Deepfake voice cloning can cost almost nothing and, with many tools, needs only well under two minutes of clean public audio. Your family has no plan for this.

How it works

  1. 1.Tell us who you're protectingThree quick questions. Nothing is stored on a server.
  2. 2.Walk through five attacksShort scenes — voicemail, text, video, and more.
  3. 3.Leave with a planA printable protocol plus the Field Guide to keep.

8 minutes. Free. No signup required.

Prefer to skip the scenarios? Open a fillable, printable protocol you can complete or print blank, then save as PDF.

You'll keep the Field Guide — a reference on every family deepfake pattern. Share it with anyone who should see it.