top of page

The Secret Code: How Families and Businesses Can Outsmart Deepfakes and Voice Fraud

  • Nov 4, 2025
  • 3 min read


With deepfake scams and voice cloning on the rise, businesses and families alike need smarter ways to confirm who’s really on the other end of a call or video meeting. One simple, low-tech solution? Use secret code phrases — discreet, everyday questions and answers that quietly verify identity without tipping off potential fraudsters.



Secret codes can assist in authenticating your meetings. hawkiit.com/blog
Secret codes can assist in authenticating your meetings. hawkiit.com/blog

Why It Matters


Modern AI voice and video tools can mimic a trusted colleague or family member with uncanny precision. That’s why relying only on tone, face, or urgency isn’t enough anymore.Instead, set up a few casual “authentication” phrases known only to your inner circle or team. These are designed so that the person initiating the call or request must naturally respond correctly — proving they are who they claim to be.



How It Works


The key is subtlety. The phrase should sound like normal conversation — not like a security check. If the person replies with the right context or answer, you can proceed. If not, pause immediately and verify through another trusted channel.

Here are a few examples you can start using right away:


Example 1 — Urgent Payment Request (Phone Call)


You say: “Hey, quick thing — what did you say you brought for lunch today?”

  • Secret Code 1: “Tuna sandwich”

  • Secret Code 2: “Veg wrap”


If they hesitate, deflect, or give a random answer, hang up and call them back on their official number.



Example 2 — Video Call Asking for a Password Reset


You say: “Quick housekeeping: who grabbed the blue notebook this morning?”

  • Secret Code 1: “Red spine”

  • Secret Code 2: “Left at reception”


Anyone deepfaking your coworker won’t have the context to answer naturally.



Example 3 — “Family Emergency” Call


You say: “I’m so sorry — can you remind me what we had for dessert last Sunday?”

  • Secret Code 1: “Grandma’s blackberry pie”

  • Secret Code 2: “Orange pretzels”


Scammers often use emotional pressure. A real relative will answer instinctively.



Example 4 — Vendor Changing Bank Details


You say (email or chat): “Thanks — quick question: what did you say you’d pick up from the store earlier?”

  • Secret Code 1: “Purple toilet paper”

  • Secret Code 2: “A 24-pack of water”


If they stumble or seem lost, verify the change via a known contact number — not the one in the message.



Example 5 — Quick Access or Password Reset Request


You say: “Quick check — is Bingo at the window?”


  • Secret Code 1: “Sleeping in the closet”

  • Secret Code 2: “Chasing the curtains”


If the reply doesn’t fit one of the agreed-upon answers, don’t proceed.



Additional Safeguards for Businesses


  • Confirm identity over your internal chat tool before acting on any unusual request.

  • Use multi-factor authentication (MFA) for all financial and system access.

  • Record and verify voice or video requests for high-risk actions.

  • Train teams regularly on AI-based impersonation scams.

  • Maintain a written incident response plan so everyone knows the escalation path.



The Bottom Line


In an era of deepfakes and synthetic voices, it’s no longer about being paranoid — it’s about being prepared. A well-timed casual question could stop a six-figure loss or data breach.

Hawki IT helps businesses strengthen their security posture with practical tools, awareness training, and managed protection.


Book your complimentary IT strategy consultation today.



📞 1-888-429-5448 | ✉️ sales@hawkiit.com | 🌐 www.hawkiit.com/get-started

 
 
bottom of page