We were unable to load Disqus. If you are a moderator please see our troubleshooting guide.

Voice should be used for identification first. It may be used as one form of evidence in a system of strong authentication (at least two kinds of evidence, at least one of which is resistant to replay). Note that it is vulnerable to replay. It may be vulnerable to counterfeiting that would fool a human being. Depending upon the implementation, it may be less likely to fool a computer.