- Help Center
- Voice Cloning
- Introduction
Voice Cloning Security
We use 3-levels of protection: 2FA, Encrypted Data Transfer and Ethical AI Practice
- Exclusive team access with 2-factor authentication
- Data security through service-to-service TLS connections and encrypted data transfer over HTTPS using SHA-2 compliant cipher suites
- Murf practices ethical AI