Published blog posts

Latest writing

The Realz blog examines how manipulated images, deepfakes, and visual impersonation affect verification, confidence, and trust in digital evidence and communications.

When Manipulated Images Become a Trust Problem

In the incidents we've looked at here at Realz, one point stands out quickly: image manipulation is not only a content issue. It is a trust issue.

Thesis: In this small set of incidents we've reviewed here at Realz, the clearest lesson is not that every altered image is technically novel, but that manipulated and AI-generated visuals can quickly blur the line between symbolic messaging, misinformation, and broader trust erosion. Even when the immediate harm is unclear, the verification burden rises for platforms, journalists, institutions, and the public.

Read article →

When Images Stop Being Evidence: What a Small Set of Recent Deepfake and Manipulated Photo Incidents Tells Us

In this sample of incidents we've reviewed here at Realz, the cases come from only a handful of countries — Belgium, Germany, Lebanon, and Sweden — over a short period from early February to early April 2026. That is far too small and uneven a set to support sweeping conclusions about the whole information environment.

Thesis: In this small set of incidents we've reviewed here at Realz, image-related deception appears in several different forms — non-consensual synthetic imagery, celebrity and public-figure impersonation, and manipulated photos used to shape public narratives. The common thread is not just false visuals, but a growing burden of verification for institutions, platforms, and the public.

Read article →
Reading guide

Use the blog for interpretation, recurring patterns, and practical implications beyond the incident record.

These posts build on documented incidents and broader developments in how people, platforms, and institutions assess what is real.

What the blog covers

The blog focuses on broader themes behind visual-authenticity incidents, including verification, visual deception, identity abuse, trust signals, and platform responsibility.

Why it exists

Incidents show what happened. Blog posts help explain why these events matter, what patterns they reveal, and how trust online is changing.

How to read it

Start with documented incidents, then use the blog for deeper interpretation, context, and longer-form thinking around digital authenticity.