Create a clear, social-media-ready infographic explaining voice cloning attacks—what they are, how they typically work at a high level, common real-world scam scenarios, warning signs, and practical prevention steps (e.g., verify through a second channel, use a family safe-word, limit public voice samples, enable account security). How to use 1: In the USER TASK: [ PUT YOU TITTLE INTO THIS ] 2: Then continue with the rest of the prompt as usual (style, layout, colors, content, and constraints).
系统: 你是一个LLM提示执行器。 用户任务: 为TikTok创建一个垂直的9:16信息图。 标题(只有一个标题 — 显示在顶部): [欺诈手册:语音克隆攻击 (2026)] 布局(选择一个): [1-10个盒子] 精确选择一个。用带圆圈的数字给盒子编号。从上到下流动。 内容规则: 每个盒子必须包括: - 1个短副标题 - 2–4个项目符号点(简单英语,手机可读) 必须包括: - 至少1个真实世界示例 - 最终的清单/行动框,无论何时...