top of page

The Secret Code: How Families and Businesses Can Outsmart Deepfakes and Voice Fraud


With deepfake scams and voice cloning on the rise, businesses and families alike need smarter ways to confirm who’s really on the other end of a call or video meeting. One simple, low-tech solution? Use secret code phrases — discreet, everyday questions and answers that quietly verify identity without tipping off potential fraudsters.



Secret codes can assist in authenticating your meetings. hawkiit.com/blog
Secret codes can assist in authenticating your meetings. hawkiit.com/blog

Why It Matters


Modern AI voice and video tools can mimic a trusted colleague or family member with uncanny precision. That’s why relying only on tone, face, or urgency isn’t enough anymore.Instead, set up a few casual “authentication” phrases known only to your inner circle or team. These are designed so that the person initiating the call or request must naturally respond correctly — proving they are who they claim to be.



How It Works


The key is subtlety. The phrase should sound like normal conversation — not like a security check. If the person replies with the right context or answer, you can proceed. If not, pause immediately and verify through another trusted channel.

Here are a few examples you can start using right away:


Example 1 — Urgent Payment Request (Phone Call)


You say: “Hey, quick thing — what did you say you brought for lunch today?”

  • Secret Code 1: “Tuna sandwich”

  • Secret Code 2: “Veg wrap”


If they hesitate, deflect, or give a random answer, hang up and call them back on their official number.



Example 2 — Video Call Asking for a Password Reset


You say: “Quick housekeeping: who grabbed the blue notebook this morning?”

  • Secret Code 1: “Red spine”

  • Secret Code 2: “Left at reception”


Anyone deepfaking your coworker won’t have the context to answer naturally.



Example 3 — “Family Emergency” Call


You say: “I’m so sorry — can you remind me what we had for dessert last Sunday?”

  • Secret Code 1: “Grandma’s blackberry pie”

  • Secret Code 2: “Orange pretzels”


Scammers often use emotional pressure. A real relative will answer instinctively.



Example 4 — Vendor Changing Bank Details


You say (email or chat): “Thanks — quick question: what did you say you’d pick up from the store earlier?”

  • Secret Code 1: “Purple toilet paper”

  • Secret Code 2: “A 24-pack of water”


If they stumble or seem lost, verify the change via a known contact number — not the one in the message.



Example 5 — Quick Access or Password Reset Request


You say: “Quick check — is Bingo at the window?”


  • Secret Code 1: “Sleeping in the closet”

  • Secret Code 2: “Chasing the curtains”


If the reply doesn’t fit one of the agreed-upon answers, don’t proceed.



Additional Safeguards for Businesses


  • Confirm identity over your internal chat tool before acting on any unusual request.

  • Use multi-factor authentication (MFA) for all financial and system access.

  • Record and verify voice or video requests for high-risk actions.

  • Train teams regularly on AI-based impersonation scams.

  • Maintain a written incident response plan so everyone knows the escalation path.



The Bottom Line


In an era of deepfakes and synthetic voices, it’s no longer about being paranoid — it’s about being prepared. A well-timed casual question could stop a six-figure loss or data breach.

Hawki IT helps businesses strengthen their security posture with practical tools, awareness training, and managed protection.


Book your complimentary IT strategy consultation today.



📞 1-888-429-5448 | ✉️ sales@hawkiit.com | 🌐 www.hawkiit.com/get-started

 
 
bottom of page