#FactCheck - Deepfake Video Falsely Links Shah Rukh Khan to Rajpal Yadav Case
Executive Summary
A video featuring popular comedian Rajpal Yadav has recently gone viral on social media, claiming that he is currently lodged in Tihar Jail in connection with a loan default and cheque bounce case. In connection with this, another video showing Bollywood superstar Shah Rukh Khan is being widely shared online. In the viral clip, Khan is purportedly seen saying that he would help Rajpal Yadav get out of jail and also offer him a role in his upcoming film. However, research by the CyberPeace found the viral video to be fake. The clip is a deepfake, in which the audio has been manipulated using artificial intelligence. In the original video, Shah Rukh Khan is speaking about his life and personal experiences. Although several prominent Bollywood personalities have expressed support for Rajpal Yadav, the claims made in the viral video are misleading.
Claim
An Instagram user named “ayubeditz” shared the viral video on February 11, 2026, with the caption: “Rajpal Yadav bhai, stay strong, we are all with you — Shah Rukh Khan.” The link to the post and its archived version are provided below.

Fact Check
To verify the claim, we extracted key frames from the viral video and conducted a Google reverse image search. This led us to the original video uploaded on a YouTube channel titled “Locarno Film Festival” on August 11, 2024. According to the available information, Shah Rukh Khan was sharing insights about his life and career during a conversation with the festival’s Artistic Director, Giona A. Nazzaro. This raised strong suspicion that the viral video had been edited using AI.

To further examine the authenticity of the audio, we analysed it using AI detection tools. The audio was first checked using Aurigin.ai, which indicated an 83 percent probability that the voice in the viral clip was AI-generated.

Conclusion
The CyberPeace’s research confirmed that the claim associated with Shah Rukh Khan’s viral video is false. The video is a deepfake in which the audio has been altered using artificial intelligence. In the original footage, Khan was discussing his life and experiences, and he did not make any statement about helping Rajpal Yadav.
Related Blogs

Introduction
The Australian Parliament has passed the world’s first legislation regarding a ban on social media for children under 16. This was done citing risks to the mental and physical well-being of children and the need to contain misogynistic influence on them. The debate surrounding the legislation is raging strong, as it is the first proposal of its kind and would set precedence for how other countries can assess their laws regarding children and social media platforms and their priorities.
The Legislation
Currently trailing an age-verification system (such as biometrics or government identification), the legislation mandates a complete ban on underage children using social media, setting the age limit to 16 or above. Further, the law does not provide exemptions of any kind, be it for pre-existing accounts or parental consent. With federal elections approaching, the law seeks to address parental concerns regarding measures to protect their children from threats lurking on social media platforms. Every step in this regard is being observed with keen interest.
The Australian Prime Minister, Anthony Albanese, emphasised that the onus of taking responsible steps toward preventing access falls on the social media platforms, absolving parents and their children of the same. Social media platforms like TikTok, X, and Meta Platforms’ Facebook and Instagram all come under the purview of this legislation.
CyberPeace Overview
The issue of a complete age-based ban raises a few concerns:
- It is challenging to enforce digitally as children might find a way to circumnavigate such restrictions. An example would be the Cinderella Law, formally known as the Shutdown Law, which the Government of South Korea had implemented back in 2011 to reduce online gaming and promote healthy sleeping habits among children. The law mandated the prohibition of access to online gaming for children under the age of 16 between 12 A.M. to 6 A.M. However, a few drawbacks rendered it less effective over time. Children were able to use the login IDs of adults, switch to VPN, and even switch to offline gaming. In addition, parents also felt the government was infringing on the right to privacy and the restrictions were only for online PC games and did not extend to mobile phones. Consequently, the law lost relevance and was repealed in 2021.
- The concept of age verification inherently requires collecting more personal data and inadvertently opens up concerns regarding individual privacy.
- A ban is likely to reduce the pressure on tech and social media companies to develop and work on areas that would make their services a safe child-friendly environment.
Conclusion
Social media platforms can opt for an approach that focuses on how to create a safe environment online for children as they continue to deliberate on restrictions. An example of an impactful-yet-balanced step towards the protection of children on social media while respecting privacy is the U.K.'s Age-Appropriate Design Code (UK AADC). It is the U.K.’s implementation of the European Union’s General Data Protection Regulation (GDPR), prepared by the ICO (Information Commissioner's Office), the U.K. data protection regulator. It follows a safety-by-design approach for children. As we move towards a future that is predominantly online, we must continue to strive and create a safe space for children and address issues in innovative ways.
References
- https://indianexpress.com/article/technology/social/australia-proposes-ban-on-social-media-for-children-under-16-9657544/
- https://www.thehindu.com/opinion/op-ed/should-children-be-barred-from-social-media/article68661342.ece
- https://forumias.com/blog/debates-on-whether-children-should-be-banned-from-social-media/
- https://timesofindia.indiatimes.com/education/news/why-banning-kids-from-social-media-wont-solve-the-youth-mental-health-crisis/articleshow/113328111.cms
- https://iapp.org/news/a/childrens-privacy-laws-and-freedom-of-expression-lessons-from-the-uk-age-appropriate-design-code
- https://www.techinasia.com/s-koreas-cinderella-law-finally-growing-up-teens-may-soon-be-able-to-play-online-after-midnight-again
- https://wp.towson.edu/iajournal/2021/12/13/video-gaming-addiction-a-case-study-of-china-and-south-korea/
- https://www.dailysabah.com/world/asia-pacific/australia-passes-worlds-1st-total-social-media-ban-for-children

Introduction
Misinformation has been a significant concern in recent times, especially in the online information landscape. This past month, misinformation has been linked to the communal tensions that have flared up in the North Tripura district. While the law enforcement agencies were quick to respond, misinformation about the law and order situation spread rapidly. Shri Amitabh Ranjanon, Tripura’s Director General of Police, issued a public statement on 21st October 2024, Monday, clarifying “The state's law and order situation has improved, and misinformation is being spread about it”. This instance is a classic example of how misinformation can affect the delivery of good governance to citizens or hamper the relationship between the citizenry and the state mechanisms. Such misinformation undermines the efforts of the law enforcement agencies striving to maintain peace, and distorted narratives can colour public opinion about the authorities and create cycles of misplaced distrust.
DGP's Statement
DGP Amitabh Ranjanon clarified during an event to commemorate Police Commemoration Day, stating that the state has recorded a lesser number of crimes this year compared to the last 10 years. He emphasized that senior police officials promptly respond to any law and order issues and additional forces have been deployed as necessary. Ranjan highlighted the peaceful celebration of Durga Puja as a testament to the effective law enforcement measures in place, demonstrating communal harmony.
Impact of Misinformation in communal settings
Misinformation in communal settings can cause anxiety, fear, and distrust among community members, leading to conflicts. It undermines public confidence in law enforcement and government institutions. The spread of false information can erode trust in law enforcement and government bodies, hindering their ability to address and solve conflicts. Therefore, precise data and accurate information are essential in every environment to avoid the harm caused by misinformation.
Preventive Measures Against Misinformation
- Look for authenticated sources
In a digital landscape filled with information from various sources, it’s essential to differentiate between credible and unreliable content. Authenticated sources are typically reputable organizations and officials. Users must rely on authenticated sources to ensure the information's accuracy and credibility. Users must verify the source, confirm the claims made in the source by comparing them with other credible sources for accuracy, and follow fact-checking practices.
- Exercise caution on social media information
Social media platforms can rapidly disseminate information, but they can also serve as breeding grounds for misinformation. The ease of sharing content can lead to the spread of unverified claims, rumours, or even outright falsehoods. Therefore, exercising caution when engaging with information on these platforms is crucial. Users must scrutinize headlines and images as well, especially since misleading images can distort the truth with the advent of AI. One must always read beyond the headline and check the context of the images used and not make split-second decisions and impressions. Users must engage in critical thinking and share informed opinions responsibly, to promote discussions about the validity of shared content.
- Role of Awareness
Awareness about misinformation is essential for navigating the complexities of modern communication. People can make better decisions and help create a more informed society by being aware of the strategies used to disseminate false information. Users need to become knowledgeable about typical misinformation strategies, hone their cognitive abilities to critically assess internet content, and verify the reliability of sources before they form opinions, make decisions or share ahead.
Final words
By integrating these simple best practices into our daily lives we can cultivate a more informed public, reduce the spread of online misinformation, and enhance critical thinking skills among peers and the larger digital community.
References
- https://www.theweek.in/wire-updates/national/2024/10/21/cal8-tr-dgp.html
- https://www.newindianexpress.com/nation/2024/Oct/21/tripura-dgp-says-misinformation-being-spread-about-states-law-and-order-situation
- https://indianexpress.com/article/north-east-india/tripura/police-inaction-tripura-dgp-amitabh-ranjan-sharp-decline-crime-rate-9632509/
- https://www.newindianexpress.com/nation/2024/Oct/21/tripura-dgp-says-misinformation-being-spread-about-states-law-and-order-situation

Introduction
In real-time warfare scenarios of this modern age, where actions occur without delay, the relevance of edge computing emerges as paramount. By processing data close to the source in the battlefield with the help of a drone or through video imaging from any military vehicle or aircraft, the concept of edge computing allows the military to point targets faster and strike with accuracy. It also enables local processing to relay central data, helping ground troops get intelligence inputs to act rapidly in critical mission scenarios.
As the global security landscape experiences a significant transformation in different corners of the world, it presents unprecedented challenges in the present scenario. In this article, we will try to understand how countries can maintain their military capabilities with the help of advanced technologies like edge computing.
Edge Computing in Modern Warfare
Edge computing involves the processing and storage of data at the point of collection on the battlefield, for example, through vehicles and drones, instead of relying on centralized data centers. This enables faster decision-making in real-time. This approach creates a resilient and secure network by reducing reliance on potentially compromised external connections, supporting autonomous systems, precision-based targeting, and data sharing among military personnel, drones, and command centers amidst a challenging environment.
A report released by the US Department of Defence in March 2025 found a crucial reality surrounding the operation of hardware relying on outdated industrial-age processes in the digital era. In the case of applications with video, edge computing helps to deliver significant advantages to a wide range of crucial military operations, which include:
- Situational awareness with real-time data processing that provides improved battlefield visibility and proper threat detection.
- Autonomous warfare systems such as drones, which use a tactical edge cloud computing to get the capability to navigate faster.
- Developing a strong communication and networking capability to secure low-latency communication for troops to stay connected in challenging environments.
- Ensuring predictive maintenance with the help of effective sensors to carry out edge detection and attrition at an early point, thereby reducing equipment failures.
- Developing effective targeting and weapons systems to ensure faster processing to enable precision-based targeting and response, besides a strong logistics and supply chain that can provide real-time tracking to improve delivery accuracy and resource management.
This report also highlighted that the DoD is rapidly updating its software and investing in AI enablers like data sets or MLOps tools. This also stresses the breaking down of integration barriers by enforcing MOSA (Modular Open Systems Approaches), APIs (Application Programming Interface), and modular interfaces to ensure interoperability across platforms, sensors, and networks to make software-defined warfare an effective strategy.
Developing Edge with Artificial Intelligence for Future Warfare
A significant insight from the work of the US Department of Defense is its emphasis on the importance of edge computing in shaping the future of warfare. In that context, the Annual Threat Assessment Report highlights a key limitation of traditional AI strategies that rely on centralised cloud computing, since these might not be suitable for modern battlefields with congested networks and limited bandwidth. The need for real-time data processing requires a distributed and edge-based AI solution to address contemporary threats. This report also directly supports the deployment of effective edge with AI in a defined, disrupted, intermittent, and limited-bandwidth (DDIL) environment. In that case, when the communication networks fail, the edge servers at the edge of the network offer crucial advantages that cloud-dependent systems cannot. This ability to analyse data and make decisions without consistent connectivity and operate with limited computational resources is a strategic necessity.
The scenario of warfare is a phenomenon that requires maintaining a strong strategic and tactical approach, which, in the present times, is being examined through the domain of digital platforms. Modern warfare patterns demand faster decision-making and edge computing deliveries by shifting the power of distant servers to the frontlines. The US military is already moving in the direction of deploying edge-enabled systems to prove the nature of sensors and networks to compute at the tactical edge to transform warfighting.
However, it can be understood with the help of an example, as creating fusion in the skies with F-35s. As they have showcased the capability of edge computing by fusing sensor data with MADL (Multi-Functional Advanced Data Link) to create a unified picture, making the squadrons a force multiplier. An example of this was visible when an F-35 relayed real-time tracking data, enabling a navy ship to neutralise a missile beyond its range.
Conclusion: The Way Ahead
As the changing nature of warfare moves towards adopting software-defined systems, where edge computing thrives as a futuristic military technology, it calls for the need for integration across all domains of warfighting. But at the same time, several imperatives do emerge, such as:
- Developing an open architecture that enables both flexibility and innovation.
- Ensuring an effective connectivity that actually combines a confluence of legacy systems.
- Developing interoperability among the systems that can function in synergy with all platforms and can function across all domains.
- Prioritising edge-native AI development systems, where it is also necessary to ensure the shift to adopting cloud-based AI models to create solutions optimised from the ground up for edge deployment.
- Investing in edge infrastructure to establish a robust edge computing infrastructure that enables rapid deployment by testing and updating AI capabilities across diverse hardware platforms. Like the way the military training academies in India are developing training infrastructures for training officer cadets or personnel to handle drones and all forms of advanced warfare tactics emerging in this age.
- Fostering talent and expertise by embracing commercial solutions where software talent could be enabled across the enterprises with expertise in edge computing capabilities and AI. In this case, the role of the commercial sector can help to drive innovations in edge AI, and the only way to move in this direction is by leveraging these advances through partnerships and collaborative efforts.
Taking the example of the ARPANET, which once seeded the modern internet, edge computing can also help to create a transformative network effect within the digital battlespace. In conclusion, future conflicts will be defined by the speed and accuracy provided by the edge, as nations integrating AI and robust edge infrastructures can hold a strong advantage in the multi-domain battlefields in the future.
References
- https://www.idsa.in/mpidsanews/rk-narangs-article-what-the-regions-first-drone-warfare-taught-us-published-in-the-new-indian-express
- https://latentai.com/blog/software-defined-warfare-why-edge-ai-is-critical-to-americas-defense-future/
- https://www.boozallen.com/s/insight/blog/how-the-us-military-is-using-edge-computing.html
- https://capsindia.org/wp-content/uploads/2022/08/RK-Narang-3.pdf
- https://www.newindianexpress.com/opinions/2025/May/12/what-the-regions-first-drone-warfare-taught-us
- https://www.maris-tech.com/blog/edge-computing-in-the-military-challenges-and-solutions/#:~:text=In%20modern%20warfare%2C%20decisions%20need,enables%20precision%20targeting%20and%20response
- https://cassindia.com/digital-soldiers/