> </div> </section> <section id="overview-of-current-state" class="s-overview"> <h2 class="animate" data-animate="fadeInUp"><strong>OVERVIEW</strong> OF CURRENT STATE</h2> <div class="text mb-0"> <p>Deepfake technology represents a transformative advancement in artificial intelligence and digital manipulation. It refers to the use of deep learning algorithms to create compelling and often deceptive media content, such as videos, audio recordings, or images, that appear to feature real people saying or doing things they never did.</p> <p>In recent years, deepfake technology has surged to unprecedented levels. What began as a niche and technically complex endeavor has rapidly evolved into a widespread phenomenon. However, as technology evolves, it drastically blurs the lines between creativity and trickery, shaping reality in astounding yet concerning ways.</p> <p>In this section, we delve into the contemporary deepfake landscape. We provide a clear introduction and compelling statistics portraying the technology's extensive influence and prevalence.</p> </div> <hr class="divider"/> <div class="row mb-8"> <div class="col-lg-7 mb-4 mb-lg-0 animate" data-animate="fadeIn"> <img src="/web/20240215223210im_/https://www.homesecurityheroes.com/state-of-deepfakes/assets/images/img-total-percentage-of-deepfake-video-online.png" alt="total-percentage-of-deepfake-video-online"> </div> <div class="col-lg-5"> <div class="text"> <h3 class="animate" data-animate="fadeInUp">Deepfake pornography makes up <strong>98%</strong> of all deepfake videos online.</h3> <p>An astonishing 98% of the deepfake videos found online are explicitly pornographic. This eye-opening figure highlights the distressing misuse of deepfake technology, particularly for generating explicit and non-consensual content.</p> <p>This trend has profound implications for privacy and consent in the digital age. With the ability to copy and manipulate an individual's likeness without permission, deepfakes threaten personal integrity and digital well-being.</p> </div> </div> </div> <div class="complex-layout waypoint"> <div class="row"> <div class="col-xl-8 mb-8 mb-xl-0"> <div class="row"> <div class="col-md-6 mb-4 mb-md-0"> <div class="total-videos"> <p>Total deepfake videos online in 2023</p> <div class="number"><span class="timer" data-from="10000" data-to="95820">95,820</span></div> <img src="/web/20240215223210im_/https://www.homesecurityheroes.com/state-of-deepfakes/assets/images/img-chart-total-deepfake-videos-online-in-2023.png" alt="chart-total-deepfake-videos-online-in-2023" class="animate" data-animate="fadeIn"> </div> </div> <div class="col-md-6"> <div class="text"> <h3 class="animate" data-animate="fadeInUp">There are <strong>550%</strong> more deepfake videos online in 2023 than in 2019.</h3> <p>In 2023, our research indicates that the digital realm will host a staggering 95,820 deepfake videos. This number reflects a 550% surge compared to measurements recorded in 2019.</p> <p>Such exponential growth indicates a rapid proliferation of deepfake technology and its escalating integration into our online experience.</p> </div> </div> </div> </div> <div class="col-xl-4 mb-8 mb-xl-0"> <img src="/web/20240215223210im_/https://www.homesecurityheroes.com/state-of-deepfakes/assets/images/img-7-out-of-the-top-10-pornography-websites.png" alt="7-out-of-the-top-10-pornography-websites" class="d-block mb-2 animate" data-animate="fadeIn"> <div class="text"> <h3 class="animate" data-animate="fadeInUp"><strong>7</strong> out of the top 10 pornography websites host deepfakes</h3> <p>We evaluated the prevalence of deepfake pornography by observing the number of posted deepfake pornographic videos and the number of websites that hosted these videos.</p> <p>Our research reveals that seven of the top ten pornographic websites host deepfake content.</p> </div> </div> </div> </div> <div class="row waypoint"> <div class="col-lg-6 mb-4 mb-lg-0"> <div class="total-views"> <p><strong>Total video views</strong> across top 10 dedicated deepfake porn websites</p> <div class="number"><span class="timer" data-from="10000000" data-to="303640207">303,640,207</span></div> <img src="/web/20240215223210im_/https://www.homesecurityheroes.com/state-of-deepfakes/assets/images/img-total-video-views-across-top-10-dedicated-deepfake-porn-websites.png" alt="total-video-views-across-top-10-dedicated-deepfake-porn-websites" class="animate" data-animate="fadeIn"> </div> </div> <div class="col-lg-6"> <div class="text"> <h3 class="animate" data-animate="fadeInUp">The total number of video views across the top ten dedicated deepfake pornography websites is <strong>303,640,207</strong></h3> <p>Across the top ten dedicated deepfake pornography websites, the cumulative video views total 303,640,207. This substantial figure provides a clear glimpse into the extensive consumption and dissemination of deepfake-generated pornographic material.</p> <p>The broad reach of these views sparks the need for conversations around societal attitudes toward such content. Ethical considerations also need to be focused on, particularly those surrounding deepfake pornography creation and distribution.</p> </div> </div> </div> <hr class="divider"/> <div class="row flex-lg-row-reverse mb-8 waypoint"> <div class="col-lg-6 mb-4 mb-lg-0"> <div class="total-traffic"> <p><strong>Total traffic</strong> across top 10 dedicated deepfake porn websites</p> <div class="number"><span class="timer" data-from="1000000" data-to="34836914">34,836,914</span></div> <img src="/web/20240215223210im_/https://www.homesecurityheroes.com/state-of-deepfakes/assets/images/img-total-traffic-across-top-10-dedicated-deepfake-porn-websites.png" alt="total-traffic-across-top-10-dedicated-deepfake-porn-websites" class="animate" data-animate="fadeIn"> </div> </div> <div class="col-lg-6"> <div class="text"> <h3 class="animate" data-animate="fadeInUp">The monthly traffic of the top ten dedicated deepfake pornography websites is <strong>34,836,914</strong></h3> <p>The monthly traffic generated across the leading ten dedicated deepfake pornography websites reached 34,836,914 this year. This considerable number shows the undeniable demand and the immense engagement these platforms command.</p> <p>People flock to these websites in significant numbers, reflecting a widespread interest in the content they offer. The magnitude of this traffic makes it clear that societal curiosity and appetite for this controversial content category are on the rise.</p> <p>Additionally, it indicates deepfake technology's growing influence on shaping online preferences for creators and consumers.</p> </div> </div> </div> <div class="complex-layout border-bottom-0 waypoint"> <div class="row"> <div class="col-lg-6"> <div class="number-deepfake-porn"> <p><strong>Number</strong> of deepfake porn</p> <ul class="list-unstyled"> <li> <span class="year">2022</span> <span class="number"><span class="timer" data-from="1000" data-to="3725">3,725</span></span> </li> <li> <span class="year">2023</span> <span class="number"><span class="timer" data-from="1000" data-to="21019">21,019</span></span> </li> </ul> <div class="percent-change">464%</div> </div> <div class="text"> <h3 class="animate" data-animate="fadeInUp">Between 2022 & 2023, the amount of deepfake pornography created has increased by <strong>464%</strong></h3> <p>When comparing statistics from 2022 and 2023, we unraveled an alarming pattern. Unbelievably, the percentage increase in the production of deepfake pornographic videos within just one year was a startling 464%.</p> <p>In 2022, the internet had about 3,725 deepfake pornography videos. However, in 2023, this number rose to 21,019. This drastic increase indicates the extent of the unchecked expansion of deepfake pornography.</p> </div> </div> <div class="col-lg-6"> <div class="host-website-type"> <p>Deepfake pornography videos by <strong>host website type</strong></p> <ul class="list-unstyled"> <li> <div class="progress" style="--width: 90%;"> <span class="label">Dedicated deepfake pornography</span> <span class="number"><span class="timer" data-from="1" data-to="90">90</span>%</span> </div> </li> <li> <div class="progress" style="--width: 10%;"> <span class="label">Mainstream pornography website</span> <span class="number"><span class="timer" data-from="1" data-to="10">10</span>%</span> </div> </li> </ul> </div> <div class="text"> <h3 class="animate" data-animate="fadeInUp">Deepfake pornographic websites have a <strong>90%</strong> market share</h3> <p>When we examine deepfake pornography by the type of hosting websites, we notice an alarming breakdown. Dedicated deepfake pornography platforms claim a significant share, encompassing a substantial 90%.</p> <p>In contrast, mainstream pornography websites hold a smaller but still notable 10% share. This distinction indicates that deepfake pornography has carved out a unique space in the broader realm of online adult content.</p> </div> </div> </div> </div> </section> <section id="targeted-individuals" class="s-targeted-individuals"> <h2 class="animate" data-animate="fadeInUp"><strong>TARGETED</strong> INDIVIDUALS</h2> <div class="text narrow mb-0"> <p>Below is a demographic breakdown of deepfake videos from <strong>top 10</strong> dedicated deepfake pornography websites and <strong>85 deepfake</strong> channels on Youtube, Vimeo, and Dailymotion. Deepfake content production is not uniform but selective, with specific individuals becoming prime targets based on gender, nationality, and profession.</p> <p>This deliberate focus on particular attributes reflects the nuanced motivations and objectives behind creating and disseminating deepfake material.</p> </div> <hr class="divider"/> <h3 class="h2 animate" data-animate="fadeInUp">Gender</h3> <div class="gender animate" data-animate="fadeIn"> <div class="gender__title">Gender</div> <div class="row"> <div class="col-md-6 text-center"> <img src="/web/20240215223210im_/https://www.homesecurityheroes.com/state-of-deepfakes/assets/images/img-gender-deepfake-pornography.png" alt="gender-deepfake-pornography" width="300" height="331"> </div> <div class="col-md-6 text-center"> <img src="/web/20240215223210im_/https://www.homesecurityheroes.com/state-of-deepfakes/assets/images/img-gender-regular-deepfake.png" alt="gender-regular-deepfake" width="300" height="331"> </div> </div> </div> <div class="text narrow mb-0"> <p>Gender plays a significant role in selecting individuals for deepfake content manipulation. In this section, we embark on a thorough exploration of the demographic makeup of deepfake videos.</p> <p>The intersection of technology, creativity, and audience preferences becomes distinct as we uncover the role that gender plays in selecting individuals for deepfake content manipulation.</p> <h3 class="animate" data-animate="fadeInUp"><strong>99%</strong> of deepfake pornographic content comprises female subjects</h3> <p>A glaring trend emerges when examining the demographic landscape of deepfake content. Our findings reveal that 99% of deepfake pornography features women as the primary subjects, while only 1% of the content features men.</p> </div> <hr class="divider"/> <h3 class="h2 animate" data-animate="fadeInUp">Nationality</h3> <div class="nationality animate" data-animate="fadeIn"> <div class="nationality__text"> <p>DEEPFAKE PORNOGRAPHY</p> <ul class="list-unstyled"> <li>South Korea <span class="number">53%</span></li> <li>America <span class="number">20%</span></li> <li>Japan <span class="number">10%</span></li> <li>England <span class="number">6%</span></li> <li>China <span class="number">3%</span></li> <li>India <span class="number">2%</span></li> <li>Taiwan <span class="number">2%</span></li> <li>Israel <span class="number">1%</span></li> <li>Other <span class="number">4%</span></li> </ul> </div> <div class="nationality__map"> <img src="/web/20240215223210im_/https://www.homesecurityheroes.com/state-of-deepfakes/assets/images/img-map-nationality.png" alt="map-nationality"> </div> </div> <div class="text narrow"> <p>Nationality is another factor that influences the targeting of individuals by deepfake content. In some instances, a person's nationality may make them a more attractive target for malicious actors. This can be motivated by geopolitical tensions, cultural stereotypes, or simply the desire to create content that resonates with a specific audience.</p> <p>This section discusses the countries most targeted by the technology and the extensive effects that it causes.</p> <h3 class="animate" data-animate="fadeInUp"><strong>South Korea</strong> is the country most targeted by deepfake pornography</h3> <p>While deepfakes have been employed for various purposes, including entertainment, politics, and disinformation, certain nations are more susceptible to specific forms of deepfake content, particularly those of an explicit nature.</p> <p>South Korea tops the list of these nations with a 53% rate of susceptibility to deepfake adult content. Other countries on the list include America at 20%, Japan at 10%, and England at 6%. Countries like China, India, Taiwan, and Israel all fall between the 3% to 1% mark, while the rest of the world has a combined 4% rate of being targeted for explicit deepfake content. Below is a table summarizing this information.</p> <div class="table" style="max-width: 750px;"> <table> <thead> <tr> <th><span class="color-blue">Country</span></th> <th>Susceptibility Rate to Deepfake Pornography</th> </tr> </thead> <tbody> <tr> <td>South Korea</td> <td><strong class="color-orange">53%</strong></td> </tr> <tr> <td>America</td> <td><strong class="color-orange">20%</strong></td> </tr> <tr> <td>Japan</td> <td><strong class="color-orange">10%</strong></td> </tr> <tr> <td>England</td> <td><strong class="color-orange">6%</strong></td> </tr> <tr> <td>China</td> <td><strong class="color-orange">3%</strong></td> </tr> <tr> <td>India</td> <td><strong class="color-orange">2%</strong></td> </tr> <tr> <td>Taiwan</td> <td><strong class="color-orange">2%</strong></td> </tr> <tr> <td>Israel</td> <td><strong class="color-orange">1%</strong></td> </tr> <tr> <td>Other</td> <td><strong class="color-orange">4%</strong></td> </tr> </tbody> </table> </div> </div> <hr class="divider"/> <h3 class="h2 animate" data-animate="fadeInUp">Profession</h3> <div class="text narrow"> <p>Profession can also be a decisive factor in selecting targets for deepfake content. Public figures such as celebrities, politicians, and influencers often face a higher risk of being targeted due to their visibility and the potential impact of false or scandalous content on their careers and public standing.</p> <p>The section below highlights the professions that are more likely to attract unconsented deepfake content generation.</p> </div> <div class="profession waypoint"> <div class="text"> <h3 class="animate" data-animate="fadeInUp"><strong>94%</strong> of those featured in deepfake pornography videos work in the entertainment industry</h3> <p>The deepfake landscape reveals a striking dominance of individuals from the entertainment industry in adult-content videos. Our findings indicate that 94% of those featured in deepfake pornography videos are affiliated with the entertainment sector.</p> <p>The list of highly featured professions in deepfake explicit creations includes singers, actresses, social media influencers, models, and athletes.</p> <p>The table below summarizes this information statistically.</p> </div> <div class="image"> <img src="/web/20240215223210im_/https://www.homesecurityheroes.com/state-of-deepfakes/assets/images/img-profession.png" alt="profession" class="d-none d-lg-block"> <img src="/web/20240215223210im_/https://www.homesecurityheroes.com/state-of-deepfakes/assets/images/img-profession-mobile.png" alt="profession" class="d-lg-none"> </div> <div class="table"> <table> <thead> <tr> <th><span class="color-blue">Profession</span></th> <th>Susceptibility Rate to Deepfake Pornography</th> </tr> </thead> <tbody> <tr> <td>Singer</td> <td><strong class="color-orange">58%</strong></td> </tr> <tr> <td>Actress</td> <td><strong class="color-orange">33%</strong></td> </tr> <tr> <td>Social Media Influencer</td> <td><strong class="color-orange">3%</strong></td> </tr> <tr> <td>Model</td> <td><strong class="color-orange">2%</strong></td> </tr> <tr> <td>Athlete</td> <td><strong class="color-orange">2%</strong></td> </tr> <tr> <td>Other</td> <td><strong class="color-orange">2%</strong></td> </tr> </tbody> </table> </div> </div> <div class="text narrow"> <p>The prevalence of entertainment industry figures in deepfake adult content can be attributed to several factors. First, the high visibility of individuals in this sector makes them more likely targets, as they are readily recognizable to the general public.</p> <p>Additionally, the availability of extensive visual and auditory material featuring entertainment professionals, such as movies, TV shows, and music videos, provides ample source material for deepfake creators.</p> <h3 class="animate" data-animate="fadeInUp">Top 10 individuals most frequently targeted by deepfake pornography</h3> <p>Deepfake pornography is characterized by a select group of individuals who find themselves targeted for manipulative and often malicious purposes. These individuals, often public figures or celebrities, bear the brunt of deepfake creators' efforts.</p> <p>This section delves into the profiles of the top ten most frequently targeted individuals in deepfake pornography. We shed light on the frequency of content that features.</p> <p>However, due to the sensitive nature of the data, we have opted not to disclose the names of these individuals. Instead, we have provided information about their nationality and profession in the following table. </p> </div> <div class="table narrow"> <table> <thead> <tr> <th>Nationality & Profession</th> <th>Video Features</th> <th>Views</th> </tr> </thead> <tbody> <tr> <td>South Korean Singer</td> <td><strong class="color-orange">1,595</strong></td> <td><strong class="color-blue">5,611,500</strong></td> </tr> <tr> <td>South Korean Singer</td> <td><strong class="color-orange">1,238</strong></td> <td><strong class="color-blue">3,865,000</strong></td> </tr> <tr> <td>South Korean Singer</td> <td><strong class="color-orange">923</strong></td> <td><strong class="color-blue">2,305,500</strong></td> </tr> <tr> <td>South Korean Singer</td> <td><strong class="color-orange">844</strong></td> <td><strong class="color-blue">3,395,500</strong></td> </tr> <tr> <td>South Korean Singer</td> <td><strong class="color-orange">803</strong></td> <td><strong class="color-blue">1,365,200</strong></td> </tr> <tr> <td>South Korean Singer</td> <td><strong class="color-orange">761</strong></td> <td><strong class="color-blue">3,294,000</strong></td> </tr> <tr> <td>South Korean Singer</td> <td><strong class="color-orange">751</strong></td> <td><strong class="color-blue">1,995,800</strong></td> </tr> <tr> <td>Thai Singer</td> <td><strong class="color-orange">733</strong></td> <td><strong class="color-blue">3,852,000</strong></td> </tr> <tr> <td>South Korean Singer</td> <td><strong class="color-orange">733</strong></td> <td><strong class="color-blue">3,084,000</strong></td> </tr> <tr> <td>British Actress</td> <td><strong class="color-orange">713</strong></td> <td><strong class="color-blue">3,190,100</strong></td> </tr> </tbody> </table> <p>Due to the sensitive nature of the data, we have opted not to disclose the names of these individuals. Instead, we have provided information about their nationality and profession.</p> </div> <div class="text narrow"> <p>The frequency with which these individuals are targeted underscores the need for comprehensive strategies to address deepfake threats. Such strategies should encompass legal measures, content detection technologies, and public awareness campaigns aimed at protecting these individuals' rights, privacy, and reputations.</p> </div> </section> <section id="advancements-in-deepfake-techonology" class="s-advancements-techonology"> <h2 class="animate" data-animate="fadeInUp"><strong>Advancements</strong> in Deepfake Technology</h2> <div class="text narrow"> <p>In recent years, advancements in deepfake technology have ushered in a new era of creative possibilities and concerns.</p> <p>Two significant factors have played pivotal roles in shaping the landscape of deepfakes: the rise of Generative Adversarial Networks (GANs) and the increasing availability of user-friendly tools, software, and communities for creating deepfakes. </p> <p>This section will expound on both.</p> </div> <div class="rise-of-gans"> <div class="text"> <h3 class="animate" data-animate="fadeInUp">The rise of GANs</h3> <p>At the heart of the deepfake revolution lies the emergence and refinement of Generative Adversarial Networks (GANs).</p> <p>Introduced in 2014, these neural network architectures have since become the driving force behind realistic data generation, including images, audio, and text used in deepfake technology. As a result, they have led to a wealth of academic research and publications. Scholars and researchers worldwide have recognized the potential and versatility of GANs, resulting in a substantial body of work exploring various aspects of these neural network models.</p> <p>The table below summarizes the extent of academic research conducted in this field from 2014 to 2021.</p> </div> <div class="image animate" data-animate="fadeIn"> <img src="/web/20240215223210im_/https://www.homesecurityheroes.com/state-of-deepfakes/assets/images/img-chart-the-rise-of-gans.png" alt="chart-the-rise-of-gans"> <p>Number of academic report about GANs published per year</p> </div> <div class="text"> <p>In 2014, GANs made their academic debut with just one research publication. This seminal paper by Ian Goodfellow and his collaborators introduced the concept of GANs, outlining their novel architecture and adversarial training framework.</p> <p>In the year 2021, the field of GAN research will reach a remarkable milestone. A staggering 658 research publications focused on GANs emerged, marking an extraordinary increase compared to the humble beginnings of just a single publication in 2014.</p> <p>The exponential growth in GAN-related research is a testament to the versatility and potential of this approach.</p> </div> </div> <div class="text mb-4"> <h3 class="animate" data-animate="fadeInUp">Availability of user-friendly tools, software, & communities for creating deepfakes</h3> <p>Another significant factor driving advancements in deepfake technology is the increasing accessibility of user-friendly tools, software, and online communities. In the early days of deepfakes, creating convincing manipulations required technical expertise.</p> <p>However, as the technology matured, a wave of user-friendly applications and platforms emerged, democratizing the creation of deepfakes. User-friendly deepfake tools and software, often accompanied by intuitive graphical interfaces, have lowered the entry barrier for individuals interested in experimenting with deepfake technology.</p> <p>These platforms offer a range of features, from simple face swapping to more complex video manipulations. Furthermore, the growth of online communities dedicated to deepfake creation and discussion has fostered collaboration, knowledge sharing, and the development of open-source projects. In the following sections, our research will reveal how these factors have contributed to the advancement of deepfake technology.</p> </div> <div class="image mb-4 animate" data-animate="fadeIn"> <img src="/web/20240215223210im_/https://www.homesecurityheroes.com/state-of-deepfakes/assets/images/img-most-creation-communities-and-forums.png" alt="most-creation-communities-and-forums"> </div> <div class="text"> <p>The realm of deepfake technology has witnessed the emergence of a robust online community and forum ecosystem. As the data from our research shows, there are approximately 15 deepfake creation community websites and forums, boasting a collective membership of over 609,464 individuals. These communities serve as hubs for enthusiasts, researchers, and creators interested in exploring the possibilities and challenges presented by deepfake technology.</p> <p>Notably, a significant portion of these deepfake creation communities and forums are hosted on platforms primarily associated with deepfake adult content. This represents a complex intersection of creativity and caution.</p> <p>While they provide a space for innovation and artistic expression, they also underscore the need for vigilance to mitigate the potential for misuse, misinformation, and privacy violations.</p> </div> <div class="row mb-8"> <div class="col-lg-7 mb-4 mb-lg-0"> <div class="text"> <h3 style="max-width: 525px;">42 user-friendly deepfake tools with roughly <strong>10 million</strong> monthly searches</h3> <p>The number of user-friendly tools making deepfake content generation more accessible than ever is on the rise.</p> <p>Our research indicates that approximately 42 such tools exist, catering to a broad spectrum of users. These tools collectively garner a staggering 10 million monthly searches, underscoring the widespread interest in and demand for user-friendly deepfake solutions.</p> <p>User-friendly deepfake tools come in various forms, with approximately 40% being downloadable applications and the remaining 60% offered as web-based platforms.</p> <p>This diversity in accessibility caters to the preferences and needs of users, whether they seek the convenience of online tools or the flexibility of downloadable software.</p> </div> </div> <div class="col-lg-5 text-center animate" data-animate="fadeIn"> <img src="/web/20240215223210im_/https://www.homesecurityheroes.com/state-of-deepfakes/assets/images/img-42-user-friendly-deepfake-tools.png" alt="42-user-friendly-deepfake-tools" width="420" height="351"> </div> </div> <div class="pornography mb-8"> <div class="row"> <div class="col-lg-6 mb-4 mb-lg-0"> <div class="text pornography__intro"> <h3 class="animate" data-animate="fadeInUp"><strong>One in every three deepfake</strong> tools allow users to create deepfake pornography</h3> <p>One of the most significant aspects of deepfake technology is the creation of adult content. At least one in every three deepfake tools allows users to generate adult content using AI-driven manipulation techniques.</p> <p>Most of these platforms, accounting for 92.3%, offer users the ability to create deepfake adult content for free, albeit with certain limitations. This approach to accessibility has contributed to the widespread use of such tools.</p> <p>However, there's also a financial endgame. These platforms consistently try to monetize their services by setting up premium features and encouraging users to buy them. The following list explores some of the monetization strategies that these platforms explore.</p> </div> </div> <div class="col-lg-6"> <div class="text pornography__text"> <h3 class="animate" data-animate="fadeInUp">Selling Extra Credits:</h3> <p>Many deepfake platforms offer users the option to purchase extra credits. These credits can be used to access premium features, enhance generated content quality, or unlock additional tools and resources. This strategy allows users to tailor their experience to their specific needs.</p> <h3 class="animate" data-animate="fadeInUp">Premium Subscriptions:</h3> <p>Another common monetization approach involves offering premium subscriptions. Users can subscribe to these premium tiers to access higher-quality deepfake tools, advanced features, and priority customer support. This subscription model provides users with enhanced capabilities and a more comprehensive deepfake pornography creation experience.</p> <h3 class="animate" data-animate="fadeInUp">Online Advertisements:</h3> <p>Many of these platforms generate revenue through online advertisements. Advertisements may appear within the user interface or alongside content generated by the tool.</p> </div> </div> </div> </div> <div class="pornography-video waypoint"> <div class="row flex-lg-row-reverse"> <div class="col-lg-6 mb-4 mb-lg-0"> <div class="pornography-video__frame"> <div class="frame-wrapper"> <div class="frame"> <img src="/web/20240215223210im_/https://www.homesecurityheroes.com/state-of-deepfakes/assets/images/frame-laptop.png" alt="frame-laptop"> <video width="320" height="240" preload="auto" loop muted> <source src="/web/20240215223210im_/https://www.homesecurityheroes.com/state-of-deepfakes/assets/video/pornography-video-demo.mp4" type="video/mp4"> Your browser does not support the video tag. </video> </div> </div> <div class="note"> <p>We conducted this test using an Intel Core i5 processor with 16 GB of RAM and an NVIDIA GeForce 2070 graphics card. The processing time can even be further reduced with more powerful hardware.</p> </div> </div> </div> <div class="col-lg-6"> <div class="text pornography-video__text"> <h3 class="animate" data-animate="fadeInUp">It now takes <strong>less than 25 minutes</strong> and costs <strong>$0</strong> to create a <strong>60-second</strong> deepfake pornographic video of anyone using just one clear face image.</h3> <p>Half an hour is all that deepfake creators need to generate a one-minute pornographic video.</p> <p>Findings from our research show that it now takes less than 25 minutes and costs as little as $0 to create a 60-second deepfake explicit video of anyone using just one clear face image.</p> <p>Among the myriad deepfake applications available, one Windows-based application stands out for its low entry barriers. This application leverages the user's hardware power, making it accessible to a wide range of users.</p> <p>Using this app, it is possible to create a 60-second deepfake explicit video of anyone in under 25 minutes. Not to mention, it comes with daily free credits provided to users, allowing them to develop deepfake porn videos almost for free.</p> </div> </div> </div> </div> </section> <section id="deepfake-porn-survey" class="s-survey"> <h2 class="animate" data-animate="fadeInUp"><strong>Deepfake Porn Survey:</strong> <br/>Awareness, Attitudes, and Impact</h2> <div class="text mb-6"> <p>The results of our survey, which involved 1522 American males, provide valuable insights into the awareness, attitudes, and impact of deepfake pornography. Through this study, we aimed to gain a comprehensive understanding of the prevalence of deepfake content consumption and the underlying motivations driving its popularity.</p> <p>Our findings shed light on the evolving dynamics within the adult entertainment domain, uncovering the factors that draw individuals to deepfake content and how it has begun to reshape conventional pornography.</p> <p>Additionally, we explore the growing interest in the creation of deepfake content, highlighting its transformative effect on the industry. This research offers a glimpse into the complex and evolving landscape of deepfake technology within adult entertainment, providing a foundation for further examination and discourse. Here are our findings.</p> </div> <div class="row mb-8 waypoint"> <div class="col-lg-5 mb-4 mb-lg-0"> <div class="text"> <h3 class="animate" data-animate="fadeInUp"><strong>48%</strong> of surveyed US men have seen deepfake pornography at least once</h3> <p>In our survey of US men, a notable <strong>48%</strong> of respondents reported having viewed deepfake pornography at least once.</p> <p>This statistic underscores the widespread presence of deepfake content within the adult entertainment landscape and highlights its growing influence on consumer preferences.</p> <h3 class="animate" data-animate="fadeInUp">Technological curiosity is the most significant reason behind watching deepfake porn</h3> <p>The top three reasons cited by participants for engaging with deepfake pornography reveal interesting insights into the factors driving its consumption.</p> </div> </div> <div class="col-lg-7"> <ul class="list-unstyled us-men"> <li> <p>A significant <strong>57%</strong> of respondents expressed their interest in deepfake technology, driven by a curiosity to explore the capabilities of this emerging field.</p> <div class="progress" style="--height: 57%;"> <span><span class="timer" data-from="1" data-to="57">57</span>%</span> </div> </li> <li> <p>Celebrity attraction ranked second at <strong>48%</strong>, indicating that many are drawn to deepfake content featuring their favorite stars.</p> <div class="progress" style="--height: 48%;"> <span><span class="timer" data-from="1" data-to="48">48</span>%</span> </div> </li> <li> <p>Fantasy fulfillment, identified by <strong>36%</strong> of participants, reflects a desire for personalized and tailored experiences within adult entertainment.</p> <div class="progress" style="--height: 36%;"> <span><span class="timer" data-from="1" data-to="36">36</span>%</span> </div> </li> </ul> </div> </div> <div class="row mb-8"> <div class="col-lg-5 mb-4 mb-lg-0"> <div class="text"> <h3 style="--width: 320px;"><strong>74%</strong> of deepfake pornography users don't feel guilty about it</h3> <p>Interestingly, 74% of users who have engaged with deepfake pornography did not report feeling guilty about their consumption.</p> <p>This finding suggests that deepfake content has become an accepted and normalized part of adult entertainment preferences for a significant portion of viewers. These users cited the factors below as the reasons why they do not feel guilty for their actions.</p> </div> </div> <div class="col-lg-7"> <div class="reasons animate" data-animate="fadeIn"> <p>Top 4 reasons why they don't feel guilty about it are</p> <img src="/web/20240215223210im_/https://www.homesecurityheroes.com/state-of-deepfakes/assets/images/img-top-4-reasons-why.png" alt="top-4-reasons-why"> </div> </div> </div> <div class="row mb-8"> <div class="col-lg-6 mb-4 mb-lg-0"> <div class="text overlay-box overlay-box--1"> <h3 class="animate" data-animate="fadeInUp"><strong>One out of five</strong> daily porn users has swapped regular porn for deepfake porn</h3> <p>Remarkably, one in five daily pornography users revealed that deepfake content has replaced traditional pornography in their viewing preferences. This finding shows the impact of deepfake technology on the adult entertainment industry and its appeal to a substantial portion of the audience.</p> </div> </div> <div class="col-lg-6"> <div class="text"> <h3 style="--width: 120px;"><strong>20%</strong> of survey participants have considered learning to create deepfake pornography</h3> <p>The survey also revealed that <strong>20%</strong> of participants have contemplated learning how to create deepfake pornography.</p> <p>Furthermore, one in ten respondents admitted to attempting the creation of deepfake pornography featuring either celebrities or individuals known to them. These statistics highlight the growing interest in deepfake content creation, with some individuals actively exploring this technology for various purposes.</p> </div> </div> </div> <div class="row waypoint"> <div class="col-lg-5 mb-4 mb-lg-0"> <div class="text"> <h3 style="--width: 80%;"><strong>73%</strong> of survey participants would want to report to the authorities if someone close to them became a victim of deepfake porn.</h3> <p>These reactions underline the seriousness with which many individuals view the potential harm caused by deepfake technology and the importance of safeguarding individuals from its misuse.</p> </div> </div> <div class="col-lg-7"> <div class="survey-report"> <div class="row"> <div class="col-md-6"> <div class="overlay-box overlay-box--2"> <span class="number"><span class="timer" data-from="1" data-to="73">73</span>%</span> <p>of respondents expressed the desire to report such incidents to the authorities.</p> </div> </div> <div class="col-md-6"> <div class="overlay-box overlay-box--3"> <span class="number"><span class="timer" data-from="1" data-to="68">68</span>%</span> <p>indicated that they would feel shocked and outraged by the violation of someone's privacy and consent in the creation of deepfake pornographic content.</p> </div> </div> </div> <p>When we asked, "If someone close to you became a victim of deepfake porn, what is your reaction?"</p> </div> </div> </div> </section> <section id="concluding-remarks" class="s-concluding-remarks"> <h2 class="animate" data-animate="fadeInUp">Concluding <strong>Remarks</strong></h2> <div class="row"> <div class="col-lg-6"> <div class="text"> <p>The prevalence of deepfake videos is on an upward trajectory, with a substantial portion featuring explicit content. Deepfake pornography has gained a global foothold and commands a considerable viewership on dedicated websites, most of which have women as the primary subjects.</p> </div> </div> <div class="col-lg-6"> <div class="text"> <p>Regrettably, this content continues to flourish, courtesy of communities, computer programs, and services. These factors contribute significantly to the accessibility and use of deepfake creation tools.</p> </div> </div> <div class="col-lg-6"> <div class="text"> <p>It is worth noting that there's a noticeable divide between the broader public's perception of deepfakes as unethical and wrong and the deepfake pornography user community.</p> </div> </div> <div class="col-lg-6"> <div class="text"> <p>These findings emphasize the multifaceted nature of deepfake technology and its impact on various domains. As a result, there is a pressing need for responsible usage, ethical considerations, and regulatory safeguards to address the evolving challenges that deepfake content presents.</p> </div> </div> </div> </section> <section id="appendix" class="s-appendix"> <h2 class="animate" data-animate="fadeInUp">APPENDIX</h2> <div class="row"> <div class="col-lg-6"> <h3 class="animate" data-animate="fadeInUp">Data Sensitivity</h3> <p class="h4">METHODOLOGY</p> <p>Conducting open-source research on sensitive data demands careful consideration, which we take very seriously. In the interest of ethical practice and responsible disclosure, we have made the decision to redact the names and URLs of specific sources, especially those associated with deepfake pornography, in order to avoid inadvertently endorsing or promoting tools, services, or websites with legal ambiguities or explicit unethical applications.</p> </div> <div class="col-lg-6"> <h3 class="animate" data-animate="fadeInUp">Forums and creation communities</h3> <p class="h4">METHODOLOGY</p> <p>Our research included Google searches for terms such as 'deepfake forums' and 'deepfake communities,' as well as searches on websites associated with deepfake pornography and forum-based platforms. We relied on publicly accessible data from the respective websites and channels to determine the number of registered users across 15 identified deepfake forums and creation communities.</p> </div> <div class="col-lg-6"> <h3 class="animate" data-animate="fadeInUp">Deepfake Pornography's Online Presence</h3> <p class="h4">METHODOLOGY</p> <p>Conducting open-source research on sensitive data demands careful consideration, which we take very seriously. In the interest of ethical practice and responsible disclosure, we have made the decision to redact the names and URLs of specific sources, especially those associated with deepfake pornography, in order to avoid inadvertently endorsing or promoting tools, services, or websites with legal ambiguities or explicit unethical applications.</p> </div> <div class="col-lg-6"> <h3 class="animate" data-animate="fadeInUp">Academic report about GANs published per year</h3> <p class="h4">METHODOLOGY</p> <p>We conducted our search using arXiv's search engine, employing the keywords 'GAN' or 'generative adversarial network.' This allowed us to identify papers containing these keywords in their titles or abstracts for each year.</p> </div> <div class="col-lg-6"> <h3 class="animate" data-animate="fadeInUp">Tools and software for creating deepfakes</h3> <p class="h4">METHODOLOGY</p> <p>We acquire data about deepfake applications and software by employing specific keywords associated with deepfake tools and services. Using this approach, we also collected details like release years, category, costs, the inclusion of mature content support, and availability of trial periods for the applications. To enhance our analysis, we've also utilized Ahrefs to gauge domain ratings and traffic metrics for these applications.</p> </div> <div class="col-lg-6"> <h3 class="animate" data-animate="fadeInUp">Deepfake Porn Survey: Awareness, Attitudes, and Impact</h3> <p class="h4">METHODOLOGY</p> <p>To gather the information presented earlier, we conducted a survey with 1,522 male participants from the United States, all of whom had viewed pornography at least once in the past six months. We included attention-check questions to ensure thoughtful responses, excluding data that didn't meet our criteria from our analysis. It's important to recognize that relying on participants' recollections may introduce memory distortions and overstatements, potentially influencing the responses. It's essential to note that the survey outcomes do not reflect our personal standpoint.</p> </div> </div> <div class="note">The collection of quantitative data covered the period from July 15th to August 29th, 2023</div> </section> </div> </div> </main> <footer id="footer"> <div class="container"> <hr> <a href="#welcome" class="back-top">HEADPAGE</a> <div class="row"> <div class="col-lg-3 text-center text-lg-start"> <a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/" class="logo"> <img src="/web/20240215223210im_/https://www.homesecurityheroes.com/state-of-deepfakes/assets/svg/logo-color.svg" alt="logo"> </a> </div> <div class="col-lg-9"> <div class="row"> <div class="col-lg-5"> <div style="max-width: 350px"> <h4>AFFILIATE DISCLAIMER</h4> <p>Home Security Heroes independently tests and reviews every product. We may earn a commission when you buy through our links. Read more <a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/affiliate-disclosure/">here</a>.</p> </div> </div> <div class="col-lg-7"> <div style="max-width: 600px"> <h4>FAIR USE STATEMENT</h4> <p>If you know someone who could benefit from our findings, feel free to share this report with them. The graphics and content are available for noncommercial reuse. All we ask is that you link back to this page so that readers get all the necessary information and our contributors receive proper credit.</p> </div> </div> </div> <div class="row"> <div class="col-lg-5"> <h4><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/">ID Theft Services</a></h4> <ul> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/best-identity-theft-protection-services-reviews/">ID Theft Service Reviews</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/aura-reviews/">Aura Reviews</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/identity-guard-reviews/">Identity Guard Reviews</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/lifelock-reviews/">Lifelock Reviews</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/idshield-reviews/">ID Shield Reviews</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/compare/">Service Comparisons</a></li> </ul> </div> <div class="col-lg-7"> <h4>Popular Posts</h4> <ul> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/famous-identity-theft-cases/">Famous ID Theft Cases</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-us-statistics/">ID Theft U.S. Statistics</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/biggest-data-breaches/">Biggest Data Breaches</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/compare/aura-vs-identity-guard/">Aura vs Identity Guard</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/compare/aura-vs-lifelock/">Aura vs Lifelock</a></li> <li><a href="https://web.archive.org/web/20240215223210/https://www.homesecurityheroes.com/identity-theft-protection/compare/identity-guard-vs-lifelock/">Identity Guard vs Lifelock</a></li> </ul> </div> </div> </div> </div> </div> </footer> <script src="/web/20240215223210js_/https://www.homesecurityheroes.com/state-of-deepfakes/assets/js/bootstrap.min.js?v=1.0.8.2"></script> <script src="/web/20240215223210js_/https://www.homesecurityheroes.com/state-of-deepfakes/assets/js/plugins.min.js?v=1.0.8.2"></script> <script src="/web/20240215223210js_/https://www.homesecurityheroes.com/state-of-deepfakes/assets/js/theme.js?v=1.0.8.2"></script> </body> </html><!-- FILE ARCHIVED ON 22:32:10 Feb 15, 2024 AND RETRIEVED FROM THE INTERNET ARCHIVE ON 01:12:00 Mar 09, 2025. JAVASCRIPT APPENDED BY WAYBACK MACHINE, COPYRIGHT INTERNET ARCHIVE. ALL OTHER CONTENT MAY ALSO BE PROTECTED BY COPYRIGHT (17 U.S.C. SECTION 108(a)(3)). --> <!-- playback timings (ms): captures_list: 0.505 exclusion.robots: 0.029 exclusion.robots.policy: 0.018 esindex: 0.011 cdx.remote: 288.404 LoadShardBlock: 97.995 (3) PetaboxLoader3.datanode: 146.483 (5) load_resource: 1015.753 (2) PetaboxLoader3.resolve: 776.97 (2) -->