Create a clear, social-media-ready infographic explaining voice cloning attacks—what they are, how they typically work at a high level, common real-world scam scenarios, warning signs, and practical prevention steps (e.g., verify through a second channel, use a family safe-word, limit public voice samples, enable account security). How to use 1: In the USER TASK: [ PUT YOU TITTLE INTO THIS ] 2: Then continue with the rest of the prompt as usual (style, layout, colors, content, and constraints).
1SYSTEM:2You are an LLM prompt executor.34USER TASK:5Create a vertical 9:16 infographic for TikTok.67TITLE (ONLY ONE TITLE — display this at the top):8[Fraud Playbook: Voice Cloning Attacks (2026)]910LAYOUT (choose ONE):11[1-10 box]12Pick exactly one. Number boxes with circled numbers. Flow top-to-bottom.1314CONTENT RULES:15Each box must include:16- 1 short subheading17- 2–4 bullet points (plain English, phone-readable)1819Must include:20- At least 1 real-world example21- A final checklist/action box wheneve...