ElevenLabs announces safeguards to curb usage of voices for abuse

February 1, 2023

Following an increase in the number of voice cloning misuse cases, ElevenLabs, the startup that provides voice cloning technology has announced additional safeguards it will be introducing to the platform.

Stopping free users from creating custom voices, launching a tool to detect AI-generated audio, and banning accounts reported for creating harmful content are among the safeguards.

Motherboard first reported on ElevenLabs software abuse when it discovered posters on 4chan sharing AI generated voice clips that sounded like celebrities like Emma Watson and Joe Rogan.

ElevenLabs tweeted shortly after the clips went viral on 4chan that; “Crazy weekend—thank you to everyone for trying out our Beta platform. While we see our tech being overwhelmingly applied to positive use, we also see an increasing number of voice cloning misuse cases.”

According to Motherboard, one 4Chan user posted a voice that sounded exactly like Emma Watson reading a section of Hitler’s “Mein Kampf,” while another used a Ben Shapiro-esque voice to make “racist remarks” about US House Representative Alexandria Ocasio-Cortez.

ElevenLabs added that, while it can trace any generated audio back to a specific user, it was looking into additional safeguards. These include requiring payment information or “full ID identification” before performing voice cloning, as well as manually verifying each voice cloning request.

The sources for this piece include an article in Vice.

Top Stories

Related Articles

April 27, 2026 Canada Life says it has contained a cybersecurity incident involving unauthorized access to internal applications through an more...

April 17, 2026 Booking.com has confirmed a data breach exposing customer booking details and contact information, prompting warnings about a more...

April 1, 2026 Anthropic has inadvertently exposed the full source code of its Claude Code tool for the second time more...

April 1, 2026 Cisco suffered a cyberattack after attackers used stolen credentials from a compromised developer tool to access its more...

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn