Deep Fake Blog: Detection, risks, and defenses