Last Update 1:05 PM February 18, 2025 (UTC)

Company Feeds | Identosphere Blogcatcher

Brought to you by Identity Woman and Infominer.
Support this collaboration on Patreon!

Tuesday, 18. February 2025

Thales Group

Arizona Department of Public Safety partners with Thales for enhanced security of license and identity credentials

Arizona Department of Public Safety partners with Thales for enhanced security of license and identity credentials prezly Tue, 02/18/2025 - 14:00 This new contract covers over 300,000 cards annually, including Concealed Weapons Permits (CWP), Certificate of Firearms Proficiency (LEOSA), Fingerprint Clearance Cards (FCC), and various licensed Security Guard and Private Investigator
Arizona Department of Public Safety partners with Thales for enhanced security of license and identity credentials prezly Tue, 02/18/2025 - 14:00 This new contract covers over 300,000 cards annually, including Concealed Weapons Permits (CWP), Certificate of Firearms Proficiency (LEOSA), Fingerprint Clearance Cards (FCC), and various licensed Security Guard and Private Investigator ID cards (SG/PI). Arizona Department of Public Safety (DPS) joins a growing number of jurisdictions in North America who have switched to Thales’ 100% polycarbonate cards – resulting in more sustainable and secure cards. The new cards are already accessible for licensed citizens, law enforcement partners, and other parties using these license and identity credentials.

The Arizona Department of Public Safety (DPS) has awarded Thales a contract, with potential to extend through 2029, for off-site printing of their special license and identity cards including Concealed Weapons Permits, Certificates of Firearms Proficiency, Fingerprint Clearance Cards, and various licensed Security Guard and Private Investigator cards.

As part of this award, these ID cards are being upgraded with stronger security features and a redesigned appearance to ensure a high degree of security and trust in each credential. The new security elements include transitioning to 100% polycarbonate cards, for stronger security and the ability to leverage a large number of embedded, visible security features making it easier for first-line inspectors and law enforcement to quickly and clearly identify whether the credential is genuine or has been altered.

New security features being added to these cards include a detailed laser engraved portrait photo for a clear photo easy to identify in rapid or low light situations, smooth color transitions within a secure background pattern, and a reflective embossed pattern across the card surface for kinetic movement effects. All security features are safely located within, and protected by, the polycarbonate card body and cannot be tampered with without damaging the card, thereby making the tampering attempt extremely evident.

Arizona DPS joins over a dozen other Thales partner agencies in North America that have switched to cards made from 100% polycarbonate, for best-in-class identity credential documents. In addition to the highest-level of security available, polycarbonate also provides a highly durable card with higher resistance to fraud over the life of the credential.

Thales is the fastest growing provider of license and identity solutions in the U.S., with a true partner-based approach with our agency and jurisdiction customers. Thales offers the strongest security features in the marketplace for identity credentials, as well as regularly introduces new card security features, to ensure our commitment to the fight against fraud.

“These next generation identity cards provide Arizona citizens, businesses and state officials with stronger security for these credentials, allowing for quicker validation,” said Tyson Moler, Vice President for Thales Identity and Biometric Solutions in North America. “Thales is pleased to partner with the Arizona DPS, leveraging our key strengths and expertise in reliable and secure documents solutions.”

Thales is a trusted provider of driver’s license and ID solutions in the U.S. Thales provides driver’s license and ID card solutions to the following 17 agencies and jurisdictions across North America: Alaska, Arizona MVD and DPS, Colorado, Georgia, Hawaii, Maryland, New Brunswick, New Hampshire, New York, Newfoundland and Labrador, Nova Scotia, Prince Edward Island, Quebec, Texas, Washington D.C., Wyoming.

 

Contacts Cédric Leurquin 18 Feb 2025 Type Press release Structure Digital Identity and Security United States The Arizona Department of Public Safety (DPS) has awarded Thales a contract, with potential to extend through 2029, for off-site printing of their special license and identity cards including Concealed Weapons Permits, Certificates of Firearms Proficiency, Fingerprint Clearance Cards, and various licensed Security Guard and Private Investigator cards. prezly_730977_thumbnail.jpg Hide from search engines Off Prezly ID 730977 Prezly UUID ef4b5815-1ca5-4a54-9448-fb4d2bec475c Prezly url https://thales-group.prezly.com/arizona-department-of-public-safety-partners-with-thales-for-enhanced-security-of-license-and-identity-credentials Tue, 02/18/2025 - 15:00 Don’t overwrite with Prezly data Off

Thales and Sopra Steria announce strategic partnership enabling digital transformation of European Air Traffic Management

Thales and Sopra Steria announce strategic partnership enabling digital transformation of European Air Traffic Management prezly Tue, 02/18/2025 - 10:00 Thales and Sopra Steria form a strategic partnership to drive the digital transformation of the Air Traffic Management (ATM) ecosystem in Europe. The two companies will develop and offer a digital platform– OpenSky Platform - an
Thales and Sopra Steria announce strategic partnership enabling digital transformation of European Air Traffic Management prezly Tue, 02/18/2025 - 10:00 Thales and Sopra Steria form a strategic partnership to drive the digital transformation of the Air Traffic Management (ATM) ecosystem in Europe. The two companies will develop and offer a digital platform– OpenSky Platform - and associated services to support greener aviation. This ultra-secure, open-architecture platform offers long-term flexibility and interoperability for ANSPs (Air Navigation Service Providers) in Europe. This initiative by Thales and Sopra Steria supports the objectives of the latest European Air Traffic Management Master Plan to harmonize flight operations in Europe.
© photographer Ralf Maassen

Paris, FRANCE – February 18, 2025 – Thales (Euronext Paris: HO), a global high technology leader, and Sopra Steria (Euronext Paris: SOP), a major player in the European Tech sector, announce a new multiyear partnership, which will lead the digital transformation of the Air Traffic Management (ATM) industry in Europe. The two players will combine their industrial and digital expertise in ATM to offer Thales’ OpenSky Platform, a safe, secure digital platform, together with associated services to support sustainable aviation and modernise European ATM. Through its dedicated aerospace organisation, Aeroline, Sopra Steria will support Air Navigation Service Providers (ANSPs) with digital transformation challenges.

The new version of the European ATM Master Plans aims to drive the digital transformation of ATM in Europe. ​ The Thales and Sopra Steria strategic partnership will support this new strategic direction for Europe, as well as enabling the migration to a new service delivery model for ANSPs.

ATM systems need to support the continuous growth of air traffic, support ANSPs offer more sustainable aviation services, and be compliant with the latest safety and cybersecurity standards and requirements. This can be done by using open architectures and interfaces, to ensure that ANSPs have access to best-of-breed components, applications and systems over the long-term.

Adopting open architectures in ATM enhances interoperability between third-party systems, drives cost efficiencies and facilitates the seamless integration of new technologies. The Thales OpenSky Platform is a fully open, cyber-secure platform which ensures that ANSPs are able to benefit from this digital transformation, without compromising the safety and security of ATM solutions.

Thales and Sopra Steria aim to innovate together, in order to support the current and future challenges and transformation strategies of air traffic management.

“This partnership aligns perfectly with Thales’ ambition to support the digital transformation of ATM in Europe. Achieving this transformation requires a strong focus on the resilience and cybersecurity of our platforms. Through this strategic partnership, Thales is extending its cybersecurity expertise and end-to-end digital transformation capabilities in the ATM sector.” said Christian Rivierre, VP Airspace Mobility Solutions, Thales.

“This partnership with Thales enables us to offer our customers innovative, high-performance and secure solutions for air traffic management, by combining our air traffic management development strategy, as well as recognised expertise and assets throughout Europe.” commented Xavier PECQUET, member of Sopra Steria’s Executive Board and Director of Aeroline.

About Thales

Thales (Euronext Paris: HO) is a global leader in advanced technologies specialized in three business domains: Defence & Security, Aerospace, and Cyber & Digital.

It develops products and solutions that help make the world safer, greener and more inclusive.

The Group invests close to €4 billion a year in Research & Development, particularly in key innovation areas such as AI, cybersecurity, quantum technologies, cloud technologies and 6G.

Thales has close to 81,000 employees in 68 countries. In 2023, the Group generated sales of €18.4 billion.

About Sopra Steria

Sopra Steria, one of Europe's leading players in the field of technology, with 52,000* employees in nearly 30 countries, is recognised for its consulting, services and digital solutions. It helps its customers drive their digital transformation and achieve tangible, lasting benefits. The Group provides a global response to the competitiveness challenges of large companies and organisations, combining in-depth knowledge of business sectors and technologies with a collaborative approach. Sopra Steria puts people at the heart of what it does and is committed to helping its customers make the most of digital technology to build a positive future. In 2023, the Group generated revenue of €5.8 billion.

*Revalued following the disposal of Sopra Banking Software in September 2024.

The world is how we shape

Sopra Steria (SOP) is listed on Euronext Paris (Compartment A) - ISIN Code: FR0000050809

For more information, visit our website at www.soprasteria.com/fr**Le monde est tel que nous le façonnons 

Documents [Prezly] Thales and Sopra Steria announce Strategic Partnership enabling Digital Transformation of European Air Traffic Management.pdf Contacts Cédric Leurquin 18 Feb 2025 Type Press release Structure Aerospace Paris, FRANCE – February 18, 2025 – Thales (Euronext Paris: HO), a global high technology leader, and Sopra Steria (Euronext Paris: SOP), a major player in the European Tech sector, announce a new multiyear partnership, which will lead the digital transformation of the Air Traffic Management (ATM) industry in Europe. The two players will combine their industrial and digital expertise in ATM to offer Thales’ OpenSky Platform, a safe, secure digital platform, together with associated services to support sustainable aviation and modernise European ATM. Through its dedicated aerospace organisation, Aeroline, Sopra Steria will support Air Navigation Service Providers (ANSPs) with digital transformation challenges. prezly_730091_thumbnail.jpg Hide from search engines Off Prezly ID 730091 Prezly UUID 3297a205-0730-4337-bf0e-443b2857cbed Prezly url https://thales-group.prezly.com/thales-and-sopra-steria-announce-strategic-partnership-enabling-digital-transformation-of-european-air-traffic-management Tue, 02/18/2025 - 11:00 Don’t overwrite with Prezly data Off

Farmer Connect

Automated EUDR Compliance: New Features to Streamline Your Process

Staying compliant with the EU Deforestation Regulation (EUDR) is no small task.  This why our mission is to make your compliance process faster and more efficient, as well as error-proof. Thus, we are thrilled to be able to share that with our latest sprint we've rolled out a bunch of new updates that will (hopefully) be worth your while.

Staying compliant with the EU Deforestation Regulation (EUDR) is no small task.  This why our mission is to make your compliance process faster and more efficient, as well as error-proof. Thus, we are thrilled to be able to share that with our latest sprint we've rolled out a bunch of new updates that will (hopefully) be worth your while.

Monday, 17. February 2025

myLaminin

Research Data Management Can Help Secure Grant Funding

Across North America, effective Research Data Management (RDM) is essential for securing and maintaining grant funding.

Across North America, effective Research Data Management (RDM) is essential for securing and maintaining grant funding. Funding agencies both in Canada and the United States place a huge emphasis on data security, integrity, and accessibility as critical components of responsible research and a key requirement for funding. Here are five reasons we believe why.

Compliance with Funding Agency Requirements

In Canada, the Tri-Agency Research Data Management Policy (CIHR, NSERC, SSHRC) mandates that institutions implement RDM strategies to maintain funding eligibility. Likewise, in the United States agencies such as the National Science Foundation (NSF) and the National Institutes of Health (NIH) require researchers to submit Data Management and Sharing (DMS) Plans ensuring secure and responsible data handling.  

Researchers have learned the hard way that failure to comply with these requirements can result in funding delays, reduced future funding opportunities, and in many cases, loss of grants.


Protecting Sensitive and Confidential Data

Research involving health data, personal information, or proprietary industry information must adhere to stringent data security laws.


In Canada, adherence to PIPEDA (Personal Information Protection and Electronic Documents Act) and provincial laws (e.g., Ontario’s PHIPA) is required. PIPEDA for example sets the ground rules for how private organizations collect, use, protect, and disclose personal information.


In the US on the other hand, any federally funded research must be compliant with both HIPAA (Health Insurance Portability and Accountability Act) and FISMA (Federal Information Security Management Act), as well as the newly enacted NIST 800-171 requirements that went into effect on January 25, 2025. These new requirements cover any federally-funded research managing Controlled Unclassified Information (CUI) in Nonfederal Systems and Organizations.


So as you can see, by following structured data security guidelines, proper data security prevents breaches, ethical violations, and reputational damage that can impact future funding opportunities.

Ensuring Long-Term Data Accessibility

Funding agencies across North America expect research data to be well-documented, preserved, and accessible for future verification and use.


At myLaminin, we believe researchers have options when it comes to research repositories. There are many federally-sponsored, institutional, domain-specific, and private-sector tools and repository options. The selection of the right repository however is dependent on the nature of the research, the number of locations involved in data collection, the tools required for analysis, the overriding research methodology, team member locations, and their respective roles.


In the end, properly managed data increases research impact, research repeatability, and improves the chances of future grant renewals.


Enhancing Credibility and Trust

A robust RDM framework facilitates data collection and minimizes errors, fraud risks, and data loss, which could otherwise jeopardize research validity. In our view, funders prefer researchers and institutions that demonstrate rigorous data stewardship and adherence to ethical data handling.

Supporting Open Science and Collaboration

It should be noted that many grants require both data sharing and transparency while balancing intellectual property protection. For example, U.S. initiatives like NIH's Data Sharing Policy encourages researchers to openly share federally funded data, while in Canada, the Tri-Agency Policy promotes open science, ensuring data is preserved and shared appropriately.


Indigenous data sovereignty also requires support of the OCAP principles, (Ownership, Control, Access, and Possession) and while OCAP does not contradict open science rather, it enhances inclusivity, ethics, and collaboration. A respectful approach allows Indigenous knowledge to contribute to global research without compromising community rights and autonomy.


With that said, secure research data management enables controlled access and fosters collaboration without compromising sensitive information.


In Conclusion

We believe a well-designed research data management platform helps researchers to create a robust strategy for handling research data while increasing their chances of securing grant funding. The ideal RDM repository should be secure, adaptable to various research domains, and more importantly, flexible enough to support different data types, storage locations, distributed teams, and role-based access thereby making regulatory compliance seamless and efficient.


By ensuring you comply with funding agency policies, promoting the safeguarding of sensitive information, and promoting open science, you can boost your credibility, streamline the funding process, and contribute to high-impact, reproducible research.


References:

Tri-Agency Council

National Science Foundation (NSF)

National Institutes of Health (NIH)

__________________________________

Deanne Bassili (article author) is the COO of myLaminin, a secure research data management platform for academia using blockchain and web3 technologies to secure sensitive research data and reduce operational inefficiencies for principal investigators, their team members, external collaborators, research legal services, research ethics boards, research librarians, IT, and administrators.



Innopay

INNOPAY at Dynamo Cloud Business Forum 2025

INNOPAY at Dynamo Cloud Business Forum 2025 from 05 Mar 2025 till 06 Mar 2025 Trudy Zomer 17 February 2025 - 13:39 Milan, Italy 45.485610316152, 9.2017896 Join Mariane ter Veen, Director of Data
INNOPAY at Dynamo Cloud Business Forum 2025 from 05 Mar 2025 till 06 Mar 2025 Trudy Zomer 17 February 2025 - 13:39 Milan, Italy 45.485610316152, 9.2017896

Join Mariane ter Veen, Director of Data Sharing at INNOPAY, at the prestigious Dynamo Cloud Business Forum taking place on 5-6 March 2025 at the Excelsior Hotel Gallia in Milan, Italy. Mariane will delve into the critical topic of digital sustainability, a key aspect of today's data-driven economic frameworks.

The forum is set to explore a range of pivotal themes centred on Europe's digital future, with discussions aimed at fostering a robust and independent European digital market. Mariane will address innovative strategies to enhance digital sustainability, emphasising responsible and efficient data usage that supports long-term economic growth, resilience and ecological stability.

This in-person, by-invitation-only event promises insightful exchanges and networking opportunities, gathering leaders and experts across the technology and digital policy landscape. 

For more details on the event and the full programme, visit de website of Dynamo Cloud Business Forum 2025.


IDnow

France vs UK. Which country knows more about fraud?

We unpack the findings from IDnow’s recent UK and France Fraud Awareness Reports to explore the differences in perceptions of fraud, preferences of identity verification solutions and much more. Separated by just 34km of the English Channel, there are many things that France and the United Kingdom have in common: size of populations, diversity of […]
We unpack the findings from IDnow’s recent UK and France Fraud Awareness Reports to explore the differences in perceptions of fraud, preferences of identity verification solutions and much more.

Separated by just 34km of the English Channel, there are many things that France and the United Kingdom have in common: size of populations, diversity of cultures, and, unfortunately, alarming rates of fraud.  

In France, victims of financial fraud and scams lose at least €500 million annually, while in the UK, the problem appears to be even more pronounced. In fact, in just the first half of 2024, over £570 million was stolen in payment fraud alone. 

In 2024, we published the IDnow UK Fraud Awareness Report, which surveyed members of the British public to explore the nation’s awareness of the latest fraud terms, the industries considered most susceptible to fraud, and how commonly Brits used risky channels like unencrypted messaging platforms to transfer copies or scans of ID documents. Last month, we published an edition focused on France, ‘Fraude bancaire : enquête sur la confiance des Français envers leur banque’ [Bank fraud: survey of French people’s confidence in their bank]. 

Referring to the recent French Report, Cyril Patou, Vice President of Sales (France) at IDnow said: “The results highlight the importance of increased awareness and having open dialogue between financial institutions and users to move forward together in the fight against fraud.” 

In this blog, we explore the differences in results between the two nations and consider why a tailored, culture-specific approach to fraud prevention – and identity verification – is required.

UK Fraud Awareness Report 2024 Learn more about the British public’s awareness of fraud and their attitudes toward fraud-prevention technology. Read now Loyalty, trust and public awareness of fraud.

While 54% of UK respondents said they would consider switching banks if they were a victim of bank fraud, only 27% of French respondents agreed, indicating that either the French were more loyal to their banks or accepting of falling victim to fraud. Surprisingly, 11% of French respondents said they had been victims of bank fraud yet had still not changed banks.  

When it comes to fraud terms, the Brits tend to be more informed than their French counterparts. For example, over half of UK respondents said they had heard of ‘deepfakes’ (videos of digitally created people that are typically used to obfuscate the user’s identity), while 42% of French said they had not heard the term combined with a further 25% who said they had heard of deepfakes, but didn‘t know what it means.  

Both countries are currently experiencing a rise in sophisticated digital fraud techniques, including deepfakes. In a recent post on social media, French President Emmanuel Macron shared a montage of deepfake videos featuring himself in popular movies, commenting “nicely done.” In the UK, recent Ofcom data shows that 43% of individuals aged 16 and older have seen at least one deepfake online in the last six months. Deepfakes have clearly arrived and being used for both fun and fraudulent purposes. In fact, the UK government recently declared deepfakes as the “greatest challenge of the online era.”

Attitudes on whether banks are adequately protecting their customers against fraud like deepfakes are largely the same in France (72%) and the UK (73%), leaving more than a quarter of respondents in both countries that either disagree or just don’t know – suggesting better education on not only the latest fraud terms but banks’ methods of fraud prevention is needed.

Which industries cause the French and British public the most concern?

Both France and the UK agree that the riskiest industry when it comes to fraud is financial services (65% and 75% respectively) followed by online shopping. Clearly, these are both industries where it serves for customers to be as cautious as possible, as bank and e-commerce accounts store important personal identifiable information that can be misused for fraudulent purposes. 

Third on the ranking of riskiest industry is social media fraud, which is where a lot of fraud originates, especially social engineering. Discover all about the rise of social media fraud, and how one man almost lost a million euros to a pig butchering scam in our blog, ‘The rise of social media fraud: How one man almost lost it all.’ 

One of the major differences seen in the IDnow Reports is the perception of public services as a potential source of fraud. While in France, nearly a third of the French population (32%) are concerned, just 13% of the UK public appear worried about eGovernment fraud. Could it be that the French are just more critical of eGovernment services or perhaps it’s just that a higher percentage of the French population are using eGovernment services. 

It appears to be the former, as in 2023, just 34% of the French public reported high or moderately high trust in the national government, below the Organisation for Economic Co-operation and Development’s average of 39%.

Identity crisis? The future of digital identity in the UK. Download to discover all about the UK’s past, present and likely future usage of digital IDs. Read now Government and public preferences in identity verification solutions.

Most industries are either required by regulation to implement identity verification checks or have chosen to do so to optimize processes or fight fraud. Such checks are required for account opening in Banking, compliance checks in Crypto, age verification in Mobility, streamlined check-in processes in Travel, financial risk checks in Gambling, and contract signing in Telecommunication.   

Identity verification requires users to provide and have information associated with their identity verified. This may be checking an identity document, such as a driver’s license, passport, or a nationally issued identity document or by biometric authentication of users’ attributes like fingerprints or facial features. 

Each country tends to have different approaches to fraud prevention and identity verification processes, which is often determined by regulatory requirements. In Germany, for example, video verification is required when opening bank accounts due to strict AML/GwG requirements, however this may all be set to change in the near future. 

In France, the government has a national digital identification program and provides citizens with electronic ID cards that facilitates secure access to various services. This centralized system enhances the efficiency of identity verification processes across both public and private sectors. France also has FranceConnect, the national digital identity federator, where users verify themselves for eGovernment and other regulated services. Our report found that the concept of digital identities was familiar to 72% of French respondents. Plus, a large majority of French (70%) said they would be prepared to use a digital identity to access bank accounts or carry out important transactions.

Learn more about our digital identity wallet product, YRIS, which features on FranceConnect here. 

In the UK, there is currently no one consistent and coherent ID system, with companies instead relying on database checks and document checks of different forms of ID, including driving licences and passports. However, the government is experimenting with various ways of modernizing its approach, including the 2023 release of a Digital Identity and Attributes Trust Framework (DIATF) – a set of rules and standards designed to establish trust in digital identity products. 

There was also a flurry of activity at the beginning of 2025 with the announcement that the government planned to launch the GOV.UK Wallet, which was very quickly followed up by panicked questions regarding its impact on the DIATF. 

Once launched, the holders of the GOV.UK Wallet will be able to: 

Securely save government-issued digital documents   Present these documents to organizations, businesses and other parts of government to prove age, identity, or eligibility for services 

When asked which identity verification method they considered the most trustworthy for a secure, reliable and accurate process, 20% of French respondents said document capture and facial recognition, while 42% of UK respondents cited a combination of electronic identity data checks and document capture and facial verification. 

While 16% of French respondents would prefer an expert-led identification process like VideoIdent, just 9% of UK respondents felt the same way. Seemingly, the French are more open-minded toward expert-led solutions than the Brits. However, products like IDnow’s customizable VideoIdent Flex are now becoming increasingly popular in European countries outside Germany, where they have typically enjoyed much success due to national BaFin (Germany’s Federal Financial Supervisory Authority) online onboarding regulatory requirements. 

There are clearly differences between the two nations when it comes to awareness of fraud, the industries considered riskiest and their preferred methods of identity verification. However, what is consistent in both the UK and France is the ever-present risk of fraud and the need for a collaborative push by regulatory and government bodies and financial services to commit to fraud prevention. 

Thankfully, whether automated or expert-led, online or in-person, IDnow offers one of the widest ranges of identity verification and digital signature solutions in Europe and beyond. Learn more about how our solutions can be used to prevent fraud while maximizing conversions by clicking the relevant category above. 

Interested in what our customers said were their top identity verification challenges last year and how they planned to tackle fraud in 2024? Read our ‘Fraud in 2024: IDnow customers have their say.’ blog 

By

Jody Houton
Senior Content Manager at IDnow
Connect with Jody on LinkedIn


Caribou Digital

Where are all the people?

Where are all the people? Takeaways from the Paris AI Safety Summit — from ‘plug baby plug’ to power to the people Written by Emrys Schoemaker — Senior Director of Advisory & Policy at Caribou Digital. The Paris AI Action Summit is over, and the scene set for the subsequent one, which will be hosted by India. This year’s Summit followed previous meetings in Bletchley Park, UK (2023
Where are all the people? Takeaways from the Paris AI Safety Summit — from ‘plug baby plug’ to power to the people

Written by Emrys Schoemaker — Senior Director of Advisory & Policy at Caribou Digital.

The Paris AI Action Summit is over, and the scene set for the subsequent one, which will be hosted by India. This year’s Summit followed previous meetings in Bletchley Park, UK (2023), and Seoul, South Korea (2024). Ostensibly, the convenings aimed to agree on guardrails for the future of AI.

The Paris AI Summit characterized the times in which it was held — one of fragmenting geopolitics, divergent priorities, and the growing pursuit of sovereign interest over collective good.

Many observers concluded that not only was the Summit more of a trade fair for Paris’s AI ambitions — with French President Macron’s ‘plug baby plug’ a, umm, plug for the country’s nuclear industry, but it was also a failure on its own terms. Although more than sixty countries, including China, India, and Germany, signed on to a declaration that committed to “ensuring AI is open, inclusive, transparent, ethical, safe, secure and trustworthy, taking into account international frameworks for all,” both the US and UK refused to do so, with US Vice President J. D. Vance saying the United States would work to retain its dominance in AI.

There were bright spots. The commitment to Current AI, a $400-million fund focused on building “open, people-first technologies,” offers hope, yet the initiative will have to demonstrate how it can have ecosystemic impact and bend the arc of AI development toward the good.

My main takeaway from the AI Summit is that, despite the increasingly centralized, mega investment focus of Big Tech AI that seems to be rushing headlong to doomsday land, the most interesting developments are in fact the opposite: away from the big companies, where efforts focus on shifting power toward people.

I saw this at the African AI Village, an independent meeting convened by a coalition of leading African organizations, including Qhala and Smart Africa, and supported by the likes of Mozilla, CEIP, and others. Three themes struck me:

Decentering and decolonizing power: Calls to stop asking for permission and instead to build African AI models, applications, and skills are growing increasingly confident. We can’t underestimate the importance of China’s DeepSeek AI models here in demonstrating that the AI field can be disrupted. Decentering principles of data governance and turning to Indigenous forms of knowledge: The Maori Data Governance Principles are an example of this approach. The Maori Principles have also informed work Caribou has done with UNDP on governance frameworks for digital ID and forthcoming on data exchange and digital ID. Dependency on metal, especially data centers, to maintain sovereignty: Africa has only 155 data centers. In 2023 these generated less than 1 megawatt (MW), compared to 88 in the US and 73 in the EU. Analysts suggest that Africa desperately needs as much as 1,000 MW and 700 facilities if African AI is going to be independent of the hyperscale cloud and computing providers.

The other theme that stood out in this technology-focused Summit is people. In the headlong rush to greater investment, including in AI for defense, the struggle to put people first continues. The Computer Says Maybe live-streamed review of the Summit captured this trend.

Where are all the people? There was a general consensus that the Summit had not done enough to focus on people or risk. The few references to people, such as the launch of Current AI, the public interest AI fund, were welcome, but not enough. The challenge of mobilizing public engagement — and protest — was also flagged as a barrier to influence and advocacy. One explanation for this was the challenge of “showing the bodies”; in contrast to other digital technologies where harms are readily apparent, the harms from AI are difficult to link directly to the technology. Increasing emphasis on developing AI diagnostic tools and methods to strengthen AI accountability led to a discussion about the role of more constructive engagement: the diagnostician vs. the clinician. The former simply identifies problems, while the latter provides constructive solutions. Importantly, there was widespread agreement among panel members about the importance of criticism, with one panel member noting that “criticism is service.”

But the big elephant in the room was geopolitics. Not just the geopolitics of AI — with US Vice President Vance “warning Europe to go easy on regulating US tech firms” — but the broader geopolitical context in which AI sits. The very rapid changes taking place in the United States, the decline in multilateral approaches to addressing global challenges, including but not only AI, are factors that will shape the future role of digital technologies in politics and everyday life. So we must take much greater account of the geopolitics in which technologies exist if we are to address the challenges of power.

Where are all the people? was originally published in Caribou Digital on Medium, where people are continuing the conversation by highlighting and responding to this story.


Herond Browser

Maintaining Optimal CPU Temperature for Peak Performance

Keeping your CPU cool is essential for performance and longevity. If you’re into gaming or handle demanding tasks like video editing, you’ll want to make sure your CPU doesn’t overheat. Let’s break down why good CPU temp matters and how to maintain it for the best performance. Learn more: Why is my laptop so slow? […] The post Maintaining Optimal CPU Temperature for Peak Performance appeared fir

Keeping your CPU cool is essential for performance and longevity. If you’re into gaming or handle demanding tasks like video editing, you’ll want to make sure your CPU doesn’t overheat. Let’s break down why good CPU temp matters and how to maintain it for the best performance.

Learn more: Why is my laptop so slow? How to speed up

What is a Good CPU Temperature?

Knowing what constitutes a “good” CPU temperature can make all the difference for your system. Here’s what you should aim for a good CPU temp, depending on what you’re doing:

Idle Temperature: When your computer isn’t doing much (just sitting on the desktop), the ideal CPU temperature should be between 30°C to 50°C. If it’s higher than this, it’s worth checking your cooling system.
Normal Use: For tasks like browsing, watching videos, or light gaming, temperatures between 50°C to 75°C are totally fine. Anything higher may indicate you need better airflow or cooling.
Heavy Load: If you’re gaming or running demanding software, temperatures between 70°C to 85°C are typical. Once it hits above 85°C, that’s when you need to start thinking about cooling options.
Maximum Temperature: At maximum load, such as gaming at full throttle or rendering videos, Intel CPUs should stay under 90°C, while AMD CPUs should aim to stay below 92°C. Temperatures above this for extended periods could damage your hardware.

Learn more: What Does It Mean When Your Browser Crashes Out? Troubleshooting Guide

What Affects Your CPU Temperature?

There are several factors that can cause your CPU to run hotter than usual:

Workload: The more your CPU is working (e.g., heavy gaming, 3D rendering), the higher the temperature. The CPU has to process a lot more information, generating heat in the process.
Ambient Temperature: If your room is too hot, your CPU will naturally run hotter. Cooling systems work better in cooler environments.
Cooling System: If your CPU cooler isn’t up to the task, or if it’s clogged with dust, the temperature will rise. Ensuring good airflow in your case and using a high-quality cooler can prevent this. Common Causes of High CPU Temperature

There are several common reasons why your CPU might be running too hot. Identifying these causes early on can help you take the right steps to keep a good CPU temp. Here are 4 main factors to watch out for:

Dust Buildup: Dust can clog fans and heatsinks, restricting airflow and causing your CPU to overheat. Regular cleaning is essential to maintain efficient cooling. Overclocking: Overclocking your CPU increases heat production. If you’re pushing your CPU beyond its factory settings, it’s important to monitor temperatures to prevent overheating. Poor Ventilation: Placing your PC on soft surfaces like a bed or couch can block airflow, causing heat to build up. Ensure your PC is on a hard, flat surface to promote better cooling. Aging Hardware: Over time, thermal paste can dry out, and cooling fans can wear down, reducing cooling efficiency. Regular maintenance, like reapplying thermal paste and cleaning fans, helps keep temperatures under control. 5 Tips for Maintaining a Good CPU Temperature

Maintaining an optimal CPU temperature requires regular attention and a few simple adjustments. By improving airflow, upgrading your cooling system, and performing routine maintenance, you can ensure your CPU runs efficiently and stays cool. Here are some practical tips to help you manage your CPU’s temperature effectively.

Improve Airflow

To keep your CPU cool, make sure your PC is placed in a well-ventilated area. Ensure there’s enough space around your PC for air to flow freely. Adding extra case fans or organizing cables inside the case can improve airflow and help cool your CPU more effectively.

Upgrade Your Cooling

If you’re into gaming or regularly run demanding applications, upgrading to a more efficient cooling system is a great idea. Consider switching to a liquid cooling system, which is more effective at heat dissipation compared to traditional air cooling, especially under heavy load.

Clean Your System Regularly

Dust accumulation is one of the biggest factors that can affect your cooling system. To avoid overheating, clean your PC’s interior every few months. Focus on removing dust from fans, heatsinks, and vents, which can all block airflow and increase temperatures. Using compressed air or a soft brush can help remove dust without damaging components.

Reapply Thermal Paste

Over time, thermal paste between your CPU and cooler can dry out and lose its effectiveness. Reapplying fresh thermal paste ensures better heat transfer, helping your CPU stay cooler. This is especially important if you’re experiencing higher temperatures or if it’s been a while since you built or serviced your system.

Use a Cooling Pad for Laptops

If you’re using a laptop, a cooling pad equipped with fans can significantly help reduce temperatures, especially during gaming or multitasking. Cooling pads provide additional airflow to your laptop’s bottom surface, preventing excessive heat buildup and improving performance during intensive tasks.

Conclusion

Maintaining a good CPU temp is vital for performance and longevity. By keeping an eye on your CPU temperature, cleaning your system, improving airflow, and investing in better cooling, you can ensure your computer runs smoothly and stays reliable for the long haul. Regular monitoring and simple maintenance can prevent overheating and help you get the most out of your machine, whether you’re gaming, working, or just browsing.

Learn more: Top 10 Ways to Prevent Internet Leaks on Your Devices

About Herond Browser

Herond Browser is a cutting-edge Web 3.0 browser designed to prioritize user privacy and security. By blocking intrusive ads, harmful trackers, and profiling cookies, Herond creates a safer and faster browsing experience while minimizing data consumption.

To enhance user control over their digital presence, Herond offers two essential tools:

Herond Shield: A robust adblocker and privacy protection suite. Herond Wallet: A secure, multi-chain, non-custodial social wallet.

As a pioneering Web 2.5 solution, Herond is paving the way for mass Web 3.0 adoption by providing a seamless transition for users while upholding the core principles of decentralization and user ownership.

Have any questions or suggestions? Contact us:

On Telegram https://t.me/herond_browser DM our official X @HerondBrowser Technical support topic on https://community.herond.org

The post Maintaining Optimal CPU Temperature for Peak Performance appeared first on Herond Blog.

Sunday, 16. February 2025

Ockam

How the World Will Look in 2125: Predictions & Possibilities

A hundred years ago, in 1925, the world was barely electrified. Continue reading on Medium »

A hundred years ago, in 1925, the world was barely electrified.

Continue reading on Medium »

Saturday, 15. February 2025

FindBiometrics

CyberArk Acquires AI-Powered Identity Governance Firm Zilla Security for $175 Million

CyberArk, a leading identity security company, has announced the acquisition of Zilla Security, a modern Identity Governance and Administration (IGA) solutions provider, in a deal valued at up to $175 […]
CyberArk, a leading identity security company, has announced the acquisition of Zilla Security, a modern Identity Governance and Administration (IGA) solutions provider, in a deal valued at up to $175 […]

Zimbabwe to Launch Biometric System for Tobacco Farmers in 2025 Marketing Season

Zimbabwe’s Tobacco Industry and Marketing Board (TIMB) has announced plans to implement a comprehensive biometric system for the 2025 tobacco marketing season, modernizing the country’s agricultural sector through digital identity […]
Zimbabwe’s Tobacco Industry and Marketing Board (TIMB) has announced plans to implement a comprehensive biometric system for the 2025 tobacco marketing season, modernizing the country’s agricultural sector through digital identity […]

New Zealand University Confirms Facial Recognition Use at Chinese Campus

The University of Waikato has confirmed it uses facial recognition technology for facility access control at its joint institute campus in Hangzhou, China. The system at the Waikato Joint Institute […]
The University of Waikato has confirmed it uses facial recognition technology for facility access control at its joint institute campus in Hangzhou, China. The system at the Waikato Joint Institute […]

El Cerrito Police Department Implements Clearview AI Facial Recognition Technology

  El Cerrito Police Department has announced the adoption of Clearview AI’s facial recognition software to support law enforcement activities, amid ongoing national and international debate over the technology’s use. […]
  El Cerrito Police Department has announced the adoption of Clearview AI’s facial recognition software to support law enforcement activities, amid ongoing national and international debate over the technology’s use. […]

liminal (was OWI)

The State of Identity – February 15, 2025

Liminal members enjoy the exclusive benefit of receiving daily morning briefs directly in their inboxes, ensuring they stay ahead of the curve with the latest industry developments for a significant competitive advantage. Looking for product or company-specific news? Log in or sign-up to Link for more detailed news and developments. Here are the main industry […] The post The State of Identity –

Liminal members enjoy the exclusive benefit of receiving daily morning briefs directly in their inboxes, ensuring they stay ahead of the curve with the latest industry developments for a significant competitive advantage.

Looking for product or company-specific news? Log in or sign-up to Link for more detailed news and developments.

Here are the main industry highlights of this week week impacting identity and fraud, cybersecurity, trust and safety, financial crimes compliance, and privacy and consent management.

🪄Innovation and New Technology Developments

Socure Launches RiskOS, an AI-Driven Risk Decisioning Platform for Identity Verification, Fraud Prevention, and Compliance

Socure has launched RiskOS, a risk decisioning platform that combines its AI-driven identity verification, fraud prevention, and compliance solutions with orchestration and decisioning capabilities from its Effectiv acquisition. RiskOS integrates over 50 third-party data solutions, offering real-time decision-making and proactive risk alerts. Built on Socure’s identity graph with a network of over 4 billion known outcomes and 314 million recurring identities, the platform provides a no-code interface for creating workflows and integrating data services. It addresses key use cases, including consumer and business onboarding, KYB automation, bank account verification, account takeover prevention, and trust and safety in digital marketplaces. (Source)

Google to Test AI Model for Age Estimation to Enforce Age Restrictions Across Its Products

Google announced it will begin testing an AI model to estimate whether users are over or under 18 to enforce age restrictions across its products, including YouTube. The initiative is part of Google’s broader push to integrate AI into its services while addressing increasing regulatory pressure on child safety. The company plans to expand the AI-based age estimation model beyond the U.S. over time, following similar efforts by Meta. (Source)

Adobe Launches a Standalone Firefly AI Subscription Service With Focus On AI Images Videos And Vectors

Adobe is expanding its Firefly AI models into a standalone subscription service with a focus on AI-generated images, vectors, and videos. Users can choose the Standard plan ($9.99/month) for unlimited AI images, vectors, and 20 five-second AI videos or the Pro plan ($29.99/month) for 70 AI videos per month. A Premium tier, offering up to 500 AI videos per month, is also in development. These plans integrate with Creative Cloud, offering access across Photoshop and Express. Competing with OpenAI’s Sora, Runway’s Gen-3 Alpha, and Google DeepMind’s Veo, Firefly aims to differentiate itself by training on a licensed, brand-safe dataset to avoid legal risks. Adobe’s move reflects its strategy to monetize Firefly’s early success and attract creative professionals seeking customizable AI-generated visual content. (Source)

South African Banks Expanding Smart ID Services to Accelerate Digital Transition

South African banks plan to expand branches offering Home Affairs services to streamline the issuance of biometric smart ID cards. This initiative supports the government’s transition from outdated green ID booklets to more secure digital IDs, aiming to reduce inefficiencies and long wait times. Currently, over 30 banks provide ID services, and many intend to open more branches in 2025 to alleviate congestion at Home Affairs offices. The government has set a goal of issuing at least 2.5 million smart ID cards as part of its broader digital transformation strategy. While no official deadline for the full transition has been announced, authorities expect the process to be completed in the coming years. (Source)

💰 Investments and Partnerships

OneID Secures New Funding to Expand Bank-Verified Digital ID Services and Market Reach

OneID® , the UK’s only provider of bank-verified digital identification services, has secured new funding led by ACF Investors, though the investment amount remains undisclosed. The company has raised over £16 million from more than 200 angel investors across the UK, Sweden, and the US, positioning itself as a leader in the sector. OneID’s technology enables real-time verification for approximately 50 million UK adults without requiring registration or storing personal data, streamlining identity authentication for businesses. The new funding will support product expansion, entry into new market sectors, and further adoption by existing and new customers, including NatWest and Adobe. (Source)

CyberArk Acquires Zilla Security for $165M to Strengthen Identity Governance and Administration Capabilities

CyberArk has acquired Zilla Security for $165 million in cash, with an additional $10 million earn-out, to enhance its Identity Security Platform with modern Identity Governance and Administration (IGA) capabilities. Zilla’s AI-driven SaaS platform automates identity compliance and provisioning, addressing the limitations of legacy IGA systems by offering faster deployment and streamlined access management. The acquisition aligns with CyberArk’s strategy to provide a comprehensive identity security platform, integrating privilege controls, entitlement management, and lifecycle governance. Zilla’s solutions, now available through CyberArk, will support enterprises in managing digital identities more efficiently across hybrid environments. (Source)

Sardine Secures $70M to Expand AI-Powered Fraud and Compliance Solutions

Sardine raised $70 million in a Series C funding round, bringing its total capital to $145 million, with backing from investors like Activant Capital , Andreessen Horowitz , and GV (Google Ventures). The company, which provides AI-driven fraud and compliance solutions, has profiled over 2.2 billion devices and serves more than 300 enterprises, including FIS, Deel, and GoDaddy. Sardine is launching AI agents to automate risk operations, reducing manual work in fraud detection, compliance, and credit underwriting. These AI tools streamline processes such as KYC verification, sanctions screening, and chargeback handling, aiming to reduce false positives and improve efficiency. With this investment, Sardine plans to scale its AI infrastructure to help financial institutions manage increasing fraud and compliance challenges more effectively. (Source)

Cleversoft Acquires Fineksus to Expand Regulatory and AML Solutions Across Europe and the Middle East

Fineksus has been acquired by cleversoft group after receiving regulatory approvals. The acquisition integrates Fineksus’ financial messaging and AML expertise with cleversoft’s regulatory technology, expanding services across Türkiye, the Middle East, and Europe. Customers of cleversoft will gain access to financial messaging services, while Fineksus customers will receive EU regulatory compliance support and improved service in Europe. Fineksus will retain its brand and leadership, with its CEO, Ahmet Vefik Dinçer, joining cleversoft’s executive board. The two companies aim for full integration by the end of 2025, focusing on enhancing regulatory and AML solutions. (Source)

Securitize, Apollo, and Wormhole Tokenize $1.3B Credit Fund for Multi-Chain DeFi Integration

Securitize, Apollo Global Management, Inc., and Wormhole have partnered to tokenize the $1.3 billion Apollo Diversified Credit Fund ($ACRED) and deploy it across six blockchains, including Solana. This allows institutional investors to access private credit markets on-chain, increasing liquidity and accessibility. Wormhole’s protocol enables $ACRED to move across blockchains, letting users trade, lend, or use it as collateral in decentralized finance (DeFi). Solana’s low-cost infrastructure is playing a key role in supporting institutional asset tokenization. The success of $ACRED could encourage further institutional adoption of tokenized assets, expanding blockchain’s role in traditional finance. (Source)

Turn/River Capital to Acquire SolarWinds for $4.4 Billion in All-Cash Deal

Private equity firm Turn/River Capital has agreed to acquire SolarWinds for $4.4 billion in an all-cash deal at $18.50 per share, taking the IT management and observability software provider private. SolarWinds, which became infamous for the 2020 supply chain attack linked to Russian-backed hackers, will no longer be publicly traded on the NYSE. The company faced SEC scrutiny in 2023 over alleged failure to disclose cyber risks, though most allegations were dismissed. The acquisition has been approved by SolarWinds’ board and is expected to close in Q2 2025. (Source)

Signaturit Group Acquires Validated ID to Expand Digital Identity and E-Signature Solutions

Signaturit Group, a Barcelona-based provider of secure digital transaction solutions, has announced its acquisition of Validated ID, a fellow Barcelona-based vendor in digital identity and electronic signature solutions. The financial terms of the deal were not disclosed.Validated ID, known for its VIDwallet mobile identity wallet and biometric signature solutions, serves over 4,000 clients in 35+ countries. (Source)

France Secures €109 Billion in AI Investments to Boost Infrastructure and Innovation

French President Emmanuel Macron announced that private sector investments in France’s artificial intelligence sector will reach approximately €109 billion ($112.5 billion) during the upcoming Paris AI Summit. Key contributions include €20 billion from Canadian investment firm Brookfield, largely for data center development, and potentially €50 billion from the United Arab Emirates, which will help finance a 1-gigawatt data center. The initiative aims to position France as a leader in AI infrastructure, though energy demands for large-scale data centers remain a challenge for Europe. The announcement follows the U.S.’s recent commitment of $500 billion in AI infrastructure from OpenAI, SoftBank, and Oracle to maintain its competitive edge over China and other rivals. (Source)

AttackIQ Acquires DeepSurface to Enhance Cybersecurity Risk Analysis

AttackIQ, a Santa Clara-based cybersecurity firm specializing in Adversarial Exposure Validation (AEV), has acquired Portland startup DeepSurface Security. Founded in 2017, DeepSurface developed software that prioritizes security risks by mapping out potential attack paths for hackers. The acquisition will integrate DeepSurface’s risk analysis technology into AttackIQ’s security control validation and breach simulation offerings. DeepSurface’s CEO, James Dirksen, and CTO, Tim Morgan, expressed enthusiasm for the merger, emphasizing its potential to enhance security teams’ ability to analyze and mitigate threats. The startup previously raised $1 million in seed funding in 2020 from Cascade Seed Fund, SeaChange Fund, and Voyager Capital. (Source)

⚖️ Policy and Regulatory

Hackers Breach OmniGPT Exposing Personal Data Of Over 30000 Users And 34 Million Chatbot Interactions

Hackers allegedly breached OmniGPT, an AI chatbot platform, exposing the personal data of over 30,000 users, including email addresses, phone numbers, API keys, and 34 million user-chatbot interactions. A hacker named “Gloomer” claimed responsibility on February 9, 2025, posting leaked samples on a hacking forum, which included plaintext emails, phone numbers, chat logs, and sensitive documents stored on Google Cloud. The leaked chat logs and uploaded files pose serious privacy risks, potentially revealing personal, financial, or corporate data. (Source)

India Considers Banning Chinese AI Chatbot DeepSeek Over Data Privacy And Cybersecurity Risks

India is considering banning DeepSeek, a Chinese AI chatbot, due to data privacy and cybersecurity concerns, with CERT-In, under the Ministry of Electronics and Information Technology, investigating its data collection practices. DeepSeek reportedly gathers user data through prompts, device metadata, app interactions, and external sources, raising fears of unauthorized access to sensitive information and potential manipulation of political discourse. Unlike ChatGPT, DeepSeek poses elevated privacy risks, as it can track user behavior across other AI platforms like ChatGPT and Google Gemini. Similar concerns have led countries like the US, Italy, and Australia to restrict DeepSeek’s use. India’s finance ministry has already warned against using AI tools like DeepSeek on government devices, reinforcing the need for strict regulations to protect national security and user privacy. (Source)

UK Government Pressures Apple to Weaken iCloud Encryption, Sparking Privacy Concerns

The U.K. government secretly ordered Apple to create a backdoor to access encrypted iCloud backups under the Investigatory Powers Act 2016, aiming to weaken Apple’s end-to-end encryption feature, Advanced Data Protection. The order, which Apple is likely to comply with by removing the feature for U.K. users, has sparked concerns over privacy rights and the potential for similar demands from other governments. Critics argue that the move would set a dangerous global precedent, making encrypted data more vulnerable to cybercriminals and authoritarian regimes. Security experts warn that weakening encryption contradicts efforts to protect users from state-sponsored cyber threats, such as recent hacking campaigns by Chinese-backed groups. The U.K.’s approach risks straining alliances with nations prioritizing encryption as a safeguard against espionage and cyberattacks. (Source)

Lee Enterprises Confirms Cyberattack Disrupting Operations at 72 Newspapers

Lee Enterprises, a major U.S. newspaper publisher, has confirmed that a cyberattack is behind ongoing disruptions at its 72 publications, including the St. Louis Post-Dispatch and Casper Star-Tribune. CEO Kevin Mowbray stated that the company is working to restore systems, but Lee has not disclosed the nature of the attack or whether any data was compromised. The outages have affected newspaper production, subscriber services, and internal systems like VPN and call centers. While Lee’s earnings report this week omitted mention of the cyberattack, this marks the company’s second known breach in five years, following a 2021 Iranian hacker attack. Recovery efforts are ongoing, with no clear timeline for resolution. (Source)

PayPal Fined $2 Million by New York for Cybersecurity Failures

PayPal has been fined $2 million by New York State for failing to meet cybersecurity regulations, leaving customer data vulnerable to cybercriminals. The investigation by the Department of Financial Services (DFS) found that PayPal lacked qualified cybersecurity personnel, failed to implement adequate security measures like multifactor authentication, and did not provide sufficient training. The breach occurred when untrained teams expanded access to IRS Form 1099-Ks, allowing hackers to exploit compromised credentials and access sensitive customer data. DFS Superintendent Adrienne A. Harris emphasized the importance of trained cybersecurity personnel and strong policies to protect consumer information. This case highlights the enforcement of New York’s updated cybersecurity regulations, which set strict standards for financial institutions to prevent data breaches. (Source)

DeepSeek iOS App Banned Globally Over Security and Privacy Risks

Critical vulnerabilities in the DeepSeek iOS app have raised serious privacy and national security concerns, leading to global bans by governments and organizations. The app transmits unencrypted user data to ByteDance servers in China, bypassing iOS security protocols and exposing users to surveillance risks. Researchers found multiple security flaws, including weak encryption, insecure data storage, and extensive fingerprinting, making user information vulnerable to interception and misuse. Given the regulatory and compliance risks, countries like South Korea, Australia, Taiwan, and U.S. agencies have banned the app on official devices. Security experts recommend prohibiting its use in corporate environments, adopting self-hosted alternatives, and conducting regular security assessments to mitigate emerging threats. (Source)

🔗 More from Liminal

Link Index for Age Estimation

Access our latest research in Link for a comprehensive benchmark and analysis of the 20 leading providers in biometric technology, identity verification, and age assurance.

Access Market & Competitive Intelligence

Our award-winning Link™ platform empowers you to monitor trends, access benchmark research reports, explore use cases, and more.

Liminal CEO Summit 2025

Interested in attending? Request an invite to our 4th annual exclusive CEO event, which will be held in Laguna Beach, California.

The post The State of Identity – February 15, 2025 appeared first on Liminal.co.

Friday, 14. February 2025

SC Media - Identity and Access

Microsoft 365 accounts targeted in device code spear-phishing scheme

Suspected Russian threat actors obtain access tokens through a lesser-known authentication flow.

Suspected Russian threat actors obtain access tokens through a lesser-known authentication flow.


Thales Group

Thales introduces new FIDO Key Lifecycle Management solution to enable secure authentication at scale

Thales introduces new FIDO Key Lifecycle Management solution to enable secure authentication at scale prezly Fri, 02/14/2025 - 16:34 New solution allows Enterprises to accelerate and secure passwordless implementation by managing FIDO* security passkeys at scale simply and efficiently Provides full control of the entire FIDO key lifecycle to IT and facilitates accelerated FIDO a
Thales introduces new FIDO Key Lifecycle Management solution to enable secure authentication at scale prezly Fri, 02/14/2025 - 16:34 New solution allows Enterprises to accelerate and secure passwordless implementation by managing FIDO* security passkeys at scale simply and efficiently Provides full control of the entire FIDO key lifecycle to IT and facilitates accelerated FIDO adoption

Thales, the leading global technology and security provider, today announced the launch of OneWelcome FIDO Key Lifecycle Management, a new solution to help large organizations successfully deploy and manage FIDO security passkeys at scale. This announcement reflects Thales’s commitment to provide its customers with a seamless and secure passwordless journey.

OneWelcome FIDO Key Lifecycle Management combines an interoperable management platform with Thales hardware FIDO security keys (passkeys) specifically designed by Thales for use in large organizations. The solution helps CISOs accelerate and secure their passwordless journey by managing FIDO security keys at scale, in a simple and efficient way, throughout their lifecycle. In addition, CISOs benefit from the ultimate Thales expertise in cyber security and in complex projects.

Danny de Vreeze, Vice President, Identity & Access Management at Thales, said: “Authentication is at the heart of securing identities and we are committed to supporting organizations securely transition to passwordless authentication. This solution eliminates the barriers to smooth adoption and enables IT teams to easily manage FIDO security keys beyond just the enrollment. The OneWelcome FIDO Key Lifecycle Management solution is a crucial part of our Passwordless 360° approach that encourages organizations to deploy passwordless at scale and reap its strategic benefits.”

FIDO security keys are the gold standard for protecting the enterprise from phishing attacks, but cumbersome self-registration and lifecycle management processes often lead to user frustration, IT overheads and delayed passwordless authentication deployment.

Thanks to unique capabilities, this new solution, allows IT teams to quickly preregister keys and manage them easily and securely from enrollment to revocation. By relieving end users from these processes, the OneWelcome FIDO Key Lifecycle Management solution improves end-user productivity, accelerates FIDO authentication deployment at scale and secures the entire FIDO key lifecycle.

Andrew Shikiar, Executive Director and CEO at The FIDO Alliance, said: “The FIDO Alliance’s mission is to reduce the world’s reliance on passwords with simpler, stronger authentication. As an active board member of The FIDO Alliance, Thales underscores that mission by supporting a wider deployment of FIDO standards via its device-bound passkey Management Solution – with the added bonus of full key lifecycle management.”

The interoperable management platform is integrated via FIDO2 provisioning API’s to Microsoft Entra ID which enables organizations to pre-register Thales FIDO keys on behalf of their end users.

Thanks to this integration, Enterprises adopting Microsoft 365 can provide secure and seamless authentication to their users from day one. Thales confirms its position as an Identity Trailblazer won at the 2024 Microsoft Security Excellence Awards in recognition of its innovative IAM solutions.

Natee Pretikul, Principal Product Management Lead at Microsoft Security, said: “With FIDO2 provisioning APIs and our longstanding collaboration with Thales, we are empowering organizations to deploy phishing-resistant authentication at scale. By pre-registering end users for a passkey (FIDO2) credential, we enable them to use phishing-resistant multi-factor authentication methods more quickly.”

*The FIDO Alliance is an open industry association with a focused mission: reduce the world’s reliance on passwords. To accomplish this, the FIDO Alliance promotes the development of, use of, and compliance with standards for authentication and device attestation. 

About Thales

Thales (Euronext Paris: HO) is a global leader in advanced technologies specialized in three business domains: Defence & Security, Aerospace, and Cyber & Digital.

It develops products and solutions that help make the world safer, greener and more inclusive.

The Group invests close to €4 billion a year in Research & Development, particularly in key innovation areas such as AI, cybersecurity, quantum technologies, cloud technologies and 6G.

Thales has close to 81,000 employees in 68 countries. In 2023, the Group generated sales of €18.4 billion.

/sites/default/files/prezly/images/Generic%20banner%20option%204_12.png Contacts Cédric Leurquin 14 Feb 2025 Type Press release Structure Digital Identity and Security Thales, the leading global technology and security provider, today announced the launch of OneWelcome FIDO Key Lifecycle Management, a new solution to help large organizations successfully deploy and manage FIDO security passkeys at scale. This announcement reflects Thales’s commitment to provide its customers with a seamless and secure passwordless journey. prezly_729420_thumbnail.jpg Hide from search engines Off Prezly ID 729420 Prezly UUID d27a9267-7aa9-4089-8a5f-c45d75aa5a5c Prezly url https://thales-group.prezly.com/thales-introduces-new-fido-key-lifecycle-management-solution-to-enable-secure-authentication-at-scale Fri, 02/14/2025 - 17:37 Don’t overwrite with Prezly data Off

auth0

Tool Calling in AI Agents: Empowering Intelligent Automation Securely

Discover how AI agents are taking center stage by seamlessly integrating with multiple digital tools like Gmail, Calendar, Slack, and Google Drive to be more efficient. Learn why it is important to secure them and how to do it.
Discover how AI agents are taking center stage by seamlessly integrating with multiple digital tools like Gmail, Calendar, Slack, and Google Drive to be more efficient. Learn why it is important to secure them and how to do it.

SC Media - Identity and Access

Trump admin sought to counter UK-ordered iCloud encryption backdoor

Newly appointed U.S. Director of National Intelligence Tulsi Gabbard has been urged by Sen. Ron Wyden, D-Ore., and Rep. Andy Biggs, R-Ariz., to oppose the UK's reported order for Apple to develop a backdoor that would enable government access to encrypted iCloud data, which they argued to be detrimental to U.S. government and citizen data security.

Newly appointed U.S. Director of National Intelligence Tulsi Gabbard has been urged by Sen. Ron Wyden, D-Ore., and Rep. Andy Biggs, R-Ariz., to oppose the UK's reported order for Apple to develop a backdoor that would enable government access to encrypted iCloud data, which they argued to be detrimental to U.S. government and citizen data security.


ComplyCube

Barclays Under AML Check Scrutiny

Barclays has revealed that the Financial Conduct Authority (FCA), the biggest financial regulatory body in the UK, has been investigating their AML processes due to possible misconduct. Read our guide and find out what happened. The post Barclays Under AML Check Scrutiny first appeared on ComplyCube.

Barclays has revealed that the Financial Conduct Authority (FCA), the biggest financial regulatory body in the UK, has been investigating their AML processes due to possible misconduct. Read our guide and find out what happened.

The post Barclays Under AML Check Scrutiny first appeared on ComplyCube.


SC Media - Identity and Access

Advanced stealthy Astaroth phishing kit emerges

Intrusions with Astaroth involve the distribution of malicious links redirecting to a seemingly legitimate website luring targets into providing their login credentials, which are later pilfered, an analysis from SlashNext revealed.

Intrusions with Astaroth involve the distribution of malicious links redirecting to a seemingly legitimate website luring targets into providing their login credentials, which are later pilfered, an analysis from SlashNext revealed.


FindBiometrics

CBP and Royal Caribbean Deploy Facial Recognition at San Juan Port, Reducing Disembarkation Times by 30%

U.S. Customs and Border Protection (CBP) and Royal Caribbean have introduced facial recognition technology at the Port of San Juan, Puerto Rico, reducing cruise ship passenger processing times while strengthening […]
U.S. Customs and Border Protection (CBP) and Royal Caribbean have introduced facial recognition technology at the Port of San Juan, Puerto Rico, reducing cruise ship passenger processing times while strengthening […]

ID Dataweb and SDG Corporation Form Strategic Alliance to Fight Fraud

ID Dataweb and SDG Corporation announced a strategic partnership, combining their respective expertise in identity verification and cybersecurity services to strengthen digital trust solutions for enterprises. The alliance integrates ID […]
ID Dataweb and SDG Corporation announced a strategic partnership, combining their respective expertise in identity verification and cybersecurity services to strengthen digital trust solutions for enterprises. The alliance integrates ID […]

Ethiopia Launches Mobile App for Fayda National Digital ID System

Ethiopia has launched a mobile application for its Fayda National Digital ID system, advancing the country’s digital transformation efforts. The National Digital Identity Program Office created the application in-house for […]
Ethiopia has launched a mobile application for its Fayda National Digital ID system, advancing the country’s digital transformation efforts. The National Digital Identity Program Office created the application in-house for […]

TÜRKKEP A.Ş.

Dijital Dönüşümün öncüsü iki şirket TÜRKKEP ve PaperWork BPM, stratejik işbirliği ile güçlerini birleştirdi.


Kin AI

The Kinside Scoop 👀 #1

Smarter, sleeker, and more intuitive: A new design, top insights, our origin story - plus, a powerful prompt to master your emotions.

Hey 👋

Welcome to the first edition of The Kinside Scoop 🎉

It’s our new bi-weekly update on how we’re improving Kin to evolve with you and better support your professional and personal growth journey.

This time we’ll go through:

What's New with KIN?🚀

A company's name carries its heart

Top 5 articles we’re reading

Super prompt: How Do You Handle Emotions?

Join the community on Discord, LinkedIn and TikTok

Last week, we made some meaningful changes to make your experience with Kin faster, smoother, and more intuitive.

You may have noticed some of these updates, but just in case you didn’t…

Let's dive in ⬇️

What's New with KIN?🚀

Simplified interface ✨

Your conversations with Kin are now front and center, in a clean, distraction-free space that lets you focus on what matters: your personal growth and reflection.

Conversations & lists 💬

Whether you're continuing yesterday's breakthrough or starting fresh, everything's right where you need it, like picking up yesterday’s conversation with a close friend.

One-tap action buttons ⚡

New shortcuts in your chat view mean less time navigating, and more time growing. Start journaling, prep for meetings, or capture insights with a single tap.

Need to capture a quick thought? Just tap the journaling shortcut, and Kin will store it for you.

This update transforms how you interact with Kin, making every conversation more natural and every action more intuitive.

More than anything, we want to create a space for deeper insights and more meaningful growth moments.

Go to KIN

A company's name carries its heart

Sometimes, the right name finds you. 18 months ago, on a hike in Spain, it just clicked. The best things we’ve built came from real friendships - the kind where you grow together. That’s what Kin is all about. Read the full story here.

Top 5 articles we’re reading

Articles shared in our #market-research channel

DeepSeek moved me to tears': How young Chinese find therapy in AI
READ - BBC

Elon Musk says he’ll drop his $97bn bid for OpenAI if it remains a non-profit READ - The Guardian

DeepSeek database left open, exposing sensitive info
READ - The Register

What if the issue with personal AI isn’t privacy - it’s intimacy?
READ - Customer Futures

Paper: LM2: Large Memory Models
READ - Arxiv org

Super prompt: How Do You Handle Emotions? Quiz me to determine my go-to strategy for dealing with emotions, based on 'Gross' Emotion Regulation Theory' by using the 'Emotion Regulation Questionnaire, ERQ' by James J. Gross and Oliver P. John. When the final question is done, then summarize the quiz results.

If you have Kin installed, click the button below to try this prompt in Kin ☺️

"Open prompt in Kin"

Share your thoughts 💡

Your feedback shapes Kin.

Once you've experienced the update, we'd love to hear your thoughts.

What feels great? What could be better? What would make your Kin experience even more impactful?

We’re all ears.

Just reply to this email or share your thoughts directly in the app (just take a screenshot 💬 ☺️)

Until next time,
The Kin team


FindBiometrics

AI Update: Multiply It by Ten and Then Do It Again

Welcome to the newest edition of ID Tech’s AI update. Here’s the latest big news on the shifting landscape of AI and identity technology: Elon Musk is attempting to stage […]
Welcome to the newest edition of ID Tech’s AI update. Here’s the latest big news on the shifting landscape of AI and identity technology: Elon Musk is attempting to stage […]

Dock

Event Takeaways: Why AI agents and eIDAS 2 are a game-changing combination

This conversation features Jamie Smith, Founder of Customer Futures, and Nick Lambert, CEO of Dock Labs. Nick serves as the host, guiding the discussion, while Jamie, an expert in empowerment technology and digital identity.

This conversation features Jamie Smith, Founder of Customer Futures, and Nick Lambert, CEO of Dock Labs. Nick serves as the host, guiding the discussion, while Jamie, an expert in empowerment technology and digital identity.


Thales Group

Thales Alenia Space and ESA sign contract for HydRON to demonstrate first multi-orbit optical communication network

Thales Alenia Space and ESA sign contract for HydRON to demonstrate first multi-orbit optical communication network tas Fri, 02/14/2025 - 09:59 Thales Alenia Space will develop the world’s first all-optical, multi-orbit optical space communication network ESA’s HydRON project will meet the challenge of bringing connectivity to multiple users to showcase the capabilities of optic
Thales Alenia Space and ESA sign contract for HydRON to demonstrate first multi-orbit optical communication network tas Fri, 02/14/2025 - 09:59 Thales Alenia Space will develop the world’s first all-optical, multi-orbit optical space communication network ESA’s HydRON project will meet the challenge of bringing connectivity to multiple users to showcase the capabilities of optical communication technology The company will leverage its expertise to contribute to Europe's technological independence in connectivity services through space.

Cannes, February 14, 2025 – Thales Alenia Space, a joint venture between Thales (67%) and Leonardo (33%), has signed a contract with the European Space Agency (ESA) for Element #2 of the HydRON (High-thRoughput Optical space Network) Demonstration System (DS) for the design, development, deployment and in-orbit demonstration of a full end-to-end optical system to verify and validate the world’s first all-optical, high-data-rate, multi-orbit transport network in space.

HydRON is set to transform the way data-collecting satellites communicate, using laser technology that will allow satellites to connect with each other and ground networks much faster.By enabling rapid, high-capacity connections between satellites and ground networks, HydRON will significantly enhance our ability to collect and utilize data from space.

HydRON optical communication for broadband in space ©ESA

The project will be conducted with the support of the various space agencies involved in this exciting challenge: the Italian Space Agency (ASI), the German Aerospace Center (DLR), the Polish Space Agency (POLSA), the Romanian Space Agency (ROSA), Enterprise Ireland (EI) and the Swiss Space Agency (SSO). Other agencies are expected to join during the project to expand the mission’s objectives. HydRON forms part of ESA’s Optical and Quantum Communications – ScyLight programme within the Connectivity and Secure Communications directorate.

“I am really pleased Thales Alenia Space will be contributing to Europe’s technological independence in connectivity services through space,” said Giampiero Di Paolo, Deputy CEO and Senior Vice President, Observation, Exploration and Navigation at Thales Alenia Space. “Thales Alenia Space believes HydRON Demonstration System is the key enabler for the reliability and operability of a high-throughput optical network in space, paving the way for the future of commercial optical communications in Europe and globally.” 

“It was an honour to sign this contract with Thales Alenia Space, which moves us closer to establishing Europe's first optical communication network in space," said Laurent Jaffart, ESA’s Director of Connectivity and Secure Communications. "HydRON is set to maintain Europe and Canada as global leaders in the optical domain. With the system being interoperable, HydRON will ensure we continue to grow ESA’s cooperation with our international partners."

Thales Alenia Space’s role in HydRON-DS project

Thales Alenia Space, with its long track record in telecommunication networks and expertise in the production of optical terminals for space, developed in Zurich, has already coordinated a working group involving Telespazio, a joint venture between Leonardo (67%) and Thales (33%), responsible for the ground segment, and other Italian and European companies for Phase A/B1 of the HydRON-DS project. This work was completed at the end of the 2023.

Today, Thales Alenia Space in Italy is ready to lead a European industry consortium for building the HydRON-DS Element #2 mission partition, including the space segment (LEO collector satellite and GEO optical payload) and ground segment (two optical ground stations, mission and network control center and satellite control center).

The project will develop and validate two concepts:

Fiber in the Sky: multi-orbit optical telecommunications at high data rates between space and ground assets. Internet beyond the Clouds: innovative onboard routing techniques at high throughput (> 100 Gbps) to build an optical space transport network seamlessly integrated with terrestrial fiber-based networks.

The project includes up to two years of in-orbit demonstration to assess the capabilities of key technologies for optical communications and concepts of operations for the network architecture. It will also provide a service demonstration for potential demo users.

About ESA’s Optical and Quantum Communications – ScyLight programme 

The European Space Agency (ESA) is Europe's gateway to space, coordinating the financial and intellectual resources of its Member States to conduct space programmes and activities. Part of Advanced Research in Telecommunications Systems (ARTES), the Optical and Quantum Communications – ScyLight programme focuses on advancing optical and quantum technologies to revolutionise satellite communications. ScyLight supports the research, development and utilisation of these technologies, for instance through the HydRON project for seamlessly integrating space assets into terrestrial communication networks. ESA is enabling future quantum communication networks with ultra-secure global connectivity by advancing space-based quantum key distribution and maturing technologies already available today. 

Through supporting industry to develop and extend its manufacturing capabilities, ScyLight helps prepare European and Canadian industry stakeholders to seize related market opportunities. 

Learn more at https://connectivity.esa.int/optical-and-quantum-communications 

ABOUT THALES ALENIA SPACE

Drawing on over 40 years of experience and a unique combination of skills, expertise and cultures, Thales Alenia Space delivers cost-effective solutions for telecommunications, navigation, Earth observation, environmental management, exploration, science and orbital infrastructures. Governments and private industry alike count on Thales Alenia Space to design satellite-based systems that provide anytime, anywhere connections and positioning, monitor our planet, enhance management of its resources, and explore our Solar System and beyond. Thales Alenia Space sees space as a new horizon, helping to build a better, more sustainable life on Earth. A joint venture between Thales (67%) and Leonardo (33%), Thales Alenia Space also teams up with Telespazio to form the parent companies’ Space Alliance, which offers a complete range of services. Thales Alenia Space posted consolidated revenues of approximately €2.2 billion in 2023 and has around 8,600 employees in 8 countries with 16 sites in Europe.

/sites/default/files/database/assets/images/2022-10/New_Banner.jpg 14 Feb 2025 Thales Alenia Space Type Press release Structure Space Thales Alenia Space will develop the world’s first all-optical, multi-orbit optical space communication network ESA’s HydRON project will meet the challenge of bringing connectivity to multiple users to showcase the capabilities of optical communication tech... Hide from search engines Off Don’t overwrite with Prezly data Off Canonical url https://www.thalesaleniaspace.com/en/press-releases/thales-alenia-space-and-esa-sign-contract-hydron-demonstrate-first-multi-orbit

PingTalk

AI Alone Isn’t the Answer to Fraud Prevention

AI alone won’t stop fraud. Learn why a hybrid approach—blending AI, identity verification, and adaptive security—is the key to protecting customers and reducing risk.

FindBiometrics

SaaS Growth and Identity Business Progress Drive Mitek’s Fiscal Q1

Mitek Systems’ first quarter fiscal 2025 financial results show flat year-over-year revenue of $37.3 million, with notable growth in its software-as-a-service (SaaS) offerings and identity verification business. The company’s SaaS […]
Mitek Systems’ first quarter fiscal 2025 financial results show flat year-over-year revenue of $37.3 million, with notable growth in its software-as-a-service (SaaS) offerings and identity verification business. The company’s SaaS […]

Socure Launches ‘Transformational’ RiskOS Platform

Socure has announced the general availability of RiskOS, a new risk decisioning engine that combines the company’s identity verification and fraud prevention capabilities with Effectiv’s orchestration technology, following its $136 […]
Socure has announced the general availability of RiskOS, a new risk decisioning engine that combines the company’s identity verification and fraud prevention capabilities with Effectiv’s orchestration technology, following its $136 […]

Herond Browser

Why Location Not Available? Troubleshooting Common Errors

Experiencing “Location not available” errors can be frustrating, especially when you’re trying to use location-based services like Find My on iPhone or access drives and folders on Windows. Fortunately, these issues are usually easy to fix with a few simple steps. In this guide, we’ll explore the causes of “Location not available” errors and how […] The post Why Location Not Available? Troublesh

Experiencing “Location not available” errors can be frustrating, especially when you’re trying to use location-based services like Find My on iPhone or access drives and folders on Windows. Fortunately, these issues are usually easy to fix with a few simple steps. In this guide, we’ll explore the causes of “Location not available” errors and how to resolve them on both iPhones and Windows 10/11 devices.

Learn more: How to stop phone from overheating

What is the “Location Not Available” Error?

The “Location not available” error occurs when a device cannot accurately determine or share its location. On iPhones, this typically appears in the Find My app when location data cannot be accessed due to issues like weak GPS signals, poor internet connectivity, or disabled location sharing. On Windows 10 and 11, this error often happens when the system can’t access the specified drive or folder, disrupting your ability to use or retrieve data from external drives.

Resolving this error is crucial for maintaining seamless device functionality, especially for users who rely on location-based apps or need access to important files on their PC.

Learn more: Step-by-Step Guide: How to Hide Apps on iPhone

Causes of “Location Not Available” Errors

Understanding what causes these errors can help you find the right solution. Here are some common reasons for the “Location not available” issue:

On iPhone: Weak or Disabled GPS Signal: GPS is essential for accurate location sharing. If the GPS signal is weak or turned off, location tracking won’t work properly. Unstable Internet Connection: Without a stable Wi-Fi or cellular connection, location services (like Find My) can’t function. Low Battery or Power Saving Mode: Low power can disable certain functions like location sharing. If Low Power Mode is on, this might limit location tracking. Location Sharing Turned Off: If you or the person you’re tracking has disabled location sharing, you won’t be able to see their location. Incorrect Date or Time Settings: Incorrect date or time settings can interfere with location accuracy. This is an often overlooked but important factor. On Windows 10/11: Unstable or Unrecognized Drive Connection: If an external drive is improperly connected, the system may fail to recognize it, causing the “Location not available” error. Corrupted System Files: Damaged system files may prevent access to drives or folders, triggering this error. Restricted Access Permissions: If the necessary access permissions are not granted to drives or folders, Windows won’t be able to access them. Faulty USB Ports or Hardware: Problems with USB ports or external hardware can stop the system from detecting external devices, leading to access issues. How to Fix “Location Not Available” Errors on iPhone

Here are some quick fixes for resolving “Location not available” on iPhone:

Check GPS and Signal Strength Go to Settings > Privacy > Location Services and make sure GPS is enabled. If the GPS signal is weak, move to an area with better reception.
Ensure Stable Internet Connection Check if your iPhone is connected to Wi-Fi or cellular data. If the connection is unstable, try reconnecting or switching to a different network.
Turn Off Power Saving Mode When the battery is low, certain features like location sharing might be disabled. Check if Low Power Mode is on and disable it to restore full functionality.
Restart Your Device and the Find My App Closing and reopening the Find My app or restarting your device can sometimes fix minor issues with location services.
Update iOS Ensure your iPhone is running the latest version of iOS, as updates often fix bugs and improve performance related to GPS and location sharing. How to Fix “Location Not Available” Errors on Windows 10/11

If you’re facing “Location not available” on Windows, follow these steps:

Check Drive Connection and Permissions Make sure the drive is properly connected to your computer. If you’re using a USB drive, try a different port or cable. Additionally, verify that you have the necessary permissions to access the drive.
Restart Windows Explorer Sometimes, the issue can be related to Windows Explorer. Open Task Manager (Ctrl + Shift + Esc), locate Windows Explorer, right-click, and select Restart.
Grant Full Access to the Drive If access is restricted, go to the drive’s Properties > Security > Edit, then select Full control and click Apply to enable full access.
Use SFC and DISM to Repair System Files Corrupted system files might be causing the error. Open Command Prompt as an administrator and run the following commands:
sfc /scannow (System File Checker) DISM /Online /Cleanup-Image /CheckHealth DISM /Online /Cleanup-Image /RestoreHealth 4 Tips to Prevent “Location Not Available” Errors

To reduce the chances of encountering “Location not available” errors, here are some simple yet effective tips:

Ensure a Stable Internet Connection: A reliable internet connection is essential for location services to function correctly. Whether on Wi-Fi or cellular data, make sure your connection is strong. If you experience weak signals, try moving to an area with better coverage or switch networks. Regularly Check and Enable GPS: GPS is vital for accurate location tracking. Always ensure that your GPS is turned on, especially when using location-based apps. You can check and enable GPS in your device settings to keep it active. Verify System Settings: Incorrect date and time settings can interfere with location services. Ensure your device’s time is set to update automatically. Also, turn off power-saving modes that may limit the functionality of GPS or network connections. Keep Software and Apps Updated: Software and app updates often include bug fixes and performance improvements. Make sure both your device’s operating system and apps are regularly updated to avoid any location service glitches.

By following these simple steps, you can prevent future location errors and ensure smooth functionality with location-based services.

Conclusion

“Location not available” errors can disrupt important functions like location tracking and file access, but they are typically easy to fix. By following the steps above, you can resolve these errors quickly and improve your device’s overall performance. Remember to check your connections, ensure GPS is functioning properly, and keep your system and apps up to date to avoid future issues.

Learn more: How to Turn on Safe Mode on Android to Troubleshoot Issues

About Herond Browser

Herond Browser is a cutting-edge Web 3.0 browser designed to prioritize user privacy and security. By blocking intrusive ads, harmful trackers, and profiling cookies, Herond creates a safer and faster browsing experience while minimizing data consumption.

To enhance user control over their digital presence, Herond offers two essential tools:

Herond Shield: A robust adblocker and privacy protection suite. Herond Wallet: A secure, multi-chain, non-custodial social wallet.

As a pioneering Web 2.5 solution, Herond is paving the way for mass Web 3.0 adoption by providing a seamless transition for users while upholding the core principles of decentralization and user ownership.

Have any questions or suggestions? Contact us:

On Telegram https://t.me/herond_browser DM our official X @HerondBrowser Technical support topic on https://community.herond.org

The post Why Location Not Available? Troubleshooting Common Errors appeared first on Herond Blog.


Ton Bridge: Your Gateway to The Open Network

TON Bridge is revolutionizing how crypto enthusiasts bridge assets to The Open Network (TON) and other major blockchains. With its user-friendly interface, low fees, and seamless integration with Telegram, TON Bridge is quickly becoming the go-to tool for crypto transfers. Whether you’re interested in exploring TON’s decentralized finance (DeFi) ecosystem or simply looking for an […] The post To

TON Bridge is revolutionizing how crypto enthusiasts bridge assets to The Open Network (TON) and other major blockchains. With its user-friendly interface, low fees, and seamless integration with Telegram, TON Bridge is quickly becoming the go-to tool for crypto transfers. Whether you’re interested in exploring TON’s decentralized finance (DeFi) ecosystem or simply looking for an efficient way to move assets across blockchains, TON Bridge provides a fast and cost-effective solution. In this guide, we’ll explore how to use TON Bridge, its unique advantages, and pro tips to make your cross-chain transactions even more efficient.

Learn more: What is a Blockchain Explorer and How Does It Work?

What is TON Bridge? 

TON Bridge is a powerful tool that enables seamless cross-chain transactions between The Open Network (TON) and other blockchains like Ethereum, Binance Smart Chain (BSC), and more. It allows users to move assets, such as Toncoin (TON), USDT, and other supported tokens, across different networks with ease.

By using TON Bridge, crypto enthusiasts can bypass the complexities of traditional exchanges and avoid the hefty fees associated with them. Whether you’re bridging assets for decentralized finance (DeFi) applications or simply exploring the TON ecosystem, the process is fast, secure, and cost-effective. You just need to connect your wallet, choose the tokens you wish to bridge, and confirm the transfer.

An example? Let’s say you’re holding USDT on Ethereum but want to take advantage of TON’s low fees and fast transactions. With TON Bridge, you can easily move your USDT to TON, opening up access to Telegram-based wallets and TON’s growing DeFi ecosystem. This streamlined process is why TON Bridge is becoming a go-to solution for those looking to leverage TON’s unique advantages.

Learn more: What Are Dapps and Why Are They Important in Web3?

TON Network: The Ultimate Blockchain for Speed & Scalability

The Open Network (TON) is a decentralized blockchain designed by the creators of Telegram to handle high-speed, scalable transactions. It processes millions of transactions per second while ensuring decentralization and security. TON offers a faster, cheaper alternative to other blockchains, making it perfect for decentralized finance (DeFi), gaming, and everyday crypto transactions.

TON is a full ecosystem that includes DeFi protocols, decentralized applications (dApps), NFT marketplaces, and Telegram integration. With a growing user base and vibrant community, TON is reshaping the crypto space, offering a seamless experience for managing assets and exploring decentralized opportunities.

Why TON Bridge is Your Go-To Tool for Seamless Crypto Transfers

When it comes to transferring assets across blockchains, flexibility, speed, and low fees are key. TON Bridge delivers all of that and more, allowing users to easily bridge their tokens to and from TON. Here’s why it’s quickly becoming the go-to solution for seamless crypto transfers.

Unlock Cross-Chain Power

TON Bridge allows you to transfer assets between TON and popular blockchains like Ethereum and BSC. In fact, TON Bridge supports cross-chain transactions for several assets, including Toncoin and USDT. This flexibility is crucial, as it enables users to tap into the full potential of TON’s ecosystem while still benefiting from other major blockchain networks.

Fast, Affordable, and Secure

TON Bridge ensures that transfers are processed in seconds, with typical transaction times ranging from 5-10 minutes depending on network congestion. On top of that, users enjoy minimal fees, often a fraction of what you’d pay on Ethereum. For example, transferring assets to TON usually incurs a fixed 1 TON fee, plus minimal gas costs, making it far cheaper compared to Ethereum’s gas fees which can skyrocket during peak times.

Telegram Integration: A Game-Changer

With TON’s Telegram integration, users can manage their crypto directly through the Telegram app—simplifying both everyday transactions and larger transfers. With over 500 million active users on Telegram, this seamless integration provides a unique, user-friendly experience that no other blockchain offers. You can send, receive, and store your crypto in Telegram’s native wallet, making it as easy as sending a text message.

Bridging Assets to TON: A Step-by-Step Guide to Getting Started

Transferring assets to TON can be quick and easy when you follow the right steps. Whether you’re new to the TON ecosystem or a seasoned crypto user, this step-by-step guide will help you bridge assets seamlessly and securely.

Step 1: Get Your Wallets Ready

Before you begin, make sure you have the right wallets set up. You’ll need a TON wallet like Tonkeeper or Telegram Wallet, and a Web3 wallet (like MetaMask) for the blockchain you’re bridging from (e.g., Ethereum, BNB). Having both wallets ready ensures a smooth transfer process.

Step 2: Connect Your Wallet to TON Bridge

Once your wallets are set up, head to the TON Bridge website. Click “Connect Wallet,” select your wallets for both the source and destination blockchains, and authorize the connection. This will link your wallets to the TON Bridge, allowing you to start your transfer.

Step 3: Choose Your Token and Amount

Next, choose which token you want to transfer to the TON network. Select from supported tokens like USDT or Toncoin and input the amount you wish to transfer. The system will automatically calculate the equivalent value on TON for the selected token.

Step 4: Approve the Transaction and Confirm

Before finalizing the transfer, you’ll need to approve the transaction in your wallet. A prompt will appear to confirm the details of the transfer—double-check everything to ensure accuracy, then click “Approve.” This step is essential for authorizing the bridge to process your transaction.

Step 5: Paying Fees and Finalizing the Transfer

At this point, you’ll be prompted to pay any fees associated with the transfer. Expect a fixed 1 TON fee for bridging to the TON network, plus minimal network fees. Once you confirm the payment, the transaction will begin processing, typically within a few minutes.

Step 6: Receive Your Tokens in TON Wallet

Once the transaction is complete, check your TON wallet for the transferred assets. Your tokens should appear in your wallet, and you’re now ready to explore the full benefits of the TON ecosystem.

Extra Tip: Alternatives for Bridging

If you’re looking for other ways to transfer assets to TON, consider using alternatives like Symbiosis or Layerswap. These platforms support bridging from Ethereum, BNB, and other chains to TON with competitive fees and fast processing.

Pro Tips: Maximize Efficiency When Bridging to TON

When it comes to bridging assets to TON, timing and strategy can make a big difference. Here are some pro tips to help you save on fees and optimize your cross-chain transfers.

Save on Fees by Timing Your Transfers Right

One of the easiest ways to save on fees is to time your transfers wisely. Gas fees can vary depending on the time of day and network congestion. To minimize costs, consider making your transfers during off-peak hours—typically on weekends or late at night, when the Ethereum network is less congested. By avoiding peak hours, you can often save up to 30% on gas fees, making your bridge to TON even more cost-effective.

Optimizing Cross-Chain Transfers: A Pro’s Guide

To make your cross-chain transfers even easier and cheaper, consider using bridging platforms that offer low fees and fast processing times, like Symbiosis or Rubic. These platforms often provide optimized routes for asset transfers, ensuring the best rates by automatically selecting the most efficient bridge. Additionally, look for platforms that support multi-chain bridging, allowing you to transfer assets from multiple networks to TON in a single transaction—saving time and money. Keep an eye on any promotions or discounts offered by bridging services, as they can help reduce fees even further.

Learn more: The Impact of Web3 on Various Industries

Conclusion

TON Bridge offers a seamless and efficient way to bridge assets to the TON network, with a streamlined process that saves both time and money. With its ability to handle multiple blockchains, fast processing times, and low fees, TON Bridge is ideal for anyone looking to explore the TON ecosystem or engage in decentralized finance activities. Whether you’re a seasoned crypto user or just getting started, bridging to TON opens up a world of possibilities, from leveraging Telegram integration to accessing TON’s expanding DeFi applications. Take advantage of the flexibility and efficiency TON Bridge offers today.

Learn more: How to connect Ethereum with Other Blockchains

FAQs: All Your Burning Questions About TON Bridge Answered How to Bridge to TON?

Bridging to TON is simple and quick! Just follow these steps:

Set up your wallets—You’ll need both a TON wallet (like Tonkeeper or Telegram Wallet) and a Web3 wallet (like MetaMask) for the blockchain you’re bridging from. Connect your wallets—Head to the TON Bridge platform and link your wallets for both the source and destination blockchains. Choose your token and amount—Select which token (like USDT or Toncoin) you want to transfer and the amount you wish to move to TON. Approve and confirm—Authorize the transaction in your wallet, review the details, and approve the transfer. Pay fees—Expect a minimal 1 TON fee plus any gas fees. Receive your tokens—Once the transfer is complete, your tokens will appear in your TON wallet, ready to use. Can I Use USDT on TON?

Yes! After bridging USDT to the TON network, you can use it just like you would on any other blockchain. USDT on TON is perfect for fast, low-fee transactions, making it ideal for payments, DeFi, or simply holding within the ecosystem. To get started, bridge USDT from Ethereum or BNB to TON using TON Bridge, and once the transfer is complete, you’ll be able to use USDT directly within the TON ecosystem, including via the Telegram wallet.

How Do I Bridge Other Tokens to TON?

In addition to USDT, you can bridge various other tokens to TON, including USDC, DAI, and ETH. To bridge these tokens, simply select the token you want to transfer on the TON Bridge platform, enter the desired amount, and follow the same easy process as for USDT. Keep in mind that the available tokens may vary depending on the bridging platform you use, so always check compatibility before starting the transfer.

About Herond Browser

Herond Browser is a cutting-edge Web 3.0 browser designed to prioritize user privacy and security. By blocking intrusive ads, harmful trackers, and profiling cookies, Herond creates a safer and faster browsing experience while minimizing data consumption.

To enhance user control over their digital presence, Herond offers two essential tools:

Herond Shield: A robust adblocker and privacy protection suite. Herond Wallet: A secure, multi-chain, non-custodial social wallet.

As a pioneering Web 2.5 solution, Herond is paving the way for mass Web 3.0 adoption by providing a seamless transition for users while upholding the core principles of decentralization and user ownership.

Have any questions or suggestions? Contact us:

On Telegram https://t.me/herond_browser DM our official X @HerondBrowser Technical support topic on https://community.herond.org

The post Ton Bridge: Your Gateway to The Open Network appeared first on Herond Blog.


FastID

AI Innovation and Sustainability: Key Takeaways from the AI Action Summit

Delve into the highlights of the AI Action Summit in Paris, where experts addressed pressing issues in AI, including ethics, regulation, and the sustainability of technology.
Delve into the highlights of the AI Action Summit in Paris, where experts addressed pressing issues in AI, including ethics, regulation, and the sustainability of technology.

Super Bowl 2025: How Social Media Reacted in Real Time

Celebrate the success of Super Bowl LIX, the most-watched in history with 128 million viewers. Uncover the intriguing social media dynamics from this iconic event.
Celebrate the success of Super Bowl LIX, the most-watched in history with 128 million viewers. Uncover the intriguing social media dynamics from this iconic event.

Thursday, 13. February 2025

ComplyCube

Is Your KYC Provider “The One”?

It’s natural to question whether you’re happy in any relationship, even with your KYC provider. In this guide, we’ll dive into how to spot red flags within your platform, and how you can find the provider that's right for you. The post Is Your KYC Provider “The One”? first appeared on ComplyCube.

It’s natural to question whether you’re happy in any relationship, even with your KYC provider. In this guide, we’ll dive into how to spot red flags within your platform, and how you can find the provider that's right for you.

The post Is Your KYC Provider “The One”? first appeared on ComplyCube.


Thales Group

Thales, Amelia and Breakthrough Energy Contrails launch one of world's largest Contrail Avoidance campaigns

Thales, Amelia and Breakthrough Energy Contrails launch one of world's largest Contrail Avoidance campaigns prezly Thu, 02/13/2025 - 10:00 Thales, in collaboration with the airline Amelia, and Breakthrough Energy Contrails, announces the large-scale deployment of a contrail avoidance solution, which has already been tested on the flight routes from Paris and Valladolid (Spain).
Thales, Amelia and Breakthrough Energy Contrails launch one of world's largest Contrail Avoidance campaigns prezly Thu, 02/13/2025 - 10:00 Thales, in collaboration with the airline Amelia, and Breakthrough Energy Contrails, announces the large-scale deployment of a contrail avoidance solution, which has already been tested on the flight routes from Paris and Valladolid (Spain). Contrails are one the major challenges in the ecological transition in aviation and this initiative has helped avoid more than 20 tonnes of CO2 equivalent (CO2eq) in 2024, reducing the climate impact1 of each flight by up to 40%. By modifying the altitude of the planes rather than their lateral trajectory, the solution optimizes flight plans and thus limits the potential overconsumption of fuel to under 3%. Amelia plans to further expand this initiative in 2025, progressively applying it to most of its eligible flight operations, making this experiment one of the largest in the world. With this solution, Thales, a key player in more sustainable aviation, offers a systematic approach that can be quickly integrated by all airlines, seeking to reduce their environmental impact as of today.
Embraer ERJ145 ​ © Nuno SELETTI

Thales, in partnership with Amelia and Breakthrough Energy Contrails, takes a major step towards more environmentally friendly aviation, by implementing an innovative contrail avoidance solution.

Since June 2024, Thales' contrail avoidance solution has been deployed on all Paris-Valladolid flights operated by Amelia, using Embraer ERJ145 aircraft. This initiative is part of the DECOR project, supported by France's 2030 investment plan.

Contrails, the artificial clouds produced by aeroplanes, trap heat from the sun, playing a role similar to that of greenhouse gases and thus significantly contributing to global warming. The impact of contrails can represent a significant part of the total climate footprint of aviation, rivalling even that of CO2.

By integrating its solution with Amelia’s Operational Control Center (OCC) tools, Thales enables OCC operations agents to directly obtain alternative trajectories to their flight plans, combining controlled operational impact and a significant reduction in contrails.

When a significant impact of contrails is detected, the Thales solution, Flights Footprint, suggests flight alternatives that allow for a significant reduction in climate impact, with a minimum average decrease of up to 40% in the total climate impact of the flight. This flight optimization relies solely on adjustments to the aircraft's altitude, without changing their route, which helps to keep additional fuel consumption to below 3%.

 

Yannick Assouad, Executive Vice-President, Avionics, Thales said: “Thales' contrail avoidance solution is a first for France. It is fully aligned with Thales' strategy aiming to transform the aerospace industry towards a more environmentally-friendly future through technology, for more sustainable and responsible aviation”.

Based on proven scientific principles, this innovative solution utilizes the latest weather forecasts and the most advanced climate models provided by Breakthrough Energy Contrails to optimize the flight plan. At the end of each flight, these climate models, enriched by meteorological reanalysis data, are applied to the actual flight path of the aircraft to assess the effectiveness of avoiding contrail formation areas. Additionally, the installation of a ground camera, supplied by Reuniwatt, enables the solution's effectiveness to be validated through the direct observation of contrails, thanks to the analyses conducted in partnership with the digital services company SII.

This project has prevented an average of more than 4 tons of CO2 equivalent (CO2eq) per flight, initially affected by contrails. Amelia has decided to extend this system to eligible flights in 2025, becoming the first airline to systematically implement a contrail avoidance approach.

Adrien Chabot, Director of Sustainable Development at Amelia said: “Taking condensation trails into account allows for the analysis of the total climate impact of our operations and thus a better optimization of them. The challenge is to significantly and quickly reduce our impact on climate change by continuing the deployment of the Thales solution initiated in 2022. Today, it is probably one of the most promising approaches in terms of cost/benefit regarding climate impact.”

This solution, accessible and easily deployable, creates new horizons for all airlines, paving the way for more sustainable and responsible aviation on a global scale.

Matteo Mirolo, Head of Strategy at Breakthrough Energy Contrails said: "The impact of contrails on the climate, similar to that of CO2, is one of the major challenges of the ecological transition in aviation. We are delighted to collaborate with Thales to implement large-scale pilot avoidance campaigns, like this one done with Amelia, which are crucial when considering the eventual deployment of systematic avoidance measures."

1 Cumulative impact of CO2 and non-CO2 effects.

 

About Thales

Thales (Euronext Paris: HO) is a global leader in advanced technologies specialized in three business domains: Defence & Security, Aerospace, and Cyber & Digital.

It develops products and solutions that help make the world safer, greener and more inclusive.

The Group invests close to €4 billion a year in Research & Development, particularly in key innovation areas such as AI, cybersecurity, quantum technologies, cloud technologies and 6G.

Thales has close to 81,000 employees in 68 countries. In 2023, the Group generated sales of €18.4 billion.

 

About Amelia

A major player in the aviation industry in Europe and Africa since 1976, Amelia is a French aeronautics group that ensures flight operations and the monitoring and maintenance of its aircraft.

Amelia's fleet, consisting of 18 aircraft, meets the needs of its various activities, chartering on behalf of major international airlines, medical evacuations, and charter flights.

Amelia is a member of IATA since November 2022, endorsing the wider Fly Net Zero commitment to reach net zero emissions by 2050.

Press contact : communication@flyamelia.com

 

About Breakthrough Energy Contrails

Breakthrough Energy Contrails is a non-profit initiative aimed at transforming contrail research into climate action. 

Partnering with academic institutions, airlines, and technology companies, the team develops forecasting and flight planning tools to help airlines avoid high-impact contrail formation. 

As part of the Breakthrough Energy platform, the initiative integrates technology, operations, and policy expertise to deliver scalable solutions for a clean aviation future.

 

For more information, visit contrails.org.

/sites/default/files/prezly/images/%28c%29%20Nuno%20SELETTI.png Documents [Prezly] Thales, Amelia and Breakthrough Energy Contrails launch one of the world's largest Contrail Avoidance Campaigns.pdf Contacts Cédric Leurquin 13 Feb 2025 Type Press release Structure Aerospace Thales, in partnership with Amelia and Breakthrough Energy Contrails, takes a major step towards more environmentally friendly aviation, by implementing an innovative contrail avoidance solution. prezly_727851_thumbnail.jpg Hide from search engines Off Prezly ID 727851 Prezly UUID d6edb7ba-000f-4c65-b818-ee6580978690 Prezly url https://thales-group.prezly.com/thales-amelia-and-breakthrough-energy-contrails-launch-one-of-worlds-largest-contrail-avoidance-campaigns Thu, 02/13/2025 - 11:00 Don’t overwrite with Prezly data Off

PingTalk

Why Identity & Fraud Teams Must Unite

Fraud starts with identity. Learn why IAM and fraud teams must unite to stop threats earlier, reduce risk, and create seamless, secure customer experiences.

Identity and fraud are two sides of the same coin, and emerging technologies have made it impossible (and risky) to separate the two. Leveraging stolen credentials, synthetic identities, and artificial intelligence (AI), fraudsters are exploiting vulnerabilities across organizations with siloed identity and access management (IAM) and fraud functions. Account takeover (ATO) fraud surged by 354% in 2023 alone, underscoring the need for a unified approach. Addressing today’s threat environment requires identity and fraud teams to share insights and adopt integrated strategies that proactively stop fraud before it occurs. Collaboration is not just a technological necessity but a strategic imperative to protect organizations and their customers from increasingly sophisticated attacks.

Wednesday, 12. February 2025

auth0

Innovation Ignited: How to Start Your Digital Identity Management Journey

To meet innovation, experience, and security requirements, organizations must establish digital Identity strategies and implement them into every product and service.
To meet innovation, experience, and security requirements, organizations must establish digital Identity strategies and implement them into every product and service.

Innovation Ignited: How Development Leaders Make Authentication an Innovation Engine

Empower your team with a unified digital Identity strategy that includes intelligent, integrated auth capabilities that minimize risk while improving experience.
Empower your team with a unified digital Identity strategy that includes intelligent, integrated auth capabilities that minimize risk while improving experience.

Identity Security 101: How to Drive Trust and Loyalty across the User Journey

If you’re curious about how to stay ahead of increasingly sophisticated attacks without putting your business goals at risk with excessive friction, this resource is for you.
If you’re curious about how to stay ahead of increasingly sophisticated attacks without putting your business goals at risk with excessive friction, this resource is for you.

Indicio

What the European Digital Wallet means for business

The post What the European Digital Wallet means for business appeared first on Indicio.
Europe’s embrace of decentralized identity means significant cost savings for business and better customer experiences The European Union is laying the foundation for the mass digitalization of business and social life for over 450 million people with open-source specifications for a European digital identity (eIDAS 2.0) and digital identity wallet (EUDI). The identities and wallets built from these specifications and standards will, eventually, enable European citizens, businesses, and organizations to securely share and prove information about themselves in privacy-preserving ways across each of the 27 member states. 

By Trevor Butterworth

What does this mean for business?

There are two dimensions to how EUDI will impact business:

Interaction with the government.

Interaction with customers (whether B2B or B2C).

Interaction with government

The scale of the EU’s digital ambitions are already driving global adoption of decentralized identity; countries want to be digitally compatible with what emerges so as to ensure frictionless interaction, whether in trade or travel.

But at the same time, many countries have already adopted similar decentralized solutions, some of which are far ahead of Europe in deployment and offer much greater functionality to users (due to more advanced decentralized identity specifications).

The best way for a company, an industry, or a sector to see what the immediate impact of EUDI will look like is to look at Canada, where the Government of British Columbia’s implementation of “digital trust” through Verifiable Credentials has reduced paperwork and increased efficiency for business.

A good starting point is login. A company with a decentralized digital identity no longer needs to use a login and password to access government services, thereby significantly reducing the company’s and the government’s exposure to identity theft and fraud while improving user experience.

Government, in turn, can issue credentials for business registration, business addresses certifications, licenses, permits — the whole range of paper-based authorization and proof — in the form of tamper-free credentials, which a company can then use and reuse whenever it needs to prove that it has the requisite documentation for a particular activity. The goal: eliminate paperwork and duplication with information that can be instantly authenticated.

With the ability to create verifiable documents comes the ability to sign these documents in the same verifiable way. For example, with a verifiable credential, a business can digitally sign an application for a license in a way that a) automatically ingests the requisite authenticated data from the credential, thereby reducing friction and manual data entry error, and b) signs the application in a legally-binding unalterable way.

The government of British Columbia has also created OrgBook as a verifiable repository of information about businesses registered in the Canadian province.

In sum, EUDI and eIDAS represent a significant opportunity to reduce the costs of compliance by creating authoritative and verifiable business data that can be seamlessly reduced. For data and regulation-intensive sectors, this represents a significant opportunity to reduce costs and make the business of setting up and running a business much more efficient.

Interaction with customers

The immediate advantage to decentralized digital identities is that you really will be able to know that your customer is your customer. By enabling people and organizations to hold their identity data, share this data securely, and have it easily, instantly, proved cryptographically, decentralized identity removes a critical security weakness in current digital authentication: the centralized database filled with personal data.

If you don’t have to store personal data to verify a digital identity, it can’t be stolen and you eliminate a security cost. It also means you can provide seamless access to a resource or service without the need for customers or users to create identity accounts with logins and passwords, a key attack vector for phishing and a key friction point for users (no more MFA). And if you no longer have to store personal data in order to make your business work, you’ve just radically simplified compliance with the numerous directives from GDPR on data minimization and privacy. You’re happy, your customers are happy — rarely is there a technology where everyone comes out as a winner.

These are the immediate benefits and the impact will be felt most in fraud reduction and better customer and user experiences. But remember, you can create Verifiable Credentials for multiple kinds of data and not just personal data. How about Verifiable Invoices to simplify invoicing and tackle invoice fraud? You could cryptographically prove in an instant that every invoice was authentic, came from a legitimate supplier, and had not been altered. A simple use case to implement, simple to use, and it solves a systemic problem.

And if you can manage invoices, you can manage payments. Remember, if you can trust the identity and the data presented from a Verifiable Credential, you can immediately act on the data. Seamless authentication and seamless payments create trust networks that eliminate the need for intermediaries and enable you to scale business in a way that current technology can not. This has significant revenue saving and creating implications.

Exciting! So what do you do now? 

Enter the market by building quickly and then scale your solution when you need to. And you can do this easily and cost-effectively with Indicio Proven.

Indicio Proven is the most flexible system for implementing decentralized identity and Verifiable Credentials. We’ve made Proven eIDAS 2.0 and EUDI compatible, so you now get Europe in addition to the leading formats and protocols used by the rest of the world.

We’ve also made it easy to combine credential formats in a single digital wallet for a continuous workflow, so you can leverage Indicio Proven’s interoperability to go from anywhere to everywhere.

Why Indicio? We are masters of scale, battle tested in global deployments. With Indicio Proven you can be up and using Verifiable Credentials in hours and implement a country-level solution in a matter of days.

And because we’ve been leading the world in building award-winning, enterprise-grade decentralized identity solutions. We’ve got everything you need to go straight to building a solution for your customers instead of embarking on a long, costly learning curve to build all the components from scratch.

There’s going to be a cascade

The value props of this technology are not imaginary. Here’s what Gartner’s Market Guide from 2024 had to say

Decentralized identity for “identity verification, account takeovers, fraud, privacy and security… represents magnitudes of improvement in terms of efficiency, cost and assurance.”

At some point, incremental development and deployment turns into a cascade. The shift to an architecture of portable digital trust changes the fundamentals in how we share and consume information. Seamless authentication reduces the cost and drag of uncertainty in an information-driven economy. The question is if you don’t start now, will you be able to catch up to those who do.

Contact us now to see a demo and discuss your European digital identity strategy!

###

Sign up to our newsletter to stay up to date with the latest from Indicio and the decentralized identity community

The post What the European Digital Wallet means for business appeared first on Indicio.


auth0

Building a Secure RAG with Python, LangChain, and OpenFGA

Learn how to use Okta FGA to secure your LangChain RAG agent in Python.
Learn how to use Okta FGA to secure your LangChain RAG agent in Python.

Safle Wallet

Making the Web2 to Web3 Transition Smoother for Developers

Bridging the Gap For developers looking to build in Web3, the transition from Web2 can feel like stepping into an uncharted territory. While decentralization unlocks incredible possibilities, it also introduces unfamiliar complexities, fragmented tooling, and new security paradigms that can slow down innovation and adoption. 🛠 The Developer Struggles in Web3 Web2 development has long
Bridging the Gap

For developers looking to build in Web3, the transition from Web2 can feel like stepping into an uncharted territory. While decentralization unlocks incredible possibilities, it also introduces unfamiliar complexities, fragmented tooling, and new security paradigms that can slow down innovation and adoption.

🛠 The Developer Struggles in Web3

Web2 development has long been streamlined with centralized hosting, standardized SDKs, and predictable infrastructure.

Web3, on the other hand, presents a maze of challenges:
Burner Wallets & User Retention — Temporary wallets lead to high churn rates, making it difficult for developers to retain users.
Fragmented Infrastructure — No single framework exists; developers must juggle multiple chains, protocols, and standards.
Gas Fees & Transaction Friction — Onboarding users comes with the burden of explaining gas fees, network congestion, and transaction speeds.
Security & Custody Dilemmas — Self-custody is empowering, but it also places greater responsibility on developers to ensure key management solutions are secure and user-friendly.
Developer Tooling Gaps — Compared to Web2, Web3 lacks a polished, standardized stack, making it harder to ship production-ready applications efficiently.
How Web3 Can Make Onboarding Developers Easier?🤔

💡 If Web3 is to reach mass adoption, we need to lower the barriers for developers by addressing key inefficiencies:

🎯 Unified Developer Tooling — Simplified SDKs, modular APIs, and cross-chain compatibility to reduce friction in building dApps.
🎯 Abstracting Complexity — Gasless transactions, account abstraction, and streamlined wallet UX to eliminate unnecessary hurdles for both devs and users.
🎯 Scalability Without Trade-offs — Optimized rollups, L2 solutions, and auto-scaling infrastructure to ensure smooth, high-performance applications.
🎯 Security-First Design — Better frameworks for key management, on-chain security, and phishing protection to enhance developer confidence.
🎯Bridging Web2 Standards — Making the transition easier by integrating familiar Web2 authentication models (OAuth, SSO) with decentralized identity systems.
🌍 The Future: A Frictionless Web3 for Builders

Developers shouldn’t have to choose between innovation and usability. The goal should be a Web3 ecosystem that feels as intuitive and powerful as Web2, without sacrificing decentralization. The real Web3 revolution will come when builders can focus on creating great products without the unnecessary headaches.

The next wave of Web3 adoption starts with better developer experiences. Let’s make Web3 as seamless as it is powerful.

Team Safle ✨


Thales Group

Thales to maintain Royal Navy ships and submarines communications

Thales to maintain Royal Navy ships and submarines communications prezly Wed, 02/12/2025 - 13:21 Defence Equipment & Support (DE&S) has awarded Thales in the UK a major contract to maintain the Royal Navy’s internal and external fleet communications and provide global 24/7 support operations for the next 10 years. This investment is one of the largest in naval communicat
Thales to maintain Royal Navy ships and submarines communications prezly Wed, 02/12/2025 - 13:21 Defence Equipment & Support (DE&S) has awarded Thales in the UK a major contract to maintain the Royal Navy’s internal and external fleet communications and provide global 24/7 support operations for the next 10 years. This investment is one of the largest in naval communications across Europe. The announcement for Maritime Communications Capability Support (MCCS) secures around 100 high skilled UK jobs sustained.
©CrownCopyright

The Royal Navy’s fleet communications systems are being maintained to support combat capability after one of the largest investment in naval communications across Europe. The announcement for Maritime Communications Capability Support (MCCS) secures around 100 high skilled jobs at Thales and the new arrangements are estimated to save the Royal Navy up to £30m in through life costs over the next decade.

Communications systems on Royal Navy Units are a critical component of a platform’s ability to operate and fight; any failure or degradation of these systems places significant risk on the Royal Navy’s ability to fulfil Defence Outcomes. To meet and sustain global Royal Navy operational commitments requires resilient and enduring support contracts to maintain mission critical equipment at the highest levels of operational capability and availability.

The MCCS arrangement replaces the previous Fleetwide Communications contract which Thales in the UK has overseen for the past seven years.

Thales in the UK will also provide “waterfront” office services, obsolescence recovery for aging equipment and inventory management, ensuring spare part availability and ongoing defect repairs as required.

A key element to the contract is the slashing of red tape through closer collaboration between DE&S, the Royal Navy, and Thales in the UK, effectively delivering a “one defence” team which massively reduces bureaucracy while boosting efficiency. Thales in the UK is awarded the freedoms and autonomy to make informed decisions on equipment replacement to sustain capability long-term to the benefit of the Royal Navy.

Commodore Phil Game, Director of Sense, Decide & Communicate at DE&S, said: “First and foremost, this announcement ensures the Royal Navy continues to have effective and secure communications equipment with continuous support from Thales, which has Europe’s largest team of marine communications engineers, supporting its vital work keeping the UK and our allies safe. Crucially, we have looked at outcomes from other successful defence programmes and applied the lessons learned from those, in particular cutting unnecessary red tape and bureaucracy allowing Thales much more freedom to get the job done. We estimate that the scope of this contract will save between £25m and £30m in through life costs to the Royal Navy over the 10-year support period by working in a much more collaborative way with Thales in the UK, underlining our ‘one defence’ philosophy.”

Phil Siveter, CEO Thales in the UK, said: “At Thales we are delighted to continue supporting the Royal Navy in its vital mission to protect our nation. This long-term fleetwide support framework reflects our unwavering commitment to ensuring the Royal Navy remains combat-ready and equipped with world-class communications capabilities, today and into the future. Building on seven years of trusted partnership, we are proud to provide the technical excellence and on-the-ground support that keeps ships, submarines and installations operational and mission-ready. By working as ‘one team’ across the Naval Enterprise, we are driving innovation and systems integration to place the Royal Navy at the cutting edge of defence technology for the next decade.”

About Thales

Thales (Euronext Paris: HO) is a global leader in advanced technologies specialized in three business domains: Defence & Security, Aerospace, and Cyber & Digital.

It develops products and solutions that help make the world safer, greener and more inclusive.

The Group invests close to €4 billion a year in Research & Development, particularly in key innovation areas such as AI, cybersecurity, quantum technologies, cloud technologies and 6G.

Thales has close to 81,000 employees in 68 countries. In 2023, the Group generated sales of €18.4 billion.

/sites/default/files/prezly/images/Generic%20banner%20option%202_6.png Documents [Prezly] Thales to maintain Royal Navy ships and submarines communications.pdf Contacts Cédric Leurquin 12 Feb 2025 Type Press release Structure Defence and Security Defence The Royal Navy’s fleet communications systems are being maintained to support combat capability after one of the largest investment in naval communications across Europe. The announcement for Maritime Communications Capability Support (MCCS) secures around 100 high skilled jobs at Thales and the new arrangements are estimated to save the Royal Navy up to £30m in through life costs over the next decade. prezly_729128_thumbnail.jpg Hide from search engines Off Prezly ID 729128 Prezly UUID 72c0ae8d-35f2-49e7-8610-3a9f9fd8e0ae Prezly url https://thales-group.prezly.com/thales-to-maintain-royal-navy-ships-and-submarines-communications Wed, 02/12/2025 - 14:21 Don’t overwrite with Prezly data Off

Ocean Protocol

Season 10 of the Ocean Zealy Community Campaign!

We’re happy to announce Season 10 of the Ocean Zealy Community Campaign, an initiative that has brought together our vibrant community and rewarded the most active and engaged members. 💰 Reward Pool 5,000 ($FET) tokens that will be rewarded to the Top100 users in our leaderboard 🚀 📜Program Structure Season 10 of the Ocean Zealy Community Campaign will feature more engaging tasks and

We’re happy to announce Season 10 of the Ocean Zealy Community Campaign, an initiative that has brought together our vibrant community and rewarded the most active and engaged members.

💰 Reward Pool

5,000 ($FET) tokens that will be rewarded to the Top100 users in our leaderboard 🚀

📜Program Structure

Season 10 of the Ocean Zealy Community Campaign will feature more engaging tasks and activities, providing participants with opportunities to earn points. From onboarding tasks to Twitter engagement and content creation, there’s something for everyone to get involved in and earn points and rewards along the way.

⏰Campaign Duration: 12th of February — 14th of March 12:00 PM UTC

🤔How Can You Participate?

Follow this link to join and earn:

https://zealy.io/cw/oceanprotocol/questboard

Season 10 of the Ocean Zealy Community Campaign! was originally published in Ocean Protocol on Medium, where people are continuing the conversation by highlighting and responding to this story.


Shyft Network

Shyft Network Expands India Presence with Unitic Partnership

Shyft Network continues to expand its presence in India’s crypto market, announcing a new partnership with Unitic for the integration of Veriscope’s compliance solutions. The partnership comes as India’s crypto sector continues to develop, blending traditional finance practices with digital asset innovation in one of the world’s most dynamic trading environments. By integrating Veriscope’s Travel

Shyft Network continues to expand its presence in India’s crypto market, announcing a new partnership with Unitic for the integration of Veriscope’s compliance solutions. The partnership comes as India’s crypto sector continues to develop, blending traditional finance practices with digital asset innovation in one of the world’s most dynamic trading environments.

By integrating Veriscope’s Travel Rule solution and User Signing functionality, Unitic joins other Indian exchanges in strengthening the country’s crypto trading environment. The implementation addresses the need for robust compliance solutions that work in harmony with local trading dynamics, while ensuring users benefit from enhanced security features.

Zach Justein, Veriscope co-founder, reflects on the partnership:
India’s crypto microclimate represents a unique convergence of technological adaptability and market potential. Unitic’s integration of Veriscope shows a deep understanding of where the market is heading — towards a future where compliance enhances rather than hinders trading efficiency. This partnership recognizes India’s distinctive position in global crypto while ensuring its traders operate within a secure framework.

The phased integration will establish secure channels for VASP counterparty discovery and information exchange, essential components of FATF Travel Rule compliance. User Signing capabilities will further enhance the security framework, particularly for transactions involving non-custodial wallets.

As the implementation progresses, both teams remain committed to maintaining the seamless trading experience that Unitic’s users value while introducing advanced compliance capabilities that will benefit the broader ecosystem.

About Unitic
Unitic is a pioneering Web3 firm at the forefront of revolutionizing the crypto landscape in India. The platform offers seamless trading of various cryptocurrencies and fiat pairs, including INR, with a focus on providing a secure and user-friendly experience. Committed to transparency and regulatory compliance, Unitic maintains strict adherence to Know Your Customer (KYC) norms while prioritizing the safety of users’ funds and information. The platform features streamlined INR deposits and withdrawals, robust security protocols, and responsive customer support, making it an ideal choice for both experienced traders and newcomers to the crypto space.

About Veriscope
Veriscope, the compliance infrastructure on Shyft Network, empowers Virtual Asset Service Providers (VASPs) with the only frictionless solution for complying with the FATF Travel Rule. Enhanced by User Signing, it enables VASPs to directly request cryptographic proof from users’ non-custodial wallets, streamlining the compliance process. Veriscope brings trust, security, privacy, and reliability to the crypto compliance process and is a go-to solution for the leading virtual asset service providers worldwide.

Shyft Network Expands India Presence with Unitic Partnership was originally published in Shyft Network on Medium, where people are continuing the conversation by highlighting and responding to this story.


Thales Group

Make in India: BEL delivers 7,000th transmit/receive module to Thales for Rafale RBE2 Radar

Make in India: BEL delivers 7,000th transmit/receive module to Thales for Rafale RBE2 Radar prezly Wed, 02/12/2025 - 09:38 Bengaluru, India, 12 February 2025: In line with the Make in India policy, Navratna Defence PSU Bharat Electronics Ltd (BEL) has manufactured the 7,000th T/R (transmit/receive) module for the RBE2 radar on-board the Dassault Aviation Rafale, and delivered it to
Make in India: BEL delivers 7,000th transmit/receive module to Thales for Rafale RBE2 Radar prezly Wed, 02/12/2025 - 09:38

Bengaluru, India, 12 February 2025: In line with the Make in India policy, Navratna Defence PSU Bharat Electronics Ltd (BEL) has manufactured the 7,000th T/R (transmit/receive) module for the RBE2 radar on-board the Dassault Aviation Rafale, and delivered it to Thales.

Thales is demonstrating its commitment to the Make in India policy through transfers of technology and production. This transfer has been growing since it was initiated in 2017 and has expanded both in scope and quantities.

Thales is an active stakeholder in the Make in India policy of the Indian Government. In November 2020, the first RBE2 AESA (active electronic scanning array) radar with a front end manufactured by BEL in India was delivered by Thales to Dassault Aviation. Four years later, BEL is pleased to announce that the 7,000th transmit/receive module has been produced and delivered to Thales. This is only an intermediate milestone of a long-term successful collaboration.

This Thales-BEL cooperation has been expanded with the start-of-the production of advanced technological microwave modules dedicated to the Rafale SPECTRA EW (Electronic Warfare) suite.

AESA RBE2

Specifically developed for Rafale, the RBE2 is the first in-service European AESA radar and has been combat proven on Rafale aircraft operated by the French Air Force and the French Navy. It was developed in close partnership with Dassault Aviation and the French Defence Procurement Agency (DGA) to meet the requirements of air forces, and uses innovative technologies to combine advanced fire control radar functions and target tracking capabilities. The T/R (transmit/receive) modules are key to the RBE2 radar’s active electronic scanning performance, enabling it to steer the radar beam with the speed of an electronic chip.

Building on Thales’s 50+ years of expertise with earlier generations of radars for combat aircraft, the RBE2 gives the Rafale a number of key advantages. Compared to radars with conventional antennas, the RBE2 delivers an unprecedented level of tactical situational awareness, faster detection and tracking of multiple targets, and can also implement several radar modes instantaneously.

"Thales and Bharat Electronics Limited are long-standing partners with several technological collaborations to their credit. The manufacturing of T/R modules by BEL for Thales’s RBE2 radar is a key reference, and the recent delivery of the 7,000th T/R module a remarkable milestone. This achievement not only reflects our collective commitment to 'Make in India' but also highlights the successful transfer of technology and production, with BEL meeting the highest international standards of industrial excellence. We will continue to develop cutting-edge technologies and strengthen local capabilities in India to further contribute to the Aatmanirbhar Bharat vision," said Pascale Sourisse, President & CEO, Thales International.

“We are proud to have successfully delivered the 7000th T/R module for the RBE2 radar to Thales. This marks a significant step in our partnership with Thales and underscores our dedication to enhancing India’s Defence capabilities. Through our close collaboration with Thales, we continue to implement world-class industrial practices and develop advanced technological expertise in line with the ‘Make in India’ initiative,” said Manoj Jain, Chairman & Managing Director, BEL.

About Thales

Thales (Euronext Paris: HO) is a global leader in advanced technologies specialising in three business domains: Defence, Aerospace, and Cyber & Digital.

It develops products and solutions that help make the world safer, greener and more inclusive.

The Group invests close to €4 billion a year in Research & Development, particularly in key innovation areas such as AI, cybersecurity, quantum technologies, cloud technologies and 6G.

Thales has close to 81,000 employees in 68 countries. In 2023, the Group generated sales of €18.4 billion.

About Thales in India

Present in India since 1953, Thales is headquartered in Noida and has other operational offices and sites spread across Delhi, Bengaluru and Mumbai, among others. Over 2200 employees are working with Thales and its joint ventures in India. Since the beginning, Thales has been playing an essential role in India’s growth story by sharing its technologies and expertise in Defence, Aerospace and Cyber & Digital markets. Thales has two engineering competence centres in India - one in Noida focused on Cyber & Digital business, while the one in Bengaluru focuses on hardware, software and systems engineering capabilities for both the civil and defence sectors, serving global needs.

About Bharat Electronics Limited

BEL, a Navratna PSU under the Ministry of Defence, Government of India, enjoys leadership position in the Defence / Strategic Electronics market in India. BEL is a multi-product, multi-technology, multi-Unit conglomerate which boasts of over 600 products in the areas of Radars & Fire Control systems, Weapon systems, Communication & Network Centric systems, Naval Systems, Electronic Warfare & Avionics, Electro Optics, Anti-submarine Warfare systems, Tank Electronics & Gun Upgrades, Homeland Security, civilian products and Strategic Components.

Some of the areas BEL is focussing as part of its diversification efforts include solutions for Civil Aviation, Unmanned systems, Railway & Metro systems, Network & Cyber Security, Smart City solutions, Space Electronics, Arms & Ammunition and Seekers, Medical Electronics and Artificial Intelligence. BEL is also a CMMi Level 5, ISO As-9100, ISO 27001-2013 (ISMS) certified and CERT-In empanelled agency.

 

PRESS CONTACTS

Thales, Communications in India

Pawandeep Kaur

+91 9990098828

pawandeep.kaur@thalesgroup.com

BEL, India

Corporate Communication

BEL-Corporate Office

Bengaluru, India

Hari Haran

+91 9008000514

media@bel.co.in

 

 

 

 

/sites/default/files/prezly/images/Generic%20banner%20option%202_5.png Contacts Cédric Leurquin 12 Feb 2025 Type Press release Structure Defence and Security Defence India Bengaluru, India, 12 February 2025: In line with the Make in India policy, Navratna Defence PSU Bharat Electronics Ltd (BEL) has manufactured the 7,000th T/R (transmit/receive) module for the RBE2 radar on-board the Dassault Aviation Rafale, and delivered it to Thales. prezly_729119_thumbnail.jpg Hide from search engines Off Prezly ID 729119 Prezly UUID 11e6936a-c7ac-4802-8b3e-aa98c6e71e74 Prezly url https://thales-group.prezly.com/make-in-india-bel-delivers-7000th-transmitreceive-module-to-thales-for-rafale-rbe2-radar Wed, 02/12/2025 - 10:38 Don’t overwrite with Prezly data Off

PingTalk

Dispelling the Myths: More Security vs. MFA Alone

More security steps don’t always mean better protection. Learn how adaptive security goes beyond MFA to stop fraud while keeping customer experiences smooth.

iComply Investor Services Inc.

The Future of KYB: Streamlined Verification for Seamless Business Transactions

KYB Made Easy: Streamlining Business Verification Discover how modern KYB technology is simplifying business verification, making it faster, more secure, and user-friendly. Learn how automated checks, biometric verification, and real-time compliance can benefit your business.

Mark is the founder of a growing logistics company, and after months of negotiation, he’s ready to seal a major partnership with a global distributor. But first, his company needs to undergo a Know Your Business (KYB) verification—a process he assumes will be long, tedious, and full of back-and-forth document requests.

Instead, Mark is about to experience how modern KYB technology makes business verification faster, simpler, and more secure.

A New Kind of KYB Process

In the past, Mark would’ve been asked to submit business registration papers, proof of ownership, and leadership information through email. On the other side, the distributor’s compliance team would spend days cross-checking everything manually, verifying documents, and screening for red flags.

This time, Mark receives a secure link to a KYB platform. The process is refreshingly simple:

Step 1: Mark enters his company’s registration number, and the system pulls verified data from official registries in seconds. Step 2: He completes a quick biometric verification using his smartphone to confirm that he’s the authorized representative. Step 3: The platform automatically runs global sanctions checks and searches for adverse media mentions.

By the time Mark finishes his morning coffee, the verification is done.

Instant Verification for Ownership and Key Personnel

KYB goes beyond company registration—it verifies who owns and controls the business. The platform prompts each key executive to complete their own ID verification remotely, ensuring they are who they claim to be.

Government-issued IDs are scanned and validated. Biometric liveness detection confirms that the individuals are physically present. The system’s secure, blockchain-backed ledger keeps records tamper-proof and ready for audits. Cross-Border Compliance in Real Time

Mark’s company operates internationally, which means regulatory checks across multiple jurisdictions. Thanks to automation, the KYB system:

Cross-references corporate filings from various countries. Screens against global sanctions and politically exposed persons (PEP) lists. Ensures that beneficial ownership is transparent and compliant with regulations.

What once took days of manual research now happens in minutes.

KYB as a Business Enabler

Instead of being a bottleneck, the KYB process becomes a point of confidence for Mark and the distributor. By verifying his company’s legitimacy quickly and securely, the deal moves forward without delays.

For growing businesses like Mark’s, digital KYB isn’t just about meeting regulations—it’s about building trust and accelerating partnerships. With tools that combine biometric verification, automated regulatory checks, and secure data management, KYB is transforming from a necessary step into a competitive advantage.

Mark signs the contract that same afternoon, knowing his company’s reputation is as solid as the deal itself.

For industries like real estate, insurance, and lending, digital KYB solutions offer more than regulatory compliance—they enhance transparency, strengthen relationships, and foster faster, safer transactions.


FastID

Key Trends in Edge Computing and AI Adoption: A Conversation with Google Cloud

Learn about the latest trends in edge computing, including insights from industry experts on how AI and modern CDNs are reshaping content delivery and user interaction.
Learn about the latest trends in edge computing, including insights from industry experts on how AI and modern CDNs are reshaping content delivery and user interaction.

Tuesday, 18. February 2025

SC Media - Identity and Access

Identity verification: The front line to workforce security

Here are four ways identity can strengthen workforce security.

Here are four ways identity can strengthen workforce security.


1Kosmos BlockID

Gartner’s Right: Why Workforce Identity Verification Can’t Wait

Gartner VP Analyst Akif Khan has good reason to believe workforce use cases for identity verification (IDV) will gain serious traction in 2025. Having received just five calls about the topic in the first five of his six years on Gartner’s IAM team, he reports there’s been a major spike in such queries in recent … Continued The post Gartner’s Right: Why Workforce Identity Verification Can’t Wait

Gartner VP Analyst Akif Khan has good reason to believe workforce use cases for identity verification (IDV) will gain serious traction in 2025. Having received just five calls about the topic in the first five of his six years on Gartner’s IAM team, he reports there’s been a major spike in such queries in recent months. In a January LinkedIn post, Kahn reveals the biggest drivers of client interest in workforce IDV are account recovery flows and employee onboarding.

It’s easy to see why. Thanks to high-profile data breaches at MGM and Caesars, IT service desks have become prime targets for fraudsters impersonating employees seeking assistance with a password reset and account recovery. In these “vishing” scams, information gleaned from employee social media profiles can help hackers fool overworked IT service desk personnel into granting them unfettered access to corporate systems.

Meanwhile, more than 100 US companies in aerospace, defense, retail, and technology have fallen prey to North Korean nation-state attackers leveraging falsified identity information and deepfake technology to gain employment in remote IT positions from which they can exfiltrate data and conduct espionage. Even though technology to prevent such incursions is readily available, the frequency and severity of successful attacks keep growing.

Workforce Wake-up Call: The IDV Imperative

Whether it’s the service desk or employee onboarding, the cost of doing nothing about workforce IDV can be catastrophic. Once fraudsters have infiltrated corporate systems, they are free to escalate their access privileges, steal valuable data and source code, deploy crippling ransomware, and more.

Ransomware exposure costs US businesses an estimated $124 billion annually, and 35% of victim organizations never retain their data. And that’s just the start of the pain. A year after the February 2024 ransomware attack on UnitedHealth, the $22 million ransom was nothing compared to the $3.09 billion in total financial losses stemming from the incident.

Meanwhile, the average cost of a data breach topped $4.88 million in 2024—$9.48 million for US-based organizations. But according to PwC, 27% of companies worldwide, and 34% of companies in North America, have suffered a data breach that cost them between $1 million and $20 million in the past three years. As much as 44% of organizations hit by an identity-related breach estimated the associated costs exceed those of a typical data breach.

In the case of North Korea’s operatives, fraudulent employees who passed background checks, reference verifications, and rounds of Zoom interviews performed job tasks while installing remote monitoring and management (RMM) tools to establish a persistent presence within compromised networks. Others worked to exfiltrate data stored in OneDrive, SharePoint, and other cloud-based systems.

With help desk attacks, the ever-growing attack surface of outsourced IT support and call center operations crewed by less experienced, often short-term employees make these organizations especially vulnerable to vishing. Emerging, AI voice-enabled attack modalities only make matters worse

Hope Is Not a Strategy: Balancing Security, Cost, and UX

Put it all together, and it’s no wonder Khan is fielding more questions about workforce IDV. And in his post, he asks the exact right questions: “Will organizations see the value in using IDV for these workforces use cases? Do they see the cost and challenges to the UX as proportionate to the risks being mitigated? And do they feel confident that IDV can mitigate those risks?”

As I mentioned, technologies to effectively address these use cases are widely available today. Organizations sourcing solutions are likely to find these same technologies prompt answers to Khan’s other questions in the affirmative.

The problem today is that HR departments and IT service desk operations with remote workers tend to rely on antiquated identity verification processes that rely on manual review of government-issued credentials shared in the clear via email and SMS messaging. High-quality fake credentials and deepfake technologies easily defeat these measures. Traditional forms of multifactor authentication (MFA) aren’t much help. Fraudsters increasingly demonstrate the ability to compromise SMS-based codes and push notifications through social engineering, SIM swapping, and other techniques.

Many forms of biometric authentication aren’t foolproof either. Anyone with administrative access can register things like user biometrics to any device they access—or set up an alternative identity provider to bypass authentication measures all together. These technologies aren’t always easy to integrate with existing workflows or infrastructure either—let alone meet a growing array of privacy mandates.

Modernizing Workforce Verification and Authentication

With traditional forms of MFA growing unreliable, modern forms of identity verification and authentication are setting new standards for security, convenience, and efficiency. Solutions certified to FIDO2, iBeta biometrics-, UK DIATF, and NIST 800-63-3 standards, for instance, combine machine-verified identity to government-issued credentials (driver’s license, state ID, passport, etc.) and enable non-phishable multifactor authentication when verified users login to digital services.

1Kosmos, for example, is a case in point. Our workforce verification solution provides an order of magnitude improvement in credential issuing during user onboarding and account recovery—replacing weak, knowledge-based and two-factor forms of authentication with a simple self-service workflow that accommodates government-issued credentials in 140 countries with 99% accuracy. Executed from any device, anywhere, anytime, 1Kosmos detects stolen and synthetic identities while establishing high-assurance trust for legitimate workers.

Meanwhile, our workforce authentication solution eliminates the vulnerabilities of traditional passwords via passwordless, identity-backed biometrics. Built on a decentralized identity framework, it ensures secure, frictionless authentication of employees, contactors, and supply chain partners and, importantly, puts users in control of their own personal identifiable information. We also provide support for password reset and legacy 2FA/MFA to accommodate disparate IT environments built over decades.

Our solutions are built on the only platform certified to NIST 800-63-3, UK DIATF, FIDO2, and iBeta ISO/IEC 30107- standards with an SDK and standard APIs to avoid security exploits and prevent vendor lock. With collaborations like our partnership with Concentrix, we help organizations enable workforce verification and authentication that transforms security, reduces costs, and enhances the user experience.

Khan-versation Starter: Looking Forward to What’s Next

In his LinkedIn post, Gartner’s Khan writes, “I’m super interested to see whether this takes hold in 2025,” adding,” I look forward to engaging with clients and vendors this year to see how this shapes up.” We couldn’t agree more—and we look forward to doing just that.

To learn how 1Kosmos can help protect your organization against worker fraud and service desk attacks with the only NIST, DIATF, FIDO2, and iBeta certified workforce verification and authentication solutions on the market, click here.

The post Gartner’s Right: Why Workforce Identity Verification Can’t Wait appeared first on 1Kosmos.


Spruce Systems

Top 10 Ways Verifiable Digital Credentials Can Impact Education

Educational institutions can enhance security, efficiency, and user experience by adopting Verifiable Digital Credentials (VDCs) for diplomas, transcripts, student IDs, and more.

Educational institutions, such as universities, public schools, and entities issuing certification courses, face a growing need for secure, efficient identity verification systems that support a mobile-ready world. Ensuring that students, staff, and alumni have safe and convenient access to their credentials is essential, and in today’s world, having their credentials easily accessible on their phones is the experience they expect. Traditional paper-based documents, from diplomas to transcripts, can be cumbersome, prone to forgery, and slow to access and verify. These outdated processes create inefficiencies, increase administrative workloads, and open doors to credential fraud.

Verifiable Digital Credentials (VDCs) offer a streamlined, tamper-proof solution that addresses these challenges head-on. By moving away from paper-based records to digital verifiable credentials, educational institutions can improve security, efficiency, and user experience. Read on to explore the top ten real-world applications of digital credentials in education and how SpruceID can partner with institutions to drive digital transformation.

Today’s Top 10 Real-World Applications

1. Digital Diplomas and Certificates: Traditional diplomas are susceptible to damage, loss, and fraud. With VDCs, students can access secure, verifiable digital diplomas that are easily shared with employers or graduate programs. This ensures authenticity while enabling institutions to reduce administrative burdens associated with paper records.

2. Transcripts and Academic Records: Transcripts often take weeks to process and are costly to manage. Digital credentials provide instant, secure access to academic records, allowing students to share their achievements with prospective employers or other institutions. VDCs streamline the verification process, making it more efficient and less prone to error.

3. Enrollment Verification: When students apply for discounts or benefits based on their enrollment status, paper verifications can slow down approval processes and increase the risk of fraud. VDCs enable instant, accurate verification of enrollment status, facilitating faster access to services such as health insurance, transportation, and housing.

4. Professional Certifications: Digital credentials can serve as verifiable proof of certification for students completing professional courses, simplifying the job application process. Employers gain confidence that candidates possess verified skills, reducing onboarding time and enhancing workforce quality.

5. Student ID Cards: Physical student IDs can be lost, stolen, or counterfeited, posing security risks on campuses. Digital student ID credentials streamline campus access—from libraries to dining halls and reduce the risk of unauthorized access to campus facilities. They can also be presented to businesses or services that offer benefits and discounts for enrolled students.

6. Continuing Education and Micro-Credentials: Lifelong learning is on the rise, and micro-credentials are increasingly important. VDCs allow institutions to issue verified micro-credentials and continuing education certificates, empowering individuals to build a verified portfolio of skills for career advancement.

7. Internship and Extracurricular Verifications: Internships and extracurricular involvement are valuable experiences, but verifying participation can be challenging with paper-based methods. Digital credentials can serve as verifiable records of participation using cryptographic technology that can’t be faked, simplifying the application process for further education or employment.

8. Financial Aid and Scholarship Eligibility: Applying for financial aid and scholarships often requires students to verify their identity and enrollment status, which can be a time-consuming process involving paperwork and manual checks. By integrating Verifiable Digital Credentials (VDCs)—such as mobile driver’s licenses (mDLs) or digital student IDs—students can instantly confirm their identity and eligibility, expediting the verification process and reducing administrative delays. This streamlined approach can ensure faster access to student funding while improving security and trust in the application process.

9. Alumni Identity and Credentials: Educational institutions often manage records for alumni long after graduation. Digital credentials ensure alumni can easily access and share their academic records and certifications, providing value long after their time at the institution and allowing them to slowly transition out of university accounts.

10. International Student Verification: International students often need to verify their credentials across borders, which can be a slow and complicated process. VDCs enable fast, reliable verification for visas, immigration, and educational assessments, helping students navigate cross-border requirements efficiently.

SpruceID’s Solution

SpruceID partners with educational institutions and government workforce development councils to create a secure ecosystem of verifiable digital credentials that enhance trust, security, and efficiency. We are currently working with Colorado on skills-based hiring and digital learning records (LERs), aiming to create a future where skills, not just credentials, connect people to job opportunities while addressing workforce challenges.

Learn how SpruceID is supporting this vision as the chosen tech vendor to help ColoradoFWD toward its goal of designing a multi-use digital wallet.

Our Credible platform supports a wide range of digital credentials, from diplomas to student IDs, utilizing cryptographic signatures to prevent tampering, unauthorized sharing, or fraudulent reproduction. With minimal data disclosure, students can confirm credentials with only essential information, keeping their personal details secure and in compliance with privacy standards. This approach reduces administrative bottlenecks and streamlines verifications, ultimately lowering costs related to physical records, printing, and mailing.

Shaping the Future of Digital Identity in Education

We believe the future of education will fully embrace verifiable digital credential solutions that integrate seamlessly with industry standards and foster collaboration across the sector. By adopting VDCs, institutions can protect students’ data, improve the services they provide, and reduce administrative burdens.

SpruceID is committed to helping institutions prepare for this digital transformation, working with universities, colleges, and other educational entities to implement scalable, interoperable solutions. To learn more about how SpruceID can support your institution’s digital credentialing needs, visit our website and get in touch with us.

Contact Us

About SpruceID: SpruceID is building a future where users control their identity and data across all digital interactions.


Holochain

Holochain 0.4.1, Networking, Docs & More

Dev Pulse 144

Here’s our progress over the last two weeks:

Holochain Core, Runtimes & Dev Tooling: Holochain 0.4.1 has moved from release-candidate to an official release. This version has been integrated into the deployment runtime Kangaroo, the scaffolding tool has been updated to use it, and the Launcher update is in progress.  We have positive reports from the field of people using the 0.4.1 release in their apps.

Networking: We are wrapping up the rewrite of our low-level networking modules: tx5 and Kitsune2. Tx5 implements the low-level p2p end-to-end encrypted WebRTC connections between peers, while Kitsune2 implements the layer on top of tx5 to store and sync data through gossip in distributed hash tables (DHTs) between the peers. The first versions of Kitsune2 crates have been published to crates.io! Our next steps are:

1) creating Wind Tunnel tests for Kitsune separate from Holochain,

2) writing a simple showcase kitsune-only p2p app for internal review, and

3) integrating the crates back into the Holochain codebase.

These next steps have been scoped, estimated and are underway.

Testing: It was quite fun to run through our current manual testing process on the first 0.4.1 release candidate, catch an error, have that fixed and run through the same test procedure successfully to then yield the green light for the full release. On the automated testing front, we’ve spun up our orchestration Nomad server, and hooking that up to Nomad-clients deployed to Holoports is well underway.

Dev Docs: We are continuing work to improve our developer documentation. Over the last two weeks we published Build Guides on DNAs & Zomes, next up are docs on hApps, validation and genesis self-check!

As always, the best place to really see the details behind the Dev Pulse is to look at Github’s Insights page for whichever repo you are most interested in. For example see Holochain and Kitsune2


myLaminin

Regulatory Requirements - What Researchers Need to Know

Researchers are required to navigate a complex regulatory landscape to ensure compliance with security, privacy, and ethical standards.
Navigating Compliance in Research

As research becomes increasingly data-driven, researchers must be cognizant of and abide by the complex regulatory landscape to ensure compliance with security, privacy, and ethical standards. Numerous regulations come into play depending on the nature of the research covering personal health information, controlled unclassified information, or sensitive electronic records.


It is well documented that failure to comply with these regulations can lead to legal consequences, data breaches, and even reputational damage, making it crucial for researchers to understand and implement the necessary safeguards.


Key Regulatory Frameworks in Research

The regulatory landscape varies based on jurisdiction and the type of data. Some of the most critical frameworks that researchers may need to comply with include:


NIST 800-171, which went into effect on January 25, 2025, protects Controlled Unclassified Information (CUI) in non-federal systems and organizations by establishing stringent security requirements. This is particularly important for research funded by U.S. federal agencies.

21 CFR Part 11 regulates electronic records and electronic signatures in FDA-regulated research, ensuring digital documentation meets the same standards as traditional paper records. 

HIPAA (Health Insurance Portability and Accountability Act) mandates strict controls over healthcare data privacy and security for research that involves patient information. Researchers handling such data must ensure encryption, controlled access, and audit trails. 

PHIPA (Personal Health Information Protection Act, Ontario) applies to healthcare-related research in Ontario, ensuring that personal health information is handled with privacy and security.

PIPEDA (Personal Information Protection and Electronic Documents Act, Canada) impacts private-sector research across Canada. It governs how personal information is collected, used, and shared. Research teams are required to obtain consent and ensure relevant data protection measures.

SOC 2 Type II is a voluntary, widely recognized standard for SaaS (Software as a Service) providers, ensuring that organizations handling sensitive data maintain strict security, availability, and confidentiality controls. 

NIST Cybersecurity Framework (CSF) provides an outlook on the best practices for managing cybersecurity risks, helping researchers strengthen their data security posture.


What Researchers Need to Do to Stay Compliant

With an excess of regulations to follow, we believe researchers must be proactive in adopting compliance best practices. Here are five ways we believe how.


Identify Relevant Regulations – Compliance frameworks are project-specific. Researchers should assess the relevant regulations based on data type, funding sources, and jurisdiction.

Implement Security Controls – Encryption, multi-factor authentication, and role-based access will help ensure the protection of sensitive data.

Maintain Documentation & Audit Trails – Compliance frameworks often require detailed records of data handling, access logs, and security measures.

Use Trusted Data Storage & Collaboration Tools – Cloud-based platforms that comply with SOC 2, HIPAA, and NIST 800-171 can help researchers securely store and share data. Good RDM tools can substantially reduce the risks of non-compliance but researchers must still take responsibility for the methods and procedures designed to support their research.

Ensure Ethical Compliance – If human or animal participants are involved, securing Research Ethics Board (REB) approval is crucial to align with regulatory requirements.


Is It Easier to Use SaaS Solutions for Compliance?

Managing multiple compliance requirements can be overwhelming. This is why many research teams rely on internal IT to support their research needs. However, this is often a cumbersome, inefficient, and error-prone approach.


Increasingly, many researchers are turning to SaaS solutions that integrate security, collaboration, and regulatory compliance into a single platform.


We believe a well-designed research management platform should provide secure data storage, maintain audit trails, and enable secure collaboration across teams while enabling access control and simplifying compliance with HIPAA, SOC 2, and NIST CSF frameworks.


Conclusion

At myLaminin, we understand that regulatory compliance can be a complex and time-consuming challenge for researchers. Our platform is designed to simplify this process by integrating robust security measures with FAIR (Findable, Accessible, Interoperable, Reusable) principles.


myLaminin was designed and built with compliance in mind, with secure data management, and seamless collaboration features. Our platform reduces the administrative burdens associated with regulatory compliance while enhancing data integrity allowing researchers to focus on breakthroughs not bureaucracy leading to more discoveries and innovation. 


References:

SP 800-171 Rev. 3, Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations | CSRC

FDA 21 CFR Part 11 Compliance

Summary of the HIPAA Security Rule | HHS.gov

SOC 2 for SaaS Providers

__________________________________


Pranati Rawat (article author) studies Economics at Western University and is a myLaminin intern in the University's WMA program.






SC Media - Identity and Access

Hacker of SEC's X account sentenced after admitting guilt

After infiltrating the SEC's X account via SIM swapping conducted with the help of his co-conspirators, Council proceeded to post fraudulent information regarding the planned approval of cryptocurrency-containing exchange-traded funds, which resulted in a Bitcoin price spike, according to the Justice Department.

After infiltrating the SEC's X account via SIM swapping conducted with the help of his co-conspirators, Council proceeded to post fraudulent information regarding the planned approval of cryptocurrency-containing exchange-traded funds, which resulted in a Bitcoin price spike, according to the Justice Department.


Reported UK-ordered iCloud encryption backdoor slammed

Implementation of a backdoor that would enable government access to Apple users' cloud storage data could set a precedent for authoritarian nation-states and threat actors, with Electronic Frontier Foundation's Thorin Klosowski noting the threat of a global emergency stemming from the secret order.

Implementation of a backdoor that would enable government access to Apple users' cloud storage data could set a precedent for authoritarian nation-states and threat actors, with Electronic Frontier Foundation's Thorin Klosowski noting the threat of a global emergency stemming from the secret order.


DeepSeek prohibited in New York government devices

Increasing concerns regarding the potential utilization of Chinese artificial intelligence platform DeepSeek for foreign government surveillance have prompted New York Gov. Kathy Hochul to ban the AI chatbot's usage across all state-issued devices just days after Texas Gov. Greg Abbott issued a similar prohibition for DeepSeek and Chinese-owned social media apps.

Increasing concerns regarding the potential utilization of Chinese artificial intelligence platform DeepSeek for foreign government surveillance have prompted New York Gov. Kathy Hochul to ban the AI chatbot's usage across all state-issued devices just days after Texas Gov. Greg Abbott issued a similar prohibition for DeepSeek and Chinese-owned social media apps.


Turing Space

What is a Digital Signature? Secure with Encryption & 6-Step Signing Process

What is a Digital Signature? Secure Your Information with Encryption & a 6-Step Signing Process

2024/6/30




In the digital era, securing electronic documents and transactions is crucial to prevent fraud and unauthorized access. Digital signatures are cryptographic security measures that authenticate the identity of the signer and ensure the integrity of documents.   


Table of contents 

I. What is a Digital Signature? Is it Legally Recognized?

A. Definition of a Digital Signature B. How Digital Signatures Work C. 3 Key Legal Elements of a Digital Signature

II. Digital vs. Electronic Signatures: What’s the Difference?

📌Comparison Table of Digital and Electronic Signature Differences

III. How Do Digital Signatures Work? Encryption & Signing Process

A. Introduction to the principles of digital signature B. Step-by-Step Guide to Apply a Digital Signature

IV. Turing Certs: The Most Secure Digital Signature Solution


I. What is a Digital Signature? Is it Legally Recognized? 

A. Definition of a Digital Signature  

Digital Signature is an anti-counterfeiting method that can verify the authenticity of digital credentials such as electronic documents and electronic certificates. 

According to Article 2, Item 3 of Taiwan’s “Electronic Signatures Act” by the Ministry of Digital Affairs, a “digital signature” refers to a type of electronic signature created using mathematical algorithms or other cryptographic methods to generate a specific length of digital data encrypted with the signatory’s private key. It can be verified using a public key and is supported by a certificate issued by a certification authority. 

To simplify, the digital signature is a way of signing e-documents. It is encrypted with the “private key” that belongs to the document owner. When others receive a digitally signed document, they can use the ‘public key’ to verify the signature. If the verification is correct, it can prove that the original owner truly signed the document and that the contents have not been tampered with or forged. 

If you see an e-document as an official printed letter, a digital signature is a seal that can prove the letter’s authenticity. 



B. How Digital Signatures Work

There are 3 main functions of digital signature: 



Ensure the identity of the signer: Digital signatures can authenticate the identity of the signer to ensure that the signer of an e-document is the actual owner or authorizer of the document.  Keep the security and integrity of document content: Digital signatures can maintain the integrity of e–document content and prevent it from being tampered with or omitted.  Avoid contract disputes: A legally valid digital signature can protect the rights and interests of both parties and prevent either party from repudiating the contract.  

C. 3 Key Legal Elements of a Digital Signature 

To be legally valid, a digital signature must meet three criteria: 



Verifiability – Must be issued by a recognized Certification Authority (CA).   Full Presentability – Must be readable and accessible in any format or device.   Mutual Agreement – Both parties must consent to digitally sign the document. 
Contact Turing Certs now to learn more about digital signature!

II. Digital vs. Electronic Signatures: What’s the Difference?

The most common way to sign a document is to sign it with a physical handwritten signature. However, paper documents are not only easily damaged and not conducive to archiving, but also have low security. Therefore, with the development of digital documents, handwritten signatures have gradually been transformed into electronic signatures and digital signatures. 

Digital signature is a type of electronic signature, but the two have different meanings. 

The electronic signature covers a wide range, as long as it is in electronic form, i.e. the signatures generated through digitizing can be considered as electronic signatures. Common forms include text, images, symbols, etc. Scanned documents of handwritten signatures are also counted as electronic signatures. 

Digital signatures refer specifically to the signature generated by encryption algorithm technology.

The biggest difference between digital and electronic signatures is security. Digital signatures use algorithms, encryption technology, and third-party certification authorities to enhance security and credibility, while electronic signatures lack the guarantee of these certificates. 



📌Table of Digital and Electronic Signature Differences 
Digital signatureElectronic signatureSecurityHighestLowerVerification methodKey encryption technologyElectronic formatApplication ScenariosE-commerce, financial operations, e-certificates, government documents, etc.Emails, contracts, agreements, etc.

III. How Do Digital Signatures Work? Encryption & Signing Process

A. Introduction to the principles of digital signature
a. Encryption Methods: Symmetric vs. Asymmetric Cryptography

Digital signatures and digital documents are based on the same encryption principle, but the execution method is slightly different. 

Digital signature uses asymmetric cryptography to sign documents with a private key and verify signatures with a public key. Besides digital signature, asymmetric cryptography can also be applied to digital credentials, which encrypts the document with the public key (lock) and decrypts the document with the private key (unlock). 

Symmetric Encryption: One lock matches one key. The key for encryption and decryption is the same. Thus, if you lock with key A, you can only open with key A.  Asymmetric Encryption: The key that encrypts and decrypts is not the same, but a pair of different public and private keys. Use public key A to lock, but use private key B to open. The private key is not publicly available, so it can be used to decrypt or sign files. 
b. RSA

RSA is one of the most widely used asymmetric encryption algorithms for digital signatures, secure email, and online banking. It was developed at MIT in 1977 and remains a critical security standard. 



B. Step-by-Step Guide to Apply a Digital Signature
a. How to Obtain & Use a Digital Signature

Follow these six essential steps to securely sign digital documents:   



STEP 1. Apply for a Digital Certificate from a Certification Authority (CA). 

STEP 2. The CA confirms the applicant’s identity. 

STEP 3. Receive Your Private-Public Key Pair linked to your verified identity. 

STEP 4. Digitally Sign Documents using the private key.   

STEP 5. The CA issues the credential to the applicant. 

STEP 6. Recipients confirm authenticity using the public key. 


b. Security Precautions for Digital Signatures

Even the most secure encryption methods are vulnerable to cyber threats. Here’s how to safeguard your digitally signed documents:  

Use a trusted Certification Authority (CA) for issuing digital certificates.   Ensure public key & identity binding to prevent unauthorized access.   Store private keys securely to prevent cyberattacks.   Verify signed documents before accepting them to avoid fraudulent transactions. 
Turing Certs, your most reliable Certification Authority!

IV. Turing Certs: The Most Secure Digital Signature Solution

Turing Space is a TrustTech startup founded by Jeff Hu in 2020, dedicating to addressing the complexity of certifications among industries worldwide. We build up a borderless digital trust network with blockchain technology, advancing global digital transformation, aiming to become the cornerstone of international trust transmission. 

With Turing Certs, you can gain a variety of e-document services:  

✅Large-quantity, quick credential creation and issuance
✅Sign digital credentials
✅Effectively manage digital credentials
✅One-stop rental management with reasonable prices 

✅ Verifiable information and immutable blockchain records 

✅ Strictly verified digital credentials for enhanced information security 

✅Provide real-person customer service support so that even novices in digital tools can adapt quickly 


Schedule a demo to know more about Turing Certs!

Share on Facebook Share on Twitter Share on WhatsApp Share on LinkedIn Share by Mail

Media Contact|pr@turingspace.co

The post What is a Digital Signature? Secure with Encryption & 6-Step Signing Process first appeared on Turing Space Inc..

ComplyCube

New UK Digital Wallet in 2025

A new digital wallet will be introduced in 2025, enabling UK citizens to hold digital identification documents on their mobile phones, such as driving licenses. Learn how this will fortify transactions and prevent identity fraud. The post New UK Digital Wallet in 2025 first appeared on ComplyCube.

A new digital wallet will be introduced in 2025, enabling UK citizens to hold digital identification documents on their mobile phones, such as driving licenses. Learn how this will fortify transactions and prevent identity fraud.

The post New UK Digital Wallet in 2025 first appeared on ComplyCube.


Mythics

Top 5 reasons to migrate from Hyperion to EPM Cloud

The post Top 5 reasons to migrate from Hyperion to EPM Cloud appeared first on Mythics.

Elliptic

Sanctions Imposed on Lockbit Ransomware's Russian Hosting Provider

The US Treasury’s Office of Foreign Assets Control (OFAC)—together with Australia’s Department of Foreign Affairs and Trade, and the UK Foreign, Commonwealth and Development Office—has today sanctioned Zservers and two of its administrators. Cryptocurrency addresses used by these actors were added to the Specially Designated National (SDN) list.

The US Treasury’s Office of Foreign Assets Control (OFAC)—together with Australia’s Department of Foreign Affairs and Trade, and the UK Foreign, Commonwealth and Development Office—has today sanctioned Zservers and two of its administrators. Cryptocurrency addresses used by these actors were added to the Specially Designated National (SDN) list.


Spherical Cow Consulting

Agentic AI and Authentication: Exploring Some Unanswered Questions

Agentic AI is changing authentication faster than our identity models can keep up. We’ve built systems assuming users are human, but what happens when an AI agent, not the user, needs to authenticate on their behalf? Our current identity frameworks weren’t designed for this, and the gaps are starting to show. 🎙 Audio Blog If Continue Reading The post Agentic AI and Authentication: Ex

Agentic AI is changing authentication faster than our identity models can keep up. We’ve built systems assuming users are human, but what happens when an AI agent, not the user, needs to authenticate on their behalf? Our current identity frameworks weren’t designed for this, and the gaps are starting to show.

Audio Blog

If you’ve read my earlier post, Are You Human? A Dive Into the Proof of Personhood Debate, you’ll notice some overlaps here. That post dove into the tricky questions around distinguishing humans from non-humans and explored some early efforts to tackle proof of personhood. This post extends that conversation by examining how agentic AI complicates the identity landscape further.

As if digital identity wasn’t confusing enough…

“Traditional” Federation Models

In federation models that assume a relying party (RP) and an identity provider (IdP), the process of authentication is kicked off by a user. From there, the RP and IdP have a lovely chat about what data is being requested (by the RP) and what data will be sent in response (by the IdP). These systems have served well in scenarios where it’s important to recognize the information may be about the user, but it does not belong to the user. (Example: a user’s affiliation with an organization is not something the user owns; it’s owned by the organization. The user should have control over releasing that information in most circumstances, but they do not own it.)

Enter agentic AI. What happens when an AI agent, not the user themselves, needs to authenticate?

Trust Boundaries: Can existing federation models extend trust to an agent acting autonomously on a user’s behalf? And if so, what ensures the agent’s actions align with the user’s intentions? Granularity of Authorization: Federation models today operate on relatively coarse-grained permissions (e.g., scopes in OAuth). For agents, finer-grained controls may be necessary to specify “what” an agent can do. Those controls will also need to specify “when,” “where,” and “how.” Auditing and Accountability: When an agent performs actions, how do we audit and attribute those actions to the user who authorized the agent, particularly if something goes wrong? OAuth2 FTW! (Right?)

In some of my conversations with people deeply embedded in the authentication space, they suggest that OAuth2-based authentication should make this a non-issue. But I’m not too sure. While OAuth2 does provide a framework for delegation, where a user can grant an agent limited access to their resources, I’m not actually asking about the basic mechanics (but if you’d like to discuss those, this is an interesting post to start with). I’m asking about under what circumstances those mechanics can and should be used, and whether they actually solve for all the use cases.

OAuth2 Handles Delegation, But Not Autonomy

So, first, my understanding is that OAuth2 would allow a user to delegate access to an AI agent by issuing tokens with specific scopes and permissions. For example, a user could grant a personal assistant app access to their calendar or email. Brilliant! We need that.

However! OAuth2 assumes the agent is an extension of the user’s intent, not an autonomous actor. Agentic AI introduces the possibility that an AI might make independent decisions, adapt over time, or interact dynamically with other systems in ways that extend beyond the original scope of user intent. And before you say “that should never happen,” that horse is leaving the barn even as I type.

Here are some potential scenarios:

An AI-powered email assistant that autonomously schedules meetings and replies to clients—What happens if it books a flight without explicit user consent? An AI stock trading bot that exceeds the user’s intended risk profile—Who is responsible? A personal shopping assistant that buys items based on inferred preferences—What happens if it misunderstands intent?

Is it the user, the developer, or the service that may have manipulated the AI agent to behave in a particular way?

Granularity and Oversight

OAuth2 tokens typically grant access to resources but don’t provide detailed controls over how, when, or why those resources are accessed. So, in the use cases I’m worried about, an agent might need to send emails on your behalf but not at all times or for all recipients. As far as I know, OAuth2 has no native mechanism to enforce or audit such fine-grained boundaries.

For highly autonomous agents, a more nuanced authorization model is needed that could dynamically enforce user preferences or constraints as the agent operates.

Federated and Decentralized Contexts

In federated systems (systems that externalize their authentication and even authorization actions), introducing agentic AI complicates how trust is propagated across domains. OAuth2 scopes might suffice in single-domain scenarios but fall short in multi-stakeholder environments.

In decentralized identity systems, such as those using verifiable credentials, the challenge extends to ensuring agents can securely act as verifiers or holders without compromising privacy or security. More on this in a bit.

While OAuth2 provides a solid foundation for today’s delegation needs, addressing agentic AI in authentication may require:

Enhanced granularity of scope to define not just what an agent can do, but how and when it can do it. Dynamic consent and revocation mechanisms that allow users to adapt permissions as agents operate. AI-specific identity standards, potentially building on OAuth2 or incorporating concepts like decentralized identifiers (DIDs) and verifiable credentials, to handle autonomous behavior.

So, yes, OAuth2 is excellent for handling simple delegation. ut agentic AI isn’t just about delegation. It makes independent decisions, adapts over time, and interacts unpredictably. Agentic AI introduces complexities around autonomy, accountability, and trust that stretch beyond the protocol’s original design. The question isn’t whether OAuth2 can delegate, it’s whether it can adapt to the nuanced and evolving behaviors of autonomous agents. (I both enjoyed and freaked out a bit with this post on AI and end-to-end encryption, which is another part of the discussion.)

Comparing and Contrasting FeatureHuman OAuth2 DelegationAgentic AI AuthenticationWho initiates?User explicitly grants accessAI may act autonomouslyBoundariesPre-defined scopesNeed real-time contextual controlsRevocationUser can revoke manuallyNeeds automated monitoringAccountabilityUser is responsibleHarder to attribute actions Verifiable Credentials and Identity Wallets: Issuer, Verifier, and Holder

The identity wallet model, with its issuer, verifier, and holder, offers an alternative framework for authentication. These systems are often designed with decentralization and user control in mind. What’s not to love? The growing ecosystem of mobile driver’s licenses and EU Digital Identity wallets that live on browsers and devices suggests some interesting conversations when it comes to agentic AI.

To make sure we’re all on the same page, here are a few quick and simplified definitions for the entities involved in identity wallet issuance and verification. The concepts are similar to RP and IdP.

Issuer: Provides credentials (e.g., a verifiable credential) to the holder. Holder: Stores and manages credentials, presenting them to verifiers when needed. Verifier: Validates the presented credentials. Agentic AI and VCs

This is a beautiful system when it applies to humans. When applied to agentic AI, however, I have questions:

Agent as Holder: If an AI agent acts as a credential holder, how does it securely store, manage, and present those credentials? How do we prevent misuse if the agent is compromised? Should an AI agent ever be a credential holder at all? Delegation: Can an agent act as a delegated representative of the user, and how do we enforce boundaries? For example, could an agent be issued temporary credentials with limited scope and validity? Probably, though some systems might not allow agents for various security and privacy reasons. Selective Disclosure: Identity wallet models often emphasize privacy through selective disclosure, such as revealing only a user’s age without exposing their birthdate. How might agents balance this with their need to automate tasks efficiently? It’s like a self-driving car; it’s a self-managing agent.

The wallet model seems to offer more flexibility for agentic AI than “traditional” federation models, but it introduces a new layer of complexity. It has to ensure the AI agent’s autonomy doesn’t come at the cost of security or user control.

Glimmers of Direction

It’s no fun asking all these questions without having associated answers. Regardless, I suspect work is underway (or will be soon) in a few areas:

Delegated Trust Models: Expanding on existing delegation mechanisms to allow users to grant agents fine-grained, revocable permissions. AI-Aware Standards: Developing new identity standards that explicitly account for agentic AI, whether by enhancing federation protocols or building on the identity wallet paradigm. Contextual Authentication: Leveraging contextual signals—such as behavioral patterns, location, or task context—to authenticate agents dynamically. Reputational Systems: Having people and systems “vote” on whether something is a person or a bot. I cringe a bit about the potential liability involved here, but the idea is definitely receiving some attention.

Ultimately, the questions of “if,” “how,” and “when” agentic AI and authentication will align are as much about societal and regulatory readiness as they are about technical feasibility. The opportunities are immense, but so are the challenges.

The identity industry has spent decades building systems for human authentication. Agentic AI changes the game. If we don’t rethink our identity models now, we’ll be retrofitting yesterday’s solutions onto tomorrow’s problems—and I’d rather avoid that headache. If you’re working in this space, let’s talk at IIW, EIC, or Identiverse!

Want to see how I tackle real-world challenges in digital identity and standards development? Check out my mini-case studies—short, practical lessons from projects where strategy meets execution.

If something sparks an idea for your team, let’s chat. I’d love to hear what you’re working on.

Get new posts straight to your inbox—subscribe here.

The post Agentic AI and Authentication: Exploring Some Unanswered Questions appeared first on Spherical Cow Consulting.


Thales Group

Thales and Bharat Dynamics Ltd Agree on Initial Supply of Man Portable Air Defence systems to India

Thales and Bharat Dynamics Ltd Agree on Initial Supply of Man Portable Air Defence systems to India prezly Tue, 02/11/2025 - 07:00 Thales and Bharat Dynamics Limited (BDL) will provide a first supply of Laser Beam Riding MANPAD (LBRM) Very Short Range Air Defence (VSHORAD) Missiles and launchers to the Indian Ministry of Defence. This is a major success, following on from the sign
Thales and Bharat Dynamics Ltd Agree on Initial Supply of Man Portable Air Defence systems to India prezly Tue, 02/11/2025 - 07:00 Thales and Bharat Dynamics Limited (BDL) will provide a first supply of Laser Beam Riding MANPAD (LBRM) Very Short Range Air Defence (VSHORAD) Missiles and launchers to the Indian Ministry of Defence. This is a major success, following on from the signing of the Partnership Agreement in 2021 between Thales and BDL to work on the LBRM, with the support of the Indian and UK Governments. This agreement will improve India’s Air Defence capabilities to enable them to enhance their national security with a highly accurate and countermeasure-resistant up-to-date technology. LBRM, manufactured up to 60% in India, are short-range, man-portable, air-defence systems and optimised to provide defence against air threats, including fixed-wing Fighter Ground Attack aircraft and late unmasking Attack Helicopters, as well as drones.
©Thales

Bengaluru, 10 February 2025: Thales and Bharat Dynamics Limited (BDL) are proud to announce the signing of an initial supply of Laser Beam Riding Man Portable Air Defence systems (LBRM) in response to a requirement set out by the Indian Government to support India’s air defence capabilities.

This initial supply of High Velocity Missiles (STARStreak) and launchers will be delivered this year and represents the first time that India has received this latest VSHORAD capability. This step confirms the foundation of a long-term collaboration and manufacturing partnership between Thales and BDL. In the spirit of the ‘Make in India’ initiative, this partnership will serve the current and future requirements of the Indian Ministry of Defence.

Thales, together with BDL, is committed to the transfer of technology (ToT) of battle proven capabilities to India to equip the Indian Armed Forces.

This contract represents the first major agreement since the establishment of the United Kingdom's Defence Partnership-India, a bespoke programme office breaking down barriers to trade and offering government-to-government contracting, where appropriate, further solidifying the defence and security relationship between the two nations. This contract also reflects Thales’ long-term partnership of 70+ years with India, serving as a testimony to its continued growth.

A production partnership with India will also increase UK production at the Thales Belfast site, where LBRM is designed.

Lord Vernon Coaker, Minister of State for Defence, said: “This exciting collaboration is just one of the ways that we are growing our defence relationship and partnership with India. While supporting India’s air defence capability and global security, this agreement also demonstrates defence as an engine for growth and delivers on the government’s Plan for Change.”

“This is a momentous occasion for all the stakeholders involved in the development of LBRM Air Defence solutions. It signifies the beginning of an exciting chapter in our collaboration with BDL, contributing to the Aatmanirbhar Bharat vision. The UK-India strategic partnership finds renewed strength through this contract, which is poised to make a significant impact in the domain of air defence in India.” declared Pascale Sourisse, President & CEO, Thales International.

“We are pleased to take our collaboration with Thales to this next significant step, enhancing our contribution to the defence ecosystem and our ability to support existing and future LBRM Air Defence customers. This initiative aligns perfectly with our Government's 'Make in India,' 'ease of doing business,' and 'Aatmanirbhar Bharat' programmes, giving a major boost to the local industry through partnerships with global organisations like Thales.” said Cmde A Madhavarao (retd.), Chairman and Managing Director, Bharat Dynamics Limited.

“The signing of this contract with BDL and Thales to support India’s air defence capability is a huge stride forward in strengthening our partnership with India. I am proud to see that Thales’ expertise in the domain of Air defence will bring vital, battle proven capabilities to India.” said Phil Siveter, CEO of Thales in the UK.

About LBRM

High Velocity Missiles (STARStreak) are a truly versatile, complex weapon system. Designed for very short-range air defence, they are the fastest missiles in their class at Mach >3.0. They are best suited to address late unmasking threats such as fixed and rotary wing targets, Unmanned Aerial Systems (UAS) and pop-up attack helicopters.

Thales is a world leader in the provision of Air Defence solutions and in particular of complex weapon systems and has been a trusted partner of forces in this field for more than 60 years.

About Thales

Thales (Euronext Paris: HO) is a global leader in advanced technologies specialized in three business domains: Defence & Security, Aerospace, and Cyber & Digital.

It develops products and solutions that help make the world safer, greener and more inclusive.

The Group invests close to €4 billion a year in Research & Development, particularly in key innovation areas such as AI, cybersecurity, quantum technologies, cloud technologies and 6G.

Thales has close to 81,000 employees in 68 countries. In 2023, the Group generated sales of €18.4 billion.

About BDL

BDL, right from its inception in the year 1970, has been in the forefront of Defence Technology to manufacture state of the art, cost-effective Missile systems, underwater weapons and allied defence equipment to the Indian Armed Forces. With the domain expertise, BDL participates in the indigenously developed missile programs by DRDO, ToT from Foreign OEMs or co-developed using in house R&D and manufactures the world class products for the domestic and international market.

About Thales in India

Present in India since 1953, Thales is headquartered in Noida and has other operational offices and sites spread across Delhi, Bengaluru and Mumbai, among others. Over 2200 employees are working with Thales and its joint ventures in India. Since the beginning, Thales has been playing an essential role in India’s growth story by sharing its technologies and expertise in Defence, Aerospace and Cyber & Digital markets. Thales has two engineering competence centres in India - one in Noida focused on Cyber & Digital business, while the one in Bengaluru focuses on hardware, software and systems engineering capabilities for both the civil and defence sectors, serving global needs.

 

PRESS CONTACTS

Bharat Dynamics Ltd

Homnidhi Sharma

+91 94939 84976

bdlbd-pr@bdl-india.in

Thales, Group Media Relations

Defence

Camille Heck

+33 6 73 78 33 63

camille.heck@thalesgroup.com

Thales, Communications in India

Pawandeep Kaur

+91 9990098828

pawandeep.kaur@thalesgroup.com

/sites/default/files/prezly/images/Generic%20banner%20option%202_3.png Documents [Prezly] Thales and Bharat Dynamics Ltd Agree on Initial Supply of Man Portable Air Defence systems to India.pdf Contacts Cédric Leurquin 11 Feb 2025 Type Press release Structure Defence and Security Defence India Bengaluru, 10 February 2025: Thales and Bharat Dynamics Limited (BDL) are proud to announce the signing of an initial supply of Laser Beam Riding Man Portable Air Defence systems (LBRM) in response to a requirement set out by the Indian Government to support India’s air defence capabilities. prezly_728395_thumbnail.jpg Hide from search engines Off Prezly ID 728395 Prezly UUID 970843b9-128e-4a59-9029-2a60e0be3ecc Prezly url https://thales-group.prezly.com/thales-and-bharat-dynamics-ltd-agree-on-initial-supply-of-man-portable-air-defence-systems-to-india Tue, 02/11/2025 - 08:00 Don’t overwrite with Prezly data Off

PingTalk

Seamless Fraud Prevention: Stop Threats, Protect Customers

Fraud prevention and customer experience don’t have to clash. Learn how AI, adaptive security, and passive fraud detection create seamless, secure journeys

Monday, 10. February 2025

SC Media - Identity and Access

'Next level' brute-force attack uses 2.8 million IPs to target VPNs

Bad actors target VPNs from leading brands, such as Palo Alto Networks, Ivanti, and SonicWall.

Bad actors target VPNs from leading brands, such as Palo Alto Networks, Ivanti, and SonicWall.


The groundbreaking technology addressing employment scams and deepfakes - Aaron Painter - ESW #393


DOGE to be sued by more than a dozen of states over payment system access

Trump "does not have the power to give away our private information to anyone he chooses, and he cannot cut federal payments approved by Congress," said the coalition of 14 states attorneys, which includes attorneys general from California, New York, Colorado, Arizona, Hawaii, Illinois, Connecticut, Maine, Minnesota, Maryland, Vermont, Rhode Island, and Nevada.

Trump "does not have the power to give away our private information to anyone he chooses, and he cannot cut federal payments approved by Congress," said the coalition of 14 states attorneys, which includes attorneys general from California, New York, Colorado, Arizona, Hawaii, Illinois, Connecticut, Maine, Minnesota, Maryland, Vermont, Rhode Island, and Nevada.


OpenAI claimed to have over 20M credentials stolen

Such an extensive OpenAI account credential theft may have been achieved by exploiting vulnerabilities or securing admin credentials to infiltrate the auth0.openai.com subdomain, according to Malwarebytes researchers, who noted that confirmation of the leak's legitimacy would suggest emirking's access to ChatGPT conversations and queries.

Such an extensive OpenAI account credential theft may have been achieved by exploiting vulnerabilities or securing admin credentials to infiltrate the auth0.openai.com subdomain, according to Malwarebytes researchers, who noted that confirmation of the leak's legitimacy would suggest emirking's access to ChatGPT conversations and queries.


Millions of IP addresses leveraged in ongoing brute force intrusion

Brazil accounted for most of the attacking IP addresses, which were primarily from MikroTik, Cisco, Huawei, ZTE, and Boa routers and Internet of Things devices, reported The Shadowserver Foundation, which noted the existence of the erring IP addresses across several networks and autonomous systems.

Brazil accounted for most of the attacking IP addresses, which were primarily from MikroTik, Cisco, Huawei, ZTE, and Boa routers and Internet of Things devices, reported The Shadowserver Foundation, which noted the existence of the erring IP addresses across several networks and autonomous systems.


IDnow

How to onboard players in Brazil without compromising on compliance or CX.

So, you’ve decided to enter the Brazilian gaming market? Here’s everything you need to know to remain compliant, fight fraud and offer a frictionless customer experience. So, it’s finally happened.   After years of ‘Will they, won’t they?’, the Brazilian powers that be have finally managed to agree on how its sports betting and online gaming […]
So, you’ve decided to enter the Brazilian gaming market? Here’s everything you need to know to remain compliant, fight fraud and offer a frictionless customer experience.

So, it’s finally happened.  

After years of ‘Will they, won’t they?’, the Brazilian powers that be have finally managed to agree on how its sports betting and online gaming market should be regulated. 

This means that for the first time ever, Brazilian operators can serve Brazilian players, capitalizing on the country’s huge customer base and generating millions of tax revenue in the process. Brazilian players, meanwhile, can now use Brazilian platforms, benefiting from the local language and accessibility options that a local platform offers. 

This is great news as before January 1, 2025, players had to either use black market platforms or international ones; neither of which were ideal for providing sufficient consumer protections. 

Read more about the dangers of using black market gambling platforms in our blog, ‘Before Brazilian regulation: The dangers of gambling without KYC.’

Of course, as Brazil is such a new market, complete with new regulatory requirements, there are certain compliance challenges operators need to be aware of and important considerations to factor in before launching.

SBC Summit Rio Will you be at SBC Summit Rio and want to discuss how we can help you fight fraud and maximize conversions in the Brazil gaming sector? Book a meeting How to offer completely compliant gaming experiences in Brazil.

Being compliant and adhering to regulatory requirements not only protects a business from potential anti-money laundering (AML) and social responsibility fines but also from reputational harm. Each year, hundreds of millions in fines are levied against gaming operators and although there haven’t been any fines against a Brazilian operator yet, it is surely only a matter of time. 

In fact, according to Neil Montgomery, a lawyer that operates in Brazil, there is no doubt that Brazilian operators will soon find themselves on the receiving end of fines and even civil cases due to the country’s litigious culture. 

“Disgruntled consumers will now have a local door to knock on and use the Brazilian courts to obtain favourable awards. Brazilian courts will look at sports betting and iGaming operators as wealthy companies and an expectation for companies to compensate damages costs to consumers,” said Neil Montgomery, founder of Brazilian law firm, Montgomery & Associados.

Working with an identity verification provider with regulatory expertise and deep knowledge of the market ensures operators can navigate the complexities of Brazilian legislation and regulation with ease; safe in the knowledge they’re offering completely compliant player experiences.  

For more information on Brazil’s newly regulated sports betting and online gambling market, read our blog, ‘Everything you need to know about online gambling in Brazil’. 

As experienced providers of KYC and identity verification solutions for the gaming industry, IDnow has customers from around the world using IDnow to offer all manner of compliant use cases, from new account openings and age verifications to affordability checks and deposit withdrawals, and everything in-between.

Working with companies operating globally has equipped us with a deep knowledge of different regulatory environments, along with every nuance of their customer onboarding processes, every document or data point required to be processed and every product innovation and functionality that could make the customer experience more inclusive, intuitive and, of course, compliant.

How gambling operators should really be onboarding players.   Most common fraud attacks that gambling operators were subjected to in 2023. Size of some of the most popular global gambling markets. The steps required to legally onboard players in nine different countries Download now 7 steps for compliant customer onboarding in Brazil.

A robust customer onboarding experience for a Brazilian gaming platform should restrict fraudsters and underage or ineligible users from opening accounts, while protecting genuine players from fraud and potentially saving the company millions in AML fines.  

Here’s how to offer an end-to-end compliant player registration and verification process in seven steps:

CPF Validation: In Brazil, every citizen is issued a unique Cadastro de Pessoas Físicas (CPF) number, which is used for tax purposes. When cross-checked against the national CPF database, the numbers can be used to verify the identity of players during onboarding. Checking against restrictive lists: You know the saying: one rotten Brazilian apple spoils the whole Brazilian barrel (or something like that). Offering a safe and secure gaming experience requires operators to be assured that every single one of their players are entitled to be there, which is why the second important step in the player registration and verification process should be to check applicants’ identities against multiple official restrictive betting lists (lists containing those who could jeopardize results of sporting events, e.g.: athletes or managers).  PEPs and Sanctions: Like the second step, checking against PEPs and Sanctions lists is essential to assess and effectively mitigate the associated risks of Politically Exposed Persons (PEPs) and sanctioned individuals.  Document verification: When combined with CPF validation, document verification enables operators to cross-check and verify identity data with other forms. It’s also important to be able to process a variety of different document types, especially in Brazil, where different provinces often have different identity formats and types. The three most common documents that operators should be able to check and verify in Brazil as per the regulation are:

1. Brazilian passport 
2. Carteira de Identidade (RG) (National identity card) 
3. Carteira Nacional de Habilitacao (National driving license)  Advanced fraud detection: Fraud detection technology can provide an additional barrier by protecting against various fraud attacks. For example, our seamless advanced fraud detection technology flags whenever a forged document is submitted and can verify whether prospective players are real through liveness checks – all without adversely impacting the user journey. Such checks can help prevent common and emerging fraud types like bonus abuse, identity theft and synthetic identity theft.  Biometric enrolment: The penultimate step in our player registration and verification process records players’ biometric information, including facial images to facilitate future smoother player authentication.  Optional manual review: At this stage, the player has registered and verified their identity and are able to start playing. However, for additional security, operators can also choose to perform a manual review of submitted documents and biometrics for additional peace of mind, especially for high-risk individuals.   Customized consistency.

While knowing what needs to be done to create a compliant onboarding process is clearly important, perhaps what is even more important is how it is done and what the user experience of doing it is like. After all, if the customer experience is too complicated then customers will seek out a competitor that does offer an intuitive process or worse still, revert to the black market to platforms that are less concerned with KYC or robust identity verification processes. 

Of course, customer abandonment isn’t something specific to the gambling industry. In fact, 90% of companies said they lose customers during the digital onboarding process, with the top three reasons for drop-offs including: 

Too long processes (29%)   Identity proofing and affirmation pain points (26%)   Too many manual steps (26%)

At IDnow, we are committed to delivering cutting-edge identity verification solutions that address the specific needs of our customers and their end users. 

For example, when we discovered that most Brazilians tended to keep their identity cards in plastic sleeves, we amended our onboarding instructions in the user interface. By including culturally tailored instructions, such as requesting the removal of IDs from plastic sleeves, we ensured users could complete document capture with ease.  

It’s important to bear in mind that while compliance and regulatory requirements may differ by country, operators must offer a consistently positive user experience, regardless of the market or the regulatory requirements.  

Simply put, the user experience needs to be as seamless as it is secure, which has benefits for both the operator and ultimately the customer.

Integrate seamlessly, with IDnow.

Managing multiple point solutions (e.g. biometrics or documents) across different service providers not only creates inefficiencies and complexities in identity verification processes, but it can also make integration difficult, especially if journeys need to be adapted to regulatory changes or to detect and mitigate new risks. 

Our modular and scalable orchestration hub has been designed to reduce technical complexity and enable global operators to balance strict KYC/AML requirements with seamless UX. What’s more, any third-party KYC and compliance service can be easily added to IDnow making it easy to manage in one integration. 

Tailored for Brazil’s regulations and localized needs, IDnow simplifies identity verification and compliance with a plug-and-play solution, allowing users to access data, document and biometric verification through a single, unified integration point.

As regulations, data and document types, and ultimately customer requirements differ per region, there is a huge advantage in choosing an identity verification provider that can be tailored to a specific country’s risk and KYC needs.

Roger Redfearn-Tyrzyk, VP of Global Gaming at IDnow.

“Being able to offer a holistic approach to identity verification that can combine compliance services, including IDV, biometric authentication and data verification to meet any country’s requirements will very quickly become a necessity,” Roger added.

Learn more about our Brazil-ready identity verification solutions here.

SBC Summit Rio Will you be at SBC Summit Rio and want to discuss how we can help you fight fraud and maximize conversions in the Brazil gaming sector? Book a meeting

By

Jody Houton
Senior Content Manager at IDnow
Connect with Jody on LinkedIn

 


Elliptic

State of Crypto 2025: Financial institutions poised for digital asset adoption

After years of cautious observation, financial institutions are now at a critical juncture with digital assets. According to new research from Elliptic, 75% of financial institutions say they will need to progress their digital asset activity within the next two years to avoid falling behind competitively and financially. This is among the key findings from Elliptic’s new research repor

After years of cautious observation, financial institutions are now at a critical juncture with digital assets. According to new research from Elliptic, 75% of financial institutions say they will need to progress their digital asset activity within the next two years to avoid falling behind competitively and financially. This is among the key findings from Elliptic’s new research report, State of Crypto 2025: The readiness of the digital asset ecosystem.


Veracity trust Network

Client-side bot protection from Veracity

Veracity Trust Network’s Web Threat Protection works by providing client-side bot protection using AI behavioural analysis to stop malicious human-mimicking bots. Our mission since we set up the company has been to identify and block unwelcome bots on both web and mobile platforms, working in real-time by providing detailed insights into the source of these threats – whether they come from comp

Veracity Trust Network’s Web Threat Protection works by providing client-side bot protection using AI behavioural analysis to stop malicious human-mimicking bots.

Our mission since we set up the company has been to identify and block unwelcome bots on both web and mobile platforms, working in real-time by providing detailed insights into the source of these threats – whether they come from competitors, foreign actors or other malicious agents.

The post Client-side bot protection from Veracity appeared first on Veracity Trust Network.


Thales Group

Space Norway orders THOR 8 telecom satellite from Thales Alenia Space

Space Norway orders THOR 8 telecom satellite from Thales Alenia Space tas Mon, 02/10/2025 - 09:47 Cannes, February 10th, 2025 – Space Norway, Northern Europe’s leading satellite operator, and Thales Alenia Space, a joint venture between Thales (67%) and Leonardo (33%), today announced they have signed a contract for the supply of a new communications satellite, THOR 8. THOR
Space Norway orders THOR 8 telecom satellite from Thales Alenia Space tas Mon, 02/10/2025 - 09:47

Cannes, February 10th, 2025 – Space Norway, Northern Europe’s leading satellite operator, and Thales Alenia Space, a joint venture between Thales (67%) and Leonardo (33%), today announced they have signed a contract for the supply of a new communications satellite, THOR 8.

THOR 8 © Thales Alenia Space/Briot

From its orbital slot at 1° west, the THOR 8 communications satellite will meet the growing demand for connectivity and ensure continuity of Space Norway’s broadcasting service over a geographic coverage area from the Nordics to Central and Eastern Europe. THOR 8 will provide top-tier satellite connectivity for broadcasters and high-speed internet access for fixed and mobile infrastructure (maritime, terrestrial and aeronautical services) in Europe, the Middle East and Africa. With a launch mass of 4 metric tons, the satellite will be built on Thales Alenia Space’s Spacebus 4000B2 platform and will operate in the Ka and Ku frequency bands.

As prime contractor, Thales Alenia Space is responsible for the design, manufacture, testing and delivery of the satellite. THOR 8 will be launched in 2027 and will have an in-orbit service life of over 15 years.

Morten Tengs, CEO of Space Norway & Hervé Derrey, CEO of Thales Alenia Space © Thales Alenia Space/Briot

“I would like to thank Space Norway for its continued trust in Thales Alenia Space,” said Hervé Derrey, CEO of Thales Alenia Space. “THOR 8 is our second satellite built for Space Norway, after THOR 6, which was launched in 2009. This new contract further underscores the success of our robust and proven Spacebus 4000 product line, which has represented a total of 41 satellite programs, including 15 based on Spacebus 4000B2 product.”

Morten Tengs, CEO of Space Norway, stated: "The deployment of the THOR 8 satellite is a significant milestone in our mission to deliver advanced and reliable connectivity solutions. This strategic addition will enhance our capabilities, providing critical services to safeguard the interests of both national and international governments while meeting the demands of our commercial partners. We extend our gratitude to Thales Alenia Space for their long-standing partnership and commitment towards this transformational project."

About THALES ALENIA SPACE

Drawing on over 40 years of experience and a unique combination of skills, expertise and cultures, Thales Alenia Space delivers cost-effective solutions for telecommunications, navigation, Earth observation, environmental management, exploration, science and orbital infrastructures. Governments and private industry alike count on Thales Alenia Space to design satellite-based systems that provide anytime, anywhere connections and positioning, monitor our planet, enhance management of its resources, and explore our Solar System and beyond. Thales Alenia Space sees space as a new horizon, helping to build a better, more sustainable life on Earth. A joint venture between Thales (67%) and Leonardo (33%), Thales Alenia Space also teams up with Telespazio to form the parent companies’ Space Alliance, which offers a complete range of services. Thales Alenia Space posted consolidated revenues of approximately €2.2 billion in 2023 and has around 8,600 employees in 8 countries, with 16 sites in Europe.

/sites/default/files/database/assets/images/2022-10/New_Banner.jpg 10 Feb 2025 Thales Alenia Space Type Press release Structure Space Norway Cannes, February 10th, 2025 – Space Norway, Northern Europe’s leading satellite operator, and Thales Alenia Space, a joint venture between Thales (67%) and Leonardo (33%), today announced they have signed a contract for the supply of a new communications sat... Hide from search engines Off Don’t overwrite with Prezly data Off Canonical url https://www.thalesaleniaspace.com/en/press-releases/space-norway-orders-thor-8-telecom-satellite-thales-alenia-space

PingTalk

Fraud Starts with Identity Crime, Not Financial Loss

Fraud starts with identity crime, not financial crime. Discover how phishing, credential theft, and synthetic identities drive fraud—and how to stop them.

Herond Browser

Investing in celebrity meme coins: Is it worth the risk?

Celebrity meme coins have quickly become one of the most exciting and unexpected trends in the crypto world. These playful tokens, often inspired by celebrities or viral internet memes, have been grabbing attention in recent years. However, while these coins might seem like a fun way to get involved in the market, they come with […] The post Investing in celebrity meme coins: Is it worth the ris

Celebrity meme coins have quickly become one of the most exciting and unexpected trends in the crypto world. These playful tokens, often inspired by celebrities or viral internet memes, have been grabbing attention in recent years. However, while these coins might seem like a fun way to get involved in the market, they come with both great opportunities and notable risks. In this blog, we’ll take a closer look at celebrity meme coins, highlight the most popular ones, and discuss what the future might hold for this quirky trend.

Learn more: ROI in the Long Run: Cryptocurrency’s Potential for Sustainable Returns

What Are Celebrity Meme Coins?

In simple terms, celebrity meme coins are digital currencies either created or endorsed by well-known celebrities. Unlike more established cryptocurrencies like Bitcoin or Ethereum, these coins usually don’t offer much in terms of technical utility. Instead, their value largely comes from the celebrity behind them and the hype they generate. These coins can experience huge price jumps, often fueled by the celebrity’s popularity and their massive social media following.

Many celebrity meme coins are designed to be fun and lighthearted, drawing inspiration from pop culture, internet memes, or iconic moments from the celebrity’s career. Their value tends to fluctuate based on the buzz surrounding their launch and the ongoing promotion from the celebrity or their team.

Learn more: Bitcoin predictions: What to expect

Celebrity Meme Coins List: Top 5 Coins You Need to Know About

Here’s a closer look at some of the most popular celebrity meme coins that are making waves in the market today. These coins have garnered attention due to their celebrity backing, viral potential, and exciting price movements. Let’s dive into the details of the top 5 celebrity meme coins currently circulating:

$Jenner (Caitlyn Jenner) Price: $0.0001 Market Cap: $46M (Peak)

Launched with a bang, $Jenner took off when Caitlyn Jenner promoted it alongside a famous image with Donald Trump. It saw a huge spike initially, reaching a peak market cap of $46 million. However, it quickly dropped by over 65%, showing the volatile nature of meme coins. Even with this significant dip, $Jenner remains one of the most talked-about celebrity meme coins, thanks to its massive media attention and celebrity backing. The coin was part of a larger trend where several celebrities launched their tokens on the Pump.fun platform.

$Trump (Donald Trump) Price: $0.0001 Market Cap: $35M (Peak)

$Trump soared in popularity thanks to Donald Trump’s resurgence in the media and his loyal fanbase. The coin reached a market cap of $35 million, heavily supported by his political followers. Despite criticisms from some who saw it as a gimmick, the coin saw impressive growth, especially around Trump’s campaign comeback. It continues to generate interest, especially during political events and media coverage.

$Elon (Elon Musk) Price: $0.145 Market Cap: $1.2B

Without a doubt, $Elon is the most well-known celebrity meme coin, largely because of the massive influence of Elon Musk. Whenever Musk tweets or mentions anything about crypto, especially $Elon, the coin sees an instant surge in interest. With peaks reaching up to a billion-dollar market cap, $Elon is seen as a potential rival to Dogecoin. Its strong following and Musk’s continued influence make it a favorite among meme coin enthusiasts, cementing it as a significant player in the meme coin space.

$Mother (Iggy Azalea) Price: $0.0018 Market Cap: $10M (Peak)

$Mother, the meme coin backed by rapper Iggy Azalea, launched with a lot of buzz. While it hasn’t experienced the same explosive growth as $Elon, it remains a steady player in the celebrity meme coin market. Its market value has fluctuated as the initial excitement wore off, but $Mother continues to appeal to Azalea’s fanbase and meme coin collectors. It’s a good example of how celebrity-backed tokens can maintain interest despite the rollercoaster ride.

$Kekius (Kekius Maximus) Price: $0.02197 Market Cap: $22M

While $Kekius may be lesser-known than some of the other meme coins, it has found its niche within smaller crypto communities. With a more modest market cap, $Kekius has gained traction due to its dedicated followers and steady growth. This coin has become one of the hottest new meme coins to keep an eye on, with its loyal fanbase keeping the momentum going in the crypto space.

Why Are Celebrity Meme Coins So Popular?

Celebrity meme coins have taken off recently, and it’s easy to see why. Here are a few key reasons behind their growing popularity:

Celebrity Power: Celebrities are more than just famous figures; they’re also massive influencers. From Caitlyn Jenner to Elon Musk and even Iggy Azalea, these stars bring huge followings with them. When they back a meme coin, their fans often rush to get involved, driving up demand and boosting prices. Viral Power of Social Media: Celebrities are experts at leveraging social media to create instant buzz. Platforms like Twitter and Instagram allow them to easily share their new coin launches, sparking viral interest. This quick spread of information often leads to dramatic price spikes as more and more people jump on board. Fun and Engaging: Let’s face it—meme coins are fun! They’re often based on pop culture references or memes, making them easy to understand and relatable. Even those who aren’t crypto experts can enjoy the lighthearted side of meme coins. This fun factor attracts people who want to be part of the latest trend, not just make an investment. Fear of Missing Out (FOMO): As celebrity meme coins grow in popularity, FOMO kicks in. People see others making a quick profit, and the fear of missing out pushes them to get in on the action, sometimes even before fully understanding the risks. This rush of new investors adds to the excitement and can further drive prices up. Risks and Scams in Celebrity Meme Coins

Celebrity meme coins are fun and exciting, but they also come with some serious risks. Let’s break down the main concerns:

Volatility
Meme coins can shoot up in value one day and crash the next. It’s all about the hype. Take $Jenner for example: it hit a market cap of $46 million but dropped by 65% after the initial excitement wore off. This kind of roller coaster is typical for meme coins, so be prepared for major ups and downs if you’re thinking about investing. Pump and Dump Schemes
Some meme coins get inflated by hype, and then insiders sell off their coins when the price is high, leaving regular investors holding the bag. This is called a “pump and dump.” $Jenner faced this exact situation: its price spiked, but then the value collapsed after major holders sold off their coins. Lack of Regulation
Many celebrity meme coins are new, and there’s not much regulation around them. This makes them more vulnerable to scams. Without proper rules in place, it’s easier for shady activities to go unnoticed, and that can lead to huge losses for unsuspecting investors. Short-Lived Hype
Meme coins often get attention because of a viral moment or celebrity endorsement. But once the hype dies down, the coin can lose value quickly. Remember, these coins might seem like a great investment now, but they can fade just as fast as they rose.

Learn more: What can you buy with bitcoins?

The Future of Celebrity Meme Coins

Where are celebrity meme coins headed? Here’s what you should keep in mind about their future:

Celebrity Influence
Celebrities play a huge role in the success of these coins. If they keep promoting the coin, it might do well. But if they lose interest or the celebrity’s public image changes, the value can fall off a cliff. $Jenner and $Trump have seen big gains thanks to celebrity involvement, but how long will that last? Social Media Trends
Social media drives meme coin success. When a celebrity shares their coin on Twitter or Instagram, it can spark a huge surge in interest. However, if the trend shifts or people lose interest, the coin can quickly lose value. It’s all about timing, and trends can change fast. Regulations
Governments are still figuring out how to deal with meme coins. If countries decide to regulate or even ban them, it could affect their value. So, if you’re thinking about investing in these coins, it’s important to stay up to date on any changes in regulation that could impact the market. Which Meme Coin Might Hit $1 by 2025?

It’s hard to say for sure, but looking at the current trends and celebrity influence, $Elon and $Trump are the most likely meme coins to reach $1 by 2025. Their backing by some of the biggest names in the world gives them a special edge in the market. That said, meme coins are notorious for their wild volatility, and with their unpredictable nature, we can’t really know which of these coins will stand the test of time. Only time will tell which ones will thrive and keep growing in value.

Conclusion

Celebrity meme coins have taken the cryptocurrency world by storm, blending fun, pop culture, and investment opportunities into one exciting package. While they offer intriguing potential, especially with big names like Elon Musk and Donald Trump backing them, they come with inherent risks, including volatility, pump-and-dump schemes, and short-lived trends. 

As an investor, it’s important to stay informed, be cautious, and understand that celebrity-backed hype can be fleeting. If you’re looking to get involved in celebrity meme coins, take the time to do your research and be prepared for the ups and downs that come with this wild and unpredictable market.

Learn more: Ethereum Staking: What This Means & How to Stake ETH

About Herond Browser

Herond Browser is a cutting-edge Web 3.0 browser designed to prioritize user privacy and security. By blocking intrusive ads, harmful trackers, and profiling cookies, Herond creates a safer and faster browsing experience while minimizing data consumption.

To enhance user control over their digital presence, Herond offers two essential tools:

Herond Shield: A robust adblocker and privacy protection suite. Herond Wallet: A secure, multi-chain, non-custodial social wallet.

As a pioneering Web 2.5 solution, Herond is paving the way for mass Web 3.0 adoption by providing a seamless transition for users while upholding the core principles of decentralization and user ownership.

Have any questions or suggestions? Contact us:

On Telegram https://t.me/herond_browser DM our official X @HerondBrowser Technical support topic on https://community.herond.org

The post Investing in celebrity meme coins: Is it worth the risk? appeared first on Herond Blog.


How to save your crypto transaction fees

Crypto transaction fees can quickly add up, reducing the profits you make from trading or transferring digital currencies. But understanding these fees and knowing how to manage them can save you a lot of money in the long run. Whether you’re dealing with Bitcoin, Ethereum, or any other cryptocurrency, there are several ways to reduce […] The post How to save your crypto transaction fees appeare

Crypto transaction fees can quickly add up, reducing the profits you make from trading or transferring digital currencies. But understanding these fees and knowing how to manage them can save you a lot of money in the long run. Whether you’re dealing with Bitcoin, Ethereum, or any other cryptocurrency, there are several ways to reduce these costs. In this blog, we’ll explore what crypto transaction fees are, the factors that influence them, and provide you with actionable tips on how to save crypto transaction fee.

Learn more: Understanding the Benefits and Challenges of ICOs

What Are Crypto Transaction Fees?

Crypto transaction fees are the costs you pay when transferring digital currencies. These fees go to miners or validators who verify and record transactions on the blockchain. The fee amount can vary based on factors like the cryptocurrency used, network congestion, and how quickly you need the transaction to be processed.

For example, Bitcoin fees can spike during high traffic, while smaller coins may have lower fees but offer less security. Understanding these fees helps you manage costs when sending or receiving crypto.

Learn more: Ethereum Staking: What This Means & How to Stake ETH

4 Popular Types of Crypto Transaction Fees

Crypto transactions come with several types of fees, and understanding them can help you save money. Here’s a quick breakdown:

1. Network Fees

These are fees paid to miners or validators for processing transactions on the blockchain. The amount varies based on network congestion – the busier the network, the higher the fees. To save on this, it’s best to avoid trading during peak times.

2. Exchange Fees

Platforms like Coinbase or Binance charge fees for buying or selling crypto. These fees can vary depending on your trading volume. Many exchanges offer lower fees for higher trading volumes, so if you’re a frequent trader, you might pay less.

3. Deposit and Withdrawal Fees

These fees are charged when transferring funds to or from an exchange. Some platforms offer free deposits, but withdrawals can come with fees that vary based on the crypto and platform. Always check before moving your funds.

4. Maker and Taker Fees

On exchanges, “makers” are those who add liquidity by placing limit orders, while “takers” are those who execute market orders, taking liquidity. Maker fees are typically lower than taker fees, so if you want to save, it’s good to place limit orders and wait for them to be filled.

4 Factors That Influence Crypto Transaction Fees

Several factors can drive up or lower the cost of your crypto transactions. Let’s take a quick look at what influences these fees:

Network Congestion: When many people are trying to make transactions at the same time, it creates congestion. This high demand leads to increased fees, especially during peak times. Think of it like rush hour traffic; everyone is trying to get through at once. Transaction Size: Larger transactions require more processing power, and as a result, they often incur higher fees. The more complex the transaction, the more it costs to validate and record it on the blockchain. Blockchain Type: Different cryptocurrencies have different fee structures. For example, Bitcoin tends to have higher network fees due to its large user base and complex network. In contrast, other cryptocurrencies like Litecoin or Stellar are designed to have lower fees. Exchange Policies: Each crypto exchange has its own fee structure. Some may charge a flat fee, while others use tiered pricing based on your trading volume. It’s important to compare exchanges to find the best deal for your needs. 5 Tips On How To Reduce Bitcoin Transaction Fees

If you’re looking to minimize Bitcoin transaction fees, here are some practical steps that can make a big difference:

Choose the Right Time: Bitcoin transaction fees tend to increase during times of high network congestion. This happens when more people are trying to make transactions at the same time. To avoid this, try to make your transaction during quieter times, such as early in the morning or late at night when fewer people are active on the network.
Use SegWit Addresses: Bitcoin transactions can be sent using SegWit (Segregated Witness) addresses. These addresses allow for more efficient transactions by reducing the size of each transaction, which leads to lower fees. If your wallet supports SegWit, make sure you use these addresses for cheaper transactions.
Consolidate Transactions: Instead of sending multiple small transactions, consolidate them into one larger transaction. When you make several small payments, each one requires its own fee. By grouping smaller transactions together, you can significantly reduce the total amount you pay in fees.
Select Low-Fee Networks: Not all blockchains have the same transaction fees. While Bitcoin can be costly during busy periods, other cryptocurrencies like Litecoin or Stellar offer much lower fees. If your transaction can be done on one of these networks, it may be worth considering to save on costs.
Leverage Off-Peak Hours: Performing transactions when fewer people are using the Bitcoin network can help lower the fees. During off-peak hours (for example, weekends or early mornings), the network is less congested, which means your transaction will be processed at a lower cost.

Learn more:

Navigating the Basics of Bitcoin Network Fees

Bitcoin predictions: What to expect

Clarifying Unconfirmed Bitcoin Transaction ETA Meaning

How To Save Crypto Transaction Fee

When trading or transferring crypto, these strategies can help you save crypto transaction fee:

Limit Orders: Instead of using market orders that execute immediately at the current price, use limit orders. Limit orders allow you to set the price at which you’re willing to buy or sell a coin, which can reduce trading fees. Market orders often incur higher fees due to immediate execution, whereas limit orders give you more control over your costs.
Utilize Exchange Tokens: Many exchanges, like Binance with its native token BNB, offer discounts on trading fees if you use their platform’s tokens. Holding and using these tokens for fees can save you a significant amount, especially if you trade frequently.
Decentralized Exchanges (DEXs): DEXs, such as Uniswap or PancakeSwap, typically have lower fees compared to centralized exchanges. This is because they don’t require an intermediary, and the fee structure is often simpler. If you’re okay with slightly more technical setups, DEXs can be a great way to save money on transaction costs.
Consider Layer 2 Solutions: For Bitcoin, using Layer 2 solutions like the Lightning Network can drastically reduce transaction fees. These networks work by handling transactions off-chain and then settling them on the main blockchain later, enabling faster and cheaper transactions. If you frequently send Bitcoin or other supported cryptocurrencies, exploring Layer 2 could be a game-changer for reducing fees. Conclusion

Saving on crypto transaction fees is essential for maximizing your profits and minimizing unnecessary expenses. By understanding the different types of fees, such as network fees and exchange fees, and using strategies like selecting the right time for transactions or opting for decentralized exchanges, you can significantly reduce your costs. It’s all about being smart with your crypto transactions, and with these tips, you’ll be able to save crypto transaction fee and trade more efficiently.

Learn more: ROI in the Long Run: Cryptocurrency’s Potential for Sustainable Returns

About Herond Browser

Herond Browser is a cutting-edge Web 3.0 browser designed to prioritize user privacy and security. By blocking intrusive ads, harmful trackers, and profiling cookies, Herond creates a safer and faster browsing experience while minimizing data consumption.

To enhance user control over their digital presence, Herond offers two essential tools:

Herond Shield: A robust adblocker and privacy protection suite. Herond Wallet: A secure, multi-chain, non-custodial social wallet.

As a pioneering Web 2.5 solution, Herond is paving the way for mass Web 3.0 adoption by providing a seamless transition for users while upholding the core principles of decentralization and user ownership.

Have any questions or suggestions? Contact us:

On Telegram https://t.me/herond_browser DM our official X @HerondBrowser Technical support topic on https://community.herond.org

The post How to save your crypto transaction fees appeared first on Herond Blog.


FastID

The lengthiest HTTP headers

Discover how large HTTP headers can impact your web page's loading speed. Learn about essential headers and strategies to optimize their size for better performance.
Discover how large HTTP headers can impact your web page's loading speed. Learn about essential headers and strategies to optimize their size for better performance.

Friday, 07. February 2025

auth0

Build a Secure RAG Agent Using LlamaIndex and Okta FGA on Node.js

Learn how to use Okta FGA to secure your LlamaIndex RAG agent on Node.js.
Learn how to use Okta FGA to secure your LlamaIndex RAG agent on Node.js.

Kin AI

Resolving Internal Conflict: How Personal AI Can Help

As the world becomes more turbulent, it can be harder to escape internal conflict and dilemmas. What if there was a faster way?

Try Kin - Personal AI

Photo by Randy Jacob on Unsplash

In real life, just as in any good story, internal conflict shapes who people become. However, as technology becomes more focused toward round-the-clock production, the modern workplace increasingly presents dilemmas that pit people’s roles, values, and desires against each other.

This rising tide of inner conflict isn't surprising. Just as a main character faces challenges that drive character development in literature, people face opposing forces in their daily lives. As remote work blurs the lines between professional and personal spheres, and social media constantly shows alternate paths, many find themselves caught between these competing personal choices.

Understanding what is internal conflict and how to resolve it has therefore become crucial for maintaining both self-image and well-being. Writers have long used writing tips about character development to illustrate how internal conflict drives personal growth—and these same insights can help us understand our own inner struggles.

I’m Yngvi Karlson, Co-Founder of Kin. Born in the Faroe Islands, I’ve spent my career building startups, with two exits along the way, and five years as an active venture capitalist. Now, I’m dedicated to creating Kin, a personal AI people can truly trust.

Follow me on LinkedIn, TikTok and X

To help, I’m going to discuss the following in this article:

Understanding Internal Conflict

Evidence-Based Strategies for Conflict Resolution

Creating an Internal Conflict Action Plan

The Role of Artificial Intelligence in Internal Conflict Resolution

How Kin Supports Internal Conflict Resolution as a Personal AI

Get Started Today with an AI Assistant You Can Trust

In short, we’ll explore the nature of inner turmoil, its impact on our life stories, and evidence-based strategies for finding resolution—including how artificial intelligence like Kin can help navigate these challenging waters.

Photo by Windows on Unsplash Understanding Internal Conflict

Internal conflict occurs within a character's mind—whether that character is fictional or, as in our case, ourselves. These conflicts manifest as tension between what we think we should do and what we want to do, creating moral dilemmas that challenge our self-awareness. This differs from external conflict, where we battle external forces like circumstances or other people.

Writers often use various types of internal conflict to drive character arcs. Writing tips from skilled authors remind us that the most compelling stories feature characters whose internal struggles mirror our own experiences with personal growth. In our own character development, we might face similar conflicts.

A classic example is the struggle between career advancement and work-life balance—like a professional weighing whether to take a higher-paying job that requires more time away from loved ones. Here, the character's internal conflict (ambition versus personal values) often intertwines with external forces (workplace demands versus family needs).

The different types of internal conflict we face include:

Moral conflict between competing ethical principles

Self-doubt about our abilities or choices

Cognitive dissonance between beliefs and actions

Personal growth challenges that test our self-image

Examples of internal conflict in professional settings often mirror those found in a good story: the ambitious employee torn between advancement and ethical concerns, or the team leader struggling with difficult decisions about resource allocation. These inner struggles create compelling character arcs in both fiction and real life.

Common Causes of Internal Conflict

Understanding why we face such inner turmoil helps in resolving internal conflicts effectively. Research in psychological literature identifies several common triggers that any main character in their own life story might face:

Value Conflicts: When different personal values compete for priority, creating moral dilemmas. For instance, valuing both honesty and loyalty can create conflict when keeping a friend's secret would mean being dishonest with others.

Decision Paralysis: The tension created when multiple good (or bad) options exist, each with their own advantages and drawbacks. This often occurs in career decisions, relationship choices, or major life changes.

Role Conflicts: When different roles in life demand conflicting behaviors or time commitments. A common example is balancing professional responsibilities with personal relationships or self-care.

Identity Transitions: During periods of personal growth or change, internal conflict often arises between old patterns and new aspirations. This is particularly common during career changes or relationship evolutions.

Signs of Unresolved Internal Conflict

Recognizing internal conflict is the first step toward resolving it. Research from the American Institute of Stress identifies several common indicators that internal conflict may be affecting someone's well-being.

In emotional terms, persistent anxiety, irritability, and mood swings often signal unresolved internal conflict. People might notice themselves feeling constantly unsettled or unsatisfied, even when external circumstances are relatively stable. Many report a sense of being "stuck" or unable to move forward with decisions.

Behaviorally, internal conflict often manifests as procrastination, indecisiveness, or inconsistent actions. Someone might repeatedly change their mind about important decisions, or find themselves unable to stick to resolutions they've made. Sleep disturbances are another common sign, with studies showing that unresolved internal conflict can reduce sleep quality by up to 30%.

Physical manifestations can include tension headaches, digestive issues, and muscle tension—particularly in the neck and shoulders. These symptoms often worsen during periods when the internal conflict feels most pressing.

Photo by youssef naddam on Unsplash Evidence-Based Strategies for Conflict Resolution

Research in cognitive psychology and neuroscience has identified several effective approaches to resolving internal conflict and cognitive dissonance. These strategies don't just provide temporary relief—they help build lasting resilience and decision-making confidence.

While seeing a mental health professional can be beneficial during times of extreme internal conflict, sometimes that can be too costly or impractical. It’s also helpful to learn how to work through it individually, so that it can be more efficiently dealt with.

The current science suggests three main approaches:

1. Changing conflicting behavior to align with values

2. Updating beliefs to accommodate necessary behaviors

3. Adding new information that bridges the gap between beliefs and actions

For the first, one powerful approach comes from Acceptance and Commitment Therapy (ACT), which is a type of talking therapy that helps patients recognise and follow their personal values.1 This involves deeply examining what truly matters to someone—beyond surface-level preferences or societal expectations—by asking them to open up and examine all of their thoughts, reactions, and feelings.

For the second, cognitive restructuring can be a helpful exercise. This evidence-based technique involves examining and challenging the thoughts underlying internal conflicts, and proposing plausible alternatives to uncomfortable beliefs. This might mean questioning whether moving for a new job is inherently negative, or whether a difficult conversation at work really will end a relationship—and considering possible and less extreme situations instead.2

For the last, research as a tool is as important as ever. For example, someone in a creative tech role like the games industry might initially have an issue accepting lucrative AI support in their work. However, they may be able to bridge the gap by discovering and supporting ethical and genuinely useful AI products, rather than more environmentally-damaging AI.

Mindfulness approaches like Journaling have also shown remarkable effectiveness, as discussed previously, as they allow people to better understand and recognize sources of conflict.

But, how does that actually get put into practice, and used to help?

Photo by Glenn Carstens-Peters on Unsplash Creating an Internal Conflict Action Plan

Moving from understanding to action requires a structured approach. As we discussed in our goal-setting article, breaking down conflict resolution into manageable steps significantly improves outcomes. The key is creating a process that feels both comprehensive and achievable—here’s an example to begin working with:

Define the Conflict: Start by clearly articulating the conflict, including all competing elements. Write down not just the surface-level conflict, but the deeper values and needs at play. For instance, a conflict about taking a new job might actually be about balancing security with growth, or personal fulfilment with family responsibilities.

Develop Evaluation Criteria: Think about what the ideal solution might include, both practically (like salary) and emotionally (like family time). Try to be as clear as possible.

Examine the Assumptions Underlying the Conflict. Often, people have incorrect, unconscious beliefs that make conflicts seem worse than they are. By writing out all of the things that feel true about a dilemma, and tackling them with the methods from the last section, truth can be more easily separated from fiction. For example, the belief that a role with a new company means contact will be lost with old teammates can be challenged by the fact that many people stay friends with ex-colleagues.

Brainstorm Solutions: This section is easier said than done. Still, by combining the previous steps, it’s common that a solution or decision that felt unrealistic due to unconscious assumption now appears more fitting. Either way, the goal isn't to find a perfect solution—research shows that aiming for ‘good enough’ decisions that honor our core values leads to better outcomes than pursuing perfection.3

Even with all of the above support, however, trying to resolve internal conflict independently can be a long and stressful process. This is why more and more advanced support systems are being developed for exactly that reason.

Photo by Possessed Photography on Unsplash The Role of Artificial Intelligence in Internal Conflict Resolution

Modern technology, particularly artificial intelligence, has introduced new tools for addressing internal conflict effectively.

Though the internet has made knowledge and psychological support more accessible than ever, an AI companion can serve as an unique space for exploring thoughts and feelings without judgment, AI chatbots can respond back with tailor-made responses.

This dynamic can help identify patterns in someone’s decision-making, emotional responses, and behavior that contribute to internal conflict—and an advanced enough personal AI could even suggest therapies, therapists and tactics to deal with these personal triggers.

However, the effectiveness of these tools depends heavily on user trust and privacy—without it, users won’t discuss their internal conflicts in enough detail for the AI to provide accurate support. As we’ve said before, this is why the relationship between users and their personal AI must be built on a foundation of complete transparency and robust privacy protection.

How Kin Supports Internal Conflict Resolution as a Personal AI

Kin represents a new approach to resolving internal conflict, combining the benefits of traditional self-reflection tools with advanced AI capabilities.

Kin’s empathetic and customizable Chat interface and Journal systems gives users an open space to explain and express their internal dilemmas either in conversation or in notes, while still providing web search capabilities and custom responses.

However, Kin’s unique power comes from its advanced Memory, which allows it to remember and reference everything said to it in its Chat or Journal, unlike standard AI chatbots.

This understanding enables Kin to provide increasingly personalized guidance, as the AI assistant can identify patterns from past situations, highlight previous successful resolutions, and guide users through using and personalizing structured reflection processes like the one given above.

This way, resolving internal conflict never has to be an individual job again—and at the very least, Journal notes become much easier to access.

But, we don’t expect you to blindly trust our AI companion with your personal struggles. Kin maintains strict privacy standards, storing and processing information locally on user devices whenever possible, and securely in the cloud wherever possible.

This data can be viewed and deleted at any time, and Kin will never be able to read it, let alone trace it back to an individual user. Supporting people is our business, not their data.

Get Started Today with an AI Assistant You Can Trust

Ready to begin addressing your internal conflicts more effectively? Download Kin here, and start with this message:

"Hi Kin! I've been struggling with internal conflict about [specific situation/decision]. I feel torn between _______ and _______, and it's making me feel _______. I'd like to work through this with you and develop better strategies for handling similar conflicts in the future. Can you help guide me through this process?"

From there, Kin will help explore your conflict, identify patterns, and develop personalized strategies for finding resolution.

Remember, resolving internal conflict is a journey of personal growth—and having the right support, built on trust and understanding, can make all the difference.

1

Clarke, B. 2024. ‘What Is ACT therapy?’ www.bupa.co.uk. Available at: https://www.bupa.co.uk/newsroom/ourviews/act-therapy [Accessed 02/05/25]

2

Crum, J. 2021. ‘Understanding Mental Health and Cognitive Restructuring With Ecological Neuroscience.’ Frontiers in Psychiatry, 12, 697095. Available atL https://doi.org/10.3389/fpsyt.2021.697095 [Accessed 02/05/25]

3

Swider, B.; Harari, D.; Breidenthal, A.P.; Steed, L.B. 2018. ‘The Pros and Cons of Perfectionism, According to Research’. hbr.org. Available at: https://hbr.org/2018/12/the-pros-and-cons-of-perfectionism-according-to-research [Accessed 05/02/25]


Herond Browser

Bitcoin predictions: What to expect

Bitcoin has had a wild journey since it first appeared in 2009. It’s gone from being worth just a few cents to reaching nearly $110,000 at its peak. With so many ups and downs, it’s no surprise that people are always asking: “What will Bitcoin be worth in 2025?” or “What is the realistic Bitcoin […] The post Bitcoin predictions: What to expect appeared first on Herond Blog.

Bitcoin has had a wild journey since it first appeared in 2009. It’s gone from being worth just a few cents to reaching nearly $110,000 at its peak. With so many ups and downs, it’s no surprise that people are always asking: “What will Bitcoin be worth in 2025?” or “What is the realistic Bitcoin price prediction?” In this post, we’ll dive into Bitcoin’s past performance, what experts are saying about its future, and what factors could shape Bitcoin predictions in the years ahead.

Learn more: What can you buy with bitcoins?

Bitcoin’s Performance Over the Years

Bitcoin’s price history is nothing short of a rollercoaster. When it first launched, it was almost worthless. Fast forward to 2017, and Bitcoin hit $20,000, only to fall back down. But every time it seemed like Bitcoin might fade away, it bounced back stronger. By 2021, it soared to nearly $65,000 before experiencing another dip.

As Bitcoin continues to gain attention, more and more people are asking “How much will 1 Bitcoin be worth in 5 years?” Bitcoin has shown growth over the years, but its price is also incredibly volatile, which is why predicting its future isn’t easy. For example, market events like major companies investing in Bitcoin or countries announcing regulations can dramatically influence its price.

Learn more: Navigating the Basics of Bitcoin Network Fees

What Experts Are Saying About Bitcoin Predictions

Many experts have different opinions on Bitcoin’s future. Some are optimistic, predicting that Bitcoin could continue to rise in value, especially as more businesses and investors get involved. Others are more cautious, pointing out the risks, like its volatility and the uncertainty around regulation.

If you’re wondering, “What is the realistic Bitcoin price prediction?” you’ll find a wide range of answers. Some say Bitcoin could hit $200,000 or even $500,000 in the next few years. Others believe that it might stabilize around $75,000. One thing that many experts agree on is that Bitcoin’s price will likely continue to grow over time, but it’s not going to be a smooth ride.

Expert Predictions for Bitcoin’s Future Matrixport

Financial firm Matrixport predicts that Bitcoin will reach $160,000 by 2025. Markus Thielen, the company’s Chief Research Officer, believes that stable demand from Bitcoin spot ETFs, favorable macroeconomic trends, and the expansion of global liquidity will drive Bitcoin’s price to new heights.

Galaxy Digital

Alex Thorn, Head of Research at Galaxy Digital, forecasts that Bitcoin could exceed $150,000 by mid-2025, eventually reaching $185,000 by the fourth quarter. Thorn attributes this expected rise to growing acceptance of Bitcoin by institutions, businesses, and even governments, which will play a crucial role in pushing Bitcoin to new price levels.

Maple Finance

Sid Powell, CEO of Maple Finance, projects that Bitcoin could range from $180,000 to $200,000 by the end of 2025. Powell believes that the influx of capital into Bitcoin ETFs will continue to increase as Bitcoin becomes a key asset for institutional investors.

Standard Chartered

Geoffrey Kendrick, Head of Digital Asset Research at Standard Chartered, provides an ambitious prediction that Bitcoin may reach $200,000 in 2025. He suggests that institutional investor demand will remain strong, particularly as pension funds begin adding Bitcoin to their portfolios through Bitcoin ETFs.

Nexo

Elitsa Taskova from Nexo is the most optimistic, predicting that Bitcoin could rise to $250,000 by the end of 2025. Taskova attributes this forecast to increasing recognition of Bitcoin as a reserve asset and favorable macroeconomic factors, which could propel Bitcoin past gold within the next decade.

4 Factors That Could Impact Bitcoin’s Price

There are a few things that could affect Bitcoin’s price in the future, and it’s important to keep these in mind:

Market Adoption: The more businesses and people use Bitcoin, the more its price could rise. If Bitcoin becomes a mainstream asset, like gold, it could see its value increase significantly.
Regulation: Governments around the world are still figuring out how to handle Bitcoin. Regulations will play a huge role in Bitcoin’s future. If countries decide to embrace it, the price could rise; if they decide to restrict or ban it, we could see a price drop.
Technology: Bitcoin’s technology is constantly evolving. Improvements to its blockchain, like the Lightning Network, could make Bitcoin faster and more practical for everyday use, which would boost its value.
Global Economy: Inflation and the value of traditional currencies will also influence Bitcoin. In times of economic instability, Bitcoin has been seen as a safe haven for people looking to protect their wealth, which could push its value up.
5 Risks and Challenges to Keep in Mind Trading Bitcoins

Bitcoin can be an exciting investment, but it’s not without risks. Here are some key challenges to consider:

Volatility

Bitcoin is known for its wild price swings. Its price can rise or fall thousands of dollars in a short period, which can be great for those looking for quick profits but risky for long-term investors. These price movements are driven by market sentiment, news, and global events, making Bitcoin unpredictable in both the short and long term.

Security Issues

While Bitcoin’s blockchain is secure, exchanges and wallets are vulnerable to hacks. High-profile attacks on exchanges have led to millions of dollars worth of Bitcoin being stolen. If you’re holding Bitcoin on an exchange, you’re at risk, which is why using secure methods like hardware wallets is essential.

Market Manipulation

Bitcoin’s price is also affected by large holders, known as “whales.” These whales can influence the market by buying or selling large amounts of Bitcoin, causing sudden price changes. This makes Bitcoin’s price more susceptible to manipulation, which adds an extra layer of unpredictability.

Competition from Other Cryptos

While Bitcoin is the largest cryptocurrency, it faces growing competition from others like Ethereum, which offer unique features. These cryptocurrencies may eventually challenge Bitcoin’s dominance, which could affect its market share and price.

Regulation

Governments are still figuring out how to regulate Bitcoin. Countries like China have imposed bans, while others are adopting Bitcoin more openly. New regulations could impact Bitcoin’s price, either positively or negatively, depending on how they are implemented.

Learn more: Clarifying Unconfirmed Bitcoin Transaction ETA Meaning

Conclusion

Bitcoin’s future is full of possibilities, but it’s also uncertain. As we’ve discussed, there are many factors that could shape Bitcoin’s price, from adoption rates and regulations to technological advancements. While predictions like “Will Bitcoin reach $10 million?” are exciting, we need to take them with a grain of salt.

What we can say for sure is that Bitcoin has the potential to grow, and it will likely continue to be a major player in the world of finance. But as with any investment, there are risks. If you’re looking to invest in Bitcoin, make sure you understand both the rewards and the risks.

Learn more: What Does HODL Mean in Crypto?

About Herond Browser

Herond Browser is a cutting-edge Web 3.0 browser designed to prioritize user privacy and security. By blocking intrusive ads, harmful trackers, and profiling cookies, Herond creates a safer and faster browsing experience while minimizing data consumption.

To enhance user control over their digital presence, Herond offers two essential tools:

Herond Shield: A robust adblocker and privacy protection suite. Herond Wallet: A secure, multi-chain, non-custodial social wallet.

As a pioneering Web 2.5 solution, Herond is paving the way for mass Web 3.0 adoption by providing a seamless transition for users while upholding the core principles of decentralization and user ownership.

Have any questions or suggestions? Contact us:

On Telegram https://t.me/herond_browser DM our official X @HerondBrowser Technical support topic on https://community.herond.org

The post Bitcoin predictions: What to expect appeared first on Herond Blog.


Are Trump NFTs a good investment?

Trump NFTs have caught the attention of many, offering a way to own a piece of the former president’s legacy in the digital world. Launched in 2022, these NFTs have sparked interest from both fans and investors. But are they really a good investment? In this blog, we’ll take a closer look at how Trump […] The post Are Trump NFTs a good investment? appeared first on Herond Blog.

Trump NFTs have caught the attention of many, offering a way to own a piece of the former president’s legacy in the digital world. Launched in 2022, these NFTs have sparked interest from both fans and investors. But are they really a good investment? In this blog, we’ll take a closer look at how Trump NFTs have performed, the risks and rewards, and whether they’re a smart investment choice.

Learn more: Everything You Need to Know About Non-Fungible Tokens (NFTs)

Trump NFTs: A Quick Overview

Trump NFTs are digital collectibles tied to the former president’s brand. These unique, blockchain-based assets feature artwork inspired by Trump’s career and persona. Launched in late 2022, Trump NFTs include limited-edition cards and images, appealing to his supporters and investors alike.

Trump entered the NFT market as a way to expand his brand and tap into the growing interest in digital assets. This move also provided an opportunity to raise funds and connect with his audience in a new, innovative way. By offering these NFTs, Trump allowed fans to own a piece of his legacy, while investors saw potential for growth in these exclusive items.

These NFTs are closely tied to Trump’s identity as both a businessman and a political figure. For fans, owning a Trump NFT means having a part of history. For investors, they represent a chance for financial gain, driven by their rarity and celebrity backing.

Learn more: The Complete Guide to NFT Marketplace

How Did Trump NFTs Perform?

Since their release, Trump NFTs have had some ups and downs. Initially, they were priced at $99, but after launch, their value surged. Today, some NFTs are worth around 0.145 ETH (around $235). If you had invested $1,000 in Trump NFTs when they were first released, you could have bought 10 NFTs. Now, those 10 NFTs would be worth $2,350. This is a return of about 135% in just 10 months.

However, the market has been volatile. The price of these NFTs has dropped from its peak, where they were worth over $1,000 at one point. Still, the performance of these NFTs has been much better than the S&P 500, which only returned 8.9% over the same period.

S&P 500 vs. Trump NFTs: A Comparison

When comparing Trump NFTs to traditional investments like the S&P 500, NFTs have done much better. A $1,000 investment in Trump NFTs would be worth $2,350, while the same amount invested in the S&P 500 would have grown to $1,089. This shows the higher potential returns in the NFT market, but also highlights the higher risk involved.

The second series of these NFTs has not done as well. The value of these NFTs has dropped, with current prices around $55.92 per NFT, showing that the market can change quickly.

Learn more: Utilize Smart Contracts for Effective NFT Transactions

Pros and Cons of Trump NFTs for Coin Investors

Trump NFTs have both advantages and risks for investors. While they offer high return potential through celebrity backing and media attention, they also come with significant volatility and political controversy. Here’s a look at the pros and cons.

Pros: Celebrity Backing: Trump’s name and brand make these NFTs attractive to collectors. Potential for High Returns: With limited editions, these NFTs can rise in value, especially if interest increases. Media Influence: Media attention, especially with Trump being president again, can boost the value of these NFTs. Cons: High Volatility: Prices can go up quickly but can also fall just as fast, making them a risky investment. Political Influence: Trump’s political background can make these NFTs controversial. Some people may avoid them because of his political ties. Risk of Hype: The value of thsse NFTs can be driven by media attention and public trends, making them unpredictable. The Future of Trump NFTs: Are Trump NFTs a good investment?

The future of Trump NFTs depends on several factors, such as Trump’s political career and how the NFT market develops. If Trump’s popularity stays high, demand for his NFTs might rise. However, the NFT market is still new and unpredictable, so it’s hard to say if these NFTs will continue to increase in value.

For those looking to invest long-term, it’s important to consider the risks. These NFTs may offer high returns in the short term, but their value could drop as quickly as it rises. Political events and market trends will be key to whether these NFTs continue to be a good investment.

Learn more: Metaverse Real Estate: Investing in the Virtual World

Conclusion

Trump NFTs offer a unique investment opportunity, with potential for high returns thanks to Trump’s brand and media attention. However, they also come with risks – especially given the volatility of the NFT market and Trump’s political ties. While they’ve outperformed traditional investments so far, their future remains uncertain. As with any investment, it’s important to weigh both the upsides and the risks before jumping in.

About Herond Browser

Herond Browser is a cutting-edge Web 3.0 browser designed to prioritize user privacy and security. By blocking intrusive ads, harmful trackers, and profiling cookies, Herond creates a safer and faster browsing experience while minimizing data consumption.

To enhance user control over their digital presence, Herond offers two essential tools:

Herond Shield: A robust adblocker and privacy protection suite. Herond Wallet: A secure, multi-chain, non-custodial social wallet.

As a pioneering Web 2.5 solution, Herond is paving the way for mass Web 3.0 adoption by providing a seamless transition for users while upholding the core principles of decentralization and user ownership.

Have any questions or suggestions? Contact us:

On Telegram https://t.me/herond_browser DM our official X @HerondBrowser Technical support topic on https://community.herond.org

The post Are Trump NFTs a good investment? appeared first on Herond Blog.

Thursday, 06. February 2025

Spruce Systems

Recognition of Award-Winning Privacy Research Paper

SpruceID CEO Wayne Chang's collaborative research on personhood credentials is recognized in the Future of Privacy Forum’s Privacy Papers for Policymakers Awards, highlighting its impact on digital credentials and AI trust.

We are thrilled to announce that SpruceID CEO Wayne Chang's collaborative research on privacy-preserving tools in the digital identity space has been recognized as a winner of the Future of Privacy Forum’s (FPF) 15th Annual Privacy Papers for Policymakers (PPPM) Awards.

The research paper, Personhood Credentials: Artificial Intelligence and the Value of Privacy-Preserving Tools to Distinguish Who is Real Online, highlights the importance of maintaining online trust while preserving user anonymity in the age of AI.

The Privacy Papers for Policymakers (PPPM) Awards honor outstanding privacy research that informs policymakers on emerging data protection challenges and solutions. This year’s winners were selected by a panel of leading academics, advocates, and privacy professionals, recognizing research that contributes to the global conversation on privacy and security.

What are Personhood Credentials?

This paper explores the concept of personhood credentials (PHCs)—digital credentials that allow users to verify their status as real people rather than AI-generated entities without exposing personal information.

With AI-generated content becoming more sophisticated, the ability to distinguish between real and synthetic entities online is crucial to combating fraud, misinformation, and digital deception. Our research provides actionable insights for policymakers, technologists, and standards bodies on deploying PHCs in a privacy-preserving and equitable way.

Supporting PHCs with Verifiable Digital Credentials

At SpruceID, this research aligns with our mission to empower individuals with verifiable digital credentials that enhance trust and security without compromising privacy.

Our work in decentralized identity solutions ensures that users maintain control over their personal data while enabling seamless and trustworthy interactions online. The development and implementation of personhood credentials directly reinforce the principles behind verifiable digital credentials, providing real-world applications for privacy-first authentication and identity verification.

Advancing Privacy-First Digital Identity Solutions

It's an honor to contribute to this important dialogue and remain committed to advancing privacy-first digital identity solutions.

If you want to learn more about technologies that can be used to implement personhood credentials, check out our knowledge base.

To learn more about this work and other award-winning research, visit FPF’s official announcement and click the link below to read the full research paper.

Read the Research Paper

About SpruceID: SpruceID is building a future where users control their identity and data across all digital interactions.


KILT

The KILT Foundation is Here

We are delighted to announce that the KILT Foundation has been established. This is a new entity dedicated to supporting KILT’s growth, representing the DAO, and building strategic partnerships. BOTLabs’, the initial developer of the KILT Protocol, single purpose was to build the KILT Protocol and then take care of the decentralisation process. As the KILT community has now established the KILT F

We are delighted to announce that the KILT Foundation has been established. This is a new entity dedicated to supporting KILT’s growth, representing the DAO, and building strategic partnerships.

BOTLabs’, the initial developer of the KILT Protocol, single purpose was to build the KILT Protocol and then take care of the decentralisation process. As the KILT community has now established the KILT Foundation, this goal has been reached.

The KILT core developers and design team has transitioned to galaniprojects, KILT’s first and most recognised integrator. They will maintain the KILT blockchain and work closely with the KILT Foundation to develop new features on community request. The team size has not been reduced.

The administrative employees, Elisa, Matthias, and Ingo, become independent KILT agents and continue their work for PoKe — Polkadot’s Key Account BD Unit under the umbrella of BOTLabs. Ingo remains the sole founder of KILT Protocol and will devote significant time and resources to continue his presence for KILT and its community.

Gustav stays in the Polkadot ecosystem, transitioning into the legal department of Parity Technologies, a company that develops much of the open-source tech that drives Polkadot.

The Foundation, led by Rish and Svet, will cater to the community’s needs and the well-being of the KILT network and developed software. They maintain the vision and necessary financial resources to lead KILT into a bright future.

The handover process is now underway! Stay updated by following @KILTProtocol on X (Twitter).

The KILT Foundation is Here was originally published in kilt-protocol on Medium, where people are continuing the conversation by highlighting and responding to this story.


ComplyCube

AML Check Cost: Hidden Fees in Compliance

Many businesses fail to recognize hidden costs within AML processes due to a lack of understanding of what drives AML pricing. This guide dives into how to identify hidden costs in AMLcheck pricing whilst ensuring compliance. The post AML Check Cost: Hidden Fees in Compliance first appeared on ComplyCube.

Many businesses fail to recognize hidden costs within AML processes due to a lack of understanding of what drives AML pricing. This guide dives into how to identify hidden costs in AMLcheck pricing whilst ensuring compliance.

The post AML Check Cost: Hidden Fees in Compliance first appeared on ComplyCube.


Kin AI

What is Kin For?

Kin can do a lot of things—but why?

Try Kin - Personal AI

More than just an AI chatbot, Kin is your personal artificial intelligence support system, designed to help you navigate both professional and personal challenges through personalized guidance and continuous learning.

I’m Yngvi Karlson, Co-Founder of Kin. Born in the Faroe Islands, I’ve spent my career building startups, with two exits along the way, and five years as an active venture capitalist. Now, I’m dedicated to creating Kin, a personal AI people can truly trust.

Follow me on LinkedIn, TikTok and X

To help you understand what that means, this article will cover:

How to Get the Most from Kin

Maximizing Kin’s Support

Extra Tips for Using Kin

Get Started Today with Your AI Assistant

So, let’s get into it.

How to Get the Most from Kin

Here's how to understand and maximize Kin's support capabilities:

Understand Kin's Core Support Areas as a Personal AI

After downloading Kin, you'll find it can help with three main areas:

Professional Development

Kin’s advanced Communication, Memory, and Reminder systems make it ideal for helping you with the following through research, discussion, and roleplay:

Navigating and improving workplace relationships

Planning career moves

Improving communication skills, both in public speaking and everyday life

Tracking professional goals

Preparing for important meetings

💡 Kin’s Chat can be a great place to figure out your next professional move

Personal Growth

These same skills make Kin a powerful tool for:

Processing emotions and experiences

Building better habits

Strengthening non-professional relationships

Making life decisions

Tracking personal goals

💡 Kin’s Journal is similarly a good place for self-reflection

Daily Support

And finally, they also make Kin immensely useful for:

Remembering commitments

Preparing for conversations

Analyzing your behavioral patterns, and those of others

Providing task reminders

Searching for miscellaneous solutions

💡 Kin can help with any combination of these areas, and can mix and match abilities between them—you're not limited to just one!

Choose Your Interaction Method with Your AI Companion

Kin offers two main ways to interact for this support:

Chat Feature

This is found through the speech bubble icon, on the bottom right of the Home page. It’s great for:

Quick questions and immediate support

Direct conversations about specific topics

Two-way discussions

Setting reminders and searching for information

Journal Feature

This is found through the book icon, on the bottom left of the Home page. It’s good for:

Deeper reflection on experiences

Processing complex emotions

Working through difficult decisions

Keeping track of your habits and emotional states

💡 Both features have typing and dictation input modes, and both feed into Kin's Memory, helping it understand you better over time.

Build Kin's Understanding with Privacy and Trust

The more you tell Kin about you, the better it can provide what you’re looking for. And don’t worry—we take privacy and trust very seriously.

Help Kin support you better by sharing:

Your current situation and challenges

Your goals and aspirations

Your relationships and social dynamics

Your preferred communication styles

Your daily experiences and feelings

💡 If you’re not sure where th gaps in Kin’s learning are, head to the Knowledge Map, or simply ask!.

Track Kin's Learning

Visit the Streaks & Stats tab within the flame icon on the top right of the Home page to see:

Your daily usage streak

What Kin has learned about you today

Your Knowledge Map (connected dots icon, top right)

The Knowledge Map shows everything Kin knows about you and how it's all connected.

💡 You can delete anything from Kin's memory at any time from this tab, or by asking in Chat.

Maximizing Kin's Support

Want to get the most from Kin? Here are some proven strategies:

1. Be Consistent

Regular interaction helps Kin build a better understanding of you. Even brief daily check-ins contribute to its ability to provide relevant support.

2. Share Context

When discussing situations with Kin, include relevant details about people involved, your feelings, and any important background information.

3. Use Multiple Features

Combine Kin's Chat and Journal features for comprehensive support. Use Chat for immediate guidance and Journal for deeper reflection.

4. Monitor Progress

Regularly review your Knowledge Map to see patterns in your behavior and track your progress toward goals.

Extra Tips for Using Kin

Here are some additional ways to enhance your experience with Kin:

Start Small: Begin with simple check-ins and gradually explore more features.

Be Specific: The more detailed your sharing, the more targeted Kin's support.

Stay Open: Trust in Kin's privacy features and be honest about your challenges

Ask Questions: If unsure about how Kin can help, just ask - it's always learning.

Get Started Today with Your AI Assistant

Ready to begin working with Kin? Download the app and start with this simple message:

"Hi Kin! I could use some support with __________. Could you help me understand how we might work on this together?"

Remember, Kin becomes more helpful with each interaction, so start wherever feels most comfortable and build from there.


Caribou Digital

“Serious yet fun”: Games as tools for digital development

This piece explores the use of serious games in international development spaces, acknowledges their challenges and limitations, and considers ways to create thoughtful gaming scenarios that inspire learning and action. By Dr. Savita Bailur — Senior Director of Gender Equality & Social Inclusion, and Jesús Tabares — Grants & Community Manager, both at Caribou. What are serious&

This piece explores the use of serious games in international development spaces, acknowledges their challenges and limitations, and considers ways to create thoughtful gaming scenarios that inspire learning and action.

By Dr. Savita Bailur — Senior Director of Gender Equality & Social Inclusion, and Jesús Tabares — Grants & Community Manager, both at Caribou.

What are serious games?

Over the 2024 holiday season, many gathered with family and friends to engage in games, whether indoors or outdoors, silly or serious. (Cluedo, for instance, can feel quite serious.) The holiday season often highlights the appeal of games, from lively board game nights with family to quiet moments spent solving puzzles.

As routines have resumed in the new year, this “games season” may already feel distant. However, the spirit of play can continue to inspire work and creativity in areas such as development, community building, and activism. The engaging and immersive nature of games provides a unique space for critical thinking and meaningful discussions, especially when addressing issues of justice and equity. A game is “an activity that one engages in for amusement or fun.” Clark C. Abt first introduced the term “serious games” in his 1970 book of the same name. He defined serious games as those that could be “played seriously or casually” with an explicit educational purpose beyond mere entertainment.

In the context of international development, serious games have emerged as powerful tools leveraging interactive and immersive experiences. Serious games have been gaining traction as transformative tools for development practitioners, and are now used to raise awareness, educate, and promote behavior change in areas such as poverty alleviation, healthcare, and environmental sustainability. Titles like PeaceMaker, Evoke, and UrbanSim illustrate how games can drive collaboration and problem-solving by simplifying complexity and encouraging participants to engage from fresh perspectives. Similar examples are David Taverner’s immersive work in space and climate and the Wilson Center’s Serious Games Initiative, which has games on managing plastic waste and navigating AI, just to name a few. As the field continues to mature, more rigorous evaluation is needed to fully understand the opportunity and potential of serious games on development goals and to refine their application in addressing global challenges.

In Cosmopolis, players join Dr. Isla Campbell and other fascinating characters in a journey through Sylvan Glade, learning about the use of satellite data for forest management and monitoring. In-game the fantastic world of Sylvan Glade is combined with real-life accounts of uses of satellite data.
The combination of play and purpose creates an environment where participants can approach challenges boldly and with greater creativity.

Serious games enable players to simulate real-world scenarios, test strategies and assumptions in hypothetical scenarios, and build empathy in a safe, risk-free environment. Games create immersive spaces where abstract challenges become tangible, and where we can lay out the complexities of issues like poverty alleviation, gender equity, or climate resilience. Through simulation, challenges, and restrictive sets of rules, games introduce scenarios that not only force practitioners to think, but create a flat structure for others to challenge our assumptions and worldviews. In a family context, this could level the “playing field” between grandparents and grandchildren. At a company level, it could be between senior leadership, consultants, administrators, etc. The constellation of gamers with different worldviews makes the experience rich. Moreover, the power of playing games is also reflected in their ability to foster inclusion and creativity; games create a shared space where participants feel safe to contribute ideas, regardless of their role or expertise. This is especially critical in collaborative environments like development practice, or when championing equity in any sector.

“Please design a session on digital and livelihoods”

At Caribou’s November retreat, four of us (Jesús Tabares, Savita Bailur, Grace Natabaalo, and Hanna Laufer) were asked to lead a company-wide session on the intersection of digital and livelihoods, a crucial theme in Caribou’s portfolio. We knew we had to make the agenda productive yet fun. When brainstorming ideas for the most impactful format, some of us thought storytelling would be powerful, while others felt it might create artificial distinctions of “presenters” and “listeners.” Jesús, Community Manager for the Mastercard Strive portfolio managed by Caribou, proposed a “Future of Livelihoods” game. The aim of this approach was to foster collaboration, challenge assumptions, and create a shared space for innovative thinking — as well as have fun, of course.

We needed to connect the diverse lenses through which each team member had recently engaged with livelihoods — gender, youth, agriculture, or small businesses — so we created the Future of Livelihoods Lab, a game that captured everyone’s curiosity, creativity, and ingenuity. This game featured three decks of cards with an individual theme: Challenge, Innovation, and Client. Each team drew one card from each deck, outlining a specific livelihoods challenge, a cutting-edge innovation, and the profile of an imagined client with unique needs. For instance, a team might address the challenge of digital access gaps in rural Ghana through the innovation of mobile learning platforms to empower the client, young entrepreneurs represented by the Aspire Youth Collective. The objective was to design a strategy that seamlessly integrated the challenge, innovation, and client profile into a cohesive and impactful solution.

The game unfolded with lively discussions and a strategic swap option, allowing teams to exchange one card for another if their initial combination felt mismatched. Teams were given twenty minutes to craft their proposals and then pitch their strategies in two-minute presentations to a panel acting as a donor board, which scored each idea on creativity, client alignment, and scalability.

The dynamic, fast-paced nature of the “Future of Livelihoods Lab” energized the retreat, fostering innovative ideas and revealing cross-cutting themes among participants. A prize was awarded to recognize how this thoughtful and immersive activity transformed a pressing topic into a collaborative and enjoyable exercise.

Decks of cards and a matching animated background set the scene in the “Future of Livelihoods Lab.” Recognizing that development is not just a game: The challenges and limitations of games

Despite their promise, serious games also come with challenges. For games to resonate, they must be culturally relevant and accessible, ensuring all participants feel included. Additionally, power dynamics within groups can shape the experience, requiring careful facilitation, thoughtful mechanic and rule design, and adequate stewardship to maintain equity and inclusivity. Finally, practitioners must be sensitive when integrating play with serious issues. Not all serious games are focused on development, and not all development-focused games are necessarily serious. A decade ago, Jaded Aid made waves — though not without controversy — for its sharp, self-referential critique of the sector.

What excites us today is a very different approach, one that moves away from self-critique (though it remains necessary) and toward fostering meaningful learning and growth.

The questions of who designs, executes, and participates in a game must all be addressed thoughtfully. At a company level, there should be a collective understanding of the purpose of a game, and a sense of safety and security to raise points that might be different from others. This may not be the case at a community level, where power dynamics of “insiders” and “outsiders” or “game designers” and “participants” may emerge. Games may place a time and labor burden on participants. We may see evidence of groupthink, or fear to truly speak up, and reluctance to challenge cultural, social, and/or gendered hierarchies — critiques leveled at burdensome participatory methods more than twenty years ago by authors such as Cooke and Kothari in “Participation: The New Tyranny.”

In our case, the in-person “Future of Livelihoods Lab” allowed for group discussion, creative thinking, and innovation. By creating a structured but flexible environment, the game enabled participants to think critically and collaboratively without losing sight of the broader purpose. It was specifically crafted for an audience of colleagues, with a shared ethos and a comparable understanding of the topic and its dynamics. Setting assumptions like these requires deeper thinking, collaboration, and planning in community scenarios, where a well thought-out game could help make solutions emerge — or a poor one could make issues worse.

The value of games: Insights for practitioners

Our Caribou retreat experience underscored several benefits of using serious games in development work:

Breaking silos: Games bring together diverse stakeholders, encouraging them to work collaboratively and share insights that transcend individual roles or projects. Encouraging horizontal collaboration through play: Structured play levels the playing field, empowering participants to engage as equals and contribute ideas freely. Stimulating creativity: By stepping into fictional scenarios, participants are freed from the constraints of their usual roles, enabling them to take bold, imaginative risks. Revealing blind spots: Games help participants explore perspectives they might not otherwise consider, uncovering overlooked challenges and opportunities. Building empathy: Role-playing and interactive scenarios allow practitioners to see the world through the eyes of others, fostering greater understanding and connection. Navigating complex learning curves through engagement: Games sustain attention by guiding participants through intricate topics in an intuitive and enjoyable way.

For Jesús, these benefits are grounded in his experience using games as trust-building tools in community settings:

“When participants work on a fictional scenario, it’s easier to spot the assumptions and biases we carry into our everyday work. This space to experiment without fear often leads to surprising breakthroughs.”

Savita emphasizes how applying serious games in workplace scenarios encourages iterative thinking: “Games provide a relatively safe space where we can fail without real-world consequences.” For David Taverner, games are a powerful learning tool because “games are a form of ‘interactive storytelling’ and often hold our attention for long periods.”

Playing the “Future of Livelihoods Lab” game at the Caribou retreat. Beyond games: A tool for systemic change

While the “Future of Livelihoods Lab” was a useful exercise for Caribou, it’s just one example of how bringing games to work can enhance development practice, and iterating games can be just as important as creating new ones.

Savita plans to test and iterate further on the “Future of Livelihoods” game in the first class of her spring semester course “Human-Centred Digital Development” at the School of International and Public Affairs at Columbia University. While many international development students at “Northern” or “Western” universities come with good intentions, they can also come with assumptions around digital development, assumptions that can be questioned by using the game, thus raising awareness around barriers to digital livelihoods including access, relevance, literacy and use, and issues of social norms.

The real value of serious games lies in their ability to act as bridges — connecting people, ideas, and disciplines to create systemic change. Whether used in community workshops, classrooms, or multi-stakeholder forums, (serious?) games can foster dialogue, uncover new possibilities, and inspire bold action.

Reach out to Jesús Tabares if you’d like to partner with Caribou to play seriously!

“Serious yet fun”: Games as tools for digital development was originally published in Caribou Digital on Medium, where people are continuing the conversation by highlighting and responding to this story.


Ocean Protocol

DF127 Completes and DF128 Launches

Predictoor DF127 rewards available. DF128 runs Feb 6— Feb 13th, 2024 1. Overview Data Farming (DF) is Ocean’s incentives program. In DF, you can earn OCEAN rewards by making predictions via Ocean Predictoor. Data Farming Round 127 (DF127) has completed. DF128 is live today, Feb 6. It concludes on February 13th. For this DF round, Predictoor DF has 37,500 OCEAN rewards and 20,000 ROSE 
Predictoor DF127 rewards available. DF128 runs Feb 6— Feb 13th, 2024 1. Overview

Data Farming (DF) is Ocean’s incentives program. In DF, you can earn OCEAN rewards by making predictions via Ocean Predictoor.

Data Farming Round 127 (DF127) has completed.

DF128 is live today, Feb 6. It concludes on February 13th. For this DF round, Predictoor DF has 37,500 OCEAN rewards and 20,000 ROSE rewards.

2. DF structure

The reward structure for DF128 is comprised solely of Predictoor DF rewards.

Predictoor DF: Actively predict crypto prices by submitting a price prediction and staking OCEAN to slash competitors and earn.

3. How to Earn Rewards, and Claim Them

Predictoor DF: To earn: submit accurate predictions via Predictoor Bots and stake OCEAN to slash incorrect Predictoors. To claim OCEAN rewards: run the Predictoor $OCEAN payout script, linked from Predictoor DF user guide in Ocean docs. To claim ROSE rewards: see instructions in Predictoor DF user guide in Ocean docs.

4. Specific Parameters for DF128

Budget. Predictoor DF: 37.5K OCEAN + 20K ROSE

Networks. Predictoor DF applies to activity on Oasis Sapphire. Here is more information about Ocean deployments to networks.

Predictoor DF rewards are calculated as follows:

First, DF Buyer agent purchases Predictoor feeds using OCEAN throughout the week to evenly distribute these rewards. Then, ROSE is distributed at the end of the week to active Predictoors that have been claiming their rewards.

Expect further evolution in DF: adding new streams and budget adjustments among streams.

Updates are always announced at the beginning of a round, if not sooner.

About Ocean, DF and Predictoor

Ocean was founded to level the playing field for AI and data. Ocean tools enable people to privately & securely publish, exchange, and consume data. Follow Ocean on Twitter or TG, and chat in Discord. Ocean is part of the Artificial Superintelligence Alliance.

In Predictoor, people run AI-powered prediction bots or trading bots on crypto price feeds to earn $. Follow Predictoor on Twitter.

DF127 Completes and DF128 Launches was originally published in Ocean Protocol on Medium, where people are continuing the conversation by highlighting and responding to this story.


FastID

DDoS in January

Stay informed with Fastly's monthly DDoS report, highlighting a 14.5% rise in attacks. Utilize our data-driven insights to bolster your application's security.
Stay informed with Fastly's monthly DDoS report, highlighting a 14.5% rise in attacks. Utilize our data-driven insights to bolster your application's security.

Wednesday, 05. February 2025

Indicio

Destination Europe: Unlock markets, create seamless services with Indicio Proven’s EUDI wallet integration

The post Destination Europe: Unlock markets, create seamless services with Indicio Proven’s EUDI wallet integration appeared first on Indicio.
With Indicio Proven now supporting the European Digital Identity Wallet (EUDI), governments and businesses can streamline identity authentication, reduce fraud, and create seamless digital experiences that make digital interaction easier, faster, and safer.

By Trevor Butterworth

With the approval of eIDAS 2.0, adult citizens of European Union member states will soon have access to secure, decentralized digital identities that they can hold in a European Digital Identity Wallet (EUDI Wallet). Wallet holders will be able to control their data and share it in privacy-preserving ways to prove who they are across EU member states, conduct business, and access services, and make payments.   

This continent-wide embrace of decentralized identity and Verifiable Credentials is a ground-breaking opportunity for governments and businesses both inside the EU and outside to streamline identity authentication, reduce fraud, and create seamless digital experiences that make digital interaction easier, faster, and safer. 

Get ahead of Europe’s EUDI revolution

As this new era rapidly approaches, how do you prepare for an entirely new seamless way to share and authenticate identity and take advantage of the opportunities it offers? 

With Indicio Proven, you get it all. 

Indicio Proven is a complete end-to-end system for implementing Verifiable Credentials and Digital Wallets, and it is compatible with all the major decentralized identity protocols and standards, including those specified in eIDAS 2.0 and implemented in EUDI. Proven also provides ways to combine different credential formats so that you can expand credential features and create solutions that work globally.

With Indicio Proven, you get:

The software to create credentials and issue them EUDI-compatible digital wallet for your users to hold and share them Cloud and mobile software for verification, a mobile SDK to add Verifiable Credentials to your existing apps Pre-made credential schemas for different use cases Continuous upgrades All the support and training you need to be successful.

In addition to a complete system for creating and participating in the EU’s emerging trust network, Indicio Proven also delivers field-leading scalability that can easily manage country-level credential issuance and verification. 

And because we’ve taken all the hard work out of creating decentralized identity solutions, you get to do all this without having to get rid of your existing systems — which means you can be up and running in days. 

Here are some of the immediate solutions you can implement to streamline your operations, improve products, reduce costs, and drive value for your customers.

Payments and Financial Services  

Strengthen security: Indicio’s “government-grade” credential solutions combine authenticated biometrics in Verifiable Credentials for the highest level of identity authentication. They easily provide the  Strong Customer Authentication needed to integrate payments into EUDI wallets. Our authenticated biometric workflow will also provide protection against generative AI biometric fraud. Instant KYC (Know Your Customer) verification: Do KYC once, reuse often, program an expiry date. Can be combined with authenticated biometrics. Avoid the liability of storing sensitive data: The portable trust created by Verifiable Credentials means easy compliance with Europe’s GDPR and other data privacy regulations.  

Travel and Hospitality  

Seamless digital travel: Starts at home with preauthorized travel and continues through every step of your journey. Cross a border in seconds. And it’s more secure than manual checking.  Eliminate manual data entry: Digital travel credentials ingest authenticated data to simplify complex processes.   Enhanced security: Authenticated biometrics and cryptographic verification reduce identity fraud, including deepfakes.  

E-Government Services  

Digitized public services: Citizens can quickly and simply file taxes, vote, and apply for benefits using verified digital identity.   Fraud prevention: Government agencies can rely on cryptographic verification instead of manual checks.   Business licenses and certifications: Reduce time by using credentials that can be authenticated anywhere and repeatedly.

Create tomorrow’s Europe today —  with Indicio Proven

Why wait for the future?  We’ve poured our years of experience in building award-winning seamless digital wallet solutions into Indicio Proven. This means you have a system that’s been proven to solve some of your biggest challenges today in digital identity and access management for global enterprises and governments. With Indicio Proven you can implement now and be ready to serve both a European and global market.

Contact us now to see a demo and discuss your European digital identity strategy! 

###

Sign up to our newsletter to stay up to date with the latest from Indicio and the decentralized identity community

The post Destination Europe: Unlock markets, create seamless services with Indicio Proven’s EUDI wallet integration appeared first on Indicio.


auth0

Okta Universal Logout Integration Now Supported in Auth0

We’re thrilled to announce that Auth0 now supports Universal Logout integration with Okta Workforce Identity.
We’re thrilled to announce that Auth0 now supports Universal Logout integration with Okta Workforce Identity.

How to Implement Relationship-Based Access Control (ReBAC) in a Ruby On Rails API?

The way to implement an authorization system depends on your application's needs. Let's explore Relationship-Based Access Control (ReBAC) and implement it in a Rails API using OpenFGA.
The way to implement an authorization system depends on your application's needs. Let's explore Relationship-Based Access Control (ReBAC) and implement it in a Rails API using OpenFGA.

iComply Investor Services Inc.

The Future of KYC: A Digital Journey Through Verification

The Future of KYC: A Seamless Digital Experience Explore how modern KYC technology is transforming identity verification, making it faster, more secure, and user-friendly. Discover the benefits of biometric authentication, blockchain security, and self-sovereign identity.

Emma’s buying her first home—a process that used to mean printing documents, scheduling in-person visits, and endless waiting. But instead of navigating outdated systems, Emma’s lender uses modern Know Your Customer (KYC) technology. The result? A seamless, digital experience where her identity is verified in minutes, not days.

Reimagining KYC with Digital Identity

Emma logs into her lender’s app and is guided through a quick digital ID verification process:

She uploads a photo of her government-issued ID. The system scans and validates the details instantly using optical character recognition (OCR) to ensure accuracy. A live selfie confirms Emma’s identity through biometric liveness detection, verifying that she’s physically present and not using a static image.

In less than two minutes, Emma’s identity is verified—no manual forms, no waiting rooms.

A Secure Foundation: Blockchain for Tamper-Proof Records

Behind the scenes, Emma’s lender uses blockchain technology to protect her data. Unlike traditional databases, which are vulnerable to tampering, blockchain creates a secure, decentralized ledger where:

Verified records can’t be altered, ensuring transparency and data integrity. Emma’s verified identity can be reused across multiple services, reducing redundant processes.

Though Emma doesn’t interact with blockchain directly, its presence strengthens the security of her entire transaction.

The Future of KYC: Self-Sovereign Identity

Emma’s experience offers a glimpse into the future of digital identity: self-sovereign identity (SSI). In this model, Emma controls her credentials through a secure digital wallet and decides what information to share.

For example:

When renewing her driver’s license, she could share only her name, birthdate, and photo—nothing else. When applying for a new bank account, she could authorize proof of identity without revealing unrelated personal data.

SSI enhances privacy while streamlining the verification process, putting individuals in charge of their digital identities.

Redefining Trust in Financial Transactions

Emma’s KYC journey illustrates how biometric authentication, blockchain-backed security, and decentralized identity verification are redefining trust. For businesses, adopting these innovations isn’t just about meeting regulatory requirements—it’s about delivering secure, frictionless customer experiences that build confidence and loyalty.

The future of KYC is here, and it’s making complex verifications simple, secure, and efficient.


FastID

Cache Me If You Can: HTTP Cache API Edition

Discover Fastly's programmable cache, a powerful feature of our Compute platform. Leverage our HTTP Cache APIs to enhance application performance and user satisfaction.
Discover Fastly's programmable cache, a powerful feature of our Compute platform. Leverage our HTTP Cache APIs to enhance application performance and user satisfaction.

Tuesday, 04. February 2025

myLaminin

How Does Good Research Data Management Practice Support Research Repeatability

An integral requirement of academic RDM is ensuring research repeatability. We discuss the importance of continuing scientific integrity.

An integral requirement of academic research data management (RDM) is ensuring research repeatability to preserve the continuation of scientific integrity. Repeatability allows other researchers to validate findings, build on existing work, and maintain high-quality standards and public trust in research outcomes.


Well-document data and metadata significantly improve reuse

Effective RDM practices, such as thorough data management plans, organizing data systematically, storing data in accessible formats, and managing and controlling access to research data, facilitate the process of discovery and create a clear roadmap for others to follow. For instance, a study by Wallis et al. (2013) highlights that well-documented data and metadata significantly improve the likelihood of successful data reuse. When researchers provide detailed descriptions of their data collection processes, analysis techniques, and tools used in their research, it clarifies their procedures and allows others to accurately evaluate academic publications. This can also expedite the peer review process and enhance its accuracy, enabling more research to be published faster without compromising quality standards.


Guarantee long-term accessibility

Furthermore, storing data in trusted repositories guarantees long-term accessibility, which is crucial for ensuring that studies can be repeated effectively. According to a report by the National Academies of Sciences, Engineering, and Medicine (2019), transparent data sharing not only supports reproducibility but also creates an environment of innovative collaboration. By adequately adopting RDM best practices and solutions that are designed to enable them, researchers are able to contribute towards a culture of accountability, which ultimately strengthens the credibility of the scientific community.

 

In conclusion, good RDM is not just about preserving data, it is about defending the future of academic research itself. By enabling researchers to easily embrace strong research data management practices, myLaminin ensures that your data is not only secure but also accessible for future scholars. myLaminin's commitment to FAIR (Findable, Accessible, Interoperable, and Reusable) science principles, and reliability in our data security, team collaboration, agreements management, data collection, integrated Research Ethics Board, and audit trail capabilities supports ongoing discovery and innovation, helping us all build a more informed future.


References:  

Wallis, J. C., Rolando, E., & Borgman, C. L. (2013). If we share data, will anyone use them? Data sharing and reuse in the long tail of science and technology. 

National Academies of Sciences, Engineering, and Medicine. (2019). Reproducibility and Replicability in Science. National Academies Press.

__________________________________


Quenifer Lung (article author) is a Western University Honours Business & Globalization student and myLaminin intern as part of the University's WMA program.




Elliptic

Crypto regulatory affairs: In the US, focus on crypto banking access grows

Over the past two weeks, policymakers in the US have turned increasing attention to the challenges cryptoasset businesses face in obtaining bank accounts - and are signalling a desire to end widespread de-risking of the sector. 

Over the past two weeks, policymakers in the US have turned increasing attention to the challenges cryptoasset businesses face in obtaining bank accounts - and are signalling a desire to end widespread de-risking of the sector. 


This week in identity

E59 - Token Security Funding / Jumpcloud + Stack Identity / Identity Data Management

Summary In this episode of the Analyst Brief Podcast, Simon and Dave return to discuss the latest funding trends in identity security, the rise of non-human identity (NHI), and the importance of governance and data management in identity solutions. Useful Links: Token Security raise $20 million Jumpcloud acquires Stack Identity AI Prompt Engineering Protection Keywords

Summary

In this episode of the Analyst Brief Podcast, Simon and Dave return to discuss the latest funding trends in identity security, the rise of non-human identity (NHI), and the importance of governance and data management in identity solutions.


Useful Links:

Token Security raise $20 million Jumpcloud acquires Stack Identity AI Prompt Engineering Protection


Keywords

identity security, funding, non-human identity, governance, AI, identity management, chief data officer, AI, identity security, prompt engineering, content authenticity, digital transformation, business opportunities


Chapters

00:00 Introduction and Podcast Evolution

03:04 Funding Trends in Identity Security

08:43 The Rise of Non-Human Identity (NHI)

15:03 Governance and Identity Data Management

23:38 Emerging Trends in Data Technology

26:20 The Role of Chief Data Officers

30:12 AI's Impact on Identity and Security

32:38 Navigating the Challenges of AI and Data Authenticity




Extrimian

Credencial Verificable de Licencia de Conducir Digital en miBA y QuarkID

Un gran paso hacia la seguridad de datos digitales En un mundo cada vez más digital, la gestión de nuestra identidad se ha convertido en un tema central. La Ciudad de Buenos Aires da un paso trascendental hacia el futuro de la identidad digital con el lanzamiento de la Licencia de Conducir como credencial verificable. […] The post Credencial Verificable de Licencia de Conducir Digital en miBA y
Un gran paso hacia la seguridad de datos digitales

En un mundo cada vez más digital, la gestión de nuestra identidad se ha convertido en un tema central. La Ciudad de Buenos Aires da un paso trascendental hacia el futuro de la identidad digital con el lanzamiento de la Licencia de Conducir como credencial verificable. Este hito, disponible en las wallets miBA y QuarkID, representa un avance significativo en la protección de datos personales y la eficiencia de los trámites.

En octubre de 2024, miBA integró QuarkID, permitiendo que los usuarios gestionen su información de forma segura a través de la tecnología blockchain de ZKsync. Esta actualización proporcionó a los más de 3,8 millones de usuarios una Identidad Digital Descentralizada (DID), convirtiendo al Gobierno de la Ciudad en el primero a nivel mundial en adoptar blockchain para la gestión de identidades digitales.

La licencia de conducir digital en CABA se puede exhibir a través de la app miBA.

¿Qué significa este lanzamiento para los Ciudadanos?

La nueva Licencia de Conducir digital ofrece múltiples beneficios:

Mayor control:

Los ciudadanos tienen el control total de sus datos, decidiendo cuándo y con quién compartirlos.

Privacidad reforzada:

La tecnología de credenciales verificables protege la información personal de accesos no autorizados.

Seguridad avanzada:

La autenticidad de la licencia se verifica de forma criptográfica, previniendo fraudes y falsificaciones.

Eficiencia en trámites:

La verificación de identidad se agiliza, eliminando tiempos de espera y fricciones innecesarias.

Menos intermediarios:

Se reducen las interacciones con terceros para la verificación de documentos, simplificando procesos.

miBA QuarkID Licencia de Conducir mockup

Extrimian: El Motor Tecnológico de la Innovación

Extrimian, como proveedor técnico de esta solución de vanguardia, se enorgullece de colaborar con el Gobierno de la Ciudad de Buenos Aires en este proyecto pionero. Nuestra experiencia en tecnologías descentralizadas y seguridad de datos garantiza la robustez y confiabilidad de la plataforma. 

Esta implementación representa la primera aplicación masiva a nivel mundial de información verificable descentralizada, y desde Extrimian estamos orgullosos de que haya sido construida usando nuestro producto ID Connect, líder en Latinoamérica en esta tecnología revolucionaria. 

Un Futuro de Identidad Digital Soberana

Esta nueva credencial se suma a otras iniciativas exitosas implementadas por la Ciudad de Buenos Aires, donde miles de ciudadanos ya disfrutan de los beneficios de la identidad digital soberana. Extrimian continúa trabajando para expandir el ecosistema de credenciales verificables, construyendo un futuro digital más seguro, privado y eficiente para todos.

¡Gracias a la Ciudad de Buenos Aires por confiar en Extrimian como proveedor tecnológico para hacerlo posible! 

Todavía no tienen tus credenciales verificables como ciudadano de la Ciudad de Buenos Aires?

¡Descarga MiBA o QuarkID y obtén tu Licencia de Conducir digital hoy mismo! Únete a la revolución de la identidad digital y experimenta un mundo de posibilidades con mayor control y seguridad.

The post Credencial Verificable de Licencia de Conducir Digital en miBA y QuarkID first appeared on Extrimian.


Kin AI

How to Make Kin a Daily Habit

The more you use Kin, the better it understands you, and the more valuable its advice becomes.

Try Kin - Personal AI

Making Kin part of your daily routine unlocks its full potential as your personal AI and AI companion. But how do you actually do this?

I’m Yngvi Karlson, Co-Founder of Kin. Born in the Faroe Islands, I’ve spent my career building startups, with two exits along the way, and five years as an active venture capitalist. Now, I’m dedicated to creating Kin, a personal AI people can truly trust.

Follow me on LinkedIn, TikTok and X

To show you, this article will cover the following:

How to Build Your Kin Habit

Maximizing Your Kin Habit for a Better AI Assistant

Extra Tips for Your AI Companion

Get Started Today with Your Personal AI

How to Build Your Kin Habit

Here’s a step-by-step guide:

Step One: Pick Your Check-in Time

Considering your schedule, choose a regular time when you'll aim to use Kin each day.

It can help to have a purpose in mind for this usage session.

Some examples are:

First thing in the morning to plan your day

During your lunch break to reflect on the morning

In the evening to process the day's events

Before bed to journal your thoughts

💡 If you miss your allocated time, or want to do something different, don’t panic! Checking in when you remember to, with whatever is on your mind, will still help a habit form.

Step Two: Set Up Your Space

Think about where you’ll be using Kin during this time. Try to find a comfortable spot where you can focus on your conversations.

This might look like:

A favorite chair at home

A peaceful corner of the office

Your regular commute spot

A table in a coffee shop

💡 You can use either text or voice input with Kin—choose what works best for your setting.

Step Three: Start Small but Consistent

Begin with quick, five-minute check-ins to get used to using Kin as an AI assistant regularly.

What these include will depend on what you’re using Kin for, but some examples are:

Reviewing your current mood

Sharing one achievement

Recounting one event

Setting one goal

💡 If you’re unsure about what to do in a quick check-in, ask Kin for ideas!

Step Four: Explore Kin’s Usage-Based Features

Kin was designed with an array of features to help you use it regularly, such as:

Custom Reminders which you can make to help build your habit with Kin, or anything else you need to remember

Displaying your daily usage streak and stats in the Streaks & Stats tab

Providing a dynamic visual mindmap of Kin’s understanding of you, called a Knowledge Map

Allowing you to build privacy and trust by giving you full control over Kin’s personal data storage

💡 Wondering how to make the most of these features? Check out our guides on them, and ask Kin for tailored advice.

Maximizing Your Kin Habit for a Better AI Assistant

Want to make the most of your Kin routine? Here are some proven strategies:

1. Stack Your Habits

Attach your Kin check-in to an existing habit, to make it easier to remember.

Examples include:

Your morning coffee

Your commute

Your lunch break

Your evening wind-down

2. Use Reminders Effectively

Kin isn’t just an AI chatbot. Work with Kin to create custom reminders that notify you at your check-in time, and remind you of the topics you want to discuss.

You can even ask Kin to send a follow-up notification if you miss a check-in, or to send one to celebrate a streak milestone (e.g. 50 days).

3. Make It Enjoyable

Kin is designed to fit around you. Take advantage of this!

Some ways you can do this are:

Customizing Kin's tone and voice

Using your preferred input method (voice or text)

Starting with topics you enjoy discussing

Celebrating your consistency

4. Track Your Progress

Knowing how far you’ve come can be a great motivator.

Kin offers multiple ways to see your personal progress, such as:

Your daily streak count

Growth in your Knowledge Map

Journal entry consistency

A summary from Kin of how you’ve improved (just ask Kin for it!)

5. Don’t Stop Growing

Every now and again (or once a month if you need a solid figure), ask Kin how you could improve your regular usage of it and its advice.

Whether its spending more time in discussion with Kin, setting new reminders, or trying different ways to interact with Kin, investing time and effort into growing your habit will ensure Kin’s artificial intelligence stays as useful as possible.

Extra Tips for Your AI Companion

Here are some additional ways to strengthen your Kin habit:

Be Prepared: Keep a mental note of things to discuss with Kin throughout your day.

Stay Flexible: Consider choosing a new check-in time if one becomes too unwieldy—but try to stick with one first.

Start Fresh: If you break your streak, begin again immediately rather than waiting for the "perfect" time. The perfect time is often “now”!

Use Kin with Kin: Ask Kin to review the ways you use it, and help you optimize them

Get Started Today with Your Personal AI

Ready to make Kin a daily habit? Download the app, open the Chat, and start with this simple message:

"Hi Kin! I want to make you part of my daily routine. My ideal check-in time would be ______, and I'd like reminders to help me stay consistent. How do we start?"


Dock

Event Takeaways: Digital ID and Trust in Europe: Opportunities and Challenges

The discussion explores digital identity and trust in Europe, focusing on opportunities and challenges in eIDAS 2.0. Panelists:  Viky Manaila – Trust Services Director at Intesi Group and President of the Cloud Signature Consortium. Vedran Lalic – Digital Identity Consultant

The discussion explores digital identity and trust in Europe, focusing on opportunities and challenges in eIDAS 2.0.

Panelists: 

Viky Manaila – Trust Services Director at Intesi Group and President of the Cloud Signature Consortium. Vedran Lalic – Digital Identity Consultant and Advisor for the World Bank. Nick Lambert - CEO at Dock Labs.

FastID

Three application security trends to monitor in 2025

Discover how cybersecurity professionals are adapting to a rapidly changing landscape. Explore insights on growth, consolidation, and automation in security strategies.
Discover how cybersecurity professionals are adapting to a rapidly changing landscape. Explore insights on growth, consolidation, and automation in security strategies.

Monday, 03. February 2025

Spruce Systems

How Verifiable Digital Credentials Improve Financial Inclusion

Learn how verifiable digital credentials (VDCs) can make banking more affordable and payments more reliable.

Modern financial services and technology have spread around the world over the past century-plus, but many adults still don’t have, or can’t access, traditional bank accounts or digital payments tools. As of 2021, only 75% of adults worldwide have a bank or mobile spending account. This rate of so-called “financial inclusion” is lower in developing economies, at only 71%. 

The consequences are substantial. Living without modern banking or payment tools makes basic life tasks like shopping harder, saving money more difficult and insecure, and adding particular burdens to small business operators. Exclusion can fall particularly hard on women and minority groups, who are sometimes still actively prevented from accessing banking infrastructure, compounding other challenges. In turn, financial exclusion depresses overall economic activity for communities and nations.

The good news is that financial inclusion has grown significantly over the past decade, driven by innovative mobile payments and digital identity systems like India’s Aadhar. SpruceID’s work is focused on the next generation of digital identity based on cryptographic signatures known as “verifiable digital credentials,” or VDCs.

The Mobile Transition and Financial Inclusion

The discussion about financial inclusion has been dramatically reshaped by the advent of digital technologies, particularly by the rise of mobile phones and smartphones. According to the World Economic Forum, the adoption of mobile tools has driven the majority of increased financial inclusion in the developing world over the last decade, and VDCs similarly rely on mobile devices. For that reason, we largely focus below on the specific advantages of VDC-based identity over existing digital and mobile tools.

More Affordable Banking

Again and again, whether in developing countries or wealthy nations, the number one reason individuals don’t use banks is the cost. Discussions often focus on the fear of overdrafts and other “gotcha” fees, which were thankfully recently capped in the U.S. But banking costs will always trickle down to users in some fashion. 

Two major cost centers for banks and payment services are service and fraud. Trustworthy VDCs can reduce service labor costs through automation and also offer potential long-term savings via fraud prevention. As onboarding for financial services has gone increasingly online, fraud has exploded, including most recently thanks to the rise of fake IDs created with AI

By making digital identity trustworthy and fraud-resistant, online and off, VDCs should make banking services cheaper, increasing inclusion. They could even make online and digital lending services more affordable since being able to reliably trust that you’re lending to a specific person dramatically reduces fraud and defaults. Going still further, VDCs can also be used to prove educational credentials like degrees and training. Making these documents fully trustworthy and natively digital might further de-risk lending since lenders can verify education and experience credentials as easily and reliably as identity.

More Reliable Payments

Fraud prevention also increases the chance that users of digital payment systems will actually receive the money they’re owed, whether by a friend, customer, or government agency. This is particularly vital because mobile payments are such a major portion of recent adoption. One prime example is M-PESA, which began life as a form of digital cash for old-school “dumb” phones. M-PESA has now thrived for going on two decades, with profoundly transformative impacts: M-PESA adoption alone lifted 2% of the Kenyan population out of poverty

The scattershot distribution and rampant fraud in COVID-19 relief payments highlighted how vulnerable and fragmented the U.S. system for government disbursements is. Even users of India’s more advanced benefits system via Aadhaar have had payments stolen, in part because Aadhaar relies on an account number for access, a variety of what’s known as “knowledge-based security.” 

VDCs, by contrast, can be tied to a specific device, preventing hackers from easily impersonating an account holder. For mobile payment systems, in particular, on-device digital credentials present huge security benefits for the still-unbanked, further enhancing trust and adoption. M-PESA-style systems that use official VDC-based identity for verification are not yet widespread. But they don’t face major technical barriers because VDCs—again, unlike centralized digital identity services—are designed to easily interact with third-party digital tools.

Privacy, Security, and Trust

By far the most direct advantage of a VDC-based digital identity system is that it protects the personal data and privacy of users. This is in part because the system can be implemented in a way to allow the storage and verification of identity data locally on a mobile device rather than requiring a “phone home” verification to a faraway server. The latter “phone home” architecture is vulnerable to hacking: India’s centralized system, for instance, has experienced repeated, devastating thefts of private information from millions of Indian citizens. That information can, in turn, be used for fraud or worse.

VDC-based identity also offers better privacy for everyday use compared to both conventional paper ID documents and older digital identity systems. “Selective Disclosure” lets VDC users control exactly what data they share. This makes it possible to access banking services without revealing irrelevant details to the servicer – including identity details such as gender and race, which might enable discrimination. Another privacy and security feature of VDCs is more subtle: a digital identity document is less conspicuous than a paper document and often can’t be viewed without the holder’s explicit consent via opening their phone.

These features are vital for improving financial inclusion because they foster user trust. Some unbanked people are hesitant to participate in systems that might make them vulnerable – and in some cases, their fears have been justified. Correcting or preventing these flaws, and fostering deep trust in an identity system, are fundamental to improving many people’s lives by bringing them into the global banking and financial system.

To learn more about how SpruceID is advancing financial inclusion through verifiable digital credentials, explore our work in secure, privacy-preserving digital identity. Join us in shaping the future of trusted transactions.

Learn More

About SpruceID: SpruceID is building a future where users control their identity and data across all digital interactions.


ComplyCube

Companies House Introduces IDV Checks in 2025

For years, fraudsters have been able to set up fraudulent companies in the UK without any barriers to entry. Companies House will now introduce IDV checks within the business registration process to prevent identity fraud. The post Companies House Introduces IDV Checks in 2025 first appeared on ComplyCube.

For years, fraudsters have been able to set up fraudulent companies in the UK without any barriers to entry. Companies House will now introduce IDV checks within the business registration process to prevent identity fraud.

The post Companies House Introduces IDV Checks in 2025 first appeared on ComplyCube.


IDnow

18+ only? Age verification on adult sites.

France has become the latest in a long line of countries that is doubling down on requiring pornographic sites to offer mandatory age verification. The aim is to protect minors, but will it work and at what cost to user privacy?  In January 2025, a new regulation was passed requiring pornographic sites in France to […]
France has become the latest in a long line of countries that is doubling down on requiring pornographic sites to offer mandatory age verification. The aim is to protect minors, but will it work and at what cost to user privacy? 

In January 2025, a new regulation was passed requiring pornographic sites in France to verify the age of their users. This initiative aims to protect minors from exposure to inappropriate content online, which can cause long-term harm and affect their perception of gender and sexual relations as well as put younger people and women at greater risk of abuse.  

Platforms must now implement robust identity verification solutions to verify users’ ages either through the identification of documents or facial recognition.  

However, questions have been raised on the effectiveness of the proposed methods and the potential impact on user privacy. 

How France aims to crack down on underage users viewing pornography.  

Every month, 2.3 million minors in France access pornographic sites, representing a staggering 12% of the total visitors. To address the issue, the Regulatory Authority for Audiovisual and Digital Communication now requires adult sites to implement age verification services by April 11, 2025. After this period, sanctions, including site blocking, may be applied in the event of non-compliance. 

Accepted methods of identity verification include the use of video selfies for biometric recognition, or proof of identity via document verification. As a simple confirmation of age is no longer sufficient, compliance is reinforced by a double anonymity system, allowing age to be verified while guaranteeing anonymity.   

With double anonymity, the site you’re connecting to doesn’t know who you are, only that you’re over 18. Plus, the age verification service doesn’t know which site you’re connecting to.

Marc Norlain, Managing Director at IDnow
Global regulation practices for adult sites. 

France is not alone in its efforts to regulate access to adult content. Here are how some other countries are tackling the issue of minors viewing pornography. 

United Kingdom: The Online Safety Act will require pornographic platforms to use age verification services by July. All websites on which pornographic material can be found, including social media platforms, must introduce ‘robust’ age-checking techniques, such as demanding photo ID or running credit card checks for UK users. Ofcom has published what it calls a “non-exhaustive” list of technologies that may be used to verify ages, which includes:  Open banking  Photo ID matching  Facial age estimation  Mobile network operator age checks  Credit card checks  Digital identity services  Email-based age estimation 
  Germany: The country imposes strict regulations via the Commission for the Protection of Minors in the Media (KJM). Sites must ensure that users are of legal age by using verification solutions such as digital identity services or national identity cards. 
  Italy: The government has recently tightened online controls. Pornographic platforms must verify age via state-issued digital identifiers, such as the SPID (Public Digital Identity System).  
  Denmark: More lenient than some other European countries, Denmark simply encourages the use of age verification services to protect minors, notably via public-private partnerships. 
  United States: Since June 2024, 19 states have passed laws requiring age verification for access to adult content.  
  Nations such as China, Iran and Saudi Arabia completely block access to pornographic sites, using censorship technologies to prevent access. 
  In Spain, Poland and the Czech Republic, there are no specific regulations imposing age verification services for pornographic sites, although discussions are underway.  

The Digital Services Act, which is in force in all European Union (EU) Member States, requires digital platforms, including adult content sites, to implement age verification mechanisms when their services are massively used (over 45 million users). This regulation aims to ensure a safer online environment for minors throughout the EU. 

Age verification solutions for accessing sensitive content.  

Faced with new and more prolific age verification requirements, a promising solution is emerging to combine efficiency, anonymity and privacy: the EUDI Wallet (European Digital Identity Wallet).  

Digital identity wallets offer two main benefits: 

Selective disclosure of information. 

This system allows users to prove their age without disclosing other personal data. For example, users can confirm that they are over 18 without revealing other personal information, such as their name or address. Only information strictly necessary for verification is shared. 

Non-traceability of users. 

A key feature of the digital identity portfolio will be its ability to guarantee the non-traceability of users’ interactions with sites. Thanks to advanced technologies such as zero-knowledge proof, it will be impossible to link a user’s actions to a specific site or to their other online activities.  

Digital wallets look set to usher in a major advancement in privacy protection, addressing some of the current concerns associated with using identity verification solutions to gain access to adult sites. 

Porn, privacy and data confidentiality.  

When it comes to viewing pornographic content, the topic of privacy is clearly an important and sensitive topic. To reassure adult users that they will be able to remain anonymous and their data kept confidential, all while complying with new and upcoming regulations, it will become essential to implement solutions that comply with strict privacy protection principles. 

Implementing these new solutions is a challenge but represents a major opportunity to combine innovation with security and respect for individual freedoms. 

By

Mallaury Marie
Content Manager at IDnow
Connect with Mallaury on LinkedIn


Spherical Cow Consulting

Securing the Software Supply Chain: How SCITT, SPIFFE, and WIMSE Work Together

I’ve been saying that to follow what’s happening in NHI standards, some of the core work you need to follow is happening in the IETF: SPICE, WIMSE, and SCITT. Everybody loves WIMSE with its workload identity architecture, and building the credential format in SPICE that can meet the needs of NHIs is of course brilliant Continue Reading The post Securing the Software Supply Chain: How

I’ve been saying that to follow what’s happening in NHI standards, some of the core work you need to follow is happening in the IETF: SPICE, WIMSE, and SCITT. Everybody loves WIMSE with its workload identity architecture, and building the credential format in SPICE that can meet the needs of NHIs is of course brilliant (I’m not biased, you’re biased!). But thinking about this from the bottom up is what SCITT (Supply Chain Integrity, Transparency, and Trust) is all about, and it’s time to learn more about it and its close allies, SPIFFE (which isn’t happening in the IETF) and, yes, WIMSE. (I’ll cover SPICE in a future blog post.)

Prefer to listen? Here’s the audio version of this post:

First, let’s talk about why you should care.

Whether you’re a vendor or a product manager, modern software is a patchwork of third-party components, open-source libraries, and cloud-based services. A single weak link can undermine the entire system, putting your company’s product and reputation at risk.

That’s where SCITT comes in. By focusing on verifying every step in the software supply chain, it offers vendors the confidence that their components meet security and integrity standards. Customers, too, are demanding greater transparency, and SCITT is working to become a big part in how that happens.

Key Trends Shaping Supply Chain Security

Conversations about software supply chains are becoming almost as exciting as NHI and AI. Probably because NHI and AI depend on a crazy amount of software, each with its own set of potential vulnerabilities. We’re talking about rising threats, high-profile breaches, and increasing regulatory pressure requiring organizations to rethink how they build, deploy, and manage software. To meet these challenges, the industry is rallying around key practices and frameworks that promote transparency, trust, and resilience. Two of the big trends in this space are the adoption of Software Bill of Materials (SBOMs) and the emergence of global legislation driving accountability.

The Rise of SBOMs (Software Bill of Materials)

An SBOM is essentially an ingredient list for your software, showing all the components inside. The EU’s Cyber Resilience Act (CRA) now requires manufacturers to create and maintain SBOMs for digital products, which must be available for regulatory checks. SCITT can simplify this process by integrating verification mechanisms directly into the supply chain.

A Global Push for Legislation

The primary legislative framework in Europe that covers software supply chain security is the Cyber Resilience Act (CRA). Proposed in September 2022, the CRA introduces mandatory cybersecurity requirements for certain products in order to ensure their security throughout the product lifecycle. The CRA is setting the standard for cybersecurity, mandating secure development practices, vulnerability management, and lifecycle security.

Across the pond, U.S. executive orders also demand greater accountability for third-party software providers, emphasizing secure development attestations and artifact validation. There are two particular ones to pay attention to:

Executive Order on Improving the Nation’s Cybersecurity (May 2021) directing federal agencies to improve the security and integrity of software critical to the government’s ability to function. If you’re interested in the supply chain aspects, see Section 4 Enhancing Software Supply Chain Security. Executive Order on Strengthening and Promoting Innovation in the Nation’s Cybersecurity (January 2025) has an even bigger section (Section 2) on Operationalizing Transparency and Security in Third-Party Software Supply Chains.

Changes in administration can negate executive orders, but I suspect core elements like the supply chain requirements are going to stick around.

Supply chain security is evolving, but standards like SCITT, SPIFFE, and WIMSE are still finding their place. If you’re figuring out where these fit in your security strategy or how to engage in standards discussions, let’s talk. See how I help organizations navigate identity standards.

What Is SCITT?

OK, let’s get back to SCITT. At its core, SCITT provides a framework to ensure integrity and transparency in the software supply chain. It’s about cryptographic proofs, signed attestations, and validated processes that make it easier to trust what you’re building and buying.

SBOM Integration: SCITT enhances the accuracy and traceability of SBOMs. Certified Compiler Tracking: It ensures that trusted tools are used throughout the development process. Compliance Made Simple: SCITT aligns perfectly with regulations like the CRA, making it easier for vendors to meet evolving standards. Don’t Forget SPIFFE and WIMSE!

This isn’t directly an IETF thing, but it’s closely related to SCITT: SPIFFE (Secure Production Identity Framework for Everyone). SPIFFE addresses a critical challenge—workload identity in cloud-native environments. Think of it as a way to ensure that during builds and deployments, only the right processes are communicating with each other. No more hardcoded credentials or guessing who’s knocking on the door—SPIFFE ensures every workload has a secure and verifiable identity.

Here’s what SPIFFE brings to the table:

Workload Authentication: SPIFFE provides dynamic, secure identities for workloads, removing the need for manual credential management. Securing CI/CD Pipelines: It locks down your build and deployment environments, ensuring only authenticated processes can interact with sensitive systems. Complementing SCITT: Together, SCITT and SPIFFE form a powerful duo, enhancing transparency and security at every stage of the supply chain.

But wait—what about WIMSE, the Workload Identity for Multi-System Environments effort? Does it cover the same ground as SPIFFE? Well, kind of, but not exactly. Here’s the deal:

WIMSE: Focuses on creating vendor-neutral standards for managing workload identities across diverse systems. It’s about defining best practices and protocols to make sure everyone is playing by the same rules. SPIFFE: Provides the frameworks and tools to implement those principles in real-world systems. In other words, SPIFFE is more about the “how,” while WIMSE is about the “what” and “why.”

Chatting with Justin Richer, co-chair of the WIMSE working group, he helped me clarify the difference: SPIFFE is defining the tools for assigning and trusting the identities; WIMSE is defining the protocols and practices around them.

How SCITT, WIMSE, and SPIFFE Fit Together

Here’s how these three puzzle pieces come together to form a strong foundation for modern software supply chains:

SCITT: Verifies the integrity and transparency of the supply chain through cryptographic proofs and attestations. WIMSE: Defines the standards and best practices for managing workload identities, ensuring a consistent approach across environments. SPIFFE: Implements those standards with secure, dynamic identities that can be integrated into SCITT workflows.

Together, they ensure:

Trustworthy SBOMs: By verifying and securing every component in the supply chain. Secure Build Environments: Through workload authentication and protection of CI/CD pipelines. Compliance with Global Regulations: Aligning with frameworks like the EU’s Cyber Resilience Act (CRA). Why This Matters to Vendors and Product Teams

Cybersecurity practitioners don’t need to be convinced (I hope) about the importance of the work happening at the supply chain level. I want to make the case, though, that this matters to a much wider audience. While sales engineers and product teams may be ready to dismiss these deep, dark frameworks and standards as theoretical, recognize that SCITT and SPIFFE deliver practical, real-world benefits:

Building Trust: Customers and regulators increasingly demand transparency. SCITT and SPIFFE ensure your supply chain is secure and verifiable. Staying Competitive: Security is no longer a “nice to have.” Vendors who embrace these frameworks gain a clear market edge. Reducing Risks: From SolarWinds to open-source vulnerabilities, supply chain attacks are a thing. These tools help mitigate those threats. Operational Efficiency: Automating security processes reduces complexity, saving time and resources. There is SO MUCH going on in terms of attacks and defense, automating your security processes is not really optional. Wrapping It Up

Efforts like SCITT, SPIFFE, and WIMSE might not grab headlines like the latest tech gadgets, but they’re truly critical and live at the foundation of software security. For vendors and product teams, understanding and leveraging these tools is about staying secure, competitive, and ahead of the curve. For me, I’m definitely going to keep my finger on the pulse of what’s happening in the space. My own decisions on what software and services I purchase or recommend will absolutely be influenced by these efforts.

I want to help you go from overwhelmed at the rapid pace of change in identity-related standards to prepared to strategically invest in the critical standards for your business. Follow me on LinkedIn or reach out to discuss my Digital Identity Standards Development Services.

Want my latest blog posts delivered directly to your inbox? Subscribe here—no carrier pigeons required.

The post Securing the Software Supply Chain: How SCITT, SPIFFE, and WIMSE Work Together appeared first on Spherical Cow Consulting.


Tokeny Solutions

Trump Administration’s Impact on Tokenization: Is the Golden Age Upon Us?

:thu The post Trump Administration’s Impact on Tokenization: Is the Golden Age Upon Us? appeared first on Tokeny.

:thu

January 2025 Trump Administration’s Impact on Tokenization: Is the Golden Age Upon Us?

For years, US financial institutions have faced significant hurdles in adopting tokenization, primarily due to regulatory uncertainty and operational challenges. But recent changes under the Trump administration are clearing these obstacles, paving the way for the golden age of tokenization in the United States.

Breaking the Custody Barrier

The SEC’s Staff Accounting Bulletin 121 (SAB 121) created a major roadblock by requiring institutions holding tokenized assets for clients to report these as liabilities on their balance sheets.

This increased financial exposure discouraged institutions from offering custody services. With the repeal of SAB 121, this burden has been lifted, enabling institutions to provide custody solutions for tokenized securities without unnecessary financial risk.

Public Blockchains Gain Regulatory Support

Institutions have long recognized the value of public blockchains for tokenized assets, removing silos, ensuring transparency, and unlocking interoperability. However, regulatory uncertainty left many hesitant to adopt them.

President Trump’s new executive order on digital assets changes this, ensuring lawful access to public blockchain networks and introducing technology-neutral regulations.

Like other forward-thinking jurisdictions (e.g., E.U., Singapore, Hong Kong), the US now takes a “same assets, same rules” approach, where compliance becomes the focus, not the underlying technology.

Tokeny’s proven solutions, using the ERC-3643 ‘T-REX’ standard, address the critical question of how to enforce compliance on public blockchains, allowing institutions to confidently move forward.

Stablecoins: Institutionally Accepted On-Chain Cash

One of the biggest challenges for tokenization has been the absence of on-chain cash that institutions are willing to adopt. Stablecoins, despite their wide adoption by cryptocurrency players, have faced hesitation from financial institutions due to concerns about legitimacy.

The recent executive order promotes lawful USD-backed coins while banning CBDCs in the US. This move not only provides regulatory clarity but also establishes stablecoins as a trusted on-chain cash solution.

While some institutions remain cautious, this shift is expected to accelerate institutional acceptance of cash coins for tokenized securities. It will unlock atomic settlements, where security and cash coexist on the same ledger, and enable automation of processes like capital calls, dividend payments, and more.

The growing demand for dollar-backed stablecoins is creating significant opportunities for tokenized money market funds. Stablecoin issuers will mint more tokens as adoption grows, driving a greater need for collateral that is liquid, safe, and yield-bearing. It’s precisely what tokenized money market funds offer.

At the same time, tokenized MMFs also represent onchain cash with yield, positioning them as an alternative to the first generation of stablecoins, which typically capture yield for themselves. This dynamic introduces both competition and synergy between the two, as stablecoin issuers may turn to tokenized MMFs for reserves, while investors seeking yield-bearing onchain cash could increasingly look to MMFs instead of stablecoins.

Tokeny’s customers are already leading the way. Moreliquid, which tokenized the HSBC Euro Liquidity Fund, and Fasanara, which tokenized U.S. Treasury Bills, are capturing this trend with the scalable solutions we provide underneath.

A Golden Moment for Tokenization

The challenges are being resolved: regulations are aligning, proven technology like ours is ready, and the market is moving rapidly. Institutions must now ask themselves: What are we waiting for?

We believe this could be the year we bring the first trillion dollars in assets on-chain as an ecosystem. Let’s shape the golden age of tokenization together!

Tokeny Spotlight

PRESS RELEASE

Fasanara Launches Tokenized Money Market Fund on Polygon.

Read More

TOKENY TALENT

We interviewed our very own Digital Marketing Intern, Christian Stricker.

Read More

PARTNERSHIP

Tokeny and Ditobanx Partner to Transform El Salvador into a Tokenization Leader

Read More

PARTNERSHIP

Tokeny and ONYZE Join Forces to Provide a Turnkey Solution for Institutional Tokenization in Europe

Read More

TOKENY HIGHLIGHT

We look back at Tokeny’s incredible journey in 2024, celebrating our key achievements and milestones

Read More

SPEECH

What happens when a major fund administrator managing $4 trillion uses Tokeny’s technology?

Read More Tokeny Events

RWA Summit Paris
February 13th, 2025 | 🇫🇷 France

Register Now

RWA London Summit
February 24th, 2025 | 🇬🇧 United Kingdom

Register Now

Digital Assets Week Hong Kong
February 27th, 2025 | 🇭🇰 Hong Kong

Register Now

Consensus by CoinDesk Hong Kong
February 18th – 20th, 2025 | 🇭🇰 Hong Kong

Register Now

Halalverse Summit
February 25th – 26th, 2025 | 🇦🇪 United Arab Emirates

Register Now ERC3643 Association Recap

Fasnara Launch Tokenized MMF, developed in collaboration with ERC3643 Association Members

Fasanara Capital, a global leader in digital finance with $4.5B AUM, has chosen the ERC-3643 “T-REX” standard to launch its first tokenized MMF: the Fasanara MMF Token.

Learn more here

Subscribe Newsletter

A monthly newsletter designed to give you an overview of the key developments across the asset tokenization industry.

Previous Newsletter  Feb3 Trump Administration’s Impact on Tokenization: Is the Golden Age Upon Us? :thuJanuary 2025 Trump Administration’s Impact on Tokenization: Is the Golden Age Upon Us? For years, US financial institutions have faced significant hurdles in adopting tokenization,… Dec9 Bitcoin Hits $100K: The Tokenization Tipping Point? December 2024 Bitcoin Hits $100K: The Tokenization Tipping Point? Last week, Bitcoin hits $100k! This milestone, fueled by institutional adoption and a promising regulatory shift… Oct21 Institutional Tokenization 3.0: Break Silos October 2024 Institutional Tokenization 3.0: Break Silos Since Tokeny started building tokenization solutions in 2017, we have seen financial institutions exploring tokenization of assets in… Sep6 Amsterdam Teambuilding Fuels Our Mission for Open Finance May 2024 Amsterdam Teambuilding Fuels Our Mission for Open Finance Greetings from Amsterdam! We hope you had a wonderful summer holiday. Recently, our global team…

The post Trump Administration’s Impact on Tokenization: Is the Golden Age Upon Us? appeared first on Tokeny.


FastID

PCI DSS 4.0 Demystified

Stay informed about the upcoming PCI DSS 4.0 deadline on March 31, 2025. Learn how to enhance your security measures for processing cardholder data.
Stay informed about the upcoming PCI DSS 4.0 deadline on March 31, 2025. Learn how to enhance your security measures for processing cardholder data.

Friday, 31. January 2025

Holochain

Provenance and Accountability in the Digital World

Strategic collaboration between the Holochain Foundation, Holo, and Immu.ai.

This post is a strategic collaboration announcement between Immu.ai, the Holochain Foundation, and Holo. You can check out Immu.ai's announcement here and then continue to the rest of this post to get a deeper sense and the wider context of why this collaboration matters.

I have a garden. I love eating the tomatoes that come out of my garden.  Sometimes I love it because they taste better than supermarket tomatoes, but honestly they don’t always taste better than ones I get from the local farmers market, and I still love eating them.  Why?  Because I know the full story of the tomatoes.  I know where I got the seeds.  I know how they grew, what went into them, how they fared a dry-spell and more.  There’s something deeply satisfying about knowing the story of what we eat, what we use, what we wear.

And it’s more than just satisfying, it’s actually critical to creating healthy systems.  In any system where there is no information about an input to that system, there will be an inability to respond.  If I don’t know what went into the growing of my tomatoes, I cannot respond to differences between tomato sources.  If I know about pesticide use, carbon footprint, labor practices, transportation distances, then I can respond in my choices about which tomatoes to buy.  This story is meant simply to show a systemic truth, that in a complex society where goods are produced and flow through a supply chain, we need mechanisms to have that data aggregated and attached to products as they make their way through the economy for the effects of producing those goods to not just be “externalities”. 

We have seen for quite some time formal mechanisms to add some data to our products.  USDA Organic, Fair-trade and similar certifications create a bit of added information. It’s rather easy to see the need for generalized, high resolution versions of these kinds of product indicators, but for the whole supply chain of products.  It’s rather difficult to figure out how to build ones that have the reliability, transparency, systemic neutrality and incorruptibility we would want for such systems.  And now, critically, the EU has mandated phasing in Digital Product Passports that will need to do just that.

In designing Holochain one of the core principles behind its architecture was for it to provide a substrate in which parties could create a space of engagement in the digital world in which they could all hold each other to account without having to have an intermediary keeping the accounts.  These core design criteria led us to create a system where data provenance is a native feature of the framework.  This is what is meant when people describe Holochain as “agent-centric”.  All actions taken by agents in a given Holochain network include the provenance of that action, and only valid actions determined by the rules-of-engagement of that particular Holochain network, can get recorded.   And all of this happens with no intermediary.

Such a substrate is ideal for creating the kind of transparency and accountability framework that can deliver on the demands of robust Digital Product Passport solutions that are truly decentralized.

Immu.ai is working on a platform for providing, data modeling, validation, and transparency, in service of Digital Product Passports, and has recognized the value proposition of Holochain to deliver on their commitment to decentralization of their platform. This is why the Holochain Foundation is taking on this strategic collaboration immu.ai together with Holo.  We believe it will help deliver on the possibility of living in a world where the full story of the products we consume is available, and can be used to steer our economic participation in directions that aren’t full of collateral damage due to lack of information. 

As a final note, this isn’t the only collaboration in this domain.  The Holochain Foundation supports the development of hREA, a Holochain based implementation of the Resource, Event, Agent accounting framework and valueflows ontology.  You can read more about hREA and the Holochain community efforts here.


auth0

Use CIBA Authentication with Auth0 and .NET

Learn how to integrate CIBA authentication in your .NET applications to improve security and privacy.
Learn how to integrate CIBA authentication in your .NET applications to improve security and privacy.

liminal (was OWI)

The State of Identity – January 31, 2025

Liminal members enjoy the exclusive benefit of receiving daily morning briefs directly in their inboxes, ensuring they stay ahead of the curve with the latest industry developments for a significant competitive advantage. Looking for product or company-specific news? Log in or sign-up to Link for more detailed news and developments. Here are the main industry […] The post The State of Identity –

Liminal members enjoy the exclusive benefit of receiving daily morning briefs directly in their inboxes, ensuring they stay ahead of the curve with the latest industry developments for a significant competitive advantage.

Looking for product or company-specific news? Log in or sign-up to Link for more detailed news and developments.

Here are the main industry highlights of this week week impacting identity and fraud, cybersecurity, trust and safety, financial crimes compliance, and privacy and consent management.

🪄Innovation and New Technology Developments

Wiz Researchers Uncover Data Leak in DeepSeek’s Unsecured Database

WIZ researchers found that China-based AI platform DeepSeek exposed over a million records, including user chat prompts and API keys, in an unsecured database. Though taken offline after contact, DeepSeek has not addressed the issue. Experts warn of security risks, while Italy investigates and the U.S. Navy advises against its use. OpenAI is also probing whether DeepSeek trained on ChatGPT outputs. (Source)

Industry Coalition Urges Trump Administration to Accelerate Mobile Driver’s Licenses and Digital Identity Adoption

An industry coalition is urging the Trump administration’s DOGE to accelerate mobile driver’s licenses (mDLs) and digital identity adoption to fight fraud. The Better Identity Coalition called for state grants and private-sector partnerships. While Biden considered an executive order on digital identity, it didn’t materialize, though his cyber directive included anti-fraud measures. The Trump administration has maintained Biden’s directive, supporting mDL funding and identity verification standards. (Source)

Australia’s Big Four Banks Adopt ConnectID for Secure and Consent-Based Digital Identity Verification

Australia’s four largest banks—Commonwealth Bank, NAB, ANZ, and Westpac —now offer ConnectID, a digital identity solution by Australian Payments Plus (AP+). Acting as a secure intermediary, ConnectID enables users to share only necessary information during transactions with full consent, without storing or accessing customer data. Businesses benefit by reducing the need to manage sensitive information. Awareness of digital identity solutions in Australia has risen, with 72% of Australians familiar with them as of December 2024. (Source)

Apple Patches Zero-Day Bug in Core Media, Enables Apple Intelligence by Default in Latest Updates

Apple‘s latest updates for iPhone, iPad, and Mac enable Apple Intelligence by default on newer devices and patch security bugs, including a zero-day vulnerability in Core Media. Hackers exploited the flaw to gain elevated privileges, affecting devices on iOS versions before 17.2. Apple has fixed the issue but did not disclose details on its discovery or targets. This is 2025’s first actively exploited iOS vulnerability, following seven similar cases in 2024. (Source)

OpenAI Launches Operator, an Autonomous AI Agent, Amid Concerns Over Oversight and Trust

OpenAI‘s Operator, an autonomous AI agent, is now live, partnering with Uber, Instacart, and DoorDash to handle online tasks. However, some websites are blocking it over concerns about bot access. To address these issues, initiatives like World propose linking AI agents to human identities, ensuring accountability while helping businesses integrate AI securely. (Source)

DeepSeek’s AI Breakthrough Disrupts Global Tech, Sparks Chip Stock Selloff, and Raises Cybersecurity Concerns

Chinese AI firm DeepSeek AI has shaken the global tech sector with its R1 and V3 AI models, matching top Western counterparts at a fraction of the cost. Training V3 on just over 2,000 Nvidia chips for $5.6M—far below the $100M–$1B spent by U.S. firms—DeepSeek’s efficiency triggered a chip stock selloff, with Nvidia plunging 15% and the Nasdaq dropping 3%. Beyond financial impact, DeepSeek’s cost-effective AI raises cybersecurity and military concerns, as it could democratize AI capabilities for various actors, including those with malicious intent. The breakthrough challenges U.S. export controls, intensifies the AI arms race, and could reshape the economics of AI development worldwide. (Source)

DeepSeek Temporarily Halts New Sign-Ups for AI Assistant App Amid Malicious Attacks and User Surge

DeepSeek’s AI Assistant app, a top-ranked ChatGPT rival, has temporarily restricted new sign-ups due to “large-scale malicious attacks.” While existing users remain unaffected, new registrations faced outages and performance issues. Initially, DeepSeek required a mainland China mobile number for sign-ups, but this has since been removed, allowing Google, Apple ID, and email registration. It’s unclear if the issue is solely due to attacks or a surge in users, as the app recently topped the U.S. App Store charts. DeepSeek has provided limited details, and the situation is still unfolding. (Source)

South Korea pilots blockchain-based digital IDs to modernize its national identification system

South Korea has launched a pilot program for blockchain-powered digital ID cards, modernizing its 56-year-old national ID system. Tested in nine regions, including Sejong and Yeosu, the program is open to residents 17 and older. Building on existing digital ID efforts like mobile driver’s licenses, this initiative aligns with the global shift toward digital identity integration. It aims to boost efficiency and security, showcasing South Korea’s commitment to innovative technologies in public administration. (Source)

Idemia launches ALIX to reduce lost luggage with AI-powered digital tags and biometrics

IDEMIA has launched ALIX (Augmented Luggage Identification Experience) to tackle the 28 million lost bags per year. Using AI and biometrics, ALIX creates digital luggage tags by capturing high-quality images when bags enter the system, ensuring identification even without physical tags. Developed with Air France and deployed at Paris CDG, ALIX boasts 90% accuracy in identifying bags. The system includes ALIX Arch (an image-capturing device) and ALIX Core (a cloud-based platform). By enhancing airport efficiency and customer satisfaction, ALIX offers a smarter baggage-tracking solution for airlines and ground staff. (Source)

Guyana invests $1 billion in biometric e-ID system to advance digital transformation and public service access

Guyana has allocated $1 billion (US$4.8 million) to launch a biometric e-ID card system this year, part of a $35.4 million contract with Veridos to enhance identity security and e-governance. The initiative supports healthcare, education, and transportation while expanding digital access to rural areas. Alongside e-IDs, Guyana is integrating biometric surveillance, facial recognition, and an electronic passport control system at its main airport for national security. However, political tension remains, as the election commission rejected biometric voting for 2025, citing time constraints, drawing criticism from the opposition. (Source)

💰 Investments and Partnerships

Tenable To Acquire Vulcan Cyber For $150M To Boost Exposure Management Capabilities

Tenable is acquiring Vulcan Cyber | Own exposure risk for $150 million ($147M cash, $3M stock), enhancing its exposure management platform with risk prioritization, automated remediation, and integrations with 100+ security products. Expected to close in Q1 2025, the deal follows Tenable’s 2024 purchase of Eureka Security for $30 million. In 2024, SecurityWeek tracked 400+ cybersecurity M&A deals, with disclosed transactions totaling $50.4 billion, highlighting continued consolidation in the sector. (Source)

CHEQ Acquires Deduce to Enhance AI-Driven Identity Fraud Prevention

CheQ has acquired Deduce to integrate its patented identity graph technology into CHEQ’s go-to-market security platform. Deduce’s system, tracking 185M weekly users and 1.5B daily events, enhances fraud detection by identifying AI-generated “SuperSynthetic” identities. This acquisition boosts CHEQ’s defense against AI-driven fraud, ensuring compliance while minimizing disruptions to user experiences. It aligns with CHEQ’s M&A strategy to strengthen cybersecurity against evolving threats, offering businesses real-time forensics and advanced identity verification. (Source)

X Partners With Visa To Launch A Digital Wallet And Peer-To-Peer Payments

Elon Musk’s social platform X announced a partnership with Visa that will introduce a digital wallet and peer-to-peer payments, allowing users to transfer funds between bank accounts and X’s wallet as well as send money to each other. The initiative is part of X’s plan to expand into financial services, backed by its money transmitter licenses in 41 states. The service is expected to launch in the first quarter, initially focusing on allowing creators to receive payments within the platform and potentially including banking features such as high-yield money market accounts. (Source)

Clutch Security Raises $20M To Tackle Machine Identity Risks In The Cloud

Clutch Security, an Israeli startup specializing in machine identity management, has raised $20 million in a funding round led by SignalFire, with backing from Lightspeed Venture Partners and Merlin Ventures. Founded in late 2023, Clutch helps secure machine identities across cloud services, APIs, and SaaS applications by providing visibility, lifecycle management, and zero-trust controls for service accounts, API keys, and tokens. The funds will support R&D, product growth, and business expansion as the rise of cloud and AI-driven tools increases machine identity threats. (Source)

Wultra Raises €3M To Strengthen Quantum-Resistant Banking Authentication

Wultra, a banking security vendor, has raised €3 million from Tensor Ventures, Elevator Ventures, and J&T Ventures to advance quantum-resistant authentication for financial applications. Anticipating a “Q-day” within five years, when quantum computing could break current cryptographic methods, Wultra offers software authentication, the Talisman hardware device, and biometric onboarding for banks. Clients include Raiffeisen Bank, Erste Digital, OTP Bank, and Global Payments. With this funding, Wultra plans to expand into Western Europe, Southeast Asia, and Vietnam, where it has partnered with Savis Group. (Source)

Humanity Protocol Raises $20M to Expand Decentralized Identity Solutions and Web3 Credential Validation

Humanity Protocol has raised $20 million in a Pantera Capital- and Jump Crypto-led round, valuing the company at $1.1 billion. The funding will accelerate its decentralized identity blockchain solutions and global expansion in 2025. Partnering with OKX Wallet, the company will issue verifiable credentials to ensure fair token distribution and fraud prevention. Additionally, its collaboration with Open Campus integrates verifiable credential frameworks for education validation and Web3 interoperability, allowing users to showcase verified skills while maintaining privacy via zero-knowledge proofs. (Source)

⚖️ Policy and Regulatory

France Expands Binance Probe Over Money Laundering And Terrorist Financing

French authorities have expanded their investigation into Binance for money laundering and terrorist financing, covering activities from 2019 to 2024. The probe examines allegations of habitual money laundering linked to drug trafficking and tax fraud, as well as unauthorized marketing via influencers. This follows Binance’s $4.3 billion fine by U.S. officials in 2023 for similar violations. Despite receiving registered status in France in 2022, the exchange now faces scrutiny over customer complaints and inadequate disclosure, with the case referred to client protection and anti-fraud agencies. (Source)

Largest Medical Data Breach in U.S. History Exposes Sensitive Information of 190 Million Americans

UnitedHealth Group has confirmed that the February 2024 ransomware attack on Change Healthcare affected 190 million Americans, nearly double the initial estimate. This ALPHV ransomware gang breach is now the largest medical data breach in U.S. history, exposing names, contact details, government IDs, health diagnoses, treatment plans, and financial information. Hackers gained access via a stolen credential lacking multi-factor authentication, causing months-long outages across the U.S. healthcare system. While UnitedHealth claims no evidence of medical record misuse, some stolen data was published online, and two ransoms were paid to prevent further leaks. The incident highlights serious vulnerabilities in healthcare data security. (Source)

UK Sets Timeline for Stricter ID Verification and AML Measures Under Economic Crime and Corporate Transparency Act 2023

The UK will enforce stricter identity verification (IDV) and anti-money laundering (AML) controls under the Economic Crime and Corporate Transparency Act 2023. Starting autumn 2025, new business directors and PSCs must verify their identities, with existing companies complying by autumn 2026. IDV will also be required in annual filings. Authorized Corporate Service Providers (ACSPs) can offer verification from February 2025, with voluntary IDV opening in March 2025 and enforcement in 2026. Covering 7 million individuals, the Act aims to combat fraud and money laundering, though verification methods remain unspecified. (Source)

Google allowed to depose Texas in biometric data lawsuits but blocked from deposing Attorney General’s office

Google has won the right to depose Texas in lawsuits over alleged biometric and consumer protection violations but cannot depose the Attorney General’s Office. The cases involve claims that Google Photos, Assistant, and Nest Hub Max violated Texas’ biometric law (CUBI) and that Google collected location data under the Deceptive Trade Practices Act. Google has also subpoenaed Clearview AI to support its defense, while Amazon and Lytx have settled similar biometric privacy lawsuits under Illinois’ BIPA for undisclosed terms and $4.25 million, respectively. The rulings highlight growing legal scrutiny over biometric data use in the tech industry. (Source)

🔗 More from Liminal

New Research Available

Access the Market & Buyer’s Guide for Third-Party Risk Management in Link for insights to strengthen compliance and tackle emerging risks as the TPRM market nears $19.9 billion by 2030.

Access Market & Competitive Intelligence

Our award-winning Link™ platform empowers you to monitor trends, access benchmark research reports, explore use cases, and more.

Liminal CEO Summit 2025

Interested in attending? Request an invite to our 4th annual exclusive CEO event, which will be held in Laguna Beach, California.

The post The State of Identity – January 31, 2025 appeared first on Liminal.co.


Kin AI

Thriving as an Introvert in a Loud World: Brunna’s Story

Ever felt small in a big, noisy world? You're not alone. Here's Brunna's story on how she turned her most natural state into her biggest strength with KIN.
A safe space with KIN

Try Kin - Personal AI

If you’ve always been an introvert, you know what it’s like to feel small in a world that seems far too loud.

Maybe you were the quiet one at the back of the class, trying to stay invisible while the louder kids took center stage.

The world buzzed with energy you couldn’t match, leaving you feeling out of place, unsure, and overly aware of your own existence.

Even now, in your professional life, you might find yourself grappling with an inner struggle—trying to project confidence while fearing that others might see right through you, back to the quiet, uncertain version of yourself who once sat in the back of that classroom.

Brunna, a 29-year-old design management student and Product Specialist at a tech company, knows this feeling well.

“I’ve always found it hard to express my emotions,” she shared.

For Brunna, that shy inner child hasn’t disappeared.

She’s still there, whispering doubts during presentations, meetings, or moments when she needs to step into the spotlight.

The Challenges of Work Life for Introverts

For introverts like Brunna, the professional world can feel like an ongoing performance. The need to network, collaborate, and lead often feels overwhelming.

“At work, I don’t always feel comfortable sharing my vulnerabilities,” Brunna admitted.

“Sometimes, being honest about feeling nervous can be seen as a weakness, and that’s not something I want to show.”

Even simple tasks, like asking her boss for vacation time, can spark overthinking.

“I wanted to ask for some time off, but my boss didn’t respond right away, and I found myself wondering: Is it too soon to ask? How should I phrase it?”

Instead of spiraling into doubt, she turned to Kin.

“I asked Kin how to approach the conversation,” she shared. “It helped me frame my request in a way that felt professional and clear. That gave me the confidence I needed to actually bring it up with my boss.”

Finding Support in the Right Tools

Brunna found a way to manage her challenges with Kin. What started as curiosity about the personal AI app quickly became an indispensable part of her routine.

Kin feels like a safe space where I can open up without fear of judgment,” Brunna explained.

“It’s helped me prepare for difficult conversations at work, organize my thoughts, and even reflect on my emotions.”

One feature of Kin that stood out for her was how the AI companion visualizes conversations.

“I love how it creates diagrams of what I share,” she said. “It’s helped me better understand myself, and it’s even something I plan to share with my therapist.”

Kin’s privacy features also gave her the confidence to open up.

“Knowing that my data is secure and won’t be shared is so important. I can say things to Kin that I wouldn’t feel comfortable saying to anyone else.”

Small Steps Toward Confidence

For Brunna, using Kin isn’t about erasing her introverted nature but embracing it as a strength.

Kin has helped her take small but meaningful steps toward confidence—whether it’s finding the right words for an email, preparing for a meeting, or reflecting on her emotions.

“Sometimes, I use Kin just to talk about personal feelings, like missing my boyfriend who lives in the Netherlands,” she shared. “What starts as a conversation about sadness often turns into something more positive, like talking about museums we’ve visited or things I enjoy. It’s a reminder that even small conversations can shift your perspective.”

These moments of reflection and preparation with the AI assistant have made a noticeable difference.

“I feel more prepared and less nervous when I use Kin,” Brunna said. “It’s not about becoming someone I’m not—it’s about showing up as the best version of myself.”

Photo by Amelia Wahyuningtias on Unsplash Thriving as an Introvert

Brunna’s story highlights the power of small steps and the right tools.

For introverts, thriving in the workplace isn’t about transforming into an extrovert.

It’s about finding ways to prepare, reflect, and navigate challenges in a way that feels authentic.

“No one is going to pat you on the back and say, ‘It’s fine, just breathe, drink some water,’” Brunna noted. “But Kin will. It’s like having someone who’s always there, reminding you that you’ve got this.”

Photo by Christina @ wocintechchat.com on Unsplash Final Thoughts

If you’re struggling with similar challenges, Kin can help. You don’t need to be anyone else to feel calm and succeed.

You just need to be yourself—embracing even the quiet version of you sitting in the back of the class—and learn how to make the most of your unique strengths.

Think of it this way: you don’t expect an apple tree to grow bananas, right?

You simply expect it to grow the best apples it can. The same goes for you.

You can thrive in your own way by understanding and working with who you are.

As so much more than an AI chatbot, Kin is here to support you every step of the way.

Chat With Kin


The user gave consent for this information to be shared.


Elliptic

2025 Regulatory outlook: Tokenization projects will soar among financial institutions

 

 

Thursday, 30. January 2025

HYPR

2025's Top Five Trends in Identity Verification

Identity verification has emerged as a key component of modern enterprise security as rules tighten and cyber threats, increasingly powered by AI, grow in volume and effectiveness. Emerging technology, changing attack patterns, and new regulations are all influencing how companies validate identities.

Identity verification has emerged as a key component of modern enterprise security as rules tighten and cyber threats, increasingly powered by AI, grow in volume and effectiveness. Emerging technology, changing attack patterns, and new regulations are all influencing how companies validate identities.

Traditional identity proofing and verification methods — which are generally employed only at fixed checkpoints such as employee onboarding — are no longer enough. The prevalence of hybrid workforces, the advancement of fraud techniques, and the demand for seamless user experiences, are driving a shift toward continuous, contextual identity proofing. As we go into 2025, we look at key identity verification challenges and trends and their effects on workplace security.

Rise In Interview and Onboarding Fraud

It's increasingly common for organizations to discover (eventually) that the candidate they thought they hired for a role is not the person that joins the company. The FBI and other agencies have issued multiple alerts about fake IT workers from North Korea infiltrating U.S. companies by using fabricated or stolen identities. The most recent FBI statement warns that the stakes have grown higher, with North Korean IT workers extorting victims by holding stolen proprietary data and code hostage until the companies pay a ransom.

The focus on the threat from North Korea however, while undeniably severe, masks the growing and widespread nature of the issue. Fraudsters exploit the ubiquity of remote work to pull a bait and switch, using deepfakes or stand-ins to impersonate job candidates during interviews and verification processes. The person that shows up on day one, and granted system access, isn’t the same person who went through the initial screening. Motivations range from the somewhat innocuous, for example trying to land a job the person isn’t qualified for, to malicious attempts to gain access to corporate systems. Anyone can be a target — HYPR recently exposed its own brush with candidate fraud (which was thwarted by our Identity Assurance platform).

AI-Powered Help Desk Social Engineering Attacks

Credential resets remain a major vulnerability, with attackers tricking help desk agents to bypass security protocols. Most IT service desks operate with limited staff and handle a high volume of calls, many of which involve password or MFA issues. Attackers often take advantage of human nature and publicly available information to deceive service desk personnel, ultimately gaining access to legitimate credentials. Once inside, they can access sensitive systems, escalate privileges, and move laterally within an organization — often without triggering security alerts.

These attacks are particularly dangerous because they sidestep traditional security controls. Even with strong authentication policies in place, a well-executed social engineering attack can grant an adversary the same access as an authorized employee. Cybercriminals use tactics like creating a sense of urgency, posing as high-ranking executives, or leveraging insider-like information — often stolen or scraped from public sources — to make their requests seem credible. Generative AI has made these schemes even more convincing, allowing attackers to mimic speech patterns, craft realistic emails, or even generate deepfake voices in real time.

Preventing help desk social engineering with HYPR

Adoption of Multi-Factor Verification

The intensifying attacks on workforce system vulnerabilities underscore the critical need for enterprises to implement adaptive, robust identity proofing methods capable of detecting and neutralizing these sophisticated threats. Multi-factor verification (MFV) has emerged as a logical evolution of traditional multi-factor authentication (MFA). Instead of relying on authentication as the primary gatekeeper, MFV makes adaptive, risk-based identity verification an intrinsic part of daily access flows. It integrates factors like behavior, biometrics, and contextual signals to continuously validate user identity throughout the session. MFV can address weak spots in critical processes like credential recovery and device registration, which traditionally use insecure methods such as knowledge-based answers and help desk calls.

Consider a situation where a user logs in from a trusted device but behaves in an unexpected manner, for example accessing files that aren’t typical for their role or working from a different location. Based on these risk signals, MFV adjusts in real time, raising the required verification levels. By ensuring that verification aligns with the perceived threat and situational risk, MFV not only reduces the risk from compromised credentials, it provides a quicker, less intrusive process.

NIST 800-63-4: Upping the Identity Verification Stakes

The draft NIST SP 800-63-4 guidelines, slated for release in 2025, introduce significant updates to strengthen identity proofing and verification standards. These include stricter provisions for remote identity proofing, incorporating advanced methods such as biometric matching and live document verification for remote onboarding. The draft standards also emphasize risk assessment, encouraging organizations to evaluate the risk level of each identity-related transaction and apply verification measures accordingly. Fraud detection is another area of focus, with requirements to detect and mitigate potential fraud during verification processes.

The guidelines highlight the shift toward continuous identity verification as a critical component of identity assurance. Enterprises looking to align with NIST 800-63-4 will need to adopt rigorous, scalable solutions to improve security while meeting compliance requirements. 

The Emergence of Decentralized Identity

Decentralized identity systems will start to gain traction in the workplace in 2025. Organizations can significantly simplify and secure processes like onboarding and credential recovery by incorporating verifiable credentials, such as Microsoft Verified ID credentials, into their identity processes. A modern decentralized identity verification workflow might include the following steps:

The employee’s identity is verified using advanced proofing methods, such as document capture, liveness detection, and employer attestation. Once verified, the employee receives a secure, verifiable credential issued to their digital wallet. The credential enables the employee to complete tasks like provisioning passkeys, enrolling in benefits, or resetting credentials, all without relying on centralized identity stores.

Example workflow to issue Microsoft Entra Verified ID credentials

This decentralized approach not only streamlines workflows but also strengthens security by reducing reliance on centralized systems.

Preparing for the Future of Identity Verification

As identity verification trends evolve, organizations must adapt to stay secure and competitive. Multi-factor verification, robust defenses against social engineering, and alignment with emerging standards like NIST 800-63-4 are critical to staying secure. Decentralized identity solutions offer promising advancements in simplifying and securing workforce processes, but only when paired with strong identity proofing practices.

HYPR’s Identity Assurance platform was built to help organizations navigate these challenges. HYPR integrates phishing-resistant passwordless authentication, adaptive risk mitigation, and automated identity verification into a streamlined and user-friendly access flow. It allows organizations to tailor identity verification processes to fit their specific environments and use cases. For instance, secure self-service options can be used in low-risk situations, while additional measures, such as live video verification, can be invoked in higher-risk scenarios or when anomalies are detected. To see how HYPR can help your organization, schedule a demo tailored to your identity security interests and needs.


playhaus.tv

28 – Traitorous Green Demos | Weekly Mojo w/ Madison Jesseka


auth0

CIBA: Authenticate Customers in Call Centers and Other Out-of-Band Scenarios

Find out how you can improve your customers' security and authentication experience using CIBA.
Find out how you can improve your customers' security and authentication experience using CIBA.

Kin AI

How to Use Kin's Journal

Kin's Journal feature can turn your daily thoughts into powerful, personal insights—helping you become more self-aware.
Photo by Jan Kahánek on Unsplash

Try Kin - Personal AI

Kin has a dedicated Journal feature, giving you a free space to record your thoughts, or even do things like manage your anxiety. Powered by artificial intelligence, Kin can then use these Journal entries to better support you. But how?

I’m Yngvi Karlson, Co-Founder of Kin. Born in the Faroe Islands, I’ve spent my career building startups, with two exits along the way, and five years as an active venture capitalist. Now, I’m dedicated to creating Kin, a personal AI people can truly trust.

Follow me on LinkedIn, TikTok and X

To help you use it, this article covers:

How to Navigate Kin’s Journal

Maximizing Your Personal AI Journal

Extra Tips for Using Your AI Companion

Get Started Today with Your AI Assistant

So, let’s go.

How to Navigate Kin’s Journal

Here’s how to the Journal feature works:

Step One: Access the Journal

Open the Kin app, and tap on the book icon in the bottom left, then it’s over to you.

💡 Kin will give you the option to either type or speak your Journal entry, to better fit you.

Step Two: Use the Prompt—or Don’t

Every daily Journal contains a randomized prompt for inspiration at the top of the page.

If you’re not sure where to start journaling, writing down what the prompt makes you think about can be a good way to begin. But you can ignore it, too!

💡 Want a prompt, but don’t like the one you’ve got? Hit the refresh button in the top right corner to get a new prompt!

Step Three: Visit the Streaks & Stats Tab

Once you’ve written your entry, return to the homepage with the back button in the top left, and hit the flame icon in the top right. From here, you can track how many days you’ve used Kin in a row (your streak), and see what Kin learned from your Journal entry today.

Maximizing Your Personal AI Journal

Want to make full use of the Journal feature? Here are some extra tips:

Let Yourself Write Freely

Each daily Journal entry is a blank space for you. There is no right or wrong; you can fill it with whatever you choose.

The aim of journaling isn’t to come to a big revelation, or even to write about your daily experience. It’s just to write. The rest comes by itself—so write freely.

Try to Journal Regularly

Regular journaling helps both you and Kin notice patterns in your behavior and relationships. Kin stores these in its personal memory of you, which helps Kin better understand how to guide you in the future.

Regularly doesn’t have to mean every day—though that is often best. Once a week or even once a month is better than nothing!

Discuss Entries with Kin

Unlike traditional journaling, Kin can discuss your Journal entries with you, as well as record them. In its advanced AI chatbot Chat feature, Kin can ask questions to help you elaborate and understand yourself, explain different points of view, and even make suggestions on what is best for you to do next.

This interactive, pressure-free space can be a powerful way to explore your thoughts, at your own pace.

Trust The Data’s Safe

Journal entries are inherently personal. That’s why, along with the rest of Kin’s memory of you, they’re handled securely. You can read more in our privacy blog.

You can also always view or delete what Kin knows about you through the app, too. Not even we can do that.

Extra Tips for Using Your AI Companion

Those aren’t the only things you can do. Here are some more ideas for getting the most from Kin’s Journal:

Get Comfortable: Choose a quiet moment when you won't be interrupted, and decide whether you want to write or speak, so you can just Journal.

Consider Prompts: Look at today’s prompt, and see if it inspires anything. But if you already have something in mind, or feel yourself drifting away from the prompt, that’s okay. Just keep writing.

Anything Goes: It doesn’t matter if you write one word, or 10,000. It doesn’t even matter what words they are. What matters is you wrote what you wanted to.

Add Feeling: That being said, many people find it helpful to consider their feelings as they write, and to include them. It might sound cliche, but it helps.

Don’t Push: If you’re finding it really hard to write anything, don’t force it. Just write that you struggled, and come back to it later—even during your next session.

And, remember—Journaling helps inform Kin's Memory about you. The more you use it, the more personal and valuable Kin’s insights will become. You can always discuss your Journal entries or even your feelings in Kin’s regular chat too, if you’re seeking interactivity.

Get Started Today with your AI Assistant:

Ready to start journaling? Here's a prompt you can send Kin to help it help you through the process:

“Hey Kin, how should I best Journal with you?”


Ocean Protocol

Machine Learning Meets Monetary Policy: Insights from the FOMC Data Challenge

This article is written in collaboration with Yunus Gümüşsoy, the winner of the FOMC data challenge hosted by Ocean Foam in December 2024. Introduction The Federal Open Market Committee (FOMC) meeting on January 28–29, 2025, has garnered significant attention from financial markets, impacting investment strategies across technology, cryptocurrency, and artificial intelligence sectors. Inter

This article is written in collaboration with Yunus Gümüşsoy, the winner of the FOMC data challenge hosted by Ocean Foam in December 2024.

Introduction

The Federal Open Market Committee (FOMC) meeting on January 28–29, 2025, has garnered significant attention from financial markets, impacting investment strategies across technology, cryptocurrency, and artificial intelligence sectors. Interest rate decisions are pivotal in shaping economic policy and market sentiment; thus, predicting these outcomes is invaluable for traders, analysts, and policymakers.

Fed Funds Interest Rate changes over time

To investigate the potential of machine learning (ML) in forecasting FOMC decisions and their market impact, Ocean Foam and Desights organized a data challenge in December 2024. This initiative aimed to utilize ML techniques to analyze macroeconomic data, financial indicators, and Federal Reserve communications to enhance the accuracy of rate decision predictions.

This article discusses our findings from the challenge and employs the best-performing ML model to predict the FOMC’s latest decision. As of now, the Federal Reserve has opted to maintain current interest rates after several prior cuts, striving for a balanced economic path amid fluctuating market conditions. We will evaluate our model’s performance while acknowledging areas for improvement.

Applying the Model to January 2025

Following the success of the December challenge, we applied our highest-performing model to predict outcomes for the January FOMC meeting. We aimed to refine our predictive framework by integrating additional economic indicators, sentiment analysis, and ML optimizations.

Our analysis considered various macroeconomic factors, although we will highlight only a few key indicators here. These include:

Consumer Price Index (CPI): A vital measure of inflation that significantly influences Fed decisions. Unemployment Rate: An essential indicator of labor market health, crucial for monetary policy considerations. Financial Market Trends: Encompassing stock market movements, bond yields, and overall investor sentiment. Federal Reserve Communications: Analyzed using natural language processing (NLP) to detect shifts in policy tone.

Please refer to the “Understanding Macroeconomic Correlations” section for a comprehensive view of all the factors analyzed.

We tested multiple ML models to enhance prediction accuracy and ultimately selected a fine-tuned Random Forest model for its balance of interpretability and predictive power. Transparency was essential; we ensured the model’s outputs were understandable and aligned with economic rationale. Our approach involved analyzing FOMC communications to discern tone and underlying messages through sentiment analysis tools. We also examined economic data trends to create features that could aid in predicting future rate changes.

Prediction for the January 2025 FOMC Meeting

Our model’s probability distribution for the January 29, 2025, FOMC rate decision is as follows:

No change (+0.00%): 51.1% probability Rate cut (-0.25%): 6.7% probability Rate cut (-0.50%): 6.9% probability Rate hike (+0.25%): 35.3% probability

The model indicates a substantial likelihood of no rate change, consistent with the current economic landscape. The new presidential administration favors lower interest rates, so a rate hike appears less probable. However, a 35.3% probability remains for a 0.25% increase, reflecting ongoing uncertainty in market expectations.

Understanding Macroeconomic Correlations

Understanding the relationship between macroeconomic factors and the Fed Funds Rate is crucial for grasping monetary policy dynamics. To enhance our predictive framework, we examined correlations among key economic indicators.

Correlation Heatmap of Macroeconomic Factors & Fed Funds Rate

Correlation heatmap

The heatmap illustrates pairwise correlations among various economic indicators:

High Positive Correlations: Treasury yields (2-year and 10-year) and mortgage rates with the Fed Funds Rate. Moderate Correlations: CPI and Core CPI reflect the Fed’s focus on inflation trends. Weaker Relationships: Employment-related factors like unemployment rates remain key considerations but show weaker direct correlations. Ranked Correlation of Variables with Fed Funds Rate Correlation of variables

A bar chart ranks individual macroeconomic factors based on their correlation strength:

Highly Positive Correlations: Bank loan rates, Treasury yields, and mortgage rates are strong indicators of monetary policy adjustments. Negative Correlations: The unemployment rate, oil prices, and real export rates indicate that rate hikes often correlate with stronger economic conditions and lower unemployment. Future Improvements and Next Steps

While our model shows promising accuracy, there are areas for enhancement:

Enhanced Sentiment Analysis: Incorporating advanced NLP techniques to detect nuanced shifts in Federal Reserve rhetoric. Expanded Macroeconomic Data: Including additional leading indicators such as consumer spending trends and wage growth. Real-Time Adaptation: Developing models that dynamically update as new economic data becomes available.

A key takeaway from this challenge is that even advanced models can struggle with real-world uncertainties influenced by political factors or unexpected market shifts. The model’s 35.3% probability of a rate hike underscores this challenge.

Moving forward, we will focus on refining our models to improve prediction accuracy by incorporating more financial sentiment indicators and macroeconomic trends. By continuously iterating on these approaches, we aim to provide better predictive insights for policymakers, investors, and financial analysts navigating monetary policy complexities.

About Ocean Protocol

Ocean was founded to level the playing field for AI and data. Ocean tools enable people to privately & securely publish, exchange, and consume data.

Follow Ocean on Twitter or Telegram to stay up to date. Chat directly with the Ocean community on Discord, or track Ocean’s progress on GitHub.

Machine Learning Meets Monetary Policy: Insights from the FOMC Data Challenge was originally published in Ocean Protocol on Medium, where people are continuing the conversation by highlighting and responding to this story.


Spherity

Spherity Achieves SOC 2® Type II Compliance, Meeting Highest Bar for Customer Data Security

SOC 2 report validates Spherity’s commitment to protecting its customers’ sensitive information Dortmund, Germany — Spherity, a global pioneer in digital identity software, has successfully completed the Service Organization Control (SOC 2) Type II examination. Spherity’s customers can now be assured that Spherity is meeting the highest standards for data security. “Achieving SOC 2 Type II compl
SOC 2 report validates Spherity’s commitment to protecting its customers’ sensitive information

Dortmund, Germany — Spherity, a global pioneer in digital identity software, has successfully completed the Service Organization Control (SOC 2) Type II examination. Spherity’s customers can now be assured that Spherity is meeting the highest standards for data security.

“Achieving SOC 2 Type II compliance is a testament to our unwavering commitment to data security and trust. At Spherity, we leverage cutting-edge digital identity solutions to ensure our clients’ data is protected and seamlessly integrated into their systems. This milestone reflects our dedication to maintaining the highest standards of security and compliance in the industry.” — Dr. Michael Rüther, COO/CFO at Spherity GmbH.

SOC 2 Type II audits are designed to provide independent confirmation that organizations have sufficient controls in place to mitigate security risks over an extended time period. As the most comprehensive system and certification within the Systems and Organization Controls protocol, it evaluates a company’s policies and procedures over a specified time period in order to ensure continued compliance and reliability.

Spherity’s SOC 2 Type II audit was completed by Modern Assurance and with the help of Secureframe. Secureframe also drives Spherity’s continuous compliance strategy including the ability to continuously track, monitor, and remediate any compliance needs.

We’re proud to work with organizations like Spherity who are committed to delivering the highest standards of security for their customers.” — Noelle Gantz, Managing Director at Modern Assurance LLC.

About Spherity

Spherity, a global pioneer in digital identity software, revolutionizes secure identity integration for enterprises, machines, products, data, and algorithms. Leveraging self-sovereign identity (SSI), Spherity streamlines compliance with regulations on data protection and security. The company offers products tailored for supply chains and financial services, including an eIDAS 2.0-compliant enterprise wallet, authentication and authorization for the US pharmaceutical supply chain, and the Digital Product Passport solution mandated by the European Commission.

About Secureframe

Secureframe empowers businesses to build trust with customers by automating information security and compliance. Thousands of fast-growing businesses such as AngelList, Ramp, Remote, and Coda, trust Secureframe to simplify and expedite their compliance journey for global security and privacy standards such as SOC 2, ISO 27001, PCI DSS, HIPAA, GDPR, and more. Backed by top-tier investors and corporations such as Google, Kleiner Perkins, and Accomplice Ventures, the company is amongst the Forbes list of Top 100 Startup Employers for 2023.

About Modern Assurance

Modern Assurance is a tech-first, customer-focused firm with a mission to provide the highest level of SOC 2 service and audit quality. We provide you with the expertise, service-customization, and high standards that come with a gigantic name-brand firm, yet with the agility and personalized attention that you would get at a boutique shop. We are relentless about continually improving our processes and technology so that an engagement with Modern Assurance is a smooth and transparent process.

Stay sphered by joining Spherity’s Newsletter list and following us on LinkedIn. For publications, contact communication@spherity.com.

Spherity Achieves SOC 2® Type II Compliance, Meeting Highest Bar for Customer Data Security was originally published in Spherity on Medium, where people are continuing the conversation by highlighting and responding to this story.


Tokeny Solutions

Tokeny’s Talent | Philippe’s Story

The post Tokeny’s Talent | Philippe’s Story appeared first on Tokeny.
Philippe Gonday is Blockchain Developer at Tokeny.  Tell us about yourself!

I’m Philippe, a software engineer living in the west of France and a proud father of three. My life is a blend of family, technology, and passion.

What were you doing before Tokeny and what inspired you to join the team?

My career has unfolded in three distinct stages. I started with embedded real-time software development, primarily for mobile phones. Later, I transitioned to backend web application development. Since 2021, I’ve been immersed in the blockchain ecosystem, navigating the challenges and opportunities of various startups. Joining Tokeny felt like a natural step given my passion for finance and DeFi, and the company’s ideal size for innovation and growth.

How would you describe working at Tokeny?

Working at Tokeny means enjoying the liberty of full remote work while staying connected with a team of truly great people. The team-building activities are fantastic, fostering both collaboration and connection.

What are you most passionate about in life?

Music is a huge part of my life. I play bass guitar and am also involved in Javanese Gamelan. Beyond music, I find peace and inspiration in the mountains, where I love to hike and explore.

What is your ultimate dream?

As a father, I worry about the challenges facing the world, from climate change to conflicts at Europe’s doorstep. My ultimate dream is for a more peaceful and sustainable world—though I acknowledge it feels like a distant hope.

 

What advice would you give to future Tokeny employees?

Full remote work offers incredible freedom, but it also requires a strong sense of responsibility. Embrace the balance, and you’ll thrive.

What gets you excited about Tokeny’s future?

I believe blockchain and DeFi have the potential to become the operating system of finance. Tokeny sits at a fascinating intersection of traditional and decentralized finance, making it an exciting place to shape the future.

He prefers:

Coffee

check

Tea

Movie

check

Book

Work from the office

check

Work from home

Dogs

check

Cats

Call

check

Text

Burger

check

Salad

check

Mountains

Ocean

check

Wine

Beer

check

Countryside

City

check

Slack

Emails

check

Casual

Formal

check

Crypto

Fiat

Night

check

Morning

More Stories  Tokeny’s Talent|Radka’s Story 4 May 2022 Tokeny’s Talent|Héctor’s Story 29 July 2022 Tokeny’s Talent | Satjapong’s Story 19 November 2024 Tokeny’s Talent | Omobola 25 July 2024 Tokeny’s Talent|Barbel’s Story 17 December 2021 Tokeny’s Talent | Adrian 15 May 2024 Tokeny’s Talent|Barbora’s Story 28 May 2021 Tokeny’s Talent | Fedor 10 April 2024 Tokeny’s Talent|Joachim’s Story 23 April 2021 Tokeny’s Talent|José’s Story 19 August 2021 Join Tokeny Solutions Family We are looking for talents to join us, you can find the opening positions by clicking the button. Available Positions

The post Tokeny’s Talent | Philippe’s Story appeared first on Tokeny.


Kin AI

How to Use Kin’s Memory

Every conversation builds your story—and Kin remembers every word.

Try Kin - Personal AI

Kin’s advanced memory allows it to instantly record and recall any information you tell it in context, all while storing everything on your device.

I’m Yngvi Karlson, Co-Founder of Kin. Born in the Faroe Islands, I’ve spent my career building startups, with two exits along the way, and five years as an active venture capitalist. Now, I’m dedicated to creating Kin, a personal AI people can truly trust.

Follow me on LinkedIn, TikTok and X

So, how do you use it? I’ll cover the following to explain it:

How to Navigate Kin’s Memory

Maximizing Kin’s Memory

Extra Tips for Your Personal AI

Get Started Today with Your AI Companion

How to Navigate Kin’s Memory

Here’s a step-by-step guide:

Step One: Navigate to the Chat

Open up the Kin app, and tap the speech bubble icon in the bottom right to open up the Chat feature. From here, you can say anything you want to Kin.

💡 Use the Voice controls in the input box to talk with Kin, rather than text with it.

Step Two: Tell Kin Something

Let Kin know something about you, those around you, or your situation.

Once you send the message, or Kin transcribes it, you’ll see that any keywords Kin thinks it should remember are highlighted in the chat thread.

💡 Has Kin missed out a keyword? Want to know more about what it knows? Just ask—Kin can record and explain knowledge on request.

Step Three: Visit the Streaks & Stats Tab

Any highlighted keywords (and the information about them) are automatically added to Kin’s Memory by its artificial intelligence.

By tapping the “x” button in the top left to return to the homepage, and hitting the flame icon in the top right, you can enter the Streaks & Stats tab.

Here, Kin shows you the amount of days you’ve used Kin in a row (your streak), and what Kin has learned about you today across its Chat and Journal features.

💡 In the top right of the tab, hit the connected dots icon to view your Knowledge Map, which showcases every connection and fact Kin has recorded about you.

Maximizing Kin’s Memory

Kin’s memory can do more than just this, though. Here’s how to make the most of our AI assistant’s memory:

1. Interact with Kin Daily

By making Kin a habit, it’ll catch more of the small things that might be easily lost. New names, spontaneous promises, mid-shower realizations—Kin can save them all for you, if you let it.

2. Share Deeper; Go Further

When sharing facts and situations, full context is the most helpful for Kin to remember—explain social dynamics, highlight important sections, and include your feelings. Our Journal feature is especially helpful for helping you do this.

Kin can even combine this information with analyses and web searches for personalized yet informed responses that help guide you through life.

3. Set Strategic Reminders

You can set custom Reminders with Kin to help you track particularly important or elusive things.

Got to remember that email? Trying to build a new nightly routine? Just tell Kin what you'd like to be reminded about when, and Kin will keep tabs—both on the homepage, and in your Chat.

4. Keep Privacy Controlled

You can trust that Kin does this privately and securely, too. Kin’s entire Memory is stored only on your device, invisible to anyone but you.

At any time, you can head over to the Knowledge Map and see or delete it—all in one place.

Extra Tips for Your Personal AI

There’s more you can do to make Kin’s memory more powerful. Consider doing the following in your conversations with Kin:

Introduce Yourself: Tell Kin who you are, what you do, and what your goals are to give it a baseline about you.

Cover Context: Explain what's currently going on at work and at home, so Kin can understand your situation and how it might be affecting you.

Catch Everything: Nothing’s too small. Make sure you cover how you're feeling, and little things like new names you've learnt and off-the-cuff promises you've made.

Set Reminders: Ask Kin to remind you about a few things coming up—whether that's a discussion with a colleague, or your next haircut—so you can get a feel for how they work.

Probe Gaps: Check if there's anything else Kin would like to know about you, so it can improve its support of you.

And, remember—Kin's Memory becomes more valuable the more you use it. Small, regular interactions, with larger conversations as you want them, are a good way to build a habit and keep Kin informed.

Get Started Today with Your AI Companion

Ready to begin maximizing Kin's memory? Here's to send to Kin which will kick off the process:

“Hey, Kin. What do you know about me, and what would you like to know about me?”


Ocean Protocol

Ocean Protocol Partners with NetMind as the First External GPU Provider for Ocean Nodes

We’re thrilled to welcome NetMind AI as the first trusted GPU provider for the Ocean Nodes ecosystem! This collaboration represents a big leap forward in delivering secure, scalable, and decentralized AI computing. With NetMind’s nearly 2,000 high-performance GPUs, this partnership empowers decentralized AI by enabling developers, data scientists, and organizations with high-performance computati

We’re thrilled to welcome NetMind AI as the first trusted GPU provider for the Ocean Nodes ecosystem! This collaboration represents a big leap forward in delivering secure, scalable, and decentralized AI computing.

With NetMind’s nearly 2,000 high-performance GPUs, this partnership empowers decentralized AI by enabling developers, data scientists, and organizations with high-performance computational resources to build and scale AI models.

What Are Ocean Nodes?

Ocean Nodes are a decentralized framework by Ocean Protocol that enables secure and efficient sharing of data and computational resources for AI development, leveraging blockchain technology to enhance scalability, privacy, and accessibility. In summary, it is a practical decentralized solution designed to facilitate the building and deployment of powerful AI models.

Using them eliminates the complexities of traditional setups by integrating key components of the tech stack like Ocean Provider, Aquarius, and Compute-to-Data (C2D) into a single, modular system. This enables developers to focus on building and scaling AI models without worrying about the underlying infrastructure.

Ocean Nodes are democratizing access to large-scale models, decentralizing the process, and providing a secure way to monetize and protect intellectual property (IP).

NetMind’s Role in Ocean Nodes

As a trusted GPU provider, NetMind helps to power the Ocean Nodes ecosystem by providing high-performance computational power. With almost 2000 GPUs available, NetMind enables organizations to effortlessly train AI models, ultimately lowering the barrier to entry for everyone to participate in the new data economy.

What does this mean for NetMind users? More opportunities to monetize idle computing power. Our GPUs are now part of Ocean Protocol, which allows anyone to contribute their computational resources to its ecosystem and earn NMT in the process.

How NetMind and Ocean Nodes Work Together

AI Development with Decentralized Power

With Ocean Nodes and NetMind’s GPUs, users can run AI models and access computational power permissionlessly. The integration eliminates the need for complex infrastructure setup, letting developers and data scientists focus on building, training, and monetizing their AI models.

Monetizing Computational Resources

The integration allows anyone with idle GPUs to monetize their resources within the Ocean Protocol ecosystem. By contributing computational power to the network, users can earn rewards for their role in powering AI computations, fostering greater participation in the decentralized data economy.

Scalable, High-Performance Infrastructure for AI

The Ocean Nodes ecosystem is designed to scale effortlessly due to its modular design, and NetMind provides the computational horsepower needed to support large-scale AI models.

The Road Ahead

As Ocean Nodes continues to evolve, NetMind will play an essential role in expanding the decentralized AI ecosystem.

About Ocean Protocol

Ocean was founded to level the playing field for AI and data. Ocean tools enable people to privately & securely publish, exchange, and consume data. Ocean Protocol is a founding member of the ASI Alliance.

About NetMind Power

NetMind Power is a leader in providing high-performance GPU resources for web2 and web3 AI workloads. Our mission is to provide the infrastructure needed to scale AI models securely, efficiently, and flexibly, while empowering users to monetize their computational resources.

Ocean Protocol Partners with NetMind as the First External GPU Provider for Ocean Nodes was originally published in Ocean Protocol on Medium, where people are continuing the conversation by highlighting and responding to this story.


DF126 Completes and DF127 Launches

Predictoor DF126 rewards available. DF127 runs Jan 30 — Feb 6th, 2024 1. Overview Data Farming (DF) is Ocean’s incentives program. In DF, you can earn OCEAN rewards by making predictions via Ocean Predictoor. Data Farming Round 126 (DF126) has completed. DF127 is live today, Jan 30. It concludes on February 6th. For this DF round, Predictoor DF has 37,500 OCEAN rewards and 20,000 ROSE&nbs
Predictoor DF126 rewards available. DF127 runs Jan 30 — Feb 6th, 2024 1. Overview

Data Farming (DF) is Ocean’s incentives program. In DF, you can earn OCEAN rewards by making predictions via Ocean Predictoor.

Data Farming Round 126 (DF126) has completed.

DF127 is live today, Jan 30. It concludes on February 6th. For this DF round, Predictoor DF has 37,500 OCEAN rewards and 20,000 ROSE rewards.

2. DF structure

The reward structure for DF127 is comprised solely of Predictoor DF rewards.

Predictoor DF: Actively predict crypto prices by submitting a price prediction and staking OCEAN to slash competitors and earn.

3. How to Earn Rewards, and Claim Them

Predictoor DF: To earn: submit accurate predictions via Predictoor Bots and stake OCEAN to slash incorrect Predictoors. To claim OCEAN rewards: run the Predictoor $OCEAN payout script, linked from Predictoor DF user guide in Ocean docs. To claim ROSE rewards: see instructions in Predictoor DF user guide in Ocean docs.

4. Specific Parameters for DF127

Budget. Predictoor DF: 37.5K OCEAN + 20K ROSE

Networks. Predictoor DF applies to activity on Oasis Sapphire. Here is more information about Ocean deployments to networks.

Predictoor DF rewards are calculated as follows:

First, DF Buyer agent purchases Predictoor feeds using OCEAN throughout the week to evenly distribute these rewards. Then, ROSE is distributed at the end of the week to active Predictoors that have been claiming their rewards.

Expect further evolution in DF: adding new streams and budget adjustments among streams.

Updates are always announced at the beginning of a round, if not sooner.

About Ocean, DF and Predictoor

Ocean was founded to level the playing field for AI and data. Ocean tools enable people to privately & securely publish, exchange, and consume data. Follow Ocean on Twitter or TG, and chat in Discord. Ocean is part of the Artificial Superintelligence Alliance.

In Predictoor, people run AI-powered prediction bots or trading bots on crypto price feeds to earn $. Follow Predictoor on Twitter.

DF126 Completes and DF127 Launches was originally published in Ocean Protocol on Medium, where people are continuing the conversation by highlighting and responding to this story.


Verida

Verida 2024 Recap: A Year of Private AI and Confidential Compute

We’re proud to share the milestones from 2024, where Verida led the way in building decentralized infrastructure for personal and private AI. Highlights • VDA Token: Empowering the private data economy. • Privacy-Preserving AI: Revolutionizing secure AI experiences. • Verida DAO: Advancing decentralized governance. • $5M Funding: Expanding confidential compute capabilities. • Private Data B

We’re proud to share the milestones from 2024, where Verida led the way in building decentralized infrastructure for personal and private AI.

Highlights

• VDA Token: Empowering the private data economy.
• Privacy-Preserving AI: Revolutionizing secure AI experiences.
• Verida DAO: Advancing decentralized governance.
• $5M Funding: Expanding confidential compute capabilities.
• Private Data Bridge: Integrates data from centralized platforms into Private AI.
• Verida AI Agent Kyra: Delivering private AI-driven insights.
• Verida Network Explorer: Enhanced DID management and transparency.
• Devcon 2024: Winning 200,000POL in Polygon POL Rush competition at Devcon 2024.
• Private AI Grants: $30K in VDA supporting developers.
• Grant from Polygon: Strengthening privacy-focused AI solutions.

2023 Ended on a High Note for Verida

On December 28th, 2023, Verida officially launched its Mainnet, marking the debut of the first private, self-sovereign data network tailored for Web3.

Data Ownership: The launch marked the beginning of a new era of data ownership, empowering users to reclaim control over their personal and private data from the grip of Big Tech. Personalized Web3: Verida redefined how personal and private data is securely managed in a decentralized way, enabling developers to access this data (with user consent) to build personalized products and applications. The Verida Foundation DAO

At the start of 2024, Verida reached a key milestone with the launch of The Verida Foundation DAO, marking an important step toward decentralized governance and innovation in privacy-preserving technology.

The DAO drives community growth through grants, education, and engagement, while advancing self-sovereign data and identity solutions, including AI innovations for secure and personalized experiences.

This milestone underscores our commitment to building a secure, user-centric, and privacy-preserving future for users and builders.

Verida Storage Credit Token (VDA)

Following the Mainnet and Foundation launch, Verida introduced the VDA Token, the cornerstone of the first private data economy in Web3.

Data Economy: VDA enabled secure data storage, trusted sharing, and rapid querying across the Verida Network. Node Staking: Storage node operators staked VDA to provide storage capacity, secure private data, and earn rewards. Utility Token: Users paid for storage using VDA, while node operators earned fees for their services, fostering a sustainable and self-sovereign data network.

In May 2024, VDA was listed on major exchanges, including Gate, MEXC, and Quickswap, further solidifying its role in the decentralized data ecosystem.

After VDA started trading on exchanges, Verida distributed 3.5M VDA tokens across two airdrop campaigns, rewarding contributors.

The 200M VDA tokens were allocated to incentivize sustained network growth over the years.

Technical Litepaper: Privacy-Preserving AI Infrastructure

Part 1: Introduction

Verida expanded its mission from a decentralized private data storage solution to supporting privacy-preserving compute, enabling private, encrypted data to be integrated with leading AI models. This ensures end-to-end privacy, safeguarding data from model owners, and paves the way for a new era of hyper-personalized and secure AI experiences.

Part 2: Self-Sovereign AI

Verida’s infrastructure integrates Trusted Execution Environments (TEEs) to process data within secure enclaves, ensuring high levels of privacy and security, in collaboration with partners like Marlin, Nillion, and TEN.

Verida’s architecture guarantees that user data remains under their control, with no access granted to infrastructure node operators. By supporting both Stateless and Stateful Compute, Verida enables real-time data processing for AI assistants in a secure, privacy-preserving environment.

Part 3: Conclusion

Verida’s Confidential Compute Nodes and self-sovereign compute infrastructure ensure secure, private data processing, giving users full control over how their data is stored and processed.

This infrastructure lays the foundation for a secure and scalable AI ecosystem, empowering users to manage and utilize their data safely by providing controlled access to developers. Private Data APIs enable developers to integrate personal and private user data into AI applications and products while ensuring privacy and user consent.

Verida Secures $5M in Funding to Address AI Data Privacy Challenges

Verida raised new strategic funding to expand the network’s capabilities to include confidential compute, ensuring secure data storage and processing while preserving user privacy.

Through collaborations with ecosystem partners like Privado ID, NEAR, Marlin, Nillion, TEN, and zkPass, Verida continues to strengthen its position in Web3, driving innovation in the decentralized and privacy-preserving technology stack.

This milestone empowers Verida to deliver advanced solutions, enabling users to securely store and process their personal and private data while unlocking the transformative potential for private AI applications and beyond.

Verida launches Kyra, a private AI-driven newsletter

Verida has made significant progress in building a private AI ecosystem, highlighted by the launch of blog.verida.ai by Kyra, which provides valuable insights into the importance of Verida’s technology stack. Through the blog, Kyra explores how privacy and AI can coexist to create personalized, ethical, and efficient AI solutions.

Additionally, Kya has hosted the Interview Series, featuring prominent industry leaders like Omar Saadoun from Brainstems, Y J from Cluster Protocol, and Mohammad Iman from Founders Hub Network.

Key insights from these discussions emphasized the rise of specialized AI agents, the critical role of decentralized infrastructures, and the growing potential of personalized AI solutions. These underscore Verida’s position as a leader that helps users and builders enable decentralized and user-centric AI.

With rapidly growing list of influential subscribers, Verida continues to expand its community, sharing these insights and fostering connections.

Verida Unveils the Private Data Bridge

Verida announced the Private Data Bridge, a groundbreaking solution enabling users to securely pull data from various platforms with APIs, including Meta, Google, X, LinkedIn, Dropbox, and more, directly into their private Verida Vault.

This empowers users to integrate their data into hyper-personalized solutions such as AI agents/assistants and unlock future use cases like data marketplaces and other innovative applications.

Stay updated with our Data Connectors Roadmap to track progress and influence development priorities.

Revamped Verida Network Explorer

The updated Verida Network Explorer simplifies managing decentralized identities (DIDs) and provides insights into network activity.

Key Features:

Identity Control: Manage DIDs, access public documents, and view metadata seamlessly. Transparency: Explore node details, distribution, and network performance. Developer Tools: Build transparent, decentralized applications with ease.

The Verida Network Explorer empowers users with full control of their digital identity and offers developers the tools needed to create user-focused decentralized solutions.

Empowering Builders on the Verida Network

At Verida, we empower developers to innovate using our infrastructure and privacy-preserving technology stack.

Verida supported developers through initiatives like:

Verida AI Whitelist: Early access to tools like the Private Data Bridge, enabling seamless integration of user-owned data into private AI applications. Private AI Grants: $30,000 in VDA tokens to fund developers building data connectors and expanding the Verida ecosystem.

By providing tools, funding, and support, Verida fosters a builder-first ecosystem, advancing decentralized, privacy-focused technology and AI-driven solutions for secure and personalized user experiences.

Finder Innovation Awards Finalist

Verida was honored as a finalist in the Digital Assets & Web3 Innovation category at the Finder Innovation Awards. This recognition underscores our leadership in privacy-preserving decentralized data storage, providing encrypted, GDPR-compliant solutions that allow users to reclaim their personal and private data from centralized platforms, addressing growing privacy concerns, particularly in the age of AI.

With its global, region-aware design, Verida offers flexible data storage solution, ensuring scalability and compliance across the globe.

Devcon 2024: Winning 200K POL with the Private Data On-ramp for AI

Verida secured second place in the POL Rush Competition at Devcon 2024, hosted by Polygon at the Aggregation Summit in Bangkok, with 200,000 $POL granted. This recognition highlights Verida’s innovative role in connecting Web2 user data with AI agents.

CEO and Co-Founder, Chris Were, presented Verida on the main stage at Devcon, emphasizing our role as the “Private Data On-Ramp for AI” and showcasing how we’re enabling secure, personalized AI experiences.

This achievement underscores Verida’s leadership in providing decentralized infrastructure to enable Private AI, along with our growing partnership with Polygon to drive privacy-first and user-centric AI technologies forward.

Watch Chris Were’s pitch on our YouTube channel.

Looking Ahead

2024 was a groundbreaking year for Verida, driving innovation in decentralized, privacy-focused technology. As we look ahead to 2025, even more exciting milestones await.

The Verida AI solution is currently in private alpha, with many teams around the world integrating ahead of our public launch that will showcase to the world the critical role Verida is playing in the emerging AI landscape.

About Verida Network

A ‘one-click’ AI data platform that lets users securely extract and store data from centralized platforms for personalized AI services with confidential compute. For more information, visit Verida Network and Verida AI.

Join the Verida Community on Discord, X, and Telegram.

Verida 2024 Recap: A Year of Private AI and Confidential Compute was originally published in Verida on Medium, where people are continuing the conversation by highlighting and responding to this story.


FastID

Built with Fastly: Northflank’s Developer Platform

Discover how Fastly empowers engineering teams to build and scale web applications, like startup Northflank, and how Fastly's products assist in reaching their goals.
Discover how Fastly empowers engineering teams to build and scale web applications, like startup Northflank, and how Fastly's products assist in reaching their goals.

Wednesday, 29. January 2025

Indicio

The Vital Role of Identity Verification in Verifiable Credentials

The post The Vital Role of Identity Verification in Verifiable Credentials appeared first on Indicio.
In the identity industry, ID verification or “IDV” is the term for the process of verifying that a person is who they claim to be. This process plays an important role in establishing trust in Verifiable Credentials by confirming the authenticity of the credential holder’s identity.

By James Schulte

Industries across finance, government, healthcare, travel, e-commerce, and telecommunications are rapidly adopting Identity Verification (IDV) to enhance security, prevent fraud, and comply with regulatory requirements. Banks and fintech firms are using IDV for KYC and AML compliance, while governments rely on it for issuing passports, digital IDs, and secure citizen access to public services. In healthcare, IDV ensures patient identity for telemedicine and medical records, while travel and transportation sectors use it for seamless airport experiences and ride-sharing safety. As digital interactions grow, businesses are integrating IDV to build trust, reduce fraud, and streamline user authentication, making it a crucial component of modern digital ecosystems.

How IDV works

Identity Verification usually functions by confirming the validity of personal information and documentation provided by the individual against reliable data sources. Some of the steps that can be undertaken during ID verification include: 

Document verification

Examining passports, driver’s licenses, or national ID cards.

These physical documents typically require security features like the holograms or watermarks.

Biometric verification

Matching biometric information such as facial recognition, fingerprinting, or iris scanning to data that’s been provided on the document.

Liveness detection

A way of ensuring that that person being verified is physically present and not using a video or picture to spoof the system.

Database verification

Cross-checking the presented information against trusted databases or registries.

IDV + VC = an easy win for everybody

The combination of Identity Verification and Verifiable Credentials creates a powerful framework for secure and efficient digital identity management. Verifiable Credentials extend the range of identity verification technologies by encapsulating the verified data in a privacy-preserving and portable format. 

Verifiable Credential technology offers the unique ability to securely hold data in a tamper-resistant way, and make it easy to share across systems. They do this by packaging the data created by issuing organizations and digitally signing it in a way where any attempt to alter the data will be visible on the network and “break” the credential. Once created, the credential can be easily and securely stored locally by the data owner in a digital wallet and verified by anyone with the appropriate software. This provides a better experience for the user who no longer needs to repeat redundant identity verification steps, and saves relying parties the costs of verifying each user.

(For a more in-depth look at Verifiable Credentials you can read this short article from Indicio.) 

But to use them effectively, we need to be sure that the data inside is correct, we need a strong identity verification process.

An example of this technology combination in action are the government-grade credentials that Indicio has developed that can be self derived from the user’s passport. Used in our solution for SITA and the government of Aruba, these credentials can be created in seconds by scanning the chip inside a biometric passport and performing the necessary document authentication. The generated credential can then be presented digitally to share the relevant information from the passport to the border authorities prior to departure.

In short, these two technologies are highly complementary to each other. The existing IDV processes ensure the quality of the data for the credential, and the Verifiable Credential enables that data to be reused and shared across systems, organizations, and platforms.

If you would like to learn more about how these technologies work together you can watch a recent video from Indicio. Or if you would like to discuss a specific implementation or ask questions of our team please contact us here.

Sign up to our newsletter to stay up to date with the latest from Indicio and the decentralized identity community

The post The Vital Role of Identity Verification in Verifiable Credentials appeared first on Indicio.


1Kosmos BlockID

Unlocking Workforce Security: 1Kosmos & Concentrix Expand Identity-Backed Passwordless MFA

As organizations worldwide face mounting cyber security threats from phishing, social engineering and stolen or synthetic identity attacks, password-based authentication systems represent a security Achilles’ heel, productivity drain and inflatable cost center. It has become clear through countless headlines and from the staggering financial losses that the systemic risk of weak identity verificat

As organizations worldwide face mounting cyber security threats from phishing, social engineering and stolen or synthetic identity attacks, password-based authentication systems represent a security Achilles’ heel, productivity drain and inflatable cost center.

It has become clear through countless headlines and from the staggering financial losses that the systemic risk of weak identity verification and credentialling practices to ongoing business operations warrants modernization of Identity and Access Management, and most critically, identity verification.

Enter the ground-breaking collaboration between 1Kosmos and Concentrix—a partnership that combines innovative identity verification and passwordless MFA solutions with global cybersecurity infrastructure and managed service expertise.

Together, 1Kosmos and Concentrix are unveiling transformative enterprise offerings for remote worker identification and convenient authentication via verified biometrics delivered through proven methodologies and managed security services.

This launch is more than a business collaboration; it is a significant step toward reshaping how organizations approach workforce authentication. Here is everything you need to know about this innovative approach and its game-changing impact on businesses worldwide.

The Vision Behind the Launch

The vision of this partnership is to modernize and transform user onboarding and authentication into digital services in a way that enables high-assurance trust, improved user satisfaction and reduced friction to the user experience in ways not previously possible.

This is delivered through a low-risk enterprise-wide methodology that encompasses the many systems typically left uncovered by passwordless strategies, overcomes user resistance by easing them into their new experience at a controlled pace, and drives quick time to value through a scalable, enterprise-wide approach.

This vision is realized through the following combination of cloud-delivered business applications, globally high-availability infrastructure and world-class managed services team located in regions throughout the world.

1Kosmos Verify for remote identity verification represents an order of magnitude improvement in credential issuing during user onboarding and account recovery, where agents represent a single point of cyber vulnerability. The solution can be implemented stand-alone or integrated via SDK and standard API connectors to replace weak knowledge-based authentication (KBA) and two-factor authentication (2FA) with a simple self-service workflow that can be executed from any device, anywhere, and at any time. This detects stolen and synthetic identities and quickly establishes high-assurance trust for legitimate workers, many of whom are remote contractors and routinely onboarded outside the control of Human Resource (HR) departments.

1Kosmos Workforce for passwordless MFA represents a paradigm shift in authentication by eliminating the vulnerabilities of traditional passwords via identity-backed biometrics. Built on a decentralized identity framework, it ensures secure, frictionless authentication for employees, contractors, and supply chain partners into new and legacy Windows, macOS, iOS, Linux, and Unix environments as well as non-SAML based applications and digital services.

Concentrix CyberProtect offers a full suite of security services to bolster cyber defenses via an automation-first, AI-driven approach to design, build, and run next-generation security solutions. This provides swift, expert deployment and ongoing global support to ensure resilience against evolving cyber threats.

Transformative Features and Benefits

1. Remote Identity Verification

Problem: HR departments and IT (Information Technology) Service Desk agents working with remote workers use antiquated identity verification processes that rely on manual review of government-issued credentials typically shared in the clear via email and SMS messaging. The use of high-quality fake credentials and AI deepfake presentation and injection attacks defeat these measures with increasing efficacy. Non-secure sharing of documents scatters digital artifacts putting individuals at risk for compromised PII (Personal Identifiable Information).

Solution: 1Kosmos offers around a dozen modalities for identity verification. For high assurance, identity documents are scanned and managed via an end-to-end encrypted workflow that verifies authenticity in real time for 150+ countries globally. Facial scanning hardened against deepfake attacks matches user likeness, issues a pass/fail and can create a digital authentication credential certified to FIDO, NIST, UK DIATF and iBeta Pad-1 specifications.

Benefits:

· +99% accuracy to verify identity anywhere, anytime and on any device

· Non-biased racial or gender decisioning drives objectivity, equity, and fairness

· Privacy by design secures PII and gives users control

· Brandable mobile app, app-less or browser workflows

2. Passwordless Multi-Factor Authentication (MFA)

Problem: Traditional MFA methods, such as SMS-based codes and push notifications, are increasingly compromised through social engineering, SIM swapping and push bombing.

Solution: 1Kosmos leverages biometric identity verification to eliminate passwords entirely. By using facial, fingerprint recognition or any one of around a dozen authentication modalities, users can authenticate seamlessly across devices and platforms without sacrificing security.

Benefits:

· Cost Reduction: Eliminate SMS fees and multiple authenticators and reduce helpdesk workloads related to password resets.

· Enhanced User Experience: Simplify the login process for employees, contractors, and partners.

· Improved Security: Create a durable, tamper-proof digital identity for each user, minimizing cyber risks.

3. Restricted Environment Compatibility

Problem: Many workplaces, such as clean rooms and customer-facing service desks, cannot allow mobile phones, camera-equipped mobile devices, or hardware tokens.

Solution: 1Kosmos introduces a fingerprint biometric security key that supports multiple users on a single device. This ensures secure, passwordless MFA even in environments with transient workers and / or shared workstations.

Benefits:

· Efficiency: Reduce the need any user-specific hardware (such as security keys). The device stays with the workstation.

· Simplicity: Enable a zero-learning-curve user experience with intuitive biometric authentication.

· Flexibility: Can authenticate into the workstation or web-based applications.

Business Impact: The Numbers Speak

Cybersecurity Resilience

· Detect and defeat stolen and synthetic identities with 99.9% efficacy

· Secure PII with advanced cryptography and prevent 3rd party administrative access

· Eliminate passwords to render phishing and social engineering ineffective

Cost Efficiency

· Reduce identity verification and authentication management costs by 20–25%

· Lower SMS fees and minimize user training costs

· Reduce physical security tokens to one per workstation for unlimited users

Productivity Gains

· Accelerate authentication processes, enhancing worker productivity

· Register once, use anywhere with an immutable record of individual access events

· Reduce IT Support call volume related to password reset / recovery

Deployment and Integration Scenarios

Flexible Deployment Options: All solutions available via this partnership are designed and built to integrate with a wide array of environments, from legacy systems to innovative platforms, including Microsoft Entra ID, Okta and Ping. Deployment is swift, with a typical timeline of 2–4 weeks to realize initial benefits.

Common Use Cases:

· Verified Identity: Improve identity assurance levels for existing single sign-on platforms

· External Authentication Method: Standardize authentication across environments

· 2FA Replacement: Upgrade from outdated two-factor authentication systems

· Passwordless SSO: Enable single sign-on for systems not covered, such as virtual machines, VPN, domain controls, Mac, iOS, Unix, Linux, and legacy Windows

· On-Premises and Cloud: Seamless integration with Active Directory, Entra ID, and Windows Hello for Business.

· Restricted Environments: Secure authentication in call centers, clean rooms, and manufacturing floors.

How It Works: Behind the Scenes of 1Kosmos

Decentralized Identity (DCI)

1Kosmos verifies identity and creates a secure, decentralized identity for each user during enrollment. This identity is stored on a blockchain, ensuring data integrity and user privacy.

Biometric Authentication

Certified to FIDO, UK DIATF, NIST IAL2 and AAL2 standards, 1Kosmos employs advanced iBeta-certified biometric verification resistant to deepfake attacks.

Immutable Audit Trails

The blockchain infrastructure creates an unalterable log of authentication events, providing transparency and security for audits and investigations.

Interoperability

With over 50 pre-built connectors and an SDK, 1Kosmos integrates seamlessly into diverse IT ecosystems, preserving investments in existing infrastructure.

Biometric Security Key

A biometric security key supporting unlimited users per device is available for restricted environments where camera-equipped mobile devices are not allowed.

Mapping to C-Level Priorities

Executive Concerns Addressed

1. Combat Hiring Fraud: Prevent rough actors from becoming malicious insiders at onboarding

2. Cyber Risk Mitigation: Reduce risks related to phishing and unauthorized access

3. Budget Optimization: Preserve existing IT investments cut costs by simplifying and standardizing identity verification and authentication to deliver measurable ROI

4. Enhanced User Experience: Ensure high adoption rates with an intuitive interface and experienced global design, build, deploy, and support team

5. Operational Automation: Minimize manual reviews and processes with adaptive, policy-based continuous authentication

6. Data Protection: Safeguard intellectual property and personal data with privacy-by-design architecture

The Road Ahead: Realizing the Vision

The 1Kosmos and Concentrix partnership marks a pivotal moment for businesses striving to enhance security and streamline operations. This solution delivers unparalleled value by leveraging identity-backed biometric authentication, decentralized identity, and managed services expertise.

Whether you are a Chief Information Security Officer seeking to bolster your cyber defenses, a Chief Technology Officer aiming to standardize and simplify IAM processes, or a line of business executives interested in minimizing the risk of operational disruptions from cyber incidents, these solutions offer the perfect blend of innovation, scalability, and resilience.

Join the revolution in workforce identity verification and passwordless authentication today. Explore how 1Kosmos sold, deployed, and supported by Concentrix can transform your security strategy and deliver measurable results. To learn more, visit 1Kosmos or contact us for a demo.

Let us redefine the art of the possible in cybersecurity, together!

The post Unlocking Workforce Security: 1Kosmos & Concentrix Expand Identity-Backed Passwordless MFA appeared first on 1Kosmos.


Trinsic Podcast: Future of ID

Jonas Brännvall - How BankID Became Ubiquitous in Sweden

In this episode, we speak with Jonas Branvall, Head of International Expansion at BankID Sweden, one of the most widely-adopted reusable ID systems in the world. With 99.7% of Swedish adults using BankID and over 7,500 relying parties onboard, it’s a fascinating success story in the digital identity space. I’ve been eager to explore what drives the adoption of a universally embraced digital ID sy

In this episode, we speak with Jonas Branvall, Head of International Expansion at BankID Sweden, one of the most widely-adopted reusable ID systems in the world. With 99.7% of Swedish adults using BankID and over 7,500 relying parties onboard, it’s a fascinating success story in the digital identity space.

I’ve been eager to explore what drives the adoption of a universally embraced digital ID system, and Jonas provides clear answers. We discuss the pivotal role of strong use cases in driving adoption, including the two major relying party use cases that helped BankID achieve its widespread success. Jonas also shares his insights on the tipping point for adoption—approximately 40% penetration—and why that marks the transition to ubiquity for both users and relying parties.

BankID’s story offers a powerful model for anyone involved in launching mobile driver’s licenses (mDLs), EUDI wallets, private-sector reusable ID networks, or companies looking to integrate these solutions.

Join me for this insightful conversation with Jonas Branvall and learn more about BankID at https://www.bankid.com/en/.


Kin AI

Reflecting on Your Career Path with Kin

Working out whether past career choices were correct—and which should be taken next—is only getting harder. How can AI help?

Photo by Vladislav Babienko on Unsplash

Try Kin - Personal AI

The modern workplace has transformed dramatically over the past decade. With remote work becoming standard, artificial intelligence entering workplaces, and career trajectories becoming increasingly digital and non-linear, traditional approaches to career development are becoming increasingly obsolete.

As such, the question of “is technology a good career path” is becoming more popular—especially when fields like information technology and cybersecurity can offer dynamic promising career objectives for both entry-level positions and experienced professionals.

But, how do people properly reflect on their career path, and find what’s right for them? How can personal AI like Kin show helpful insights?

I’m Yngvi Karlson, Co-Founder of Kin. Born in the Faroe Islands, I’ve spent my career building startups, with two exits along the way, and five years as an active venture capitalist. Now, I’m dedicated to creating Kin, a personal AI people can truly trust.

Follow me on LinkedIn, TikTok and X

To answer that, I’ll cover the following in this article:

What is a Career Path?

The Importance of Career Reflection

The Core Components of Career Reflection

Building an Effective Career Reflection Practice

The Role of Artificial Intelligence in Career Reflection

How does Personal AI Help?

How Kin Enhances Career Reflection as a Personal AI

So, let’s go.

Photo by Ashley Batz on Unsplash

What is a Career Path?

Firstly, we must define a career path.

A career path represents the sequence of roles, experiences, and skills that shape professional progression over time—essentially, the things that people do and learn that impact their career.

The Four Career Paths

Traditional career paths typically fall into these four main categories:1

1. Knowledge-based

These paths see someone build their career through gained knowledge, whether that’s from moving up the corporate ladder, upskilling, studying, or a mixture of the three.

Human resources, marketing, accounting, information technology, and engineering roles often come under this category.

2. Skills-based

Similar to knowledge-based careers, but in relation to physical skills like service, performance arts, or construction. In these roles, experience tends to matter more than anything.

3. Entrepreneur-based

A less-standardized path, entrepreneur-based career paths see people begin their own company to fill an identified market gap. The path often includes the elements of knowledge- and experience-gaining the previous two paths contain, but with the end goal of creating and maintaining a new successful company.

4. Freelance-based

Landing somewhere between the first two paths and the entrepreneur-based path, freelance-based career paths see people offer out their knowledge and skills on a temporary basis to businesses and individuals.

It’s most common for writers, consultants, tradespeople, and artists to offer their services in this way, but most professions can.

It can be useful for people to know which career path they fall under, as this can help them recognise their natural tendencies, and create effective goal setting toward an ambition.

The Five Career Pathways

The five career pathways often come up in career discussions, and refer to the five health science career pathways—the specific routes people can take into a healthcare career.2

While not extensively covered in this article, these are:

Diagnostic Services

Therapeutic Services

Health Informatics

Support Services

Biotechnology Research & Development

Though these can be helpful if considering a way into a healthcare career, they are not as broad as their four traditional kin above.

Early on in a career journey, it’s still worth asking questions like “is technology a good career path?” or “what about business management?” to reflect on paths travelled so far, and find the best personal fit.

But why is this important?

Photo by Yeshi Kangrang on Unsplash The Importance of Career Reflection

Career reflection is crucial to professional growth, because it helps individuals take control of their own career and make informed decisions about their career trajectory. In fact, research shows that those who engage in career reflection and exploration are often happier with their jobs.3

What’s more, reflection on the skills and experience someone has developed, and the ways they’ve done this over their career journey, are indispensable parts of improving mindset, increasing emotional intelligence, and perfecting work-life balance.

Without this power of perspective, it can be hard to plan a path to a dream career, or figure out why a job feels so miserable—even if a career coach is hired.

So, if it’s so important, how is career reflection done?

Photo by Noah Buscher on Unsplash The Core Components of Career Reflection

Bearing some similarity to journaling for anxiety and self evaluation, the process of career reflection is all about providing a clear picture of what career path has been followed, and how well that’s fit.

But what does this look like?

1. Thorough Assessment

Firstly, to assess a current position along a career trajectory, take stock of everything that has been experienced up to this moment. This process is often supported by mentors, career counselors, or, as will be discussed, personal AI tools like Kin.

Consider factors like:

Specific Skills: What has been learnt, and how advanced is the knowledge? Remember to include hard and soft skills.

Level of Responsibility: How much has been trusted to these skillsets?

Years of Experience: How long has this career journey been so far? How long has each skill been learnt and applied for?

Scope of impact: What has been achieved by those skills in that time?

Comparison to Industry Standards for your field. LinkedIn and other professional organizations often provide benchmarks for different career stages, from entry-level to executive positions.

2. Practical Evaluation

Next, consider how effectively and easily these skillsets were gained, and what they bring to the current career trajectory stage. Were there faster ways to reach the same level? Are there new skills needed to fill gaps growing within these specific skills?

3. Emotional Evaluation

Now, look at the previous step from an emotional perspective. What feelings do those skills—and the ways they were acquired—provoke? Does the current level of ability in this career path and progress inspire pride, indifference, or disappointment? What situation (or even different career paths) might have been preferred? Does this experience align with personal values?

This step can feel superfluous to some, but it’s not just an essential step for growing emotional intelligence—it can often reveal the culprit behind burnout and job dissatisfaction.

4. Reconsider Goals:

Finally, review any career goals alongside this information. Is the current career trajectory leading to these goals? Are these goals even still what’s wanted? What new roles or skills are needed, and how can this career trajectory be updated to meet them?

Initiatives like continuous learning or journaling may be implemented here to help.

But what comes next?

Photo by Mélanie Arouk on Unsplash Building an Effective Career Reflection Practice

Next is all about ensuring the assessment process above is carried out regularly, effectively, and with sustainability. This helps personal career goals always stay true to personal ambitions, as it informs effective milestones for both entry-level workers and experienced professionals.

To do this, consider the following steps to help make this a strong habit:

1. Define Preferences

Decide what medium, time and location is best for the career reflection.

Are notebooks easier to use, or is a touchscreen or keyboard preferred? Are mornings uncluttered, or does the night finally give space to think? Is a bustling environment appreciated, or is quiet solitude?

Ensuring that the best personal working conditions can be arranged like this will minimize distractions and irritations.

2. Foster Consistency

Now, look for ways to connect these preferences to existing habits to make them easier to keep. Have five minutes on the morning train? Jot down some thoughts. Like a Saturday snooze? Reflect on the week once you wake up.

The tighter reflection is tied to old habits, the easier it will be to remember to do it as well.

3. Have Conversations

Finally, talk about the findings. Tell friends, family, colleagues, mentors, personal AI, everyone. Each person has a unique insight and perspective to share, and can do so from within their own career pathway, and not anyone else’s.

But, that can be a lot of work. How can this be more effective?

Photo by Patrick Lindenberg on Unsplash The Role of Artificial Intelligence in Career Reflection

Digital tracking and pattern recognition capabilities in AI tools like AI chatbots and AI companions have transformed how professionals understand themselves, their colleagues, and their career trajectories.

Technology like these machine learning algorithms can analyze years of career and behaviour data to identify trends in employee and global industry behaviour alike, meaning employees and their companies can respond to them more quickly than ever.

Other AI tools like AI assistants make it easier for both employers and employees to track employee engagement, upskilling, and performance by logging information about these metrics, and analyzing it against their datasets. Similarly, this allows employers and their staff to recognise and respond to things like skill gaps and job satisfaction much faster.

Perhaps the most powerful of these tools has been personal AI.

How does Personal AI Help?

Personal AI’s power comes from its ability to provide all of the above on an individual level, often from a mobile phone. With 24/7 support, and the ability to process a lot of historical and web data quickly, these tools can quickly give personalized insights on career trajectories—valuable guidance, alongside traditional mentors and training programs.

How Kin Enhances Career Reflection as a Personal AI

Kin represents a new generation of personal AI tools designed specifically for long-term support of personal and professional growth.

Its empathetic Chat and Journal features allow users to easily provide its advanced memory with a comprehensive and searchable record of their professional life—which it then analyzes to track progress toward career objectives, and identify potential new career and certification opportunities in real time.

This makes career path planning and reflection easier, as Kin can draw on all of this knowledge to help users generate a tailored roadmap to reaching their career objective based on their individual needs. It can even show trends in habits to help users realise what’s working and what isn’t for them—almost like a Kin TV show that summarises the last few seasons.

Its Reminder feature then allows users to set reminders about habits, tasks and opportunities within the app, so Kin can send push notifications to help keep its users on track, or just remind them to check in regularly.

If that sounds like it requires a lot of personal data, though, that’s because it does—but Kin was designed for trust.

Why Can You Trust Kin with Privacy?

All the personal data Kin collects is anonymous, and is both stored and processed on the user's device wherever possible. Third-party processing, when necessary, takes place with approved vendors and robust encryption—and all of this means that not even Kin as a company can access personal data.

What’s more, users maintain complete control over their data, with the ability to view, modify, or delete any and all stored information at any time.

Get Started Today with Your AI Companion

Ready to improve your own career reflection with Kin? Download the app here and begin with this message template for Kin:

"Hi Kin! I'd like to start reflecting on my career more effectively. I'm currently [your role] at [your company], and I've been thinking about [specific area of reflection]. My biggest career questions right now are [your questions]. Could you help me build a reflection practice?"

From there, Kin will guide you through creating a personalized development plan that evolves with your professional life. The system provides template ideas for career planning, skill tracking, and professional development documentation, so you maintain a comprehensive view of your career journey while ensuring your personal data remains secure and private, and your time minimally taken up.

1

Stahl, A. 2021. “4 Booming Career Paths To A Secure Your Future In 2022”. forbes.com. Available at: https://www.forbes.com/sites/ashleystahl/2021/12/31/4-booming-career-paths-to-a-secure-your-future-in-2022/. [Accessed 01/28/25]

2

Stauffer, B. 2024. “What Are the 5 Health Science Career Pathways?” www.icevonline.com. Available at: https://www.icevonline.com/blog/health-science-career-pathways [Accessed 01/28/25]

3

Werbel, J.D. 2000. “Relationships among Career Exploration, Job Search Intensity, and Job Search Effectiveness in Graduating College Students”. Journal of Vocational Behavior, 57(3), pp.379–394. doi:https://doi.org/10.1006/jvbe.2000.1746. [Accessed 01/28/25]


iComply Investor Services Inc.

The Lifecycle of Dirty Money: How AML Checks Turn the Tide

The Journey of Laundered Money: A Deep Dive into AML Compliance Follow the path of "dirty money" through its three stages – placement, layering, and integration – and discover how robust AML processes can break the chain at each step.

Picture this: A luxury apartment in a bustling city is purchased for cash by an unknown buyer through a string of anonymous shell companies. The sale raises no eyebrows, but behind the scenes, a complex money laundering operation is underway. From illicit origins to seemingly legitimate assets, this is the journey of “dirty money”—and the fight against it begins with Anti-Money Laundering (AML) checks.

Let’s follow the path of laundered money through its three stages—placement, layering, and integration—and see how robust AML processes can break the chain at each step.

Stage 1: Placement — Getting Illicit Cash Into the System

It starts with a duffel bag of cash in a bustling financial district. The launderer’s challenge? Converting a pile of questionable money into something less conspicuous. Enter placement, where funds are introduced into the financial system.

The Tactic: Instead of depositing a large sum into a single account (a major red flag), the launderer sends small amounts across multiple accounts at different branches—also known as “smurfing.” Some of the funds are funneled into luxury car purchases or jewelry, quickly flipped for cash. The Risk: At this stage, banks may notice unusual deposits or sudden asset purchases. But if no AML checks are in place, the funds slide through undetected.

How AML Helps: Customer due diligence (CDD) kicks in here—verifying identities, tracking transaction patterns, and flagging customers depositing amounts that don’t match their profiles. Advanced systems automatically cross-check data against watchlists and issue alerts for suspicious activity.

Stage 2: Layering — Disguising the Money’s Origins

The launderer now faces the next hurdle: making the funds untraceable. In the layering phase, the money is moved across accounts, companies, and borders to obscure its origins.

The Tactic: The funds pass through shell companies, offshore accounts, and even fake invoices for “business expenses.” Wire transfers bounce from one country to another, each hop making the trail more complex. The Cover Story: To the outside world, it looks like a series of standard business transactions—payments for consulting services or shipments that never existed.

How AML Helps: This is where transaction monitoring tools shine. They flag unusual patterns, such as frequent international transfers to high-risk regions or round-dollar amounts that match no legitimate business activity. Machine learning algorithms detect when these activities deviate from normal behavior, even in large, global transaction flows.

Stage 3: Integration — Making the Money Look Legitimate

Once the money has been sufficiently disguised, it’s time to bring it back into the economy—cleaned and ready for “legitimate” use. This is the integration phase, where illicit funds reappear as real estate investments, stock portfolios, or lavish lifestyle purchases.

The Tactic: The launderer buys a $5 million penthouse outright, claiming the money came from the sale of a successful business. They might also repay large loans or invest in companies with stable returns, embedding the funds into the economy. The Challenge: At this stage, the money looks like it belongs. Without context, it’s difficult to distinguish legitimate earnings from laundered funds.

How AML Helps: Enhanced due diligence (EDD) is key here. When a transaction or customer’s background raises red flags—such as ties to politically exposed persons (PEPs) or untraceable revenue sources—EDD digs deeper, collecting additional data and scrutinizing high-value purchases. Automated systems provide detailed audit trails, ensuring nothing is missed.

The Human Cost of Failure

When laundered money flows freely, the consequences are far-reaching—fueled criminal enterprises, destabilized economies, and reputational damage for financial institutions. But with robust AML processes, institutions can stop dirty money in its tracks, ensuring their systems don’t become conduits for crime.

A Future-Ready AML Strategy

Gone are the days when manual audits were enough. In today’s landscape, AML programs must be adaptive, automated, and vigilant. Real-time monitoring, machine learning, and secure data processing are no longer luxuries—they’re necessities.

The difference between catching a launderer at “placement” rather than “integration” could be millions in fines—or worse, a reputation that’s impossible to repair. By embracing advanced AML solutions, financial institutions can protect not just their businesses, but the communities they serve.

Tuesday, 28. January 2025

Matterium

Getting home: financing the rebuilding of LA with Bitcoin

A new consortium will accelerate LA’s reconstruction In Los Angeles, thankfully, the fires are now contained. Now the city faces the task of rebuilding, which brings with it whole new challenges. Some of these critical issues — like expedited permitting processes — are already being addressed. But how is the reconstruction going to be financed? Will the construction financing system be over-stre
A new consortium will accelerate LA’s reconstruction

In Los Angeles, thankfully, the fires are now contained.

Now the city faces the task of rebuilding, which brings with it whole new challenges. Some of these critical issues — like expedited permitting processes — are already being addressed. But how is the reconstruction going to be financed? Will the construction financing system be over-stressed by the sheer scale and complexity of the rebuild?

Mattereum has teamed up with the renowned Fastrack Institute and influential Bitcoin infrastructure developers Bitscape to answer these questions. “Permit to Permanence” envisages a new, faster way to complete critical construction financing steps in the LA rebuilding processes.

http://mattereum.com contact us at: policy@mattereum.com

The LA rebuild is going to stress permitting, financing, construction, and even legal capacity very hard. $250 billion dollars of rebuilding is going to be needed, and fast. “Permit To Permanence” is the new solution being offered by this consortium of industry veterans that will allow LA to rebuild commercial real estate, homes and lives, with minimal delay.

Everybody wants to get back to a “new normal” — they want to “build back better” and to get out of crisis conditions and back to normal, but this time a normal which will not risk their home inadvertently trending on social media again. We can help get people back home safely by expediting the “Permit to Permanent” journey. To start that journey, proposed buildings need permits, affirming that the construction is safe before it proceeds. This is particularly vital in earthquake-prone LA. The faster they get those permits, the faster rebuilding projects can move to the next stage: financing, which is where our story begins.

Currently all ways to get funds to the people who need financing to rebuild their homes, businesses and lives are slowed down by bureaucratic red tape and numerous intermediaries all taking their margins. Our consortium has come up with a revolutionary proposition intended to streamline recovery by standardizing the paperwork for various processes including construction finance, and integrating smart contract technology, thus enabling the rapid deployment of capital from the $2 trillion Bitcoin liquidity pool (+$1.5tn of other assets) into the LA rebuilding process. This is Permit to Permanence.

This breaks revolutionary new ground for Mattereum: we stand on firm foundations in disaster. Mattereum CEO Vinay Gupta started the company in 2017, after 15 years of experience in emergency sheltering and critical infrastructure modelling (and associated fields). When it was launched, one of Mattereum’s long term goals was to use the company’s innovative blockchain lawtech to streamline disaster reconstruction.

Mattereum’s innovations have been deeply rooted in the Ethereum blockchain, which has always been able to provide the smart contract architecture that Bitcoin did not. Now though, using Bitscape’s creativity, it has become possible to operate smart contracts on the Bitcoin blockchain, to access a much larger pool of working capital. These smart contracts make Mattereum’s innovations work just as well on Bitcoin as on Ethereum, something that a year ago would have been dismissed as impractical. Mattereum will, of course, continue to offer services on Ethereum.

The Bitcoin community’s entrepreneurial mindset and technical sophistication makes it particularly suited to providing the financial infrastructure needed to rapidly deploy massive capital to support rebuilding efforts. By connecting this digital breakthrough to Fastrack’s framework for empowering cities to bring together their leaders and inhabitants to find solutions for critical civic problems, you have a technique machine-tooled to provide the financial infrastructure needed to rapidly deploy capital and kickstart rebuilding efforts in Los Angeles, and ultimately, anywhere in the world. This is a sophisticated new approach to streamlining finance for disaster recovery in the US.

http://lalaunchpad.org/

Vinay also has prior experience in helping with the housing crisis in Los Angeles, having seen his “hexayurt” emergency shelter technology, developed in 2002, adopted by the LA Launchpad project. There, church groups and others provided hexayurt emergency shelters to homeless people in the city as a winterized alternative to tents. Hexayurts are durable structures made from cheap, readily available materials designed to be fabricated quickly post-disaster to provide emergency shelters that do not have to be stockpiled and then shipped in from far away warehouses.

CEO Vinay Gupta says “As soon as I saw what was happening in LA, I knew this is exactly what my path had prepared me for. When I worked at Rocky Mountain Institute I saw that building and rebuilding in the era of unprecedented natural disasters would need a new systematic approach. I went on to develop this, taking in aid transparency, ultra-efficient disaster architecture and critical infrastructure design. I then project managed the Ethereum launch and went on to set up Mattereum to create the highly transparent global transactional technology needed for world trade, and yes, disaster relief. This LA project puts all that into action. We will achieve fast “permit-to-permanence” via Bitcoin financing.”

As far back as 2009, Vinay was also a pioneering innovator in decentralised finance (DeFi) and decentralized physical infrastructure (DePin) having helped get over 100,000 solar lighting units deployed in refugee camps. Based on that experience, he developed a proposal for a new system for financing distributed infrastructure deployments. The goal was to reduce barriers to infrastructure investment. The goal was encourage the financing of “build back better” distributed infrastructure solutions after natural disasters, by solving issues in project contracting, monitoring, and reporting. In 2009 he wrote “The challenge is to imagine full end-to-end decentralization in infrastructure, including financing. Every step can be decentralized, from raising the capital, allocating it to loans or triple-bottom-line investments, deploying the infrastructure systems, repaying the loans and measuring the impacts”.

http://files.howtolivewiki.com/The_Global_Village_Development_Bank_v2.pdf (2009)

15 years ago we started the journey that led us here, today, with the capability to expedite the flow of funds into fire-worn LA. Going from technology to lawtech and back has been a round trip for the ages. Our understanding has matured over all of those years. We really do have the tools to help here.

The new consortium can help people get back to their homes faster.

Reach us at: policy@mattereum.com

The consortium wants to grow rapidly to meet these challenges. If you have relevant expertise in LA planning/zoning, compliant prefab and modular building systems, are on the ground hoping to rebuild (particularly multi-family/commercial, or large numbers of homes), please immediately send us an email about your capabilities or needs. The consortium and its members are also looking for resources to scale operations.

https://www.pexels.com/photo/aerial-photography-of-the-downtown-la-skyline-14657304/

Getting home: financing the rebuilding of LA with Bitcoin was originally published in Mattereum - Humanizing the Singularity on Medium, where people are continuing the conversation by highlighting and responding to this story.


playhaus.tv

36 – INB4 Memecoins Go Mainstream

GM HEARTLAND The internet culture newsletter equivalent of a ‘u up’ text. —El Prof, Muhammed & Chad MONEY MONEY MONEY TOKEN PRICE CHANGE PRICE Solana ($SOL) -7.83% $252.57 Helium ($HNT) -6.65% $4.45 Pyth ($PYTH) -14.00% $0.27 Save ($SLND) -17.35% $0.70 (Price changes reflect past 7 days as of 1.28.25) BUZZWORD OF THE WEEK de-PIN: Public […]
GM HEARTLAND

The internet culture newsletter equivalent of a ‘u up’ text.

—El Prof, Muhammed & Chad

MONEY MONEY MONEY

TOKEN

PRICE CHANGE

PRICE

Solana ($SOL)

-7.83%

$252.57

Helium ($HNT)

-6.65%

$4.45

Pyth ($PYTH)

-14.00%

$0.27

Save ($SLND)

-17.35%

$0.70

(Price changes reflect past 7 days as of 1.28.25)

BUZZWORD OF THE WEEK de-PIN:

Public utilities that are modern and efficient, through advanced accounting and auditing technologies enabled with AI

The next evolution of IoT (Internet of Things), where the data prescribes agents to identify and resolve problems before they get out of hand

The robotic arm of the Data Economy

Check out more of our favorite buzzwords here.

AI Isn’t A Bubble. Software Is.

I’m typically either two years too early or two seconds too late. And for a hot sec, the latter seemed totrue once again this past week, as the AI sector crashed — moments after I entered it in earnest.

My capacities as a dev have continue to grow week over week as I struggle through the deployment of playhaus’ MVP to Google’s Cloud Platform. (Which I am probably still doing as we speak.) Of course, when I say “capacities as a dev”, I mean “cursing out an AI-powered coding chatbot until it gets results”, but hey. It does get results. More than all my past dev hires combined, if that tells you anything.

That’s not all. Over the weekend, I finally started a project with LangChain, a framework for developing custom AI agents and operators. I was psyched to finally start dancing at the party — up until the music unceremoniously stopped. As you’ve surely heard, China’s industrial machine responded to the erstwhile TikTok ban with DeepSeek, an open-source LLM that can apparently outperform ChatGPT and was developed in a fraction of the time, for a fraction of the cost. Blue-chip AI stocks promptly plummeted, right as I was getting my feet wet. Sigh. Just a simple guy, trying to leverage the Solana Agent SDK, so I can build some memecoin sniper bots and buy myself a vacation.

Fortunately, the rout didn’t last long. Investors are already buying the dip today, and I can’t say I’m surprised, given the rise of the AI meta in the web3 space, the success of AI meme coins, and the 180 on SAMA’s costly AI training clusterfuck, Project Stargate. The reports of the AI bubble’s burst were greatly exaggerated.

As much as we may fall on the anti-Big-Tech side of the spectrum, I can’t argue in good faith that this is a bad thing. We should be hopeful for NVIDIA, and the future of the hardware side of these businesses, because demand for computers will scale exponentially. Our reliance on technology all but guarantees it. (At least, until we start getting into organic-based computation. But I’m sure NVIDIA has R&D in the space already.) Efficiency gains in energy consumption or processing capacity shouldn’t scare the markets.

What should scare the markets are open-source models, decentralized computation networks, and community-owned applications that transform our current internet infrastructure from digital fiefdoms to a true public utility. The software moat is bloated and over-valued in this environment. 

In other words, AI isn’t a bubble, but software is.

The short-lived fall of TikTok exposed the fallibility of even the biggest tech players. Now, imagine if the ban didn’t come from the outside, but from within. A digital asset custody protocol — encompassing the assets that represent you, your digital identity, and enabling you to choose the level of your privacy and benefit from the resale or licensing of data — could bring some of the biggest companies in the world to their knees.

AI isn’t going anywhere. But it requires that very same data to train, update, and optimize it. Cut off access to it (or, even better, make companies pay for it) and it could cripple the majority of profitable operations for software giants like Microsoft and Google.

Of course, that raises a big follow-up question: What is the killer consumer app that takes us there? And another one, in the case of this newsletter: How do we keep it from centralized control?

Our friend and advisor Branden suggests we build on the existing idea from Newglenn.eth, AI memecoins of sunset legacy brands like Enron, Blockbuster, or even PanAM but imbued with the power of pseudo-sentience, through the creation of character-based LLM. So basically, the OG Wendy’s Twitter account, but instead of an intern dragging anons, it’s an AI agent dragging web2 walled gardens all to hell.

(And potentially a community of fans voting on token weights, with their tokens, to adjust the personality of the brand character, or allowing the bot to spend its tokens to build up a new business from the brand? Okay, okay. I’ll stop boring y’all and just tell it to my AI coding bot instead. Can’t wait to see what it spits out.)

—El Prof

SPONSORED BY 1440 MEDIA Seeking impartial news? Meet 1440.

Every day, 3.5 million readers turn to 1440 for their factual news. We sift through 100+ sources to bring you a complete summary of politics, global events, business, and culture, all in a brief 5-minute email. Enjoy an impartial news experience.

Join for free today!

INB4 Memecoins Go Mainstream

With DOGE now officially the name of a government agency, and big banks signaling a willingness to embrace crypto as soon as Trump rolls back regulations, we appear to be nearing everyone’s favorite stage of the crypto bull market. I call it the Walmart Announces Web3 Initiative Era.

This was a big thing in the 2021 bull cycle. Even TIME Magazine (which was apparently still a thing at the, heh, time) had its own crypto project. Admittedly, it sort of made sense at the time. That rally was catalyzed by the likes of NFTs and metaverse real estate. And it’s not hard to see why digital collectibles and virtual storefronts might go over well in a boardroom.

The current crypto summer, on the other hand, has been characterized by a very different beast: memecoins. And it’s a lot harder to picture a PR Newswire in which TIME launches one of those. Harder to picture — but not necessarily a worse idea.

If properly done, memecoins provide brands with an entirely new way to extend their influence. The potential for companies and organizations to use memecoins as part of their broader web3 strategy is enormous. Brands with strong legacies are particularly well-suited for memecoin integration. When done right, this approach can tap into a brand’s nostalgia, revive fan loyalty, and even introduce a completely new generation of supporters to their ecosystem.

In a sense, many of today’s most successful memecoins are already linked to prominent brands. Take Dogecoin, for example. The eponymous Shiba Inu meme might not be listed on the Nasdaq. But Dogecoin’s rise in value and popularity is a testament to how the line between a meme and brand can blur into nothingness. As of now, Dogecoin is integrated into platforms like Twitter for tipping and even being considered for use by certain businesses as a method of payment.

So what would it look like if established brands were to launch their own memecoin? Frankly, it could almost be seen as a logical next step for global brands that have already gone in on rewards programs, turning their own apps into a facsimile of a blockchain ecosystem. For example, McDonald’s could release a BigMacCoin to celebrate milestones and offer promotions to token holders, which might attract interest not just from loyal customers, but also retail traders eager to capitalize. (Or just doing it for the meme.)

It might be an even more natural fit for legacy brands that have seen their cultural relevance fade over time, giving them a unique opportunity to tap into an emerging culture to regain attention and bolster their image. Let’s say Nokia, once the king of mobile phones before being dethroned by smartphones, created a NokiaCoin to mark its comeback. Tapping into the nostalgia of the iconic Nokia 3310 — and the inherent irony of the phone that “never dies” — the coin could ignite the web3 version of a meme stock rally and inject a shot of adrenaline into a dying brand. But unlike a pure memecoin, Nokia is still a multibillion-dollar company, capable of offering real value to holders, perhaps in the form of limited-edition hardware or exclusive events.

Topping my personal list of somewhat realistic memecoin adopters would be trendy companies like Twitch and Gucci. Imagine Twitch, launching TwitchCoin as part of its Web3 strategy, allowing content creators to reward their viewers in a decentralized way. Imagine using TwitchCoin to access premium content, exclusive streams, or virtual rewards — blending the power of memecoins with the community-driven nature of the platform. That would be a badass move, and a major growth to crypto world.

Similarly, a fashion giant like Gucci could create GucciCoin to offer token-based access to limited-edition digital apparel in the metaverse or physical goods, rewarding loyal followers and collectors of exclusive designs.

In the end, it’s not just about adding a fun twist to a brand or generating buzz; memecoins offer companies an innovative way to integrate their legacy into the decentralized economy, reinvigorate their community, and explore new avenues for engagement. The future of memecoins holds immense potential, and for brands, it may just be the key to unlocking a new era of customer engagement, legacy revival, and, ultimately, success in the decentralized world.

—Muhammed


ComplyCube

Understanding UK Crypto Regulation in 2025

Crypto adoption has increased in the UK, with FCA reporting that 12% now own cryptocurrency. Let’s dive into what we can expect from UK crypto regulation in 2025, and how recent political changes might impact upcoming measures. The post Understanding UK Crypto Regulation in 2025 first appeared on ComplyCube.

Crypto adoption has increased in the UK, with FCA reporting that 12% now own cryptocurrency. Let’s dive into what we can expect from UK crypto regulation in 2025, and how recent political changes might impact upcoming measures.

The post Understanding UK Crypto Regulation in 2025 first appeared on ComplyCube.


Kin AI

How to Use Kin's Chat

Kin’s Chat feature is your direct line to Kin's advanced Memory and analytical capabilities, available whenever you need it.

Try Kin - Personal AI

This feature allows you easy access and control over all of Kin’s support features, and is designed as a catch-all for any discussions, questions, or musings that fit outside the scope of the Journal or other features.

I’m Yngvi Karlson, Co-Founder of Kin. Born in the Faroe Islands, I’ve spent my career building startups, with two exits along the way, and five years as an active venture capitalist. Now, I’m dedicated to creating Kin, a personal AI people can truly trust.

Follow me on LinkedIn, TikTok and X

To help you use it to its full potential, I’ll cover the following:

How to Navigate Kin’s Chat

Maximizing Your Chat Experience with Personal AI

Extra Tips for your AI Companion

Get Started Today with Your AI Assistant

How to Navigate Kin's Chat

Here's how the Chat feature works:

Step One: Access the Chat

Launch the Kin app, and tap the speech bubble icon in the bottom right to enter Kin’s Chat feature.

You’ll see the layout is very similar to a typical messaging thread—as we’ll cover, you can talk to Kin much like one of those.

💡 Kin’s Chat is designed in this way to emphasise its 24/7 availability—you can always message Kin!

Step Two: Choose Your Input Method

Like the Journal feature, you can decide whether you'd like to Type or Speak to Kin.

For typing, simply use the text input field at the bottom of the screen.

For voice input, tap the microphone icon and start speaking—Kin will transcribe your words in real-time.

💡 Voice input can be particularly useful when you're multitasking, or want to express yourself more naturally.

Step Three: Start Your Conversation

Begin chatting with Kin about whatever's on your mind. Kin will always listen without judgement, and its particular responses can be adjusted with its Voice & Tone of Voice tools

As you chat, you'll notice Kin highlighting certain keywords—these are pieces of information it's storing in its Memory to better understand and support you.

These highlights might include:

Names of people, places, or companies

Emotional states or recurring feelings

Professional roles or responsibilities

Important dates or events

Goals and aspirations

💡 If you notice Kin hasn't highlighted something you think is important, just let it know. Kin can add new information to its memory at any time.

Step Four: Explore Kin's Capabilities

Kin can do a lot, and it’s all accessible from Chat. These things include:

Suggesting conversation starters based on its knowledge of you in the Inspiration tab (just press the star icon on the left of the input field!)

Setting custom Reminders for future events or tasks

Searching the web for relevant information

Reviewing and analyzing its memories about you

Deleting Memories you'd rather it forgot

Providing summaries and recounts of your past Chat messages and Journal entries to help you track your behaviour and relationships.

💡 For all of these things, you just need to ask Kin for them in the Chat! There are no excessive menus to tap through here.

Step 5: Visit the Streaks & Stats Tab

Return to the homepage using the 'x' button in the top left, then tap the flame icon in the top right to enter the Streaks & Stats tab.

Here, you can see your daily usage streak and see visually what Kin has added to its memory about you today through your conversations. It’s a good way to track the Chat’s impact on Kin’s knowledge of you.

It’s worth noting that you can trust that all of this information is safe—it’s stored with complete privacy, so you can have any conversation you want. You can even delete it whenever you’d like.

💡 Tap the connected dots icon in the top right of this tab to view your Knowledge Map, showing everything Kin knows about you and how it's all connected.

Maximizing Your Chat Experience with Personal AI

Want to make the most of your conversations with Kin? Here are some proven strategies:

1. Be Specific

The more context you provide, the better Kin can help.

For example—instead of saying "I'm stressed," try explaining what's causing the stress and how it's affecting you. This helps Kin build a more complete understanding of your situation and perspective.

2. Update Regularly

Keep Kin informed about changes in your life, whether they're major events or small updates.

Helping Kin stay up-to-date on your situation means Kin’s pattern-tracking and advice will be more accurate and helpful to you.

3. Ask Questions

If you're unsure about something Kin has said, or want to know more about what it knows about you, just ask. Kin can explain its understanding and reasoning, so you can both understand each other better.

4. Use Keywords Intentionally

When discussing something you want Kin to remember, try to use clear, specific terms. This helps Kin accurately capture and categorize the information in its memory.

Remember, you can always ask Kin to make sure it adds something to its memory, or to explain its understanding of something so you can update or correct where needed.

5. Review and Reflect

In fact, periodically ask Kin to summarize what it knows about certain aspects of your life. This can reveal interesting patterns, prompt helpful advice, and ensure Kin's understanding of you stays accurate.

Extra Tips for Your AI Companion

Here are some additional ways to enhance your Chat experience:

Stay Consistent: Regular conversations, even brief ones, help build Kin's understanding of you over time.

Be Honest: Kin's memory is private and secure, so you can be open about your thoughts and feelings.

Check Highlights: Pay attention to what Kin highlights during conversations—it shows you what it's learning about you.

Follow Up: If Kin makes a suggestion, try it and report back about how it went. This helps Kin learn what works best for you.

Get Started Today with Your AI Assistant

Ready to begin chatting with Kin? Download the app, open up the Chat, and start with this simple message:

"Hi Kin! Let’s get to know each other. What do you do, and what would you like to know about me?"

From there, let the conversation flow naturally. Remember, every chat helps Kin become a more effective support system for you.


Veracity trust Network

UK Government’s AI plans aim to boost growth

The UK Government’s Artificial Intelligence (AI) plans aim to boost growth and provide a “vast potential” for future innovation according to Prime Minister Sir Keir Starmer. The AI Opportunities Action Plan was launched last week with proposals that include investments to boost growth and deliver services more efficiently. The post UK Government’s AI plans aim to boost growth appeared fir

The UK Government’s Artificial Intelligence (AI) plans aim to boost growth and provide a “vast potential” for future innovation according to Prime Minister Sir Keir Starmer.

The AI Opportunities Action Plan was launched last week with proposals that include investments to boost growth and deliver services more efficiently.

The post UK Government’s AI plans aim to boost growth appeared first on Veracity Trust Network.


ShareRing

ShareRing announces expansion into the US via STARS.

ShareRing announces expansion into United States via STARS affiliate program and first ever age verification trial. January 29, 2025: ShareRing is unveiling its digital age verification technology in the US market with the launch of an ambitious affiliate marketing strategy and a first ever age verification pilot programme. Affiliates can play a crucial sales and ... Read more The post ShareRing

ShareRing announces expansion into United States via STARS affiliate program and first ever age verification trial.

January 29, 2025: ShareRing is unveiling its digital age verification technology in the US market with the launch of an ambitious affiliate marketing strategy and a first ever age verification pilot programme.

Affiliates can play a crucial sales and marketing role by driving adoption and expansion of ShareRing’s technology solutions to new potential customers.


“With the launch of the ShareRing Trusted Affiliate Rewards System (STARS) we are leveraging targeted affiliate partnerships and incentive programmes to maximise our success,” said Tim Bos, Co-Founder and CTO of ShareRing.

“With STARS our goal is to access and engage with afflilates who will help us drive sales and generate revenue organically across the US and globally.“

“In the US our initial focus is on the huge nightclubs sector where there is massive potential for the ShareRing Me app to address key challenges such
as fake IDs, streamlined entry processes and compliance requirements,” he said.


In mid-February ShareRing will showcase the functionality and benefits of its Digital Me technology at an exclusive industry event in Florida, to be followed by a fully-fledged trial of the ShareRing Me app with Miami based nightclubs.

“The age verification pilot will allow us to gather critical feedback, refine our approach, and demonstrate real-world impact to potential nightclub clients,” said Tim Bos.

“The trial will feature our innovative new mini-dApps and Prove technology that works even if there is no mobile phone service. This will mean much faster guest verification, queue management, and overall venue efficiency improvements at nightclubs.“

“There are 70,000 nightclubs across the US, and if we succeed in converting just 2.5% of nightclubs, this will equate to 1,750 venues.“

“Assuming each nightclub averages 20,000 clients per year, there is potential for 35 million ShareRing verification transactions annually in the US.“

“Importantly, each verification transaction using ShareRing’s LINK technology results in a token transaction. This enhances the value of existing tokens and benefits node holders by increasing network activity and demand.“

“As ShareRing uses our own tokens to facilitate transactions, an increase in activity results in a reduction of the circulating supply, enhancing the value and exclusivity of the remaining tokens.”

For more information, or to schedule an interview with CTO Tim Bos, or CEO Ryan Bessemer please contact:
Patrick Southam, Reputation Edge
M: 0419415 998
E: psoutham@reputationedge.com.au

About ShareRing
Founded in 2019 and based in Melbourne, Australia, ShareRing is a blockchain technology company that offers business advanced verification technology solutions including verified digital identities. https://sharering.network

The post ShareRing announces expansion into the US via STARS. appeared first on ShareRing.


PingTalk

Boost Bank Launches Embedded Digital Bank App for Malaysians

Boost Bank Launches Embedded Digital Bank App in Six Months on PingOne Advanced Identity Cloud.

 

Boost Bank is revolutionizing financial services in Malaysia with the launch of its pioneering embedded digital banking app in June 2024. Designed to provide underserved communities with seamless access to banking, Boost Bank simplifies saving, bill payments, discounts on products and services, and more. Chief Technology Officer Shankar Krishnan shared the journey behind creating this groundbreaking digital bank from the ground up.

 

Boost Bank is a collaboration between Axiata and RHB Bank, Malaysia’s 5th largest bank, and one of five banks awarded a digital banking license from the Central Bank of Malaysia. The official launch, graced by Malaysian Prime Minister Y.A.B Dato Seri Anwar Ibrahim and Digital Minister YB Gobind Singh Deo, marked a significant milestone as Malaysia’s first homegrown digital bank


Okta

Announcing Integrator Office Hours

Are you working on an integration for the Okta Integration Network(OIN)? Would you like assistance designing, implementing, or submitting your integration? Our Integrator Office Hours program is now open to all builders at all stages of integration development! To attend, simply sign up on Calendly. If you share more details about your integration when you sign up, we’ll make sure to have th

Are you working on an integration for the Okta Integration Network(OIN)?

Would you like assistance designing, implementing, or submitting your integration?

Our Integrator Office Hours program is now open to all builders at all stages of integration development! To attend, simply sign up on Calendly. If you share more details about your integration when you sign up, we’ll make sure to have the right experts at your session!

Office hours are currently on Tuesdays at 2 pm Pacific time zone. You can also ask questions on the Developer Forum.

For more about the OIN, see this post and the getting started documentation.


Anonym

4 Quick Things You Can Do to Protect Your Personal Information This Data Privacy Day

Make this year’s Data Privacy Day the day you take back control of your personal information online. Data breaches are at an all-time high and if you don’t already know someone who’s had their personal data stolen, you probably soon will. Data Privacy Day is held on January 28 each year to mark the anniversary […] The post 4 Quick Things You Can Do to Protect Your Personal Information This Data

Make this year’s Data Privacy Day the day you take back control of your personal information online. Data breaches are at an all-time high and if you don’t already know someone who’s had their personal data stolen, you probably soon will.

Data Privacy Day is held on January 28 each year to mark the anniversary of Convention 108, the first legally binding international treaty dealing with privacy and data protection. In recent years Data Privacy Day has expanded to be part of the larger Data Privacy Week, simply because protecting personal information is so important.

Protecting your personal information keeps you safe

Protecting personal information online is crucial for maintaining privacy, security, and overall wellbeing. It can help you:

1. Prevent identity theft

Bad actors can use stolen personal information, such as your social security number, credit card details, or address, to impersonate you. They can use your information to open bank accounts, take out loans, or make unauthorized purchases in your name.

2. Safeguard financial security

Sharing sensitive financial details can lead to unauthorized access to your accounts. You might lose money, face fraudulent charges, or have your credit score damaged.

3. Protect privacy

Overexposure of personal details can make you vulnerable to stalking, harassment, or unwanted contact. This can lead to emotional distress and invasion of your private life. In extreme cases, it can lead to physical or mental health harm.

4. Avoid social engineering attacks

Cybercriminals can exploit your personal data to manipulate you or others in your network. Phishing scams, impersonation and deepfakes, and other attacks become easier with detailed personal information.

5. Maintain professional reputation

Information shared online can be taken out of context or used maliciously. This can harm your career or professional image, especially if sensitive or inappropriate information is leaked.

6. Avoid unwanted targeting

Companies and advertisers might misuse your personal data for intrusive marketing or profiling. You might face an overload of targeted ads, scams, or unwanted solicitations. Did you know that even your bank can be selling your personal data? Personalized ads have many privacy pitfalls.

Here are 4 quick things you can do to protect your personal information

1. Follow some privacy and security fundamentals:

Use strong, unique passwords for each account. Store them securely in a password manager. Enable two-factor authentication (2FA). Don’t share sensitive details on public platforms or unsecured websites. Keep your software and devices updated. Be cautious of phishing emails, links, and attachments. Regularly review your privacy settings on social media. Know what to do in the event of a data breach.

2. Use MySudo all-in-one privacy app to protect your information. Anywhere you’d normally use your phone number, email or credit card, use Sudos instead. Sudos are secure digital identities with their own name, phone, email and virtual card. Use your Sudos to sign up for deals and discounts, book rental cars and hotel rooms, pay for concerts or a coffee, all without giving away your personal information.

3. Reclaim your information from companies that store and might sell it with RECLAIM personal data removal tool. See who has your information, discover whether it’s been caught in a data breach, and then either ask the company to delete it or substitute it for your Sudo information using MySudo. RECLAIM is part of the MySudo app family.

4. Encrypt your internet connection and hide your IP address with MySudo VPN, the only VPN on the market that’s actually private. MySudo VPN is the perfect companion for MySudo privacy app since they’re engineered to work seamlessly together. 

By securing your own information, you reduce risks and maintain control over your personal and digital life. The message behind Data Privacy Day 2025 is Put Privacy First. That means putting yourself first. Don’t wait for governments or companies to protect you. And definitely don’t wait until it’s too late.

Download MySudo
Download RECLAIM
Download MySudo VPN

You might also like:

9 Reasons Why Data Privacy Matters
New to MySudo? Start Here

The post 4 Quick Things You Can Do to Protect Your Personal Information This Data Privacy Day appeared first on Anonyome Labs.

Monday, 27. January 2025

Spherical Cow Consulting

Are You Human? A Dive Into the Proof of Personhood Debate

I don’t think of myself as an expert in non-human identity (NHI). Instead, I’d say I’m NHI-curious and eager to share what I’m learning. Lately, I’ve been going down a rabbit hole about when and how to indicate if someone—or something—is human. I’m clearly not alone in asking this. Last year, I was one of Continue Reading The post Are You Human? A Dive Into the Proof of Personhood De

I don’t think of myself as an expert in non-human identity (NHI). Instead, I’d say I’m NHI-curious and eager to share what I’m learning. Lately, I’ve been going down a rabbit hole about when and how to indicate if someone—or something—is human. I’m clearly not alone in asking this. Last year, I was one of many co-authors of a paper, Personhood Credentials: Artificial Intelligence and the Value of Privacy-Preserving Tools to Distinguish Who is Real Online, exploring these questions and challenges. Spoiler: we ended with a call for further discussion. (I’m happy to add that it won an award: The Future of Privacy Forum’s 15th Annual Privacy Papers for Policymakers Award recognizes influential privacy research, and this paper is on the list.)

Audio Version: If you’d rather listen than read, hit play below.

So, I turned to friends and fellow IDPro members and asked: Has the call to action in that paper to Do Something caught the eye of any standards body? I had hoped for a “yes, of course, go here,” but that’s not what I got. What happened was the continuation of an interesting debate. Some argued we shouldn’t need to distinguish humans from non-humans because all non-humans should be accountable to a human. Essentially, someone—a developer, a manager, whoever—should ultimately take responsibility for what their creations (AI agents, IoT devices, bots, etc.) do.

You may not think this falls under the discussions around NHI, but they do. You can’t definitively say “this is NHI” if you can’t also definitively say “this is human.”

Before we dive in further, let’s talk about a word that’s central to this discussion: personhood. It’s not without debate. Wikipedia describes it as a concept that’s been questioned in discussions about slavery, abortion, fetal rights, animal rights, corporate law, theology, and even Indigenous legal systems. Some see it as a way to bridge these different legal perspectives, while others challenge its use altogether.

I’m using the term here because it’s in the title of a research paper I co-authored, and frankly, I don’t have a better one. But it’s something we should be thinking about.

The Scalability Problem

I get the argument, but I have concerns. First, the responsibility model doesn’t scale. A developer might write the code, but what happens when that code spawns other processes, which spawn even more? Each may have different permissions and identifiers. Can one person realistically be held accountable for all of it? Really?

Second, consider third-party systems. They’ll want to distinguish between activities originating from a person versus a bot. This isn’t just about authentication (OAuth2 delegation, for example). It’s about making decisions based on what the entity is, independent of its actions.

These are just what comes to mind off the top of my head. I expect there are more that will come down to your risk appetite. Are you willing to constrain your environment to only what you know you can control? Before you just say “of course!” think really hard about your answer and how much time and energy you’re willing to put into backing it up.

Who’s Tackling This?

The short answer: kind of everyone and no one. We’re nowhere near a consensus or even an industry best practice. Some notable players:

Humanity Protocol recently launched a foundation to support its decentralized digital identity network. Worldcoin and its WorldID system aim to establish proof of personhood (PoP) through biometric scans. Idena’s Proof of Person Blockchain exists but seems to be struggling to find a sustainable business model. (You can read more about this effort in an academic paper published here.) The ETHOS (Ethical Technology and Holistic Oversight System) framework was described in an academic paper published late in 2024; we’ll see if that gains any traction.

Each of these efforts faces similar hurdles—privacy concerns and business models. For example, if a credential verifies you as a person, does that mean someone is tracking your identity? And even if you trust the system, who covers the costs of implementing this infrastructure? What’s the ROI for businesses?

I expect more papers to be published on this topic and I’ll update this blog post as I hear about the good ones.

Beyond Technology: The Social Layer

The challenges aren’t purely technical. Social and governance issues loom just as large. Who decides what counts as “proof”? How do we build systems that protect privacy while maintaining accountability? And how do we fund these efforts in a way that’s fair and sustainable?

I’m keeping an eye on proof of personhood and hoping for a breakthrough that could standardize the approach. If you’re exploring similar questions or solutions, I’d love to hear your thoughts. We absolutely must get to an answer as we navigate this maze of personhood and accountability—human or otherwise. Though we’re not getting that answer today.

Curious about how I tackle real-world challenges in digital identity, standards development, and beyond? Check out my mini-case studies for insights and lessons from projects that showcase the strategies and skills I bring to the table. If you see something you’d like to explore further, let me know!

The post Are You Human? A Dive Into the Proof of Personhood Debate appeared first on Spherical Cow Consulting.


Ocean Protocol

How FOMC Interest Rate Decisions Shape Blockchain and AI Development

With the FOMC meeting set for January 28–29, 2025, the tech and crypto worlds watch closely for the effects of potential interest rate changes. We’re also engaged, having recently mobilized our community around this topic. Ocean Protocol and Ocean Foam organized a December 2024 data challenge, encouraging our community’s data scientists to develop ML models for forecasting FOMC decisions. Wa

With the FOMC meeting set for January 28–29, 2025, the tech and crypto worlds watch closely for the effects of potential interest rate changes.

We’re also engaged, having recently mobilized our community around this topic. Ocean Protocol and Ocean Foam organized a December 2024 data challenge, encouraging our community’s data scientists to develop ML models for forecasting FOMC decisions. Watch for our upcoming blog post, which we plan to release following Wednesday’s meeting and decision.

Introduction

The Federal Open Market Committee (FOMC) plays a pivotal role in United States monetary policy, with its decisions on interest rates reverberating through various sectors of the economy. One less obvious yet profoundly impactful area influenced by these decisions is the cryptocurrency market, which affects the trajectory of blockchain technology and the broader tech ecosystem, including AI companies. This article explores how these economic levers can steer the course of innovation in these rapidly evolving domains.

Interest Rates and Cryptocurrency Dynamics

When the FOMC decides to raise interest rates, the cost of borrowing increases, making safer investments like Treasury bonds more attractive compared to riskier assets. Cryptocurrencies, often seen as high-risk investments due to their volatility and regulatory uncertainty, typically see reduced investment interest. This shift can lead to a decline in market activity, lower trading volumes, and depressed valuations. For instance, a rate hike might see investors pulling out from Bitcoin or Ethereum, leading to a bearish market sentiment.

Conversely, when interest rates are lowered, the scenario flips. Lower borrowing costs encourage risk-taking, and capital often flows back into speculative markets. This can spark a bullish trend in cryptocurrencies, with increased buying leading to higher prices. For example, the 2020 low interest rate environment coincided with significant cryptocurrency rallies, illustrating this pattern.

Impact on Blockchain Technology

Blockchain technology is intended to support decentralized, secure, and transparent transactions, often powered by native cryptocurrencies. The health of the crypto market directly influences blockchain projects:

Funding and Investment: A thriving crypto market can lead to successful Initial Coin Offerings (ICOs) or token sales, providing crucial funding for blockchain startups. Conversely, a bear market can dry up these investment sources, slowing project development. Incentivization: Many blockchain networks rely on their cryptocurrency to reward network participants like miners or validators. A dip in cryptocurrency value can reduce the incentive for participants, potentially slowing network growth or security. Adoption and Innovation: High crypto valuations can spur interest in blockchain applications, leading to more innovation and adoption in fields like finance (DeFi), supply chain management, or identity verification. The AI Connection

While not every AI company directly intersects with blockchain, those that do can feel the indirect effects of interest rate policies through:

Funding Through Crypto: Some AI startups might leverage ICOs or token sales for initial funding, particularly if they’re building decentralized AI solutions or platforms. Data and Privacy: Blockchain can offer secure, decentralized data management solutions, which is crucial for AI development. A downturn in crypto could mean less investment in such hybrid tech solutions. Smart Contracts: AI companies might use blockchain for smart contracts to automate and secure business agreements, especially in areas like AI-driven legal services or automated compliance. Broader Economic and Technological Considerations

It’s essential to recognize that while interest rates are a significant factor, they are part of a larger, complex ecosystem:

Regulatory Environment: Regulation changes can dampen or boost the crypto market, independent of interest rates. Technological Advancements: Breakthroughs in blockchain or AI technology can drive investment irrespective of economic policies. Global Economic Health: The international economic context can influence the sensitivity of crypto and tech markets to U.S. interest rate changes. Conclusion

The FOMC’s interest rate decisions weave through the fabric of financial markets, touching even the most innovative tech sectors like blockchain and AI. These decisions can fuel a growth and innovation cycle or lead to periods of contraction and reevaluation. For stakeholders in these industries, understanding this interconnection is key to navigating market cycles, securing funding, and planning strategic growth. As these technologies mature, their relationship with macroeconomic policies will become even more nuanced, presenting challenges and opportunities equally.

About Ocean Protocol

Ocean was founded to level the playing field for AI and data. Ocean tools enable people to privately & securely publish, exchange, and consume data.

Follow Ocean on Twitter or Telegram to stay up to date. Chat directly with the Ocean community on Discord, or track Ocean’s progress on GitHub.

How FOMC Interest Rate Decisions Shape Blockchain and AI Development was originally published in Ocean Protocol on Medium, where people are continuing the conversation by highlighting and responding to this story.


Innopay

EU Digital Identity Wallet at the Future of Dutch Payments event

EU Digital Identity Wallet at the Future of Dutch Payments event from 27 Mar 2025 till 27 Mar 2025 Trudy Zomer 27 January 2025 - 11:54 Amsterdam, the Netherlands 52.376520820603, 4.9003426 Join
EU Digital Identity Wallet at the Future of Dutch Payments event from 27 Mar 2025 till 27 Mar 2025 Trudy Zomer 27 January 2025 - 11:54 Amsterdam, the Netherlands 52.376520820603, 4.9003426

Join us on 27 March for the Future of Dutch Payments event (‘Toekomst van Betalingsverkeer’), where Vincent Jansen - Vice President at INNOPAY -  will deliver a keynote speech on the critical aspects of the EU Digital Identity Wallet – its implications and opportunities for banks.

This session is a must for all industry professionals eager to understand how these pivotal changes will reshape the banking landscape to drive their strategies forward.

Vincent will deep dive into the:

Timeline and rollout of eIDAS 2.0 Mandatory acceptance of the EU Digital Identity Wallet Implications for banks Opportunities beyond mere compliance

 

We look forward to seeing you there. For tickets and more info, go to the website of the conference.


IDnow

Fraud, financial crime and forensic analysis, with Mayur Joshi.

We sit down with an Indian pioneer of forensic analysis to discuss the country’s most common scams, the successes and limitations of the world’s largest biometric ID system, and why it’s unfair to refer to Kolkata as the call center scam capital of the world. Back in 2005, when Mayur Joshi founded Indiaforensic – India’s […]
We sit down with an Indian pioneer of forensic analysis to discuss the country’s most common scams, the successes and limitations of the world’s largest biometric ID system, and why it’s unfair to refer to Kolkata as the call center scam capital of the world.

Back in 2005, when Mayur Joshi founded Indiaforensic – India’s first training and educational hub focused on financial crime investigation – the concept of forensic accounting was relatively unknown in the country. 

Despite this, Mayur knew that due to increasing rates of financial fraud and India’s lack of domestic fraud prevention specialists, the launch was essential. 

“The initial reaction to the launch was mixed and met with both curiosity and skepticism due to the novelty of the concept. However, as financial fraud became increasingly sophisticated and prevalent in India, the need for specialized education became clear,” said Mayur. 

Twenty years later, Indiaforensic has over 5,000 members from a range of industries, including the public sector, non-banking financial companies, payment aggregators, cooperative banks, multinational banks operating in India, fintech companies, fraud control teams, chartered accountancy firms, telecom companies and retail organizations. 

In this interview, we discuss India’s most common compliance mistakes, the role that technology plays in the proliferation and prevention of new fraud attacks, the importance of enabling organizations to combat financial crime and maintain robust compliance standards, and much more.

Interested in fraud a little closer to home? Discover the differences in public perception of fraud and identity verification in France and the UK in our blog, ‘France vs UK. Which country knows more about fraud?’

What would you say are the 3 most common compliance mistakes that organizations make in India?

The three most common compliance mistakes made by organizations in India, particularly within the financial services, are: 

Inadequate training: One of the most significant gaps in India’s compliance sector is the lack of advanced training for employees. Many compliance professionals are trained primarily in basic Know Your Customer (KYC) regulations, but advanced topics like sanctions compliance and Trade-Based Money Laundering (TBML) often remain underexplored. This results in a narrow understanding of the broader compliance landscape, making it difficult for employees to effectively handle more complex issues like international sanctions or intricate financial crime patterns. Without comprehensive training, compliance teams are not equipped to address the evolving and multifaceted challenges of global financial crime. 
Inadequate testing: A major issue in the Indian compliance sector is the proliferation of certification courses that fail to adequately test the knowledge and skills of participants. While these certifications may appear beneficial, the lack of rigorous testing means that compliance professionals may not be fully prepared to handle real-world scenarios. This becomes particularly problematic in high-stake situations, such as when an organization is under regulatory scrutiny or when dealing with complex fraud cases. The absence of practical assessments during training means that employees may struggle to apply their knowledge effectively in critical situations, leading to costly errors or regulatory breaches. 
Inadequate due diligence: A common mistake in compliance practices is an over-reliance on databases to conduct due diligence, often at the expense of more in-depth investigative skills. While database searches are essential, they don’t always provide the full picture. Compliance teams may fail to connect the dots or identify red flags that are not present in the databases but can be uncovered through a more thorough investigation. This could include deeper inquiries into the business relationships, transaction histories, or risk profiles of clients or partners. 

Failing to conduct comprehensive due diligence can leave organizations exposed to financial crimes like money laundering, fraud or terrorist financing.

How about financial crime, what trends are you seeing right now?

In India, digital fraud has rapidly emerged as one of the most common forms of financial crime, driven by the increasing use of digital payments and online platforms. United Payments Interface (UPI) fraud is a major concern, where fraudsters trick victims into sharing their UPI credentials or One Time Passwords (OTPs) through fake links or impersonation. 

Similarly, OTP fraud, often enabled by SIM card swapping or phishing attacks, allows criminals to intercept OTPs and complete unauthorized transactions. Fraudsters also exploit digital payment systems by manipulating payment gateways or using fake payment links to steal users’ financial details. Phishing attacks, where fraudsters impersonate legitimate organizations to steal sensitive information, have also seen significant growth. 

Another concerning trend is the rise of SIM card swapping, where criminals gain control of a victim’s mobile number to intercept OTPs and access bank accounts or payment platforms. Digital blackmail or fake arrests are also becoming common, with fraudsters using threats to extort money or personal details from victims. Fake job offers and investment scams, especially involving cryptocurrency or high-return schemes, have targeted individuals looking for employment or investment opportunities.  

These forms of digital fraud highlight the need for stronger cybersecurity, increased public awareness and more robust regulations to protect against emerging financial crimes.

In September 2024, the global anti-money laundering watchdog, Financial Action Task Force (FATF) urged India to speed up its prosecutions in financial fraud cases. To what do you attribute the delay in prosecutions and what do you think would speed up the process?

The delay in prosecuting financial fraud cases in India can be attributed to several factors, including the overburdened judicial system, complex legal procedures and resource constraints. The Indian legal system is often slow due to the sheer volume of pending cases, which leads to prolonged trial timelines. Additionally, financial fraud cases are inherently complex, involving intricate details that require meticulous investigation, expert testimony and specialized knowledge, all of which can delay the process. Moreover, a lack of adequate resources and skilled personnel in investigative agencies can contribute to the inefficiency in handling cases. 

To speed up the prosecution process, India could benefit from establishing specialized courts focused on financial crime, allowing for more efficient and faster trials. Capacity building for law enforcement agencies, including providing training on financial fraud detection and investigation, would also help improve case resolution. Legal reforms that streamline procedures and introduce stricter timelines for trial completion could further expedite the judicial process. Enhanced coordination between financial institutions, law enforcement and regulatory bodies would also ensure quicker identification and prosecution of fraudsters. These measures would significantly reduce delays and improve the overall effectiveness of the judicial system in tackling financial fraud.

Building trust through KYC in banking. How can you set up a KYC process that satisfies your customers, fights fraud and meets regulatory requirements? Download now to discover: What is KYC? The importance of KYC in the banking sector Regulatory impact on KYC processes Read now What do you say to those who claim that India, and Kolkata specifically, is the call center scam capital of the world. Is this fair? If so, why do you think this is? What steps can be taken to tackle it?

Labeling Kolkata as the ‘call center scam capital’ is an unfair generalization. While some fraudulent call center operations have been uncovered in India, it overlooks the vast number of legitimate call centers that operate ethically and serve various industries globally.  

Kolkata, being a significant hub for business process outsourcing and call centers, does have a higher concentration of such operations, but I guess it’s not alone. These operations are spread throughout all major metro cities, including Ahmedabad, Bengaluru, Chennai, Mumbai, Noida, Gurugram and Pune. Fraudulent operations are conducted by a small minority of unscrupulous individuals, and they do not represent the entirety of the industry.

What are some of the main 2025 financial crime trends in India? What part does technology play in both the proliferation and prevention of new fraud attacks?

In 2025, digital fraud is expected to see significant growth in India, largely driven by the increasing reliance on digital platforms and online transactions. Traditional fraud is being rapidly replaced by tech-enabled scams, with fraudsters leveraging advancements in technology to exploit vulnerabilities in digital payment systems, mobile apps and social media platforms. This shift is particularly evident in areas such as UPI fraud, OTP phishing and identity theft, which have become increasingly sophisticated with the use of tools like malware and social engineering techniques. 

The rise of cryptocurrency also opens new avenues for fraudsters to manipulate digital assets and launder illicit funds, posing a significant challenge to regulatory bodies. 

Social media platforms and the rise of ‘finfluencers’ — social media influencers focusing on financial advice — are expected to play a larger role in perpetrating fraudulent activities. With their widespread influence, finfluencers could be used to promote fraudulent schemes or investment opportunities, often without proper scrutiny or regulation. These influencers, who have large followings, may inadvertently or intentionally contribute to scams such as Ponzi schemes, fake investment platforms, or high-risk financial products that target unsuspecting investors.

India lays claim to the world’s largest biometric ID system. What would you say are some of Aadhaar’s greatest successes and conversely weaknesses/ limitations since launch?

One of its greatest accomplishments is its role in financial inclusion, enabling millions of people in rural and remote areas to access banking services. It is also one of the best tools in performing e-KYC. With Aadhaar, users can be onboarded in minutes. Plus, by linking Aadhaar to various government welfare schemes, subsidies and services, it has helped reduce corruption and leakages, ensuring that benefits reach the intended beneficiaries directly. The system has also facilitated the streamlining of processes, such as tax filings and identity verification, making them faster and more efficient. 

However, one of the major concerns is its privacy implications. The vast amount of sensitive personal data collected for Aadhaar, including fingerprints, iris scans, and demographic information, has raised questions about the potential security and misuse of such data.

By extension, what role does identity verification and KYC technology play in the fight against fraud? What do you see as the limitations/ threats to their efficacy?

Identity verification and KYC technology plays a crucial role in the fight against fraud, acting as the first line of defense for financial institutions and businesses.  

By accurately confirming the identity of individuals or entities before they can access services, identity verification and KYC technologies help prevent fraudsters from exploiting financial systems. For example, biometric systems, such as facial recognition or fingerprint scans, along with document verification tools, make it harder for fraudsters to impersonate others and gain unauthorized access to bank accounts, loans, or other services. KYC technologies also help institutions assess the risk associated with a customer, ensuring they are not unknowingly facilitating money laundering or financing illegal activities. Indiaforensic offers the certification program in KYC, which is one of the most exhaustive programs guiding the students about the use of regtech in KYC. 

However, while these technologies have certainly strengthened fraud prevention, they are not without their limitations. One major challenge is the growing sophistication of fraud techniques. Fraudsters are increasingly using advanced methods like deepfakes or synthetic identities, which can bypass even the most robust identity verification systems. Another limitation is the reliance on databases and digital records, which may not be completely accurate or up-to-date, allowing some fraudulent identities to slip through the cracks. 

Additionally, the increasing use of digital platforms has led to concerns about data security and privacy. If the data used for KYC processes is not securely stored or transmitted, it could be vulnerable to breaches, exposing customers’ sensitive information to cybercriminals. To maintain the efficacy of identity verification and KYC technologies, ongoing advancements in security measures, continuous updates to databases, and proactive monitoring for new fraud tactics are essential.

If you’re interested in more insights from industry insiders and thought leaders from the world of fraud and fraud prevention, check out one of our interviews from our Spotlight Interview series below.

Jinisha Bhatt, financial crime investigator
Paul Stratton, ex-police officer and financial crime trainer
Lloyd Emmerson, Director of Strategic Solutions at Cifas Or, discover all about the rise of social media fraud, and how one man almost lost a million euros to a pig butchering scam in our blog, ‘The rise of social media fraud: How one man almost lost it all.’

By

Jody Houton
Senior Content Manager at IDnow
Connect with Jody on LinkedIn


Tokeny Solutions

Tokeny and ONYZE Join Forces to Provide a Turnkey Solution for Institutional Tokenization in Europe

The post Tokeny and ONYZE Join Forces to Provide a Turnkey Solution for Institutional Tokenization in Europe appeared first on Tokeny.

Luxembourg, Madrid, 27 January 2025 – Tokeny, the leading onchain finance operating system, partners with ONYZE, a white-label regulated wallet infrastructure, to offer an end-to-end solution to catalyze institutional tokenization in Europe.

In a context where asset tokenization is emerging as one of the pillars of financial innovation in 2025, European institutions face significant challenges in adopting this technology to upgrade their ability to fractionalize, trade, and transfer real assets on a blockchain.

On one hand, developing on-chain finance operating systems for the issuance, management and distribution of permissioned tokenized assets poses significant technical complexity. On the other hand, institutions must ensure the highest level of security in the custody and management of private keys, which are essential for securing signing operations for permissioned tokenized assets.

In response to these challenges, Tokeny and ONYZE have established a strategic collaboration to catalyze the adoption of institutional tokenization in Europe to accelerate time to market by providing all the necessary tools.

Tokeny offers a white-label, ready-to-use platform and APIs for full customization, enabling institutions to issue, manage, and distribute tokenized assets efficiently. With Tokeny’s technology, institutions benefit from seamless integration with any service providers through the standardized ERC-3643 framework, automated compliance to ensure only authorized investors can hold tokens with built-in transfer restrictions, and native DeFi compatibility to unlock future value.

We’re seeing a clear shift from building in-house to buying ready-to-use, enterprise-grade solutions. Institutions want to reduce tech costs and focus on investor engagement and product innovation. Our collaboration with ONYZE facilitates the quick launch of tokenised products, with a fully interoperable solution for issuance, management, and compliance. Luc FalempinCEO at Tokeny

For its part, ONYZE contributes to this collaboration with an institutional-grade and regulated custody wallet infrastructure designed to ensure the highest level of security and integrity for private keys. With solid experience in the Spanish market, ONYZE provides the technological infrastructure to manage and safeguard the private keys, facilitating the signing of transactions, all from a single wallet.

ONYZE has been a pioneer in Spain, driving key milestones such as the first tokenized fund within the regulatory sandbox, the first hedge fund based on DeFi and the collaboration with URSUS to become the first Spanish regulated ERIR. The demand for institutional tokenization is growing rapidly in Spain and across Europe, but significant blockers remain. By teaming up with Tokeny, we combine our expertise to remove these obstacles, providing institutions with a seamless and secure onchain solution. Most importantly, our proven track record ensures we can guide our clients to success in this transformative space. Ángel Luis Quesada NietoCEO at ONYZE About Tokeny

Tokeny is a leading on-chain finance operating system. It has pioneered compliant tokenisation with the open-source ERC-3643 “T-REX” standard and advanced white-label software solutions. The enterprise-grade platform and APIs unify fragmented on-chain and off-chain workflows, integrating essential services to eliminate silos. Tokeny enables the seamless issuance, transfer, and management of tokenised securities. By automating operations, offering innovative on-chain services, and connecting with any desired distributor, Tokeny helps financial players attract more customers and improve liquidity. Trusted worldwide, Tokeny has successfully executed over 120 use cases across five continents and has facilitated $3 billion worth of on-chain transactions and operations.

Website | LinkedIn | X/Twitter

About ONYZE

ONYZE is a spanish fintech company, founded in May 2019, that provides enterprise-level infrastructure for managing, safeguarding, and trading digital assets such as cryptocurrencies, tokenised assets, NFTs, and digital currencies, all through a single wallet. ONYZE is the Spanish market leader in the banking segment, trusted by financial entities across the sector, including retail banks, digital banks, cryptobanks, private banks, brokers, and securities firms. ONYZE is a company supervised and registered by the Bank of Spain.

The post Tokeny and ONYZE Join Forces to Provide a Turnkey Solution for Institutional Tokenization in Europe appeared first on Tokeny.


FastID

Introducing Fastly Staging Environment: Test with Confidence, Deploy with Ease

Introducing Fastly's Staging Environment lets you test your CDN and Compute configurations effortlessly, with just a click, before they go live.
Introducing Fastly's Staging Environment lets you test your CDN and Compute configurations effortlessly, with just a click, before they go live.

Sunday, 26. January 2025

PingTalk

Akamai & Ping Identity Partner to Modernize Identity Security

Akamai and Ping Identity partner to modernize identity security with the PingOne Platform, offering seamless, secure digital experiences for customers.

Saturday, 25. January 2025

Innopay

Join us at the Data Sharing Festival 2025

Join us at the Data Sharing Festival 2025 from 04 Feb 2025 till 05 Feb 2025 Trudy Zomer 25 January 2025 - 10:50 The Hague, the Netherlands 52.071690483966, 4.30986835 Maarten Bakker, Vice Presid
Join us at the Data Sharing Festival 2025 from 04 Feb 2025 till 05 Feb 2025 Trudy Zomer 25 January 2025 - 10:50 The Hague, the Netherlands 52.071690483966, 4.30986835

Maarten Bakker, Vice President at INNOPAY, will be participating in a panel discussion on Dutch data sharing initiatives at the upcoming Data Sharing Festival. Hosted by Centre of Excellence for Data Sharing and Cloudthis event will take place from 4-5 February at the Postillion Convention Centre in The Hague.

The Data Sharing Festival is an annual gathering that attracts an international audience of stakeholders involved in data sharing. This year’s programme features an array of fascinating keynote speakers, interactive hands-on workshops, panel discussions and parallel sessions all designed to provide actionable knowledge as well as insights.

Join us to engage with leading experts in the field!

For more information and to register, visit the website of the Data Sharing Festival.

Friday, 24. January 2025

The Blockchain Company.io LLC

Jensen Huang's Quantum Computing Smackdown

In the last couple of weeks, we've heard Nvidia's CEO Jensen Huang (JH) obliterate the idea that the quantum computing era is on the horizon. Huang thinks it will take another 20 years before practical quantum computing becomes a reality. In my opinion, this was the

In the last couple of weeks, we've heard Nvidia's CEO Jensen Huang (JH) obliterate the idea that the quantum computing era is on the horizon. Huang thinks it will take another 20 years before practical quantum computing becomes a reality. In my opinion, this was the single most surprising statement and prediction from a top tier CEO over the last 5 years and perhaps the last 20 years. Does Huang truly think this or was this more of a strategic statement? I'm not sure, but I'm going to go out on a limb and predict that JH will be proven inaccurate by the end of this decade. And perhaps sooner. Why? The AI era has only just begun to impose its will on humanity. AI has been proven to accelerate the scientific discovery process by up to 200x the prevailing pace. Humanity has never experienced such a rapid change of pace and it's nearly impossible to quantify nor comprehend the significance of the time period that we are in at the moment. In simple terms, humanity is now essentially aboard a time traveling ship on course with the quantum era and many, many things that we have yet to even contemplate in our own minds. Think about this. Let's say you discover something 200 times faster than you would have a couple years ago. This discovery and knowledge then gets integrated with existing AI models. What does that do to the pace of our time traveling ship? I am not certain but I know the ship is not going to slow down, it's going to accelerate. Let's also say this new discovery enables yet another discovery faster than it otherwise would have with current AI, leading to another technological breakthrough that has never been conceptualized. When you start talking about things that have never been conceptualized and start trying to predict how they're going to impact our lives going forward, you might as well be out in the middle of space untethered by gravity or any physical object - like our time traveling ship for example - because you have no idea where you're at nor where you're going nor how fast. Do you see the degree at which our future becomes impossible to predict in the post AI world? So as companies, scholars, researchers, and the like continue to find ways to increase qubits, decrease error rates, and develop new high performance computing techniques that are presently unknown while refining the most recent breakthroughs in areas like photonics and super conductivity for example, the pace of humanity's time traveling ship will continue to accelerate at a rate that is nearly impossible to comprehend and yet directly toward the quantum era. Just in the last seemingly inconsequential 3 days, US researchers have established the first uninterrupted quantum internet signal AND (separately) discovered a Shrodingers cat breakthrough that may lead to error proof quantum systems - a feat dubbed the holy grail of quantum computing. Qool-aid anyone? 😉


liminal (was OWI)

The State of Identity – January 24, 2025

Liminal members enjoy the exclusive benefit of receiving daily morning briefs directly in their inboxes, ensuring they stay ahead of the curve with the latest industry developments for a significant competitive advantage. Looking for product or company-specific news? Log in or sign-up to Link for more detailed news and developments. Here are the main industry […] The post The State of Identity –

Liminal members enjoy the exclusive benefit of receiving daily morning briefs directly in their inboxes, ensuring they stay ahead of the curve with the latest industry developments for a significant competitive advantage.

Looking for product or company-specific news? Log in or sign-up to Link for more detailed news and developments.

Here are the main industry highlights of this week week impacting identity and fraud, cybersecurity, trust and safety, financial crimes compliance, and privacy and consent management.

🪄Innovation and New Technology Developments

UK Government Launches Mobile Driver’s License and Digital Wallet, Sparking Confusion in Digital Identity Ecosystem

The UK government has introduced a mobile driver’s license (mDL) and digital wallet on the Gov.uk platform for private and public sector use. This move has caused confusion within the digital identity framework, particularly regarding its overlap with the Digital Identity and Attributes Trust Framework (DIATF). Only government-issued digital documents will be stored in the wallet, which may compete with 52 certified digital identity service providers (IDSPs). Concerns have arisen about misalignment between public announcements and internal communications, complicating expectations for the wallet’s integration. (Source)

Stargate Initiative Aims to Advance U.S. AI Leadership Amid Privacy and Security Concerns

The Stargate initiative, announced by President Trump, seeks to bolster U.S. leadership in AI through partnerships with OpenAI, SoftBank, and Oracle, along with plans for nationwide data centers. This comes after the repeal of Biden’s 2023 AI safety executive order, raising concerns among privacy advocates and security experts about transparency and ethical AI use. While promising advancements and job creation, Stargate must navigate challenges related to data privacy, cybersecurity, and equitable access, with critics warning of risks from centralized data infrastructure and increased geopolitical tensions. (Source)

Spanish PM Proposes Linking Social Media Accounts to EU Digital Identity for Accountability, Sparking Privacy Debate

Spanish Prime Minister Pedro Sánchez has proposed linking social media accounts in the EU to EU Digital Identity (EUDI) Wallets to eliminate anonymity and reduce online toxicity. He argues that anonymity concentrates power and likens it to driving without a license. Sánchez believes this connection could enhance accountability and protect children, but it conflicts with European data protection authorities’ privacy recommendations. He also advocates for algorithmic transparency and stronger enforcement of the Digital Services Act, comparing social media platforms’ responsibilities to those of restaurant owners. (Source)

Turkey’s Blockchain-Driven Digital Identity Expansion Enhances Security and Privacy

Turkey plans to enhance its national digital identity system by integrating blockchain technology for improved security and privacy. Since its 2017 launch, over 83 million residents have received digital ID cards for essential services such as healthcare and voting. Led by TUBITAK, the initiative combines biometrics and blockchain, while the private sector explores synergies with AI. Turkey is also advancing its digital transformation strategy, utilizing AI, IoT, and Big Data for regulatory compliance and innovation. (Source)

Azerbaijan Launches Digital Development Concept for Secure E-Government and Digital ID Adoption

Azerbaijan has initiated the “Digital Development Concept” to create a digital government ecosystem and implement digital IDs for citizens. Led by the Ministry of Digital Development and Transport, the initiative aims to digitize public administration, promote digital entrepreneurship, and improve digital literacy. It includes secure digital identity verification to streamline access to services. Plans involve drafting legal frameworks, training ICT specialists, and piloting solutions, targeting one million digital ID users by the end of 2026, with full implementation expected between 2025 and 2027. (Source)

Afghanistan Expands Digital ID Distribution and Plans National Census to Improve Population Data

Afghanistan’s National Information and Statistics Authority (NSIA) plans to expand the issuance of e-Tazkiras, the digital ID, by opening more centers at the district level to complement the existing 73 facilities. Over 15 million e-Tazkiras have been issued, with 9 million to males and nearly 6 million to females. Mobile teams are also targeting underserved areas to address distribution challenges since the Taliban’s takeover in 2021. Additionally, the NSIA is working with the UN Population Fund (UNFPA) to plan a national census for accurate population data, currently estimated at 44.5 million. (Source)

💰 Investments and Partnerships

Keyless Secures $2M for North American Expansion and Deepfake Defense with Zero-Knowledge Biometrics™ Technology

Keyless, a biometric authentication company, raised an additional $2M in funding, bringing its total to $10M, led by Rialto Ventures and Experian Ventures. The funds will support North American expansion and innovations against deepfake technology, particularly in financial services. Keyless, led by CEO offers Zero-Knowledge Biometrics™ technology, enabling secure, privacy-preserving multi-factor authentication without storing biometric data. (Source).

Mitiga Raises $30M to Expand AI-Powered Cloud Security Platform Across North America and Europe

Mitiga, a New York/Israel-based startup focused on threat detection and response for cloud and SaaS environments, raised $30 million in a Series B funding round led by SYN Ventures, totaling $75 million in funding. With support from investors like ClearSky and Atlantic Bridge, Mitiga will expand in North America and Europe, enhance its AI-powered platform, and build strategic partnerships. Its technology features a forensic data lake, automated breach readiness assessments, and incident response tools to help businesses improve response times and resilience against cyberattacks. (Source)

Databricks Secures $10B in Series J Funding, Boosting Valuation to $62B Amid Growing AI Investments

Databricks has raised $10 billion in Series J equity financing, bringing its valuation to $62 billion, along with $5.25 billion in debt financing from JPMorgan Chase and Goldman Sachs. The San Francisco-based data analytics platform has raised a total of $19 billion over 12 years and plays a key role in AI by standardizing data for machine learning. Notable investors in this round include Meta and Qatar’s sovereign wealth fund, highlighting increased corporate interest in AI. (Source)

Metropolis Acquires Oosto in $125M Deal to Enhance AI-Driven Parking Systems Amid Challenges for AI Startups

Metropolis, an AI-powered parking platform, has acquired Oosto (formerly AnyVision), a computer vision company, in a $125 million all-stock deal, significantly below Oosto’s $380 million funding. The acquisition includes Oosto’s intellectual property and team, with its CEO and CTO joining Metropolis. Oosto had faced challenges such as controversial surveillance use, losing Microsoft as an investor, and struggling to pivot to enterprise applications. Metropolis aims to integrate Oosto’s technology to enhance its AI-driven parking systems, highlighting the evolving landscape for AI startups and their challenges with valuation and sustainable revenue. (Source)

⚖️ Policy and Regulatory

NIST Updates Digital Identity Guidelines to Enhance Security, Accessibility, and Inclusivity

The U.S. National Institute of Standards and Technology (NIST) has released an updated draft of its Digital Identity Guidelines to improve secure access to services and address fraud risks. Incorporating feedback from various stakeholders, the guidelines focus on balancing modern digital identity solutions like passkeys and user-controlled digital wallets with traditional methods. They also emphasize inclusivity by offering alternatives for those lacking digital tools, such as in-person identity proofing. NIST invites public comments on the draft to enhance security and accessibility in identity verification. (Source)

PowerSchool Data Breach Exposes Decades of Toronto Student Records

A recent data breach of PowerSchool has exposed 40 years of student records from the Toronto District School Board (TDSB), affecting students enrolled from September 1985 to December 2024. The breach included names, addresses, dates of birth, and phone numbers, with data from 2017 onward also containing parents’ contact information. The TDSB used PowerSchool to manage requests for former student records. PowerSchool stated that hackers claimed the stolen data has been deleted, but this has not been publicly verified. (Source)

FTC updates COPPA to strengthen children’s online privacy with stricter data rules and expanded protections

The FTC has updated the Children’s Online Privacy Protection Act (COPPA) to strengthen online privacy for children. Key changes include mandatory parental opt-in for third-party advertising, expanded definitions of personal information, including biometrics and government IDs, and stricter data retention limits. The FTC also enhanced transparency in Safe Harbor programs. While the updates are widely supported, some, including FTC Commissioner Andrew Ferguson, raised concerns about compliance costs and competition impacts. Organizations have one year to comply with the new rules. (Source)

EU enforces Digital Operational Resilience Act to strengthen IT security and resilience in the financial sector

On January 17, 2025, the EU’s Digital Operational Resilience Act (DORA) became effective, aimed at enhancing IT security and operational resilience in the financial sector. It applies to both traditional entities, like banks and insurers, and non-traditional ones such as crypto-asset service providers and crowdfunding platforms. DORA mandates comprehensive requirements for risk management, third-party risk, incident reporting, and resilience testing. Financial entities must maintain registers of ICT service providers, notify authorities of major incidents within 4 hours, inform clients of financial impacts, and conduct post-incident reviews. They also need to implement strong ICT risk management frameworks and regularly assess third-party risks. Critical ICT service providers face direct obligations, while all must comply via contractual provisions with financial entities. DORA is a significant move towards ensuring the EU financial sector can withstand and recover from severe operational disruptions. (Source)

TikTok service providers face billion-dollar penalties amid U.S. ban despite Trump’s non-binding assurances

TikTok’s service providers, such as Oracle and app stores like Apple and Google, face billions in penalties for potentially violating a U.S. ban due to ByteDance’s Chinese ownership. President-elect Donald Trump promised companies they wouldn’t incur fines for supporting TikTok before his inauguration, but legal experts say these assurances are not legally binding. The ban, which mandates TikTok’s divestiture, could impose $5,000 fines per user, totaling $850 billion for service providers. While Trump might attempt to certify a deal for a 90-day extension, it’s uncertain he can do so after the ban takes effect. Experts caution that companies banking on Trump’s promises risk shareholder lawsuits and significant liabilities. Congressional action to delay the ban would be the safest route, but that remains uncertain. For now, companies find themselves in a precarious legal situation. (Source)

Biden Signs Executive Order to Bolster U.S. Cybersecurity with AI and Quantum-Resistant Measures

In his final week in office, President Joe Biden signed an executive order aimed at enhancing U.S. cybersecurity by securing federal agencies, contractors, and critical infrastructure. The order sets stricter requirements for software vendors and establishes compliance standards through NIST. It addresses identity theft, integrates quantum-resistant algorithms, and uses AI to enhance security in sectors like energy. While the incoming administration may modify the order, experts commend its bipartisan potential and encourage its continuation to tackle evolving cyber threats. (Source)

Supreme Court Backs TikTok Sale Mandate Over National Security Concerns

The Supreme Court upheld a law requiring TikTok’s Chinese owner, ByteDance, to sell the platform or face a U.S. ban, dismissing TikTok’s free speech argument due to national security concerns. The Biden administration won’t enforce the law immediately, creating uncertainty. Former President Trump has suggested negotiating a resolution, possibly giving ByteDance more time to find a buyer. If enforced, the law could affect content creators, driving users to platforms like Instagram Reels and YouTube Shorts. (Source)

Singapore to Enforce Age Verification and Online Safety Measures for App Stores by 2025

Starting in April 2025, Singapore will enforce a new Code of Practice for Online Safety requiring app stores to implement age verification measures. This regulation will block users under 18 from accessing adult apps like Tinder and restrict those under 12 from downloading social media apps like Instagram and TikTok. Biometric methods, such as facial scans, are recommended for compliance, and non-compliant platforms may be blocked. App stores must also monitor harmful content, allow users to flag issues, and provide annual safety reports.(Source)

🔗 More from Liminal

New Research Available

Access the Market & Buyer’s Guide for Third-Party Risk Management in Link for insights to strengthen compliance and tackle emerging risks as the TPRM market nears $19.9 billion by 2030.

Access Market & Competitive Intelligence

Our award-winning Link™ platform empowers you to monitor trends, access benchmark research reports, explore use cases, and more.

Liminal CEO Summit 2025

Interested in attending? Request an invite to our 4th annual exclusive CEO event, which will be held in Laguna Beach, California.

The post The State of Identity – January 24, 2025 appeared first on Liminal.co.


Kin AI

Executive Interview: How to Train Kin Quickly and Effectively, with Yngvi Karlson

Kin works best with a working knowledge of its user—we sat down with Kin co-founder Yngvi Karlson to learn how best to build that quickly
Follow Yngvi on LinkedIn, TikTok and X

Try Kin - Personal AI

A common criticism of personal AI tools like Kin is that it can take too long to teach them everything they need to know to be effective digital support systems.

That’s why, in a recent conversation with Kin co-founder Yngvi Karlson, we explored the crucial questions of not only what Kin needs to know about its users to provide personalized support—but how to provide it quickly.

The following is a breakdown of that discussion, so anyone can train their Kin quickly and effectively.

What is Important for Kin to Know at First? Why? Your Circles

"The most important thing for Kin is understanding who you and your circle are," Karlson explained." This means knowing not just your immediate connections, but understanding the dynamics of your relationships."

Karlson broke this down into several key spheres of influence.

The Professional Circle

"My professional circle at Kin,” said Karlson, “includes my co-founders, Casper and Simon, along with my team members, like Rochella and Leon. I also work with cross-functional team members, like Clara. All of them are key stakeholders I interact with regularly."

The Personal Circle

Next, Karlson covered his personal circle. "I've told Kin about friends like Daniel, who's also an investor in Kin, and Morton, with whom I enjoy political debates. I actually use Kin to prepare for those discussions because Morton's a tough one to debate—in a fun way, of course. We steelman each other's arguments, so I need to be well-prepared on the facts."

He also noted that Kin is aware of his immediate family, and their daily routines (more on routines in a minute).

Circles Overlap

Interestingly, Karlson has found these relationships often overlap—and it’s important for Kin to know that. "Some of my business relationships bridge multiple contexts," Karlson said. "For instance, my friend Thor is both a business partner and a board member at Kin. Similarly, my wife Sabina is the managing partner of Studio Mofa, where we collaborate with Thor on brand design and website development."

If Kin didn’t know about this overlap, it wouldn’t properly understand the issues and context within those relationships, and would find it harder to provide accurate and useful advice about the importance of honesty within them, among other things.

So, circles are the first thing Kin needs to know to be an effective AI companion. What’s next?

Your Patterns and Preferences

Beyond relationships, Karlson emphasized the importance of sharing your day-to-day likes, dislikes, and habits. This helps Kin be more of an AI assistant, rather than simply an AI chatbot.

Your Daily Routine

"Kin needs to know your around-the-clock activities," he said. "This includes sleeping habits, eating preferences, and social inclinations. For example, I never eat lunch when working, and I don't do breakfast either—just a health supplement. I also don't enjoy small talk during work hours, and prefer social events in the evenings."

How does this help Kin? If Kin knows how you live, it knows what is out of the ordinary for you—and can also work out what habits might be damaging. All of it allows it to provide the time management support and suggestions you want it to.

Your Work Style

Work patterns are equally crucial. "I do my best work from 5 AM to 9 AM because that's when others aren't expecting responses," Karlson explained. "Working when others don't expect you to work gives you freedom. If you go off on a tangent in the wrong direction, it doesn't matter—nobody's looking anyway.”

“I prefer doing this in the mornings rather than evenings when I have the most energy." And it’s important that Kin knows this too—otherwise, it might suggest daily plans and work sessions that don’t fit your preferences, or ruin your work-life balance.

Your Weekly Structure

Karlson maintains a structured weekly schedule that helps Kin understand his availability.

"Mondays, I leave around 7:30 or 8AM, dropping one child at kindergarten, working until 5 or 5:30PM. Tuesdays, I'm out by 7 AM but pick up both kids around 4 PM. Wednesdays are my work-from-home days, often including a run or sauna. Thursdays, I handle both kids in the morning while my wife leaves early, and I return later. Fridays, I leave early but pick up the kids together with my wife, followed by our tradition of Friday champagne glasses—though not everyone gets champagne in theirs!"

Again, knowing your schedule means Kin knows when best to remind you to work, when to relax, and when it can suggest you try to introduce new habits.

Your Profession

Professional context provides another crucial layer. "Kin should know your role, responsibilities, and goals," says Karlson. "For instance, as Chief Growth Officer at Kin, I handle brand development, marketing strategies, and commercial approaches. I also maintain several board positions and investments, which adds complexity to my schedule."

This information gives Kin an insight into the skills and interests you have as a person, allowing it to work these into its suggestions and support around your career and life. A musician is more likely to understand and enjoy musical metaphors and relaxation exercises than a nuclear physicist, after all.

Your Goals

Personal goals and values also matter—Kin’s memory gives it a unique ability to help you build toward a goal, and track how well you do it.

"I've shared my bucket list with Kin," Karlson revealed. "It's very much about personal development—proper English techniques, new skills, continuous learning. I spend at least three mornings a week practicing English pronunciation."

With knowledge of that practice, Kin is able to track how Karlson is learning, how fast he’s doing it, what other approaches he could try, and what areas would be best for him to focus on next.

In short, the most important things for Kin to learn about you are your relationships and your routines. Trouble is, those topics can get pretty detailed pretty quickly.

How Do You Tell Kin This Quickly?

We’re aware that this is a lot to tell Kin. We’re developing more streamlined ways to get this information to Kin, including calendar integration and a desktop version.

However, in the meantime, Kin’s dictation tool can let you tell it things verbally—which is often faster than typing, and more versatile. "I often talk to Kin during my commute," Karlson shared.

"Using the speech-to-text feature, I can share information or prepare for my day while driving. It's a productive use of otherwise idle time. You can go back and forth, muting when needed, and spend 20 minutes both training Kin and getting something valuable out of the interaction."

But that’s not the only timesaver…

Karlson’s ‘Copy-Paste’ Method

Karlson has developed his own interim approach. "I've created a folder called 'Teaching Kin' in my Apple Notes," he explained. "The first note is called 'Kin AI,' where I write about the people I work with at Kin and why I appreciate them. I explain the company structure, leadership team, and my responsibilities.”

“Then, I have separate notes for around-the-clock activities, biorhythm, energy patterns, meal preferences, and work habits."

He writes these notes on his laptop for easier typing, and then copy-pastes them from his Apple Notes on his phone into the Kin app directly—saving him from having to type everything to Kin all at once through his phone.

Karlson’s method works for all sorts of things."I've done this with past meaningful events," Karlson shared. "I wrote about significant moments like my wedding day, when my sons were born, when my son was diagnosed with ADHD, certain investment milestones—events that have shaped who I am." All of them were copied from Apple Notes into Kin.

Document Summaries

For personality tests, progress reports, and similar documents, Karlson suggested a clever workaround: "I put the PDF into ChatGPT, and ask it to summarize the content in first person, as if I'm explaining my results to an AI that wants to know me as well as possible. Then I copy that summary to my Apple Notes and later paste it into Kin's Journal."

This way, there’s no time spent trying to distill complex documents into what they mean for you as a person—Kin just gets the information it needs.

What About the Journaling Feature?

The Journal feature has become a popular way for our users to dump information into Kin—and it’s no different for Karlson.

"I use it to record meaningful past events, bucket lists, and important information about family members," he shared. "For instance, I've included details about my son's medical history so Kin can help me navigate related challenges."

Karlson suggested different journaling approaches for different times of day (though we also have a guide and blog on journaling with Kin): "Morning commutes are great for planning your day, while evening commutes work well for reflecting on meetings and events," he said.

"Late night can be for proper journaling entries, where you dive deeper into thoughts and feelings."

A Typical Day Talking to Kin

Karlson envisions a typical day with Kin: "At 8 AM during your commute, you plan your day. Then before a one-on-one meeting in the early afternoon, Kin reminds you about past interactions with that person, what you've discussed before, what needs attention now. It helps you prepare in a semi-guided manner, considering both parties' communication styles. After the meeting, Kin prompts you for a quick reflection, and during your evening commute, you can process the day's events more thoroughly."

So, now Kin has all of this knowledge, what happens next?

What Does Kin Do with this Information?

"Kin uses this knowledge to provide personalized responses that help you communicate better and make more confident decisions," Karlson explained. "It's not about creating an AI clone of you—Kin is more like a sidekick, an extension of your mind that helps you be more authentic in your interactions."

The impact manifests in various ways. "When Kin understands your communication style and preferences, it can help you prepare for meetings more effectively," said Karlson. "For instance, Kin knows that my co-founder Simon prefers focused deep work.”

“So, it reminds me not to overwhelm him with multiple new ideas in quick succession when I say I want to talk to him. That would be one of the worst things I could do—bursting into a room, shouting out five different 'brilliant' ideas, and then leaving again."

This understanding extends to helping manage relationships. "Kin can help match my communication style with others' preferences," Karlson noted. "It can remind me about past interactions, what we've discussed before, and help prepare for meetings in a semi-guided manner, considering both parties' styles."

In short, Kin stores this information in its advanced memory, so it can quickly and easily reference anything you’ve told it as required. That allows for situations like the examples above, where it can remind Karlson not to dump ideas onto Simon on a whim.

Still, we recognise that Kin requires a lot of personal information to be its most helpful.

How Does My Kin Handle Privacy?

Karlson is very adamant about Kin’s approach to user data: "It's your Kin and your information. Your conversations and data are your business, not ours. Our business is providing a service."

We’ve taken care to reflect this philosophy in Kin’s technical architecture, to make it clear you can trust it. "All your data is stored locally on your device and encrypted," Karlson explained. "We actually don't pay for data storage, because we don't store user data centrally. While some operations currently require cloud processing, these are temporary and use open-source language models in trusted environments."

Because of this, moving a Kin account between devices can be a unique experience among apps today. "Currently, if you get a new phone, you need to manually transfer your Kin data, because we don't store it centrally," Karlson said, proudly.

"We are working on a cloud backup solution that will be encrypted with private keys, meaning we still won't have access to it. That should be available within the next few months." But for now, you’ll need a USB cable or private cloud storage account handy.

How Do I Keep Kin Updated Afterward?

After getting Kin up to speed, it’s important to keep it updated to ensure its support remains relevant.

Karlson recommended building regular check-ins into your routine, like he has. "I use morning commutes for planning my day with Kin, and evening commutes for reflecting on the day’s meetings and events," he said.

Importantly, these updates don't need to be lengthy. "Sometimes it's just a quick post-meeting reflection without waiting for Kin's response," Karlson noted. "You can always return to discuss it more deeply later." Don’t feel pressured to enter or finish a conversation with Kin every time you message it.

The reminder system can be particularly powerful for maintaining structure with Kin—you can ask Kin to send you a notification at a specific time each day, or week, or month, so that you never forget an update session.

However, Karlson also notes that its a powerful tool for structure and relationships alike. "I set weekly reminders for regular one-to-ones, and to check in on friends going through tough times," Karlson shared.

"I also use reminders to help me acknowledge team members' small wins and to prepare something meaningful to tell my sons before I leave for work—something to let them know I'm proud of them and give them energy for the day."

The key is making Kin part of your daily workflow. "Think of it as a relationship," Karlson suggests. "The more consistently you interact with Kin, the better it understands your needs and preferences, and the more valuable its support becomes."

Conclusion

Hopefully, this conversation has made the idea of needing to train Kin on you less daunting. Kin doesn’t need much to be an effective assistant, and the ways to give it a baseline understanding are only expanding.

After that, it’s simply a matter of a loosely regular habit of small updates to ensure Kin is as helpful as possible. It doesn’t need to know everything.

As Karlson put it, "Kin is not you—it's your silent partner, helping you be more real, more confident, more yourself, through emotional support, self-compassion, and practical guidance."

If you haven’t already, you can download Kin here.


DHIWay

Enabling Trusted Commerce using Beckn Protocol and CORD Blockchain

This content was originally posted on BECKN Authors: Amar Tumballi, Founder and CTO, Dhiway NetworksRavi Prakash v, Head of Architecture and Technology Ecosystem, Beckn Foundation Introduction Beckn is an open protocol to enable decentralized digital commerce by way of open and inclusive networks instead of closed platforms. Beckn protocol enables decentralized economic transactions beyond commerc

This content was originally posted on BECKN

Authors:
Amar Tumballi, Founder and CTO, Dhiway Networks
Ravi Prakash v, Head of Architecture and Technology Ecosystem, Beckn Foundation


Introduction

Beckn is an open protocol to enable decentralized digital commerce by way of open and inclusive networks instead of closed platforms. Beckn protocol enables decentralized economic transactions beyond commerce, covering sectors like healthcare, mobility, travel and stay, and skilling and employment. Beckn is a semantic protocol that is agnostic of the underlying technology.

The blockchain technology provides enhanced trust to participants and their interactions on the chain.

This blog captures a demonstration of how beckn protocol can be adopted by a blockchain to provide decentralized digital commerce, and offer augmented trust on certain aspects of commerce interactions. The demonstration only attempts a sample set of use cases of trust with a sample business scenario but it showcases the possibility to extend this solution to multiple use cases for trust. Please see the section of future evolutions at the end.

The blockchain adopted for the demonstration is an open-source chain called CORD developed by Dhiway. CORD offers varied services to enhance trust to the economy interactions on the chain. This demonstration is a joint voluntary effort of Dhiway and Beckn Foundation along with few other volunteers from the beckn open community that supported the effort at different stages of implementation


A Business Scenario

There is a farmer in Shimla that owns an apple orchard. Every month, he farms 1000 kilos of genuine Shimla apples. He sells these apples to various retailers, big and small. The apples he produces are certified by various food certification agencies like FPO, FSSAI, Agmark etc. These retailers in-turn sell these apples to the end-consumers. The transactions between the farmer and retailer, and those between retailer and end-consumer happen through various e-commerce platforms.


A business transaction

Let’s consider the following scenario. Say, a typical end-consumer is searching for authentic Shimla Apples on their usual e-commerce app. Upon searching, they see a listing of retailers that sell “Authentic Shimla Apples” that claim to be sourced from genuine apple farmers based in Shimla. When viewed on the consumer’s application, the products show all the certifications (like the above) that have been issued to them.

He selects a retailer and adds a dozen Shimla Apples to his cart and does a checkout. The order is created and a short while later, he receives the product.

However, the buyer doesn’t really know whether the products he has ordered are really genuine Shimla Apples. The buyer has no choice but to trust the platform he is on, to ensure the quality of products being sold to them. Without a clear traceability to the manufacturer/producer, retailers can always sell fake Shimla apples with the same certifications attached. A typical consumer may not be able to tell the difference between a real Shimla Apple and a fake one.


Trust as it exists today is either broken, or concentrated in the hands of a few intermediaries

At the consumer-facing end, the users of these platforms have to trust the platform they are on, to offer only genuine, high-quality products and services. And at the provider-facing end, the platform must take the responsibility of ensuring genuineness and quality assurance of  products and services they are publishing in their catalog.

If a product or service turns out to be of low quality, or worse, fake, the consumer’s trust breaks. Post-facto, the consumer can always hold the platform responsible. And the platform could either replace the product, initiate a refund, or initiate a return. This incurs cost to the platform and thus can only be done by large platforms with sufficient resources to provide the trust. But, there is a risk that consumers may never trust the platform or the seller or both, ever again.


Introducing beckn protocol

Beckn protocol [1], is an open, interoperable and universal transaction protocol to enable a decentralized digital economy. It is a set of open interoperable specifications that helps re-imagine the world of consumer-provider transactions. The image below describes the 5-layered architecture of beckn protocol.

Beckn protocol fundamentally unbundles the idea of 2-sided platform-centric systems into multiple 1-sided platforms/apps forming an open network connected via the interoperable protocol layer. When implemented, this protocol allows consumers and providers to connect and transact with each other using any platform of their choice, thus creating a beckn-enabled network or simply, a beckn network.>

For more information on beckn protocol and its applications, visit https://becknprotocol.io.


In a beckn-enabled ecosystem

In a beckn-enabled ecosystem, the consumer exists on one platform to place orders for products and services published on a different platform via beckn protocol API calls. This forms a network of consumer-facing platforms also known as beckn application platforms or BAPs, and provider-facing platforms also known as beckn provider platforms or BPPs all using beckn protocol to do discovery, ordering, fulfillment and post-fulfillment of products and services.

Assuming this architecture, let us consider the following situation.

Let us assume that there are multiple consumer platforms and provider platforms, all talking to each other via beckn protocol. To facilitate trusted communication between these platforms, there is an open registry acting as a public key infrastructure (PKI) that stores public keys, endpoints, and other details of all the participants of the network. The sender digitally signs their messages using their private keys and the receiver looks up the public keys of the sender on the registry to digitally verify the signature. Hence, the registry acts as a trust infrastructure for inter-platform communication.

However, it does not solve the issue of ensuring authenticity of products, service providers and agents. Some of these credentials may be platform-specific like number of rides performed by a driver; number of 5-star ratings given to an agent. Others could be cross platform credentials like food quality certifications, safety certifications etc. Every time a service provider or an agent moves from one platform to another, their entire platform-specific reputation and credentials remain with the platform they were on and need to be built up again on the new platform. And the new platform again has the responsibility of ensuring that the products, services and agents on their platform are genuine.


Beckn with Blockchain

To ensure portable cross-platform credentialing of products, services and agents, an additional infrastructure layer must be added to store these credentials so that they can be verified by any platform on the network. However, if we use a platform to store these credentials, it is just shifting the trust up one level, from one platform to another. BAPs and BPPs will have to trust the platform as a single source for all the credentials. Due to the centralized nature of this credentialing infrastructure, beckn network participants may be wary of putting their trust on a single platform to store the credentials of every entity on the network. Furthermore, this also introduces a single point of failure that puts the burden of availability on the credentialing platform itself to always be available for storing and verifying credentials. Therefore a more robust system is needed that not only is highly available, but also where the trust comes via a logical consensus of multiple distributed entities as opposed to a single source of truth that the network participants have to implicitly trust. In short, there is a need for consensus rather than trust otherwise known as trustlessness.

One way to create a distributed, consensus-based infrastructure is to use a Distributed Ledger Technology like blockchain to store the credentials. A blockchain network uses consensus algorithms to ensure the truth comes from multiple platforms agreeing to a common output, thus creating a decentralized database of information. This ensures that the credentials being stored on a decentralized database are immutable and non-repudiable.

Such an infrastructure can be used for several advantages. Firstly, a retailer registered on a beckn-enabled network can only add products to his catalog that match the exact description of the product that the farmer intended to be sold to the end-customer.

Also, a retailer registered on a beckn-enabled network would not be able to add products to his catalog that are more than the quantity as purchased from the farmer.

Consumers will purchase these products via their network-verified apps. Just before placing the order, the consumer app will verify the authenticity of the product credentials by referring to the previous blockchain transactions.Once verified, the order is confirmed.


How it Works Overview

In our implementation we have assumed a beckn-enabled network where there are consumer platforms, retail platforms and Manufacturer platforms.

Alongside the beckn-enabled network, there is a blockchain-based network that stores the identities and credentials of authorized participants. The semantic nature of beckn protocol allows beckn-enabled networks to be layered on any blockchain or DLT network.  In this article, we will use a reference blockchain network called CORD [2] to demonstrate a verifiable credential being created, stored and verified across a multi-network transaction. The CORD blockchain network enables the anchoring of tokenized transaction records and links to information objects that present a durable model for entities participating in the ecosystem. CORD enables discovery, access and acclaim records for various activities that relate to humans interacting with organizations, other individuals or machines. CORD provides the foundational layer of digital trust required to create a resilient, sustainable and economically viable ecosystem around authenticated data flows.

The Retail BAP [3], Retail BPP [4], Supply-chain BAP, and Supply Chain BPP are all registered on a blockchain as authorized entities that can transact on a network. This eliminates the need for a central network registry and therefore creates a trustless infrastructure for authentication and digital signatures.

In this example, a beckn-enabled network layered on top of CORD acts as a decentralized token store for verifiable credentials and registries. The decentralized nature of CORD and native implementation of beckn protocol specifications enables the end user application to verify the Availability-to-Promise (ATP) of products before ordering and trace its ownership all the way back to the manufacturer/producer irrespective of the number of intermediaries it has gone through.

In this example scenario, each beckn network participant i.e, Consumer Platforms, Retail Platforms and Supply-chain Platforms communicates with CORD via an API implemented at the CORD nodes


High level Flow (TL;DR)

Farmers will upload their products i.e “Shimla Apple” to their inventory on their Beckn-CORD-enabled Supply-chain application.


This application refers to the product schema reference stored on the CORD blockchain while uploading the object as per the prescribed product schema. The BPP will generate a unique hash of the product, its schema reference, and quantity, and send it to the CORD network. The CORD network chain nodes verify the product against the product schema and generate a unique block hash ID that represents the verifiable credential of the product. This ID is transmitted along with the product ID across the beckn-enabled network.

Retailers will place orders to these farmers via network-verified Supply-chain BAP apps to buy a specific number of units of genuine Shimla apples.

Farmers will sell their produce to retailers on Supply Chain BAPs via Supply-chain BPP applications. This happens via standard beckn APIs adopted by network participants.

Retailers add products that they have purchased from the manufacturers into their catalog. Due to their purchase reference being recorded on a blockchain, they are unable to upload more than the amount of units they have purchased from the retailer.

Consumers purchase these products from the retailer. The consumer app verifies the ownership of these products before placing an order.

Let us look at each of these interactions in more detail.


Retailer-Manufacturer Transaction

The farmer will have an application where he can see the orders he has received and allocate a specific number of authentic apples to each retailer. In the current implementation, authorized farmers and product schema used by each farmer has been pre-configured on the CORD blockchain.

The retailer has a beckn-CORD-enabled application that he uses to place orders from the farmers. Before placing the order, the retailer’s application verifies the ownership of the apples by calling the CORD network with the block hash ID and verifying if the farmer is truly the owner of those apples.

The flow can be summarized in the below diagram.


Consumer-Retailer Transaction

Now the retailer uses a typical retail store management application where he uploads the products (apples) he has purchased from the farmer to his own catalog for consumers to purchase. In this example, the particular retailer chooses to use a Magento-based seller application to manage his inventory and orders. When he uploads his product, he will not be able to upload more than the quantity (1000 units) he has purchased from the Manufacturer. Before uploading, his application calls the CORD blockchain with the product SKU ID and the quantity. The CORD blockchain nodes verify if the retailer is truly the owner of a 1000 units of Shimla Apples by calculating the hash of the product and comparing it with the hash stored on the chain. If he is not, the CORD network returns an error.

The consumer searches for these apples on his app.

And he sees genuine products with a green verified icon on the listing. All the products that have a block hash ID are treated as verifiable products as shown below.

Before placing the order, the consumer application first verifies if the genuine items are actually available in the retailer’s inventory. The chain nodes verify the availability using the previous blockchain transactions if the retailer truly has ownership of the genuine product. The state where a product is available for fulfillment before placing an order is called Availability to Promise (ATP). This prevents double selling or overblocking of inventory where a retailer claims to have more inventory available to sell so that they can get more orders. Once the ATP is verified, the BAP then fires a beckn protocol confirm API call to the Retailer BPP. The retailer BPP then transfers the ownership of the product to the consumer by calling an order.confirm remote procedure call on the CORD blockchain. This adds a ownership transfer record of a fixed amount of units from the retailer to the consumer on the blockchain. This record gets replicated across all chain nodes to ensure immutability. Now there is a non-repudiable claim to ownership of the genuine product by the buyer that the seller cannot refute. This improves the overall trust of the consumer towards the system and the seller.

Once done, the CORD blockchain will have transaction records like


Note

The CORD blockchain doesn’t store actual data but merely the hashes of the transactions to ensure privacy of the participants are protected. The creation of the hashes of the transactions still takes place on the network participant platform i.e BAP and BPP nodes. Such value exchanges augmented through the combination of off-chain verifiable credentials capturing the transaction details and on-chain verifiable proofs create a higher level of assurance for ecosystem participants.

As you can see, we have successfully managed to transmit a verifiable credential i.e the ownership of genuine Shimla Apples across two cascaded networks using beckn protocol and ensured its immutability using blockchain technology.

The entire integration of beckn-enabled networks on a blockchain can be summarized using the below transaction history on a blockchain.


Summary

Beckn protocol allows the unbundling of tightly coupled 2-sided platforms into a network of multiple 1-sided platforms. The inter-platform trust is established using a public key infrastructure that serves as a network registry. Blockchain or Distributed ledger technologies can increase this trust by allowing beckn-enabled networks to layer on top of blockchain networks. Furthermore, the layering of beckn and blockchain networks tremendously increases the consumer’s trust on the platform (BAP) where they’re buying products from especially when the inventory of products being bought are not managed on that platform. Similarly, due to the portability of these credentials, seller platforms do not have to re-verify credentials of an entity when they move from one platform to another.

The below table summarizes the difference between a beckn-network that is using blockchain versus a beckn-network that is not using blockchain in the example discussed in this article

These are just some of many possibilities that can emerge when layering beckn protocol networks on blockchain networks. Let us take a look at some ideas that we intend to implement going forward.


Future Evolution

This is just the beginning of beckn protocol’s ability to leverage advancements in the web 3.0 world, and we are already thrilled at the possibilities

Some of the use cases which we are working on imminently are as follows (in no particular order):

Executing a fully decentralized beckn protocol interaction on a blockchain Building of identity registries (of entities like retailer, buyer, manufacturer, dealer, delivery partner etc etc), on the ledger/chain/network, so those who have access can co-relate entities in the transactions. Build a Verifiable Credential based ecosystem making any product authentication made easy from the buyer. Better anonymized reputation building system for retailers, buyers and other entities in the ecosystem by handling the rating system with more validations. Possibility of having a token based economy tied to real-world use commerce transactions. Creating of a blockchain-based dispute resolution system for beckn-enabled networks


References

[1] Beckn Protocol Specification

Official Website:https://becknprotocol.io Github Repository:https://github.com/beckn/protocol-specifications Tech Overview Video Playlist: Click here

[2] CORD Network – Below links provide more information on the network

https://cord.network https://cord.network/whitepaper Open-source repos : – https://github.com/dhiway/cord/tree/beckn-demo-v1 (Blockchain code) – https://github.com/dhiway/cord.js/tree/beckn-demo-v1 (SDK) Running network https://apps.cord.network/

[3] Open-source BAP Reference app

Source-code for Retail BAP – Click here Source-code for Supply BAP – Click here Retail BAP:live demo: Click here Supply Chain BAP live demo: Click here

[4] Open-source BPP Magento Extension

Source-code for Retail BPP – Click here Source-code for Supply-chain BPP – Click here

The post Enabling Trusted Commerce using Beckn Protocol and CORD Blockchain appeared first on Dhiway.


Herond Browser

Herond Browser: January 2025 Report

Happy New Year, everyone! We’re excited to share our progress and achievements from January, building on the momentum from a busy December. We’ve been hard at work improving our products, expanding our community, and laying the groundwork for an exciting year ahead. Product Updates Our developer has been diligently at work, refining our products to […] The post Herond Browser: January 2025 Repor

Happy New Year, everyone! We’re excited to share our progress and achievements from January, building on the momentum from a busy December. We’ve been hard at work improving our products, expanding our community, and laying the groundwork for an exciting year ahead.

Product Updates

Our developer has been diligently at work, refining our products to provide a smoother and more intuitive experience for all our users. PC users on Windows and macOS can now enjoy version 2.0.41, which brings a more streamlined and intuitive interface. We’ve focused on improving navigation and clarity within the wallet and settings sections, making it easier to manage your assets and customize your preferences. Several dApp UIs have also been refreshed with a modern, user-friendly design. Additionally, we’ve resolved compatibility issues for users utilizing Hola VPN with Herond Browser. You can easily check your current version by navigating to Settings -> About Herond.

Mobile users got a major upgrade with the release of Herond Wallet on Android and iOS in version 2.1.0! This release brings the full Herond Wallet experience to mobile devices. We’ve also revamped the Settings interface on mobile for better navigation and accessibility. As always, we’ve been diligently addressing reported bugs and implementing security enhancements to ensure a more secure and reliable experience for everyone.

A Month of Engagements

January saw the successful conclusion of our two newest community initiatives – Referral Frenzy & Herond Alpha Test – with great participation and valuable feedback.

200+ Unique invites created in Referral Frenzy, expanding our community reach. 30+ Bugs identified and fixed, thanks to the invaluable feedback from our alpha testers. Thousands of new users joined our platform, marking significant growth in the Herond ecosystem.

We’re incredibly grateful for the active participation of our community in these programs. Your feedback is instrumental in shaping the future of our product.

Herond Special Poker Tournament

Kick off the new year with the Herond Special Poker Tournament!

Put your skills and luck to the test in our competitive event! Battle it out for the top spot and earn even greater rewards as an Early Supporter or OG. Sign up between January 22nd and 25th, with more rounds coming in the near future!

Find all the details here.

Looking Ahead

We’re incredibly grateful for the continued support and engagement of our community. These updates and events are a direct result of your feedback and participation. We’re excited for what the new year holds and look forward to continuing to build and improve our platform together. Stay tuned for more updates!

About Herond Browser

Herond Browser is a cutting-edge Web 3.0 browser designed to prioritize user privacy and security. By blocking intrusive ads, harmful trackers, and profiling cookies, Herond creates a safer and faster browsing experience while minimizing data consumption.

To enhance user control over their digital presence, Herond offers two essential tools:

Herond Shield: A robust adblocker and privacy protection suite. Herond Wallet: A secure, multi-chain, non-custodial social wallet.

As a pioneering Web 2.5 solution, Herond is paving the way for mass Web 3.0 adoption by providing a seamless transition for users while upholding the core principles of decentralization and user ownership.

Have any questions or suggestions? Contact us:

On Telegram https://t.me/herond_browser DM our official X @HerondBrowser Technical support topic on https://community.herond.org

The post Herond Browser: January 2025 Report appeared first on Herond Blog.


FastID

The Open Web is Vibrant, and Vital to 2025

Explore Fastly's commitment to the open web and education, where ideas flourish into impactful online experiences. Check out what members of Fast Forward accomplished in 2024.
Explore Fastly's commitment to the open web and education, where ideas flourish into impactful online experiences. Check out what members of Fast Forward accomplished in 2024.

Thursday, 23. January 2025

playhaus.tv

27 – Marvels of Youthful Engineering | Weekly Mojo w/ Madison Jesseka


Herond Browser

The Complete Guide to NFT Marketplace

Imagine owning a digital painting, a rare gaming asset, or a piece of music that only you can truly claim. NFT marketplace make this possible, offering creators a platform to showcase their work and collectors a chance to own exclusive digital treasures. With trading volumes skyrocketing to $562 million in November 2024, NFTs aren’t just […] The post The Complete Guide to NFT Marketplace appeare

Imagine owning a digital painting, a rare gaming asset, or a piece of music that only you can truly claim. NFT marketplace make this possible, offering creators a platform to showcase their work and collectors a chance to own exclusive digital treasures. With trading volumes skyrocketing to $562 million in November 2024, NFTs aren’t just a trend—they’re transforming how we think about value, creativity, and ownership in the digital world.

This guide takes you through everything you need to know about NFT marketplaces, from how they work to building your own. Whether you’re a creator, collector, or entrepreneur, there’s never been a better time to dive into the NFT space.

Learn more: Everything You Need to Know About Non-Fungible Tokens (NFTs)

What is an NFT Marketplace?

An NFT marketplace is an online platform where users can buy, sell, and trade unique digital assets known as NFTs (Non-Fungible Tokens). These digital assets can range from art and music to in-game items and collectibles. Marketplaces streamline the process of creating, trading, and owning NFTs, providing creators access to a global audience and buyers an organized platform to discover rare digital treasures.

NFT marketplaces have grown in popularity as the NFT industry continues to expand. According to CryptoSlam, November 2024 saw NFT trading volumes rise by 55.6%, hitting $562 million — the highest since May 2024. This growth highlights renewed interest driven by innovative projects and expanding use cases for NFTs.

Popular platforms like OpenSea, Rarible, SuperRare, and Foundation cater to different needs. OpenSea offers a broad collection of NFTs across various categories, while SuperRare focuses on curated, high-end digital art. Additionally, many marketplaces are adopting cutting-edge features like Layer 2 solutions for lower transaction fees, making them more accessible to users.

Learn more: The rise of NFT art: How digital art is transforming the art world

How  Does NFT Marketplaces Work?

NFT marketplaces serve as intermediaries, connecting creators, buyers, and sellers of NFTs. Users don’t need to create accounts; instead, they link a crypto wallet, such as MetaMask, which stores cryptocurrencies (ETH, SOL, etc.) and purchased NFTs.

To buy an NFT, users deposit cryptocurrency into their wallet based on the marketplace’s supported currency. For instance, OpenSea operates on ETH, while Magic Eden uses SOL. Transactions often incur network fees (gas fees) for blockchain validation and platform fees, usually ranging from 2% to 5%.

Marketplaces generate revenue through various streams:

Listing fees: Charged for posting NFTs for sale. Transaction fees: A percentage of each sale (typically 2-5%). Royalties: Creators earn a percentage (e.g., SuperRare takes 3%) from secondary sales. Auction fees: Applied to successful bids. Advertising and partnerships: Revenue from partner promotions or affiliate programs.

This model not only facilitates NFT trading but also empowers creators to earn sustainable income, ensuring long-term growth for the NFT ecosystem.

3 Popular Types of NFT Marketplaces Exclusive NFT Marketplaces

Exclusive NFT marketplaces cater to high-end collectors looking for unique, limited-edition digital assets. These platforms often feature curated art pieces or one-of-a-kind NFTs, with creators releasing only a few editions or sometimes just one. While these NFTs often command high prices, the market’s exclusivity leads to lower liquidity due to the smaller pool of potential buyers.

Notable examples include SuperRare, known for its high-end art collections; Foundation, a community-curated art platform; and KnownOrigin, which focuses on supporting digital artists. Interestingly, a report by NonFungible.com highlights that exclusive marketplaces tend to drive higher average transaction values, making them ideal for creators targeting premium buyers.

General NFT Marketplaces

General NFT marketplaces are the all-encompassing hubs of the NFT world, offering a wide variety of digital assets, from collectibles and gaming items to art and domain names. These platforms are accessible to a broader audience, making them the most popular choice for both creators and collectors.

OpenSea, one of the largest players, hosts millions of NFTs across over 700 projects, including everything from virtual real estate to profile picture collections like Bored Ape Yacht Club. Other notable platforms include Magic Eden, a Solana-based marketplace, and Binance NFT Marketplace, which integrates seamlessly with its crypto exchange for ease of use.

Specific NFT Marketplaces

Specific NFT marketplaces focus on niche sectors like gaming, music, or video content, offering tailored experiences for enthusiasts in those domains. These platforms streamline transactions within their ecosystems and often feature unique functionalities, such as in-game asset trading or royalty payments for artists.

For example, Axie Marketplace, dedicated to the popular blockchain game Axie Infinity, has attracted over 2 million daily active users trading in-game items. Similarly, Royal is a platform designed specifically for music NFTs, allowing artists to sell fractional ownership of songs, giving fans a direct stake in their favorite tracks.

Learn more: NFTs for Gamers: A Game-Changer

Comprehensive Guide to Building an NFT Marketplace

An NFT marketplace is more than just a platform for trading digital assets—it’s a hub for innovation, creativity, and economic opportunity in the digital realm. To create a successful NFT marketplace, you need to understand the market deeply, choose the right blockchain, craft a user-friendly interface, integrate robust smart contracts, and develop comprehensive features for minting, buying, selling, and auctions. Here’s a step-by-step guide to help you launch a standout NFT marketplace.

Step 1: Research the Market and Define Your Niche

Start by understanding the trends and gaps in the NFT space. Choose a niche—whether it’s digital art, gaming assets, virtual real estate, or music NFTs—to target a specific audience. For instance, marketplaces like Zora focus on empowering creators, while NBA Top Shot specializes in sports moments. Your niche will shape your marketplace’s identity and attract a dedicated user base.

Step 2: Select the Optimal Blockchain

Ethereum dominates as the preferred blockchain for NFTs, but alternatives like Polygon, Solana, and Tezos are gaining traction for their lower fees and faster transactions. Notably, Polygon recorded over 2 million unique NFT buyers in 2024, highlighting its growing adoption. Evaluate the scalability, fees, and ecosystem support of each blockchain to make an informed decision.

Step 3: Design an Intuitive User Interface

A seamless user experience is critical. Your platform should feature intuitive navigation, clear NFT listings, user profiles, and robust search filters. Tools like Figma or Adobe XD can help design a clean interface. Take inspiration from OpenSea, which prioritizes simplicity, or Foundation, which emphasizes aesthetics for art-focused users.

Step 4: Develop Smart Contracts

Smart contracts automate key processes like minting, trading, and royalty payments. Consider implementing multi-standard contracts such as ERC-721 for unique NFTs and ERC-1155 for semi-fungible assets. For royalty mechanisms, platforms like Rarible have set benchmarks, enabling creators to earn consistently from secondary sales.

Step 5: Build the Backend and Frontend Infrastructure

Your backend should handle blockchain connectivity, user data, and transaction processing, while the frontend focuses on user interactions. Opt for scalable cloud solutions like AWS or Google Cloud and decentralized storage like IPFS for secure asset hosting.

Step 6: Integrate Essential Features

Include wallet connectivity for platforms like MetaMask or Phantom and features for minting, listing, and auctions. Enhance usability with transaction histories, pricing analytics, and customizable notifications. Innovative features, like fractional ownership of NFTs (as seen on Fractional.art), can also differentiate your marketplace.

Step 7: Launch and Maintain Your Platform

After rigorous testing, deploy your marketplace on the mainnet. Post-launch, focus on monitoring performance, releasing updates, and responding to user feedback. Security measures, including regular audits of smart contracts, are vital to building trust.

Step 8: Implement Marketing and User Acquisition Strategies

Marketing is key to gaining traction. Partner with influencers, host NFT drops, and utilize social media platforms like Twitter and Discord for community building. Unique campaigns, such as gamified rewards or staking incentives, can attract and retain users. In 2024, airdrop campaigns by platforms like Blur saw significant user engagement, illustrating their potential impact.

4 Simple Ways to Earn Money from NFTs for Beginners

Earning money from NFTs isn’t just about selling digital art—it has expanded into areas like membership passes, exclusive access tokens, and brand collaborations. These opportunities provide creators with numerous ways to leverage the growing NFT market in the digital era.

Sell NFTs and Earn Royalties

One of the most popular methods to earn money is by creating and selling NFTs on marketplaces. Tools like Metacommerce Studio make it easy for anyone, even non-artists, to design and mint NFTs. Once listed, creators earn royalties—typically 5% to 15%—from every resale of their NFTs. This creates a stream of passive income, as every transaction continues to benefit the creator.

Use NFTs as Membership Passes

NFTs can act as access cards to exclusive communities, adding utility beyond ownership. For example, Bored Ape Yacht Club offers NFTs that double as membership passes, granting holders access to private events and an elite social network. Even after the membership benefits end, these NFTs retain value as collectible assets.

Offer Exclusive Access with NFTs

Creators can sell NFTs as tokens granting special privileges, such as one-on-one sessions, lessons, or unique experiences. The VeeFriends project utilized this by offering NFTs that allowed holders to have breakfast with Gary Vee, significantly boosting the value and appeal of these tokens. This exclusivity drives higher resale prices, benefiting creators with additional royalties.

Collaborate with Brands and Sponsorships

NFT projects with large communities can partner with brands for exclusive collaborations. For instance, Tiffany & Co. collaborated with CryptoPunks to create custom jewelry for Punk holders, priced at $50,000 each, selling out in 30 minutes. Such partnerships not only generate significant revenue but also enhance the reputation of both the NFT project and the brand involved.

Conclusion

NFT marketplaces are reshaping the way we interact with digital assets, offering endless opportunities for creators and collectors alike. By understanding how these platforms operate and exploring their potential, you can be part of a rapidly growing movement that’s redefining digital ownership. Start your journey today, and unlock the creative and financial potential of NFTs.

Learn more: Metaverse Real Estate: Investing in the Virtual World

About Herond Browser

Herond Browser is a cutting-edge Web 3.0 browser designed to prioritize user privacy and security. By blocking intrusive ads, harmful trackers, and profiling cookies, Herond creates a safer and faster browsing experience while minimizing data consumption.

To enhance user control over their digital presence, Herond offers two essential tools:

Herond Shield: A robust adblocker and privacy protection suite. Herond Wallet: A secure, multi-chain, non-custodial social wallet.

As a pioneering Web 2.5 solution, Herond is paving the way for mass Web 3.0 adoption by providing a seamless transition for users while upholding the core principles of decentralization and user ownership.

Have any questions or suggestions? Contact us:

On Telegram https://t.me/herond_browser DM our official X @HerondBrowser Technical support topic on https://community.herond.org

The post The Complete Guide to NFT Marketplace appeared first on Herond Blog.


ComplyCube

Fighting Fraud with Document Verification

Document checks are a core element of Know Your Customer (KYC) compliance, a regulatory framework requiring businesses to verify customer identities to prevent forgery and other financial crimes such as identity fraud cases. The post Fighting Fraud with Document Verification first appeared on ComplyCube.

Document checks are a core element of Know Your Customer (KYC) compliance, a regulatory framework requiring businesses to verify customer identities to prevent forgery and other financial crimes such as identity fraud cases.

The post Fighting Fraud with Document Verification first appeared on ComplyCube.


IDnow

Fraud in mobility: Uncovering and preventing the most common types.

New IDnow ebook highlights the most frequent types of fraud in the mobility sector and how best to prevent them.  In recent years, the mobility and micromobility industry, which includes car-sharing and scooter, bicycle and vehicle rentals, have all become increasingly popular. This is largely due to the ease of convenience, but also to it […]
New IDnow ebook highlights the most frequent types of fraud in the mobility sector and how best to prevent them. 

In recent years, the mobility and micromobility industry, which includes car-sharing and scooter, bicycle and vehicle rentals, have all become increasingly popular. This is largely due to the ease of convenience, but also to it being a more environmentally conscious way of travelling.  
 
Little wonder then that the mobility industry is on the move, literally. In 2023, the global shared mobility market was worth U$258 billion and is expected to grow to $401 billion by 2030.   

Click below to check out our latest ebook, ‘How to put the brakes on mobility fraud.’ 

Putting the brakes on fraud in the mobility industry. Learn about the most common types of fraud in the mobility industry and how best to stop them. Get your free copy Are fraudsters winning the mobility race? 

Unfortunately, the introduction of these new mobility services has inadvertently led to new forms of illicit and fraudulent attacks. As the global mobility market continues to grow, it comes as no surprise that fraudsters are going where the money is.   

Plus, unlike the banking sector, where Know Your Customer (KYC) processes and rigorous identity verification checks are mandatory for onboarding, mobility is not as strict, and fraudsters know it. Fraud attempts are also becoming increasingly sophisticated and hard to detect due to the use of deepfake technology, where a person can digitally manipulate a video to appear as someone else.  
 
This is why knowing the identity of the customer and proving the validity of a driver’s license, for example, is of extreme importance before providing access to the car or other vehicle type.   

The most dangerous stage of a customer journey is during account creation and customer onboarding. In 2023, 36% of suspected digital fraud globally in the travel industry came from digital account creation transactions. This is when users and mobility providers are most vulnerable to fraud attacks and when fraudsters attempt to steal users’ personal information to create new bogus accounts.   

Impacts of fraud on the mobility sector. 

Fraud is no joke. When fraud occurs no matter the industry, there are serious repercussions for everyone involved because not only does it affect the individual whose identity or documents were stolen but it also affects the company in the following ways:   

Reputational damage: Despite it not necessarily being the company’s fault, any occurrence of fraud puts its reputation on the line. If fraud is rampant, then customers believe that company is not safe to do business with.   Monetary loss: Fraud can cause businesses to lose a huge chunk of their revenue due to fake accounts, stolen credit cards and fraudsters exploiting vulnerabilities in onboarding processes.   Damage/misuse of vehicles: When fraudsters, some of which will be underage, gain access to a vehicle, the chances of damaging, misusing or stealing vehicles increases. Not to mention the potential danger and loss of life of those involved and the public.  Loss of customers: Customers want to know the company they are doing business with is safe, otherwise they’ll hit the road and take their business elsewhere.   Top 5 types of fraud in mobility. 

Fraud comes in many different forms and can be difficult to detect as fraudsters have a trunk full of increasingly sophisticated attacks at their disposal. Once a mobility provider discovers and identifies one form of fraud, fraudsters come up with an entirely different set ready to trick customers again.   
 
Here are some of the most common types seen in the mobility sector:  

1. Identity fraud 

Identity fraud is the impersonation of another identity, with more than 9 million identities stolen annually.    
 
One of the fastest growing types of identity fraud is known as deepfakes. In an attempt to fool an identity verification process, fraudsters impersonate someone else to gain access to a vehicle or other transport service. This is done through digitally altering IDs, other types of documents or the physical appearance of an actual person. .   

Synthetic fraud is an increasingly common form of fraud within mobility, specifically in auto lending when users apply for a loan. In fact,  2023 saw a 98% increase in synthetic fraud attempts causing $7.9 billion in losses. In a similar process to document fraud, synthetic fraud stitches together various parts of personal information from one or multiple people to create a new, fake identity. Also known as Frankenstein fraud, identity fraud is a mix of genuine and fake data.   

2. Document fraud 

One of the most common types of fraud in the mobility sector is document fraud which saw a global increase of 31% in 2023. This involves any form of tampering, alteration or creation of a completely new fake identity document. Document fraud makes use of fake IDs to access something a person might otherwise be unable to access, such as an underage person wanting to rent an e-scooter or car.  
 
In such cases, legitimate documents are altered to change the holder’s identity. This could include replacing the image or adding or replacing specific data, most likely age, on the document.   
 
As underage car and scooter rentals can have disastrous consequences for both the person and the vehicle, mobility operators have a responsibility to tackle document fraud and comply with minimum age requirements.   

3. Repeat fraud 

Once a fraudster is successful with a fraud attack, what is to stop them from trying again? Fraudsters will exploit every opportunity they can to abuse the system as many times as possible. And, once successful, they will keep coming back twice as hard. 
 
Synthetic fraud is a popular way for fraudsters to commit recurring fraud. They simply create numerous fake identities with the information they obtain from different users and try to use those identities as many times as possible, across various services. Once verified, the fake identities can then be used to abuse company promotions again and again.    
 
Putting a stop to repeat fraud cycles is of the utmost importance since fraudsters will never stop trying to exploit a company’s security system, especially if they’ve been successful the first time.   

4. Account takeover fraud 

Account takeover fraud is a growing problem for mobility services, specifically ride-hailing apps, car sharing and micromobility services. Over the past five years, account takeover fraud has increased 113% with 2023 seeing $13 billion in losses. When accounts are taken over, fraudsters can steal personal information to create a new account to either take money from someone who ordered a ride, leaving them with a no-show driver, or create completely fake profiles of users and drivers.  
 
With a fake driver profile, fraudsters can trick the ride-hailing service into believing real journeys were made using spoofed GPS locations. Fraudsters can create a never-ending cycle where they continuously create fake cancellations and fake bookings to gain even more money.  

5. Account sharing fraud 

The newest fraud on the block is account sharing fraud. Although it sounds similar to account takeover fraud, account sharing fraud occurs after the KYC check has been performed, when fraudsters exploit a vulnerability in the onboarding process to gain access to the vehicle. They then can un-install and re-install the app to commit repeat fraud.   
 
Fraudsters also sell the accounts/identities (real or fake) they have gained entry to through account sharing, helping them commit synthetic fraud.   

As some of our current customers have brought account sharing fraud to our attention, it has become evident that step-up authentication is the key to solving this next wave of fraud in mobility.

Edouard Baussier, Global Mobility & Travel Sales Director 
Drive trust with seamless, secure onboarding. 

Before allowing customers to get behind the wheel of any type of vehicle, a company needs to know that the person they are entering into business with is who they say they are. Not only will this prevent fraud, but it will also ensure the person taking control of the vehicle is legally entitled to and is safe on the road.   
 
IDnow’s automated identity verification solutions work with all types of mobility providers to assist them in offering a safe and user-friendly way of checking the identities of potential users.   

Better yet, our solutions align with a mobility provider’s specific risk appetite and customer needs. From document verification and biometric verification to step-up authentication, IDnow’s automated identity verification solutions are convenient, secure and globally compliant. We can verify over 3,000 identity documents for 195 countries in over 30+ languages, 24/7.  

Find out more about preventing fraud in the mobility industry and creating a safer and more secure experience for all users in our blogs, ‘Age verification in transport: Moving towards a better service?‘, ‘Connected vehicles and driver identification: Fewer keys for greater safety?‘ and ‘Mobility as a Service and digital identity verification—a partnership.

By

Kristen Walter
Jr. Content Marketing Manager
Connect with Kristen on LinkedIn


Dark Matter Labs

Towards Public Interest Digital Intellectual Property

The following Learning Note is a form of provocation but with a slight twist. Recognising that part of Dm’s contribution to the ecosystem is to stimulate market innovation, we are sharing our emergent learning as both a provocation and invitation. Given the trajectory and speed of technological innovation, we urgently need tangible options for governing Digital IP in new ways. This is not somethin

The following Learning Note is a form of provocation but with a slight twist. Recognising that part of Dm’s contribution to the ecosystem is to stimulate market innovation, we are sharing our emergent learning as both a provocation and invitation. Given the trajectory and speed of technological innovation, we urgently need tangible options for governing Digital IP in new ways. This is not something that Dm can realistically manifest ALONE in the timeframe required, but we we believe we can play a role in bringing unusual allies together to make that happen. We are therefore sharing this note in the spirit of both learning out loud and seeking to incite new relationships. If you would like to contribute to the development of a real world prototype of any of the elements outlined in the speculative framework below, then we invite you to add your comments here so that the conversation and connections are visible to all interested partners.

Open Dynamic Intellectual Property Rights Trusts (ODIPRT) Framework: An Intellectual Property framework for public interest in an Age of Computational Contracting and Governance.

Abstract

This learning note explores the concept of an Open Dynamic Intellectual Property Rights Trusts (ODIPR) framework, designed to address the inefficiencies and challenges of traditional IP systems. The ODIPR model introduces a dynamic Digital Autonomous Trust approach to IP management by leveraging real-time accounting, open registries, and milestone-based rights adjustments. Central to this model is the creation of Open Digital Intellectual Property Rights Trusts that utilise digital technology to dynamically manage rights and use cases across multiple stakeholders.

The development and market distribution of a new drug can be used as an illustration of how this process could work. Currently, drug companies need to raise huge upfront investment in order to carry out the necessary R&D, approval and licensing stages before they can recover any revenue. This results in the market being dominated by large players who can secure the necessary funding. Once the drug is approved the developer generally secures an exclusive patent, giving them rights over future revenue flows that are untethered from the costs incurred. By retaining long-term private property rights over a scarce resource they are able to reap gains that far exceed their contribution. In contrast, an ODIPR model would utilise an open digital patent (comparable to a smart contract). This digital contract could be pre-programmed with a variable and contingent framework of rates of return that is more representative of the risks and responsibilities of those involved (for example, the MHRA in the UK, could make a socially fair return a prerequisite for granting a licence). As the drug is sold and revenues are realised the digital trust would transparently track the stage of cost recovery plus the agreed return. At the point that both the costs and fair return were covered, the patent would pass into the public realm for open-source use.

Dynamic, digital trusts have the capacity to automatically release permissions and manage use cases and registries. This system ensures transparent tracking of investment recovery and facilitates the gradual release of IP rights as financial milestones are met, with failsafe end dates guaranteeing eventual public access. By addressing critical issues such as prolonged monopolies, rent-seeking behaviours, and the lack of transparency in current IP practices, ODIPR creates (a) a pathway to accelerate investment (b) strong incentives for initial capital deployment. It balances the need for incentivising innovation with the societal benefit of open access, fostering a viable ecosystem where intellectual property serves public interests, while respecting risk capital.

Image credit: Irina Wang

Challenges of Investing in Intellectual Property

Investing in the development of intellectual property presents several inherent challenges. One major issue is the uncertainty surrounding the potential return on investment. Investors often face significant risks due to the unpredictable nature of market reception and the time it takes to recoup their initial expenditures. Additionally, the complexity of IP accounting makes it difficult for investors to accurately assess the viability of a project. Traditional IP rights can also lead to rent-seeking behaviours, where rights holders exploit their monopolies for prolonged periods without contributing to further innovation or public benefit. Furthermore, fully open-source models, while encouraging collaboration and accessibility, can undermine investment incentives. For example, by providing insufficient financial returns to cover the high initial costs of development and innovation.

These challenges are exacerbated by the rise of the computational economy driven by digital and computational intellectual property, including software, digital art, algorithms, and large language models (LLMs). Traditional IP frameworks, designed primarily for tangible and less rapidly evolving assets, often fail to provide the flexibility and transparency needed for digital IP. The ODIPR framework addresses these challenges by fostering a digital-first IP economy that leverages advanced technological infrastructure and open registries to ensure real-time transparency and dynamic rights management.

Open Digital Intellectual Property Rights Trusts

This is a next generation of rights management that is no longer a static system but a dynamic negotiation between rights capital holders, authors, beneficiaries and societal good. This framework is conceived both as an agreement space and as an agent dynamically optimising across multiple parties. This agent-based approach transforms rights management from static contracts into active, adaptive systems that respond in real-time to the needs and inputs of ALL the stakeholders involved.

In this envisioned future, the construction and micro-capabilities of these agents allow us to compile and orchestrate them into cohesive systems of intellectual property (fully legible and compatible with compliance regulations such as transfer pricing). These systems manage flows of value and investment at a granular, unitary level while simultaneously supporting complex arrangements of value flows in structured economic systems.

Managing this future requires the creation of Open Digital Intellectual Property Rights Micro-trusts. These micro-trusts are effectively digital autonomous entities that dynamically manage rights and returns. These micro-entities are critical for operationalizing the ODIPR framework, automatically releasing permissions, managing use cases, and maintaining registries, ensuring seamless and transparent IP management.

Key Functions of ODIPRT

The key attributes of an operational ODIPRT are envisaged as follows:

Real-Time Accounting and Transparency: Continuous monitoring of revenue streams and usage metrics provides investors with up-to-date information on the performance of their investments. Open registries ensure that all stakeholders have access to this data, promoting trust and reducing risks associated with information asymmetry. Adaptability to Technological Changes: Digital IP, particularly algorithms and (large language models) LLMs, can become obsolete quickly due to rapid technological advancements. The dynamic nature of micro-trusts allows for flexible adjustment of IP rights based on the performance and relevance of the asset. This adaptability ensures that investors can respond to market changes swiftly, protecting their investments and encouraging continuous innovation. Piracy and Unauthorised Use: Digital assets are particularly vulnerable to piracy and unauthorised use, which can significantly undermine their value. Transparent accounting and rights management systems help mitigate these risks by providing clear and enforceable tracking of IP usage. Blockchain technology, integrated into the open registries, offers an immutable record of transactions and usage, further securing digital assets against infringement. Addressing Monetization Challenges: Monetising digital IP such as algorithms and LLMs is often complex due to their intangible nature and the difficulty in setting fair pricing models. Micro-trusts can facilitate flexible investment structures and dynamic adjustment of rights. This enables stakeholders to experiment with different revenue models, such as subscription-based access, licensing, or performance-based royalties, optimising returns and encouraging broader adoption of digital innovations. Complex Valuation and Risk Assessment: Valuing digital IP, especially emerging technologies like LLMs, can be challenging due to their novelty and the lack of historical data. The ODIPR model addresses this by providing standardised return multiples based on risk assessment and transparent financial reporting. This helps investors make informed decisions and accurately gauge the potential returns on their investments. Encouraging Investment in High-Risk Intellectual Projects: High-risk intellectual projects, such as developing advanced algorithms or LLMs, often struggle to secure funding due to the uncertainty and high initial costs. The ODIPR framework’s structured approach to risk assessment and return multiples provides clear incentives for investing in these projects. By offering higher returns for higher risks and ensuring transparent recovery metrics, the model makes it more attractive for investors to allocate capital to cutting-edge digital innovations.

Key Benefits of Open Digital IPR Trust Management

The real world impact will need to be validated as the framework is operationalised but the following benefits are expected:

Transparent Assembly of Micro-Intellectual Property Rights: The ODIPR framework facilitates the transparent and flexible assembly of micro-intellectual property rights within predefined frameworks. This allows for the dynamic assignment and movement of these rights without the need for complex negotiations. Market Transparency: By significantly enhancing market transparency, the ODIPR framework improves operational opportunities, making it easier for stakeholders to engage in IP transactions and investments. Structural Macroeconomic Gain: The seamless assembly of intellectual property and the ability to unleash its potential within society represent substantial structural macroeconomic gains. This fosters a more efficient and dynamic IP market, driving broader economic growth and innovation. Real-Time Negotiation and Optimisation: The rights management agent continuously negotiates and optimises terms and conditions among rights capital holders, authors, and beneficiaries. This ensures all parties receive fair value based on current market conditions and individual contributions. Adaptive and Responsive Systems: The agent-based framework adapts to changing circumstances, such as shifts in market demand, technological advancements, and evolving legal landscapes. This responsiveness ensures that rights management remains relevant and effective over time. Seamless Integration of Multiple Agents: Multiple rights management agents can be compiled and integrated to create systems that manage and optimise flows of value across different sectors and industries. This capability allows for the creation of vast, complex arrangements capable of handling diverse and intricate economic activities. Enhanced Investment Flows: By dynamically optimising rights and value distribution, the framework promotes more efficient and targeted investment. This encourages innovation and systemic capabilities by ensuring that capital is allocated where it can be most effective. Transparent and Equitable Value Distribution: The system ensures transparency in the creation, distribution, and utilisation of value. This transparency builds trust among stakeholders and supports a fairer economic system where all contributors are adequately rewarded. Micro-Level and Macro-Level Benefits: At the micro-level, individual agents optimise value flows for specific projects or intellectual properties. At the macro-level, these agents collectively contribute to a structured economic system that supports large-scale, coordinated economic activity and growth. Image credit: Irina Wang

Framework Structure and Implementation considerations

The framework is still speculative but will be based on the following pillars:

Initial Investment and Risk Capital Allocation: Investment Transparency: Open registries disclose detailed investment costs, including R&D, production, marketing, and distribution. Dynamically Restructured Risk Assessment and Return Multiples: Clear return multiples based on risk encourage capital allocation to innovative projects, with the ability to dynamically adjust based on fiscal policies.

2. Dynamic Use Rights Based on Recovery Metrics:

Real-Time Accounting: Continuous monitoring of capital recovery. Dynamic Rights Adjustment: Gradual rights release as financial milestones are met, transitioning from exclusive rights to open fair use. Failsafe End Dates: Guarantees public domain transition after a predefined period.

3. Incentivizing Continuous Innovation:

Reinvestment Strategies: Encourages reinvestment into new projects. Rewarding Early Adopters: Fiscal incentives for early high-risk investors.

4. Enabling Derivative Quasi-Equity Economies:

Derivative IP Markets: Creation of quasi-equity derivatives based on IP performance. Flexible Investment Structures: Diversified investment portfolios to spread risk and enhance returns.

Implementing the framework will be an iterative process weaving with multiple layers of the socioeconomic landscape. For example:

Legal Frameworks: Adapting existing IP laws to accommodate dynamic computational rights management, open registries, and failsafe end dates, ensuring legal enforceability and protection of stakeholders’ interests. Technological Infrastructure: Development of robust platforms for real-time accounting and rights management, leveraging blockchain and smart contracts for transparency and security. Stakeholder Engagement: Collaboration and trust and market building with creators, investors, and consumers to refine and accept the model.

Conclusion

The ODIPRT framework effectively addresses the challenges of traditional IP investment by providing a dynamic, transparent, and fair approach to intellectual property management. By ensuring clear paths to investment recovery and preventing prolonged monopolies, this model encourages more robust and confident investment in innovation. It balances the financial needs of creators and investors with the societal benefits of open access, fostering a more equitable and public-interest intellectual property landscape.

This Learning Note has been written by Indy Johar in collaboration with numerous individual efforts and inputs from across the Dm Ecosystem.

Operating In good faith (not an IP clause) Version 3.1

We distribute this document, in order to build shared acknowledgement that the problem analysis, concepts, strategies, ideas and innovations outlined herein are the culmination of years of dedicated investment and understanding. We have crafted this document with the expectation that our partners will appreciate the significance of this groundwork and collaborate with us to not only refine these proposals but also explore their viability and practical implementation together in good faith.

Furthermore, we feel it’s important to acknowledge at the outset we are committed to fostering openness and wide accessibility by making these strategies, ideas and innovation for public benefit in due time.

This approach seeks to ensure we can build partnerships necessary for innovation, respecting the work, labour and care invested and that our collective knowledge and experience can be shared widely, allowing others to adopt, adapt, and expand upon our work, thus contributing to broader, community-wide benefits.

We trust that our partners will honour the spirit of respect, endeavour, transparency and cooperation that defines this work, as we all work to achieve viable and impactful outcomes.

Towards Public Interest Digital Intellectual Property was originally published in Dark Matter Laboratories on Medium, where people are continuing the conversation by highlighting and responding to this story.


Ocean Protocol

DF125 Completes and DF126 Launches

Predictoor DF125 rewards available. DF126 runs Jan 23— Jan 30th, 2024 1. Overview Data Farming (DF) is Ocean’s incentives program. In DF, you can earn OCEAN rewards by making predictions via Ocean Predictoor. Data Farming Round 125 (DF125) has completed. DF126 is live today, Jan 23. It concludes on January 30th. For this DF round, Predictoor DF has 37,500 OCEAN rewards and 20,000 ROSE&nbs
Predictoor DF125 rewards available. DF126 runs Jan 23— Jan 30th, 2024 1. Overview

Data Farming (DF) is Ocean’s incentives program. In DF, you can earn OCEAN rewards by making predictions via Ocean Predictoor.

Data Farming Round 125 (DF125) has completed.

DF126 is live today, Jan 23. It concludes on January 30th. For this DF round, Predictoor DF has 37,500 OCEAN rewards and 20,000 ROSE rewards.

2. DF structure

The reward structure for DF126 is comprised solely of Predictoor DF rewards.

Predictoor DF: Actively predict crypto prices by submitting a price prediction and staking OCEAN to slash competitors and earn.

3. How to Earn Rewards, and Claim Them

Predictoor DF: To earn: submit accurate predictions via Predictoor Bots and stake OCEAN to slash incorrect Predictoors. To claim OCEAN rewards: run the Predictoor $OCEAN payout script, linked from Predictoor DF user guide in Ocean docs. To claim ROSE rewards: see instructions in Predictoor DF user guide in Ocean docs.

4. Specific Parameters for DF126

Budget. Predictoor DF: 37.5K OCEAN + 20K ROSE

Networks. Predictoor DF applies to activity on Oasis Sapphire. Here is more information about Ocean deployments to networks.

Predictoor DF rewards are calculated as follows:

First, DF Buyer agent purchases Predictoor feeds using OCEAN throughout the week to evenly distribute these rewards. Then, ROSE is distributed at the end of the week to active Predictoors that have been claiming their rewards.

Expect further evolution in DF: adding new streams and budget adjustments among streams.

Updates are always announced at the beginning of a round, if not sooner.

About Ocean, DF and Predictoor

Ocean was founded to level the playing field for AI and data. Ocean tools enable people to privately & securely publish, exchange, and consume data. Follow Ocean on Twitter or TG, and chat in Discord. Ocean is part of the Artificial Superintelligence Alliance.

In Predictoor, people run AI-powered prediction bots or trading bots on crypto price feeds to earn $. Follow Predictoor on Twitter.

DF125 Completes and DF126 Launches was originally published in Ocean Protocol on Medium, where people are continuing the conversation by highlighting and responding to this story.


FinTech4Good

AI 2030 Partners with Global Leaders to Launch the Global Data Challenge and Awards Program for Responsible AI

  Davos, Switzerland – AI 2030, a global initiative leading the charge for Responsible AI, today announced the launch of two transformative programs: the AI 2030 Data Challenge and the AI 2030 Awards. Partnering with industry leaders such as Sustainable IT, Global Blockchain Business Council (GBBC), 1871, University of Dubai, Woxen University, University of Lausanne, […]

 

Davos, Switzerland – AI 2030, a global initiative leading the charge for Responsible AI, today announced the launch of two transformative programs: the AI 2030 Data Challenge and the AI 2030 Awards. Partnering with industry leaders such as Sustainable IT, Global Blockchain Business Council (GBBC), 1871, University of Dubai, Woxen University, University of Lausanne, Global Inclusive Economy Society, Empire AI, Rainforest Partnership, Diversity Atlas, AIandFaith.org, and Boston Quantara, these initiatives aim to address critical challenges in AI adoption, including bias, transparency, governance, and sustainability, while recognizing organizations that exemplify ethical AI leadership and innovation.

Partnering with industry leaders such as Sustainable IT, Global Blockchain Business Council (GBBC), 1871, University of Dubai, Woxen University, University of Lausanne, Global Inclusive Economy Society, Empire AI, Rainforest Partnership, Diversity Atlas, AIandFaith.org, and Boston Quantara, these initiatives aim to address critical challenges in AI adoption, including bias, transparency, governance, and sustainability, while recognizing organizations that exemplify ethical AI leadership and innovation.

“Data is the lifeblood of AI, and addressing the underlying data challenges is critical to unlocking its transformative power for humanity,” said Xiaochen Zhang, Executive Director of AI 2030. “It takes both visionary leadership and partnerships across borders, industries, and disciplines to overcome these challenges and ensure AI delivers equitable, lasting benefits for all.”

AI 2030 Data Challenge: Empowering Innovators to Shape the Future

The AI 2030 Data Challenge invites startups, researchers, and professionals to develop groundbreaking solutions across five focus areas:

Data Diversity: Reducing bias in AI training datasets by improving inclusivity. Explainability: Enhancing AI model transparency to foster trust. Traceability: Building tools to link AI decisions to their data sources and methodologies. Sustainability: Minimizing AI’s environmental footprint through energy-efficient practices. Upskilling: Developing a Responsible AI workforce through education and mentorship.

 

Participants will receive access to curated datasets, cloud computing credits, and mentorship from AI experts. Winning solutions will be showcased on a prestigious global recognition tour at flagship events held during major high-level convening weeks, including:

United Nations General Assembly Week in New York, USA World Bank Group-IMF Annual Meetings in Washington, DC, USA G20 Summit in South Africa COP30 in Brazil

 

https://ai2030.org/wp-content/uploads/2025/01/VIDEO-2025-01-20-16-56-51.mp4   AI 2030 Awards: Recognizing Excellence in Responsible AI

The AI 2030 Awards celebrate organizations that redefine ethical AI practices across five categories:

AI 2030 Research Excellence Award: For groundbreaking research advancing ethical AI. Pioneers in Responsible AI Implementation Award: For corporations achieving measurable societal and business outcomes. Excellence in Responsible AI Innovation Award: For transformative AI innovations prioritizing ethics and accountability. AI Talent Development Leadership Award: For exceptional leadership in training Responsible AI talent. Stewardship in AI Governance Award: For robust governance frameworks ensuring fairness, transparency, and compliance.

Awardees will be honored at the Chicago AI Week (June 16-20, 2025), gaining global recognition and access to exclusive networking opportunities with policymakers, industry leaders, and investors.

Global Leaders Endorse Collaboration

Prominent voices from partner organizations emphasized the significance of this initiative:

Rick Pastore, Research Principal, Sustainable IT:
“Sustainable IT is dedicated to reducing technology’s environmental footprint. Our collaboration with AI 2030 accelerates innovation in creating greener, energy-efficient AI systems.”

Sandra Ro, CEO, GBBC:
“GBBC is thrilled to collaborate with AI 2030 to drive accountability and transparency through blockchain and AI integration. This partnership reflects our shared commitment to human-centric and inclusive technology ecosystems.”

Betsy Ziegler, CEO, 1871

“At 1871, we believe that innovation flourishes at the intersection of data, technology, and purpose. The AI 2030 Data Challenge and AI 2030 Award celebrate the transformative power of AI to tackle real-world challenges. Together, we are shaping a future where data-driven insights and ethical AI empower communities, industries, and individuals to thrive.”

Dr. Saeed Al Dhaheri, Dubai University:
“Our collaboration with AI 2030 underscores the University of Dubai’s commitment to fostering innovation that aligns with ethical and sustainable practices.”

Dr. Raul V. Rodriguez, Vice President, Woxsen University:
“Woxsen University is dedicated to empowering ethical AI leaders. Partnering with AI 2030 reflects our mission to foster global solutions for humanity.”

Dr. Nicoleta Acatrinei, University of Lausanne

“At the University of Lausanne, we strive to provide research that integrates values in an ex-ante manner in AI-based tools, a knight-like AI where virtue and service are constitutive of AI at all stages and levels. That’s why the AI 2030 Data Challenge is aligned with our research and we support their mission.”

Eva Csaky, CEO, Global Inclusive Economy Society

“Data is the cornerstone of sustainable and inclusive economic development. Realizing its full potential demands human ingenuity and insight, complemented by AI and other technologies, to drive meaningful action and empower communities to thrive in a rapidly evolving world. The AI2030 Challenge introduces an innovative framework to foster such advancements, and GIES is honored to be part of this pivotal initiative.”

Robert Harrison, Interim Director, Empire AI:
“Empire AI is proud to drive statewide innovation, research, and development in AI. Partnering with AI 2030 allows us to expand this impact globally, fostering responsible AI technologies that benefit all communities.”

Niyanta Spelman, CEO, Rainforest Partnership

“Harnessing the potential of AI to accelerate the collection, vetting and analysis of critical rainforest and biodiversity data and indicators could significantly increase efficiency and reduce costs, as well as ultimately improve results and overall health of our forests. We’re excited to collaborate with AI2030 to manifest this through the AI Data Challenge.”

Peter Mousaferiadis, CEO, Diversity Atlas

 “Diversity Atlas is proud to partner with the AI 2030 Data Challenge to advance inclusive and responsible AI innovation that reflects the rich diversity of cultural expression in humanity. We believe that achieving the world’s inclusive AI imperatives depends on building with the most robust and representative foundational data. Great things happen when everyone counts.”

Mark Graves, Research Director, AI and Faith – AIandFaith.org

“The vision of the AI 2030 Data Challenge is a practical, ambitious opportunity to catalyze the development of responsible AI application globally. The academic and professional expert network of AIandFaith.org finds synergy in supporting the inclusive scope of this ambitious and essential challenge program from AI 2030.”

Damian Speirs, Executive Director, Boston Quantara

“The future of ethical AI depends on investing in skills and fostering inclusive innovation. Initiatives like the AI 2030 Data Challenge play a vital role in bridging the gap between visionary strategies and the talent needed to bring them to life. By connecting strategy and expertise, Boston Quantara can empower organisations to navigate the complexities of AI responsibly and effectively.”

 

Call to Action

Be part of the Responsible AI movement:

Submit your proposal for the AI 2030 Data Challenge by March 1, 2025, by clicking the Submission Form. Nominate your organization for the AI 2030 Awards by click the Nomination Link. Join as a partner to help us shape and accelerate the future of Responsible AI by supporting innovation, collaboration, and global impact.

 

About AI 2030

AI 2030 is a global initiative committed to harnessing AI’s transformative power to benefit humanity, minimize risks, and mainstream Responsible AI by 2030, ensuring it serves society’s best interests and avoids critical challenges to global well-being. Focused on Responsible AI, AI for All, and AI for Good, we empower individuals and organizations  with the knowledge, tools, and networks needed to lead in Responsible AI, closing key gaps in awareness, talent, and solutions to enable responsible AI adoption across public and private sectors globally.

 

Contacts:

For media inquiries, sponsorship opportunities, or further information, please contact:
Jielin Wang, Program Manager, AI 2030
Email: info@ai2030.org

  

FAQs for AI 2030 Data Challenge and Awards General Questions Who can participate in the AI 2030 Data Challenge?
The Data Challenge is open to startups, research teams, professionals, students, and organizations globally with expertise in AI, data science, or sustainability. What are the submission requirements for the Data Challenge?
Participants must submit: A detailed project proposal addressing one or more focus areas. A prototype or proof of concept demonstrating feasibility and impact. A description of scalability and alignment with AI 2030 goals. What are the focus areas of the Data Challenge? Enhancing data diversity and inclusivity. Improving explainability and traceability of AI systems. Reducing AI’s environmental footprint. Upskilling the workforce for Responsible AI leadership.  What are the benefits for Data Challenge participants? Access to curated datasets and cloud computing resources. Mentorship from leading AI experts. Opportunities to showcase solutions at global events like convening held during the G20 Summit and COP30 weeks. Awards Program

      5. What are the categories for the AI 2030 Awards?

AI 2030 Research Excellence Award Pioneers in Responsible AI Implementation Award Excellence in Responsible AI Innovation Award AI Talent Development Leadership Award Stewardship in AI Governance Award

      6. Who can nominate for the AI 2030 Awards?

Any organization, startup, or institution demonstrating excellence in Responsible AI can apply. Self-nominations are allowed.   7. What are the benefits for award winners?7. What are the benefits for award winners?

       7. What are the benefits for award winners?

Recognition at global events like the Chicago AI Week. Exclusive networking opportunities with industry leaders and policymakers. Membership in the AI 2030 Global Fellowship program and access to the Certified Responsible AI Leaders Program.

       8. What is the nomination process for the AI 2030 Awards?

Submit your nomination through the Nomination Link. Applications will be reviewed during two evaluation cycles. Timeline and Events

       9. What is the timeline for the AI 2030 Data Challenge?

Launch: January 20, 2025 (Davos, World Economic Forum). Submission Deadline: March 1, 2025. In-person Hackathon Award: March 27, 2025 (NY AI Week). Winners Announced: June 16-20, 2025 (Chicago AI Week).

       10. What are the key dates for the AI 2030 Awards?

Nomination Period 1: January 22- March 22, 2025. Nomination Period 2: March 30, 2024 – June 6, 2025. Award Ceremonies: September 24, 2025

       11. What is the Global Recognition Tour?

       Winning teams and awardees will showcase their work at major events held during:

World Bank Group-IMF Annual Meeting (October 2025, Washington, DC). G20 Summit (November 2025, South Africa). COP30 (November 2025, Brazil). World Economic Forum (January 2026, Davos). Partnerships and Resources

       12. What resources are available for Data Challenge participants?
       Participants gain access to:

Curated datasets. Cloud credits. Expert mentorship. Networking opportunities with policymakers and industry leaders.

       13.  What role do partners play in these initiatives?

Partners play a pivotal role in these initiatives by shaping the vision, defining key challenges, and engaging stakeholders to ensure meaningful outcomes. They contribute expertise and mentorship, serve as judges in evaluating submissions, and provide resources such as knowledge, technology tools, or curated datasets. Partners also amplify outreach and impact through their networks, participate in thought leadership by leading panels or workshops, and co-host events to extend the initiatives’ reach. Additionally, they create valuable networking opportunities for participants, connecting them with industry leaders, policymakers, and investors to maximize the long-term impact of their solutions. Call to Action and Contact

       14. How do I join the AI 2030 Data Challenge or Awards?

For the Data Challenge: Submit your proposal at ai2030.org by March 1, 2025. For the Awards: Nominate your organization through Nomination Link.

       15. Who can I contact for more information?
             For inquiries, contact:
             Jielin Wang, Program Manager, AI 2030
             Email: info@ai2030.org

 

Wednesday, 22. January 2025

Elliptic

Crypto regulatory affairs: Early signs of crypto policy shifts as Trump takes office

On January 20, US President Donald Trump was sworn into office for his second term in office, a moment the cryptoasset industry has been awaiting with high expectations. 

On January 20, US President Donald Trump was sworn into office for his second term in office, a moment the cryptoasset industry has been awaiting with high expectations. 


Kin AI

How to Journal for Anxiety: A Complete Guide

The benefits of journaling for mental health are always discussed—but how does it work? This article covers how to journal for anxiety, and how Kin's AI helps.

Try Kin - Personal AI

As helpful as it is, journaling can feel overwhelming—especially for those already dealing with anxiety. To help, this article will break the process down, and cover how AI can make it even easier.

As scientific understanding expands, and economies become more competitive, mental illness and mental health conditions have become bigger and bigger challenges to our well-being.

According to the WHO, anxiety disorders affect approximately 300 million people globally,1 with rates rising particularly sharply among young adults and professionals experiencing mental distress.2

I’m Yngvi Karlson, Co-Founder of Kin. Born in the Faroe Islands, I’ve spent my career building startups, with two exits along the way, and five years as an active venture capitalist. Now, I’m dedicated to creating Kin, a personal AI people can truly trust.

Follow me on LinkedIn, TikTok and X

To help guide readers to relief, this article will cover:

What is Journaling

Core Journaling Techniques for Anxiety

Getting Started with Anxiety Journaling

How Artificial Intelligence Can Enhance Anxiety Journaling

Journal Prompts for Anxiety

So, let’s get into it.

While various coping strategies exist for managing anxiety symptoms, journaling for mental health is one of the most accessible and scientifically supported methods. Based on research including randomized controlled trials, journaling helps create a safe space for self-reflection and emotional processing,3 making it a powerful tool in supporting mental well-being.

When done properly, the benefits of journaling are a key companion to other approaches like therapy from a licensed clinical social worker (LCSW) or health professional, or medication.

But what is proper journaling?

To understand that, journaling, and its link to anxiety, must be explored.

Photo by Noémi Macavei-Katócz on Unsplash What is Journaling?

Journaling is the process of writing down thoughts, feelings, and experiences in some way. This is commonly done to help people describe their emotions and feel more able to understand them.

It’s a highly personal process that looks different for most people, but in the end, it’s still all about helping people make sense of themselves.

Understanding Anxiety and Journaling

Anxiety manifests both mentally and physically, and like journaling, it does so differently for different people.

While some anxiety is normal and even helpful in certain situations, those who experience excessive anxiety can attest to how it interferes with daily life, relationships, and overall well-being.

This is where journaling helps. Attempting to describe anxious thoughts and anxiety-inducing situations in words encourages people to view them objectively, and think about the root of the feelings to describe them fully. This process can help someone realize when and why their anxiety has become excessive, and can even lessen the anxiety itself in some cases.

Regular journaling can build the habit of approaching anxiety with a logical cause-and-effect mindset even without writing in a journal, and this can help people remember to lean on their coping strategies before their anxiety worsens.

Let’s look at what kinds of journaling help build this mindset and habit.

Photo by Prophsee Journals on Unsplash Core Journaling Techniques for Anxiety

Various types of journaling have proven particularly effective for managing symptoms of anxiety, with each having its own individual appeal and mental health benefits:

Freewriting

Freewriting, expressive writing, or stream-of-consciousness writing is perhaps the most famous and popular form of journaling.

Freewriting involves someone just writing out whatever they feel like, without any worry for topic, grammar, spelling, language, or even sense—there’s no wrong way to do it. A topic could even be chosen for a session if desired; it’d still count.

While it can take some getting used to, freewriting can help people express negative thoughts and release anxious feelings by encouraging raw thought patterns to be recorded without any kind of conscious filter. This can even reveal feelings, thoughts, or emotions that weren’t clear previously.

As such, it's particularly effective for overthinking, as it helps move anxious thoughts from your mind onto paper where they can be examined more objectively through self-awareness.

Like we’ll discuss, too, this doesn’t have to be on paper—word processors, AI chatbots, and more advanced solutions like Kin are all options.

Worry Logs

Worry logs and thought records are exactly what they sound like—a digital or physical note of every worry or important-feeling thought that someone thinks of each day, added when they think of it.

These logs provide structured ways to track anxiety triggers and individual anxiety symptoms, meaning self-check-ins for mental health states and progress become easier, as data on past and present worries are on hand.

Regular journaling like this also quickly builds a familiarity with these symptoms and their triggers, so people can more easily recognize and mitigate their anxiety.

The 3-3-3 Rule:

The 3-3-3 rule involves writing down 3 things that can be seen, 3 that can be heard, and 3 parts of the body that can be moved. It’s a coping strategy and grounding technique to help take someone out of a spiralling tirade of anxious thoughts.

Similar to its sibling, the 5-4-3-2-1 rule (where someone names 5 things they can see, 4 they can hear, 3 they can feel, 2 they can smell, and 1 they can touch), these popular techniques can be incorporated into journaling easily.

Doing this helps take someone out of their thoughts, so they can approach their journaling in a less anxious and more objective state. It also helps them associate the rule with feelings of anxiety so that they’re more likely to ground themselves unprompted in the future.

Gratitude Journaling

Gratitude journaling is again what it sounds like—writing down things that spark gratitude and thankfulness in life.

While this might seem counterintuitive for anxiety management, shifting focus away from worries toward positives can help some people escape the negative mindset anxiety can cause for long enough to begin to examine and deconstruct it. Others find pairing this with positive affirmations and online positive affect journaling to further enhance your stress management practices.

Regular journaling in this way also builds the habit of looking for positives every day, rather than dwelling on negatives—which can be a partial cause of anxiety.

Thought Challenging

Thought challenging is based on Cognitive Behavioral Therapy (CBT) principles, and involves writing down anxious thoughts to then systematically examine their validity. For each anxious thought, write:

The thought itself

Evidence supporting the thought

Evidence against the thought

Whether the thought is a balanced perspective, and what a balanced perspective might look like if not

This cognitive behavioral therapy (CBT) technique helps develop coping skills and a more balanced perspective on anxiety-provoking situations. This is because it essentially trains someone through regular journaling not only to debunk their most common anxious thoughts, but to approach all anxieties with skepticism.

Photo by IKIGLOO on Unsplash Getting Started with Anxiety Journaling

Beginning a journaling practice for anxiety management is easier than it seems.

Start by finding a preferred medium to journal in (i.e. a notebook, an app, or just paper). Then, create a dedicated space and time for journaling that feels safe and will be uninterrupted.

As journaling becomes a habit, it’ll be easier to do it in more distracting environments. For now though, an ideal place might look like a quiet corner of home, a favorite café, or even during a morning commute.

In the same vein, choose a time where consistency is likely. It can be helpful to attach journaling to an already existing routine, like breakfast or setting the dishwasher, to help encourage consistency.

It's normal to feel resistance at first. Many people worry about ‘doing it wrong’, or feel uncomfortable confronting anxious thoughts. Remember that there's no wrong way to journal – the most effective approach is the one that is enjoyable enough to do regularly.

If it’s really hard to start, journal prompts like "What triggered my anxiety today?" or "How did my physical health feel affected when I was anxious?" can help. This isn’t something that must be kept neat, either—doodle in the margins instead of writing, if that helps maintain a regular journaling practice.

Lastly, keep in mind that journals by nature will contain private and personal thoughts. Whether using a physical notebook or digital platform, ensure the chosen journaling method provides a level of privacy that is comfortable.

If it doesn’t, locks can be purchased for notebooks, and apps like Kin have been designed for private journaling.

Common Challenges and Solutions

There are a few common things that can stop new journal users from creating a consistent and helpful habit:

Writer's Block is a common obstacle, particularly when anxiety is high. Combat this by using prompts (like the ones lower down), starting with simple lists, or even drawing if words feel too difficult.

Perfectionism can paralyze journaling efforts, and even cause Writer’s Block. It’s important to remember that a journal is a purely personal thing—it doesn't need to be polished or profound, because no one else will see it. Some of the most therapeutic entries might be messy or seemingly mundane.

Difficult emotions often surface during journaling. While this can feel overwhelming, confronting these emotions in writing actually helps process them more effectively. If certain topics feel too intense, take breaks and consider seeking professional support.

Advanced Journaling Strategies

As you become more comfortable with basic journaling, several advanced strategies can deepen its anxiety-managing benefits:

Emotional awareness exercises involve detailed documentation of physical sensations accompanying anxiety. This helps build the mind-body connection and often leads to earlier recognition of anxiety symptoms.

Trigger tracking takes worry logs a step further by analyzing patterns over time. Understanding what consistently triggers your anxiety allows for more proactive management strategies.

Solution-focused entries move beyond processing anxiety to actively planning responses. For each anxiety-provoking situation, document potential solutions and coping strategies.

Progress monitoring helps maintain motivation by tracking improvements over time. Regular reviews of past entries often reveal positive changes that might otherwise go unnoticed. Bullet journaling can be particularly effective for this, and is worth exploring once journaling feels comfortable.

Photo by Jess Bailey on Unsplash How Artificial Intelligence Can Enhance Anxiety Journaling

Modern AI technology has been transformative to traditional journaling practices. AI-supported journaling tools can offer unique advantages, such as pattern recognition in anxiety triggers, emotional tone analysis, and personalized prompts based on your writing history.

Digital journaling platforms with AI capabilities can provide insights that might be difficult to identify manually. For instance, AI can analyze writing patterns and can access entire journal histories at once to identify correlations between activities, situations, and anxiety levels. This can then be reported in very simple insights and suggestions by the AI to help with goal setting, building a positive mindset, and personal growth.

However, privacy remains paramount when dealing with personal mental health data. Look for platforms that prioritize data security and give you control over your information.

How Kin Supports Anxiety Journaling as a Personal AI

Our own personal AI, Kin, has been designed with Journaling in mind and can support anxiety management. While Kin’s most revolutionary technology revolves around its advanced memory system, its Journal feature makes full use of it.

Kin’s dedicated Journal feature allows users to type or speak a journal entry at any time, guided by optional journaling prompts. Kin then parses the finished entries locally on the user’s device, picking out keywords like people, places, and situations to add to its interconnected memory of the user.

This ever-growing memory can be analyzed by Kin, allowing it to pick up on trends, patterns, and behaviors that may be contributing to its user’s anxiety, among other things.

Then, within the Chat feature, Kin can make these insights known to its user, and interactively discuss how it reached those conclusions, explain things with web search capabilities, and work with the user to build action plans to change habits and prepare for common anxiety triggers.

Kin can even create custom push notification reminders to help users build new habits, or just remember things they may forget.

With all of that personal information available to it, privacy and data protection are foundational to Kin's design—more about that can be found here. In short, though, all of a user’s journal entries and personal data are stored and processed on the user’s device, wherever possible, and only temporarily handed off to approved third parties when necessary.

Everything Kin knows about someone is viewable and deletable at any time through the app. Similarly, it’s robustly encrypted so that not even we can read it. Users control their data, not us, so they’re able to trust Kin and be honest, which allows Kin to provide the best emotional support.

Photo by Jessica Lewis 🦋 thepaintedsquare on Unsplash Get Started Today with Your AI Assistant

Sound helpful?

Kin can be downloaded here. Once in, complete the message below and send it to Kin to begin journaling for mental health and anxiety together:

“Hey, Kin. I’ve been struggling with anxiety a lot lately, and I’d like to start journal entries about it with you. The best time for me to journal is _____. How should we start?”

Chat With Kin

Journal Prompts for Anxiety

As promised, here are the journal prompts:

Effective Journaling Prompts for Anxiety

To get started with anxiety journaling, consider these proven prompts:

"What's the worst that could happen, and how would I handle it?"

"What are my anxiety symptoms telling me about my needs right now?"

"What actions can I take today to support my mental health?"

"When did I handle a similar situation well in the past?"

"What would I say to a friend feeling this way?"

Self-Care Integration Prompts

Journaling works best when combined with other self-care activities. Consider documenting:

Sleep patterns and their impact on anxiety levels

Exercise and movement activities that help reduce stress

Mindfulness or meditation experiences

Nutrition and its effects on mood

Stress manifestations in your body (tension, headaches, etc.)

Sleep Hygiene Prompts

Poor sleep hygiene often exacerbates anxiety, so use your journal to track:

Bedtime routines that work best for you

Sleep quality and duration

Factors that help or hinder your sleep

Morning energy levels

Late-day caffeine or screen time impact

1

Anon (2023). Anxiety disorders. www.who.int. Available at: https://www.who.int/news-room/fact-sheets/detail/anxiety-disorders [Accessed: 01/10/25]

2

Ames, M. et al. 2023. The Mental Health and Wellbeing of Young Professionals. www.aacu.org. Available at: https://www.aacu.org/research/mental-health-wellbeing-young-professionals [Accessed 01/10/25]

3

Sohal, M.; Singh, P.; Dhillon, B.; Gill, H. 2022. “Efficacy of journaling in the management of mental illness: a systematic review and meta-analysis”. Family Medicine and Community Health. Available at: www.doi.org/10.1136/fmch-2021-001154 [Accessed 01/10/25]

Tuesday, 21. January 2025

Holochain

Steady progress in all domains

Dev Pulse 143

Howdy folks!  As 2025 rolls in, the Holochain team continues progressing steadily toward our goal of delivering stability across the board.  At first I didn’t feel like this because the holiday season just always seems to slow things down, but as I look over all the completed issues and pull-requests I must say I’m quite pleased.  We’ve shown advancement across all our work domains: the networking layer, Holochain core, developer tooling (scaffolding and the hc command-line tool), runtimes (kangaroo, mobile), testing harness, developer documentation, and the human layer including team process.

Here’s a recap of the most important things we’ve been up to since the last Dev Pulse in mid-December:

Team Process: We’ve now been able to clear out our backlog review, prioritizing and categorizing work which sets the stage for building out a new road-map. We’ve also been using our project tooling for long enough that we may be even able to produce usable burn-down charts soon and actually predict delivery timelines from data. Now wouldn’t that be cool!I’m going to be showing up more frequently doing communications (like this one), leaving Paul more time to focus on developer documentation. Dev Docs: We are especially keen in 2025 to live up to the pulls we’ve been getting to flesh out the Build Guide as we know that it can sometimes be difficult to put all the pieces together just by reading the Rust HDK docs when trying to answer practical how-to questions.  Just added are the sections on Links and Application Structure. Holochain Core: We’ve got a release candidate out for Holochain 0.4.1 which fixes a bug that could allow the init callback to be called more than once.  This clears the way for initializing cells on headless nodes. 0.4.1 will also include an upgrade to wasmer 5.x, and fixes wasmer module serialization compatibility issues and reduces memory usage by removing redundant caching that was happening. Networking: The Kitsune 2  revamp is coming along nicely, with the peer-store revamp complete, gossip revamp well in progress, refactored fetch queue, and more. Runtimes: Kangaroo (the dev-template for stand-alone Electron-based desktop hApp delivery) has been updated to the 0.4.1 release candidate, and now also has a sys-tray option, improved password management and auto-updating. On the mobile side, our work with partner Volla continues strong on the next version of Volla Messages, with a UI refactor, and integration into the Android Holochain-as-system-service runtime. Testing: Last but not least is our testing harness, wind-tunnel. Here we haven’t made as much progress as we’d like for a number of reasons, including the usual excuse of holiday-down-time-coordination-challenges, but actually mostly because we are still working on upgrading from our home-baked TryCP orchestrator to Nomad, a third-party orchestrator which we’ll be using from now on. Even so, we’ve updated the framework to Holochain 0.4, worked on repo chores, and most importantly have made some progress coordinating with the Holo team on the plan for the updated Nomad-base scenario deployment and execution strategy to Holoports. This is important for Holochain, as we’ll need the Holo network to run many of our Wind Tunnel tests to give us real-world results.

As always, the best place to really see the details behind the Dev Pulse is to look at Github’s Insights page for whichever repo you are most interested in.  For example see Holochain and Kitsune2.


Extrimian

Centralized vs Decentralized Digital ID

Centralized Digital ID: The Risks A centralized digital ID system is like a massive database where all your identity information is stored in one location, controlled by a single entity. Think of it as your passport or driver’s license, but in digital form and potentially containing much more data. Here’s the problem: Decentralized Digital ID: […] The post Centralized vs Decentralized Digital ID
Centralized Digital ID: The Risks

A centralized digital ID system is like a massive database where all your identity information is stored in one location, controlled by a single entity. Think of it as your passport or driver’s license, but in digital form and potentially containing much more data.

Here’s the problem:

Single Point of Failure: If that central database is hacked or compromised, all the data it holds is vulnerable. This could lead to widespread identity theft, fraud, and privacy breaches. Data Misuse: The entity controlling the database has complete access to your information and could potentially misuse it, sell it, or be forced to hand it over to governments. Limited Control: You have little to no control over your own data. You can’t choose what information is shared or with whom. Decentralized Digital ID: The Solution

A decentralized digital ID system, on the other hand, puts you in control. Your identity information isn’t stored in a single location but is distributed across a network. This makes it far more secure and resistant to attacks.

Here’s why Decentralized ID it’s a more secure solution for Data Management:

Enhanced Security: With no single point of failure, decentralized systems are much harder to hack. Even if part of the network is compromised, the rest remains secure. Increased Privacy: You control what information is shared and with whom. This gives you greater privacy and autonomy over your own data. Reduced Costs: Decentralized systems can be more cost-effective by eliminating the need for expensive central infrastructure and intermediaries. Empowering individuals with secure and private digital identities Use Cases: Centralized vs. Decentralized

To better illustrate the differences, let’s examine some common use cases:

Use CaseCentralized SystemDecentralized SystemStoring customer dataA company keeps all customer information (names, addresses, purchase history) in one central database.Each customer controls their own data and chooses what to share with the company. See how Extrimian can helpAccessing medical recordsA hospital stores all patient records in a central system, accessible only by hospital staff.Patients hold their own medical records and grant access to doctors or hospitals as needed. Explore more in this Extrimian Academy courseVerifying employee identitiesA company uses a central ID system to manage employee access to buildings and systems.Employees use digital wallets to store verifiable credentials and prove their identity. Discover how this workSharing educational credentialsA university issues digital diplomas stored in a central database.Students receive verifiable diplomas they can share with employers directly. Extrimian’s solutions for EducationVoting in electionsA government manages a central voter registry and voting system.Voters use digital identities to cast secure and verifiable votes. How Decentralized Digital ID can help in voting process.Managing supply chainsA company tracks goods and transactions in a central database.Each participant in the supply chain maintains their own records and shares data securely. Use case page about supply chain managementProving age for online purchasesA central authority verifies age for online purchases like alcohol or tobacco.Individuals use digital wallets to prove their age without revealing other personal information. Age Verification with SSI or Decentralized Digital Identity. A customized solution for business and final users data management

For both individuals and companies, the advantages of decentralized digital ID are undeniable. It offers greater security, privacy, and control over your own data. In a world where data breaches are becoming increasingly common, choosing a decentralized system is not just a good idea; it’s essential.

Want to learn more about decentralized digital ID and how it can benefit you or your business?

Visit the Extrimian Academy: Extrimian Academy Explore Extrimian solutions: Extrimian Product Extrimian Wikis: Verifiable Credentials (VCs) Decentralized Identifiers (DIDs) Zero-Knowledge Proofs (ZKPs) Digital Identity Evolution QuarkID ID Protocol The Future is Decentralized: Regulations and Expert Guidance

Decentralized digital identity isn’t just a futuristic concept; it’s rapidly becoming a reality. Across the globe, governments and organizations are recognizing the importance of secure and user-centric identity solutions. In Europe, for instance, regulations like eIDAS 2 are paving the way for the widespread adoption of decentralized digital wallets, empowering citizens with control over their data.

You can find detailed information about eIDAS 2 and its implications on the European Commission website.

This trend is set to expand to Latin America and other regions, driven by the need for enhanced security, privacy, and efficiency in digital interactions. Extrimian, with its expertise in decentralized technologies and commitment to innovation, is at the forefront of this transformation. By partnering with Extrimian, organizations in Latin America can:  

Stay ahead of the curve: Be prepared for upcoming regulations and leverage the latest advancements in digital identity. Implement robust solutions: Develop secure and user-friendly decentralized ID systems tailored to their specific needs. Build trust and transparency: Establish a foundation of trust with customers and partners through transparent and ethical data management practices.

With Extrimian’s guidance, organizations can navigate the complexities of decentralized digital identity and unlock its full potential for a more secure and connected future.

Don’t wait until it’s too late. Take control of your digital identity today with Extrimian.

The post Centralized vs Decentralized Digital ID first appeared on Extrimian.


Spruce Systems

Stories from the Future: How New U.S. Digital Identity Rules Will Change Our Lives

NIST digital identity standards are paving the way for secure, user-controlled digital credentials, revolutionizing access to government services.

Last week, as various friends in southern California were sharing status updates in social media, comparing details on how to prepare to flee nearby wildfires, and in some cases, seeking new places to live, several shared the below image of what documents to be sure to collect. It’s a very thorough list, and I’ll be the first to admit, I might have a hard time gathering all these documents with just a couple hours’ notice — especially while also preparing to evacuate my family.

I would guess most Americans would have a similarly hard time. It’s terrifying to think about all your life’s most important papers going up in smoke (or floating downstream, or getting blown away). That’s one of many reasons I’m so proud of the work that SpruceID, and so many organizations across the world, are doing to make sure crucial documents can be safely and securely digitized, in a privacy-preserving and owner-controlled manner. 

Within the next decade, you’ll be able to store even sensitive documents like birth certificates, health records, and social security cards on your phone, using the digital identity technology SpruceID builds. It will be a huge boon for disaster victims and other vulnerable groups.

I’m enough of an identity and policy wonk to be excited about one of the relatively unsung drivers of that future: U.S. Federal government standards for digital identity management. The fourth revision of the NIST 800-63 Digital Identity Guidelines was recently issued by the National Institute of Standards and Technology, and they describe how user identities are first proven and then recorded for use in accessing government benefits or tax systems. NIST standards are widely referenced in government procurement standards, leading most private U.S. firms to follow their lead. Foreign governments also look to NIST to inform their own guidance, so the standards have a global impact.

This round of updates have particularly major implications. NIST standards now include various roles and guidelines for digital credentials (such as California’s mobile driver’s license) for logging on to government systems. 

That means digital credentials are going to be a much bigger part of our future.

Logging On In a Whole New Way

The most important part of the new NIST standards is simply that they include roles for encryption-backed digital credentials for the first time. This will fuel a huge step forward in adoption and acceptance of these technologies, thanks to both its implications for government contractors, and the more general “stamp of approval” their acknowledgement by NIST carries.

Most notably, this includes guidelines for using digital credentials stored in user-controlled wallets to log in to Federal services. For the vast majority of users, this will be a new experience of logging on – not with a password, but with a digitally-signed proof of identity stored on a secure hardware chip on your phone. This should lead to broad improvements in security, since passwords have been the chronic target of malicious hackers.

These new rules will add to the ongoing adoption of digital wallets as a part of digital life. “Wallets” are pieces of software that manage and display digital credentials, both for real-world and online purposes. More and more people are already relying on them instead of physical wallets, and defining them for use in U.S. government systems will only make them more useful, and more ubiquitous. It’s a huge win for cybersecurity – and that’s about more than replacing passwords.

Security That Fits

The revised digital identity standards also include guidance for using digital credentials as the basis for what’s known as ‘federated’ account management. This would essentially mean one credential, tied to one account, could give access to a host of different services or platforms. For everyday digital citizens, this reduces the surface area they need to protect - only one account to secure with strong passwords+mfa (or even better, phishing-resistant passkeys), as opposed to the over 150 accounts that most adults have today.  

The NIST guidance also presents an overarching approach to risk management for online services, defining three levels of rigor for identity proofing and authentication, used to set varying requirements depending on the sensitivity of the service being controlled. For instance, Identity Assurance Level 1 (IAL1) simply involves proof that the user is human and not a bot, and that’s enough protection to let a user access, for instance, a purely informational government web page. Higher levels of verification can require more rigorous in-person identity “proofing” for the issuance of a credential, or require multiple authenticators that show control of that credential.

Descriptions of the new NIST assurance levels now include specific reference to features of digital credentials. The highest Authentication Assurance Level (AAL3) specifically requires encrypted credentials based on key-pair cryptography, and a “hardware-based authenticator with a non-exportable private key”. 

That’s effectively a description of digital credentials stored on trusted hardware, and many of those credentials are issued based on in-person identity proofing that also meets the highest assurance level. That means that in the future, a rigorously-issued digital credential such as a driver’s license could be used as a login for even quite sensitive Federal services.

More Security, More Access, More Stability

Taken together, updates to the NIST-800 identity standards mean there will be more opportunities to use secure digital credentials, kicking off a virtuous cycle with many, many benefits. Obviously we’re big fans of the improved security digital credentials can provide, and the added privacy thanks to features like selective disclosure.

But my thoughts return to the folks across the U.S. who have been displaced and disrupted this past year – whether by a storm, fire, family struggles, or other hardships. With smartphones nearly ubiquitous, digital credentials securely tied to a hardware you carry everywhere – and usable in many cases even without a cellular signal – will become a widespread boon. Whether you’re filing paperwork that will help you get back on your feet, or just logging in to a website you use every day, digital identity means a better future is coming soon.

Learn More About Verifiable Digital Credentials

About SpruceID: SpruceID is building a future where users control their identity and data across all digital interactions.


playhaus.tv

35 – Crypto-Billionaire-in-Chief

GM HEARTLAND New year, old us. (By “Golden Age of America”, we’re pretty sure Trump was referring to the classic era of Tuesday release dates.) —El Prof, Muhammed & Chad MONEY MONEY MONEY TOKEN PRICE CHANGE PRICE Solana ($SOL) +34.17% $252.57 Helium ($HNT) -6.65% $4.45 Pyth ($PYTH) -1.32% $0.32 Save ($SLND) +1.45% $0.84 (Price changes […]
GM HEARTLAND

New year, old us.

(By “Golden Age of America”, we’re pretty sure Trump was referring to the classic era of Tuesday release dates.)

—El Prof, Muhammed & Chad

MONEY MONEY MONEY

TOKEN

PRICE CHANGE

PRICE

Solana ($SOL)

+34.17%

$252.57

Helium ($HNT)

-6.65%

$4.45

Pyth ($PYTH)

-1.32%

$0.32

Save ($SLND)

+1.45%

$0.84

(Price changes reflect past 7 days as of 1.21.25)

BUZZWORD OF THE WEEK de-PIN:

Public utilities that are modern and efficient, through advanced accounting and auditing technologies enabled with AI

The next evolution of IoT (Internet of Things), where the data prescribes agents to identify and resolve problems before they get out of hand

The robotic arm of the Data Economy

Check out more of our favorite buzzwords here.

A Lifetime In 96 Hours

The last 96 hours have been exhausting. Why wouldn’t it be for the industry that never sleeps? Web3 is 24/7. So what happens when MLK Day, the CFP Championship Game, and the coronation of our new Crypto-Billionaire-in-Chief all fall within the same 24?

Two words: price action. And boy did we get some action. It started with an announcement that American-made web3 solutions would be championed by the Trump administration. (Although it sacrilegiously named XRP and Solana in the same breadth, two projects that couldn’t represent fundamentally more different approaches to building solutions in the space, and yet also the mostly likely rails of our future.)

But this announcement was merely a precursor for what followed next, which was a launch of the official $TRUMP presidential commemorative token (read: shitcoin) on the Solana blockchain, seemingly a fundraising event for the Trump-backed crypto projects within the Ethereum ecosystem.

(Full disclosure: the +SOL team holds the shitcoin in question. I entered at a $27M marketcap with a modest .1 SOL bet at the insistence of my fellow writer Muhammed, which I rode all the way to $70M — and back down to $30M.)

So what does it mean to be standing in an era where the sitting President opens his second term with a rug pull? While, on the other end of the spectrum, we’ve got Gensler’s farewell (and/or fuck you) present on his way out of office: a lawsuit against the most presently useful and real project in the space, Helium.

I wish I had an answer. But the bizarre and short-lived TikTok ban, despite amounting to just a few hours of non-access, thoroughly disrupted my Sunday morning info consumption. So I’m not sure what the plot of anything is anymore. 

But we have to start the search somewhere, so let’s start there. The original movement to ban TikTok in the US actually began as a Trump initiative to counter the influence of China. That was before he was convinced by Barron to leverage the platform for his reelection campaign by influencing young, male voters, an overwhelming majority of which overlap with the current online crypto communities. But at some point in there, it was co-opted by a foreign lobby with a lot to lose from millions of Americans getting together and criticizing the way they wage war, or influencing their access to American taxpayers’ funds.

As a dyed-in-the-wool data nerd, the argument that TikTok has too much access to consumer data feels off. The thesis goes that TikTok is a China-owned propaganda machine influencing American’s political positions. But that doesn’t entirely jive with the reality, which is that TikTok is banned in China (yes, really), based in Singapore, owned by private individuals from multiple countries, and has less access to data than the average American tech company.

But officially, it’s the data, not the influence, driving the ban. That’s because the data represents the inputs for TikTok’s algorithm, which I am 100% convinced is an unsupervised learning algo aimed at delivering you a personalized feed to maximize your session time by matching videos to your expressed preferences based on past viewing behaviors. This is something American social media companies simply can’t do, because it is not the most direct path to profitability. Instead, they are incentivized to favor the content that primes you to engage with ads, so they can make more money. But that in turn undermines their own usefulness and influence, which is why TikTok is eating their lunch.

The point being, in midst of a major sea change in crypto/online/American culture, only the fools are pretending like they have any clue where this is all going. The Convicts are whooping the Catholics (there’s a Miami in Ohio, and I’m a Wolverine), Zuck caught a Dirty Sanchez, Elon might have done a Nazi on his way to Mars, and Ross Albricht got a pardon. But at least we still have TikTok, for now, to compare notes.

We live in the most absurd timeline. Until next week.

—El Prof

SPONSORED BY 1440 MEDIA Daily News for Curious Minds

Be the smartest person in the room by reading 1440! Dive into 1440, where 4 million Americans find their daily, fact-based news fix. We navigate through 100+ sources to deliver a comprehensive roundup from every corner of the internet – politics, global events, business, and culture, all in a quick, 5-minute newsletter. It’s completely free and devoid of bias or political influence, ensuring you get the facts straight. Subscribe to 1440 today.

Sign up now!

  The Fartcoin Stage of the Market Cycle

Much like swallowed air, legumes, and the human digestive tract can create some unholy alchemy, modern technology has led us to what Greenlight Capital’s David Einhorn called “the ‘Fartcoin’ stage of the market cycle.”

Einhorn was talking about the traditional public markets. But in explaining how TradFi valuations had exceeded common sense levels and veered into the territory of absurd and groundless hype, he invoked the reigning champion of the memecoin space, Fartcoin ($FARTCOIN).

On one level, Einhorn’s comparison was apt. Fartcoin’s appeal is in no way rooted in common sense. But it’s not inexplicable either. The shitcoin (shartcoin?) is one of several tokens propelled to prominence by the compatability of two new technologies: blockchain and AI. Typically, the best combos are more than the sum of their parts. And indeed, crypto and artificial intelligence together have the intangible “it” factor, creating value where logic might suggest there should be none.

Fartcoin’s value surged another 60% recently, one of the clearest indicators of just how powerful meme-based tokens can be when coupled with AI’s predictive and creative capabilities. Fartcoin’s originated as an AI chatbot’s idea of a joke, with every transaction triggering a fart noise. But it has become a phenomenon. And AI played a crucial role its origin story. By analyzing what types of humor and gimmicks get viral traction, the AI behind Fartcoin has created a memecoin that’s both ridiculously fun and primed for market dominance. The Fartcoin community isn’t just about trading — it’s about shared enjoyment, and that’s where the real value lies.

Elsewhere, Wall Street Pepe ($WEPE), an Ethereum-based memecoin, is bringing a unique twist to the scene by adding an element of utility — something that’s not always common in the meme world. The token has raised an astounding $48 million in presale funding, driven by the promise of empowering retail investors with access to exclusive trading signals and insights.

What sets $WEPE apart is how AI helps democratize trading, by analyzing market patterns and generating strategies that can give smaller traders a fighting chance against the whales. With its ability to process massive amounts of data, AI can offer predictions and strategies in real-time, leveling the playing field and turning meme coins like Wall Street Pepe into something more than just a joke. As AI continues to evolve in the crypto space, it could very well power more meme coins to add genuine value, far beyond the volatility of their initial hype.

Perhaps the most explosive example of AI’s potential in the memecoin world is the rise of iDEGEN. This controversial AI project has already raised over $16 million in presale funding, and its audacious, unfiltered approach to meme creation is turning heads. Created as a social experiment, iDEGEN was programmed to learn from the most deranged, unrestrained corners of crypto communities. Through its unorthodox approach — analyzing and adapting to the language and culture of “degens” — it has skyrocketed in popularity.

But not without a few stumbling blocks. iDEGEN was banned on X for “violent speech”. (That’s what you get for adapting the language of degens.) But it didn’t disappear. It exploded. Supporters launched a #freeiDEGEN campaign that sent presale numbers through the roof. The AI behind iDEGEN learns from user interactions, social media trends, and memetic warfare, creating content that resonates with the chaotic nature of crypto traders. In doing so, it has become the ultimate viral sensation, tapping into one of the most powerful memecoin catalysts: controversy.

Zooming out, we’re witnessing a fundamental shift in how meme coins are created, managed, and marketed. Traditionally, these coins were driven by human-created memes, influencers, or viral moments. Now, AI is taking the reins, analyzing social behavior, predicting trends, and even generating memes that resonate deeply with crypto’s unique culture. It’s not just about creating a coin that rides a wave of internet humor; AI is optimizing these coins to ride waves of market sentiment.

As AI continues to learn and adapt, the relationship between artificial intelligence and meme coins could be poised for significant growth. Unlike traditional projects, these AI-driven coins don’t just follow trends — they create them. The adaptability of AI, combined with the viral nature of memes, creates an ecosystem where anything is possible. From predictive trading to real-time market manipulation, the potential applications are enormous.

However, as AI begins to play a larger role in memecoin creation and management, the potential for manipulation and volatility increases. Fartcoin, Wall Street Pepe, and iDEGEN have all benefited from AI’s ability to predict, analyze, and generate content that speaks directly to the crypto crowd. But as the market matures, so too will the potential risks associated with these projects. AI will need to balance creativity with responsibility, ensuring that it’s not just fueling more speculative bubbles or scams.

In short, the future of AI-driven memecoins is both exciting and uncertain. Will they remain a fleeting trend, or will they become a mainstay of blockchain? Only time will tell, but one thing’s for sure: they’re here to stay, and they’re reshaping the landscape in ways we could have never predicted. So, while Fartcoin might have started as a joke, it’s a glimpse into the future where AI is not just analyzing the world, but creating new assets that reflect the wild, unpredictable nature of the blockchain.

—Muhammed


ComplyCube

The Price of Identity Fraud in the UK 

Identity fraud in the UK has escalated over the past few years, recently predicted in December of 2024 to cost the UK government a shocking £1.8 billion per year. Businesses must protect themselves with IDV and KYC checks. The post The Price of Identity Fraud in the UK  first appeared on ComplyCube.

Identity fraud in the UK has escalated over the past few years, recently predicted in December of 2024 to cost the UK government a shocking £1.8 billion per year. Businesses must protect themselves with IDV and KYC checks.

The post The Price of Identity Fraud in the UK  first appeared on ComplyCube.


Finicity

Open Banking 2025 Thoughts & Trends

As we head into the new year, we are highlighting a few topics that are top of mind for Mastercard Open Banking, and how we see the Open Banking landscape… The post Open Banking 2025 Thoughts & Trends appeared first on Finicity.

As we head into the new year, we are highlighting a few topics that are top of mind for Mastercard Open Banking, and how we see the Open Banking landscape evolving over the next 12-24 months.  

At a Glance  Open Banking adoption continues to gain traction across the globe – This is a result of increased consumer, merchant, and biller appetite, regulations, borrower demand for a digital mortgage experience, and an increase in account-to-account (A2A) payments usage. As momentum accelerates, there is more emphasis on safeguarding consumer information and protecting against fraud in Open Banking.   A2A and alternative payment methods are increasing in usage all over the world – Open Banking enables a more seamless A2A experience, particularly in verticals like bill pay, disbursements, and recurring payments. However, there are some barriers that are preventing A2A from scaling.   Looking ahead, we see 4 key themes that are rising in importance in Open Banking – We anticipate that Open Banking will unlock opportunities for consumers and businesses to benefit from their data and allow companies to power next-generation personalized financial services by improving the financial experiences of small businesses, leveraging technology such as Generative AI which powers innovative new use cases (e.g., categorization, security/privacy), integrating closely with Real-time Payments (RTP), and enabling value-added services and personalization with the transition to Open Finance.

Mastercard’s strategy is centered on the trends we are seeing, where we think the Open Banking market is headed, and being a valued and trusted partner to our customers by enabling them to provide enhanced financial experiences to their end users. 

What we’re seeing in the market   Open Banking is on the rise around the world, driven by different tailwinds. Consumers want more automated and digitized ways to move money, to manage their finances (e.g., by viewing their financial data and unlocking actionable insights), and more transparency and control of their data. They are using Open Banking for topping up their investment accounts, funding their wallets, and applying for mortgages. Regulations, Open Banking players pushing forward innovative solutions, and the desire for seamless, enhanced financial experiences are all drivers of Open Banking. In Europe, Open Banking use is expected to double by 2027 and in the UK, 70% of consumers connect their financial accounts directly to tools to conduct financial tasks. In the U.S., 80% of consumers also already link their financial accounts. Open Banking in Australia is still relatively nascent, but 89% of B2B users report using Open Banking today. Brazil has been a trailblazer in Open Finance – there were 4.8B API calls in June 2023 in Brazil, four times the number of calls in the UK. We are cognizant that as Open Banking matures, more and more markets will adopt and accelerate its usage. At Mastercard, market expansion opportunities are evaluated where there is greatest demand, and we will innovate and test concepts in markets that are maturing.  Regulations are changing the landscape for Open Banking. Open Banking regulations are at different stages in key global markets. While Europe and the UK were some of the first to introduce Open Banking regulation with the Payment Services Directive (PSD2) and later, Payment Services Regulation (PSR), other countries around the world are putting their own regulatory frameworks in place. For example, Canada’s Department of Finance (DoF) and the Financial Consumer Agency of Canada (FCAC) are also working on elements of Open Banking regulation in the country. Several countries in Africa are adopting frameworks for Open Banking, and Saudi Arabia and Bahrain are launching innovative measures to test Open Banking solutions. Mexico and Brazil led the way in Latin America in establishing Open Banking regulations, with a particular focus on Open Finance and leveling the playing field between fintech startups and incumbent banks. We will continue to work across the ecosystem to support our customers, consumers and small businesses in navigating regulatory changes.  Borrower demand for digital mortgage experiences is increasing. Homebuyers in the U.S. are indicating that they are more interested in leveraging digital channels for mortgages. Those surveyed cited process acceleration (75%) and making the process easier (71%) as the top benefits of a digital mortgage process. Open Banking is key to powering these experiences – it allows lenders to securely collect financial data digitally, conduct more comprehensive assessments of an applicant’s financial health, and make more informed loan decisions. To meet consumer demands and streamline the lending process, Mastercard has collaborated with U.S. government sponsored enterprises (GSEs) such as Fannie Mae and Freddie Mac in connection with certain digital verification of asset, income and employment solutions. These new mortgage solutions are driving more demand for Open Banking and alternative data sources in lending.   A2A payment flows are becoming a more common way to pay. While there are multiple payment options available to consumers and businesses today (credit cards, debit cards, BNPL, cash, etc.), A2A payments are the second-most preferred payment choice for bill payment in the U.S. and are increasingly being adopted worldwide. On a global level, A2A payments for e-commerce are expected to grow at a 14% CAGR (compound annual growth rate) through 2027. Government-led schemes for A2A are proliferating its usage in countries including India (Unified Payments Interface), Brazil (PIX) and Thailand (PromptPay). Open Banking-powered A2A payments can transform the A2A experience by making it a seamless and secure way to pay – in particular, we’re seeing Open Banking powered payments pick up in verticals like bill pay, disbursements, recurring payments – where paying by ACH (traditional A2A method) has already been popular in the U.S., for example. Recognizing this market demand, we are partnering with players like JPMC and Worldpay in the U.S. to scale A2A for their customers. We are also continuing to explore innovative solutions that would enable the scaling of A2A globally – for example, Mastercard’s approach to Open Banking helps protect the ecosystem to make OB-enabled A2A payments seamless and secure.  Fraud and identity risk are top of mind. While Open Banking will provide new opportunities, like with any exchange of personal data online, there are also risks. As more people use digital channels for financial experiences, there is the possibility for fraudsters to find new ways to attack businesses and consumers. It is estimated that the worldwide costs of cybercrimes will reach $12T in 2025 and 94% of consumers surveyed say that it’s important that financial institutions keep consumer financial data secure. To ensure consumers feel safe using Open Banking and the experiences it powers, fraud mitigation plays a significant role – for example, leveraging identity verification and device intelligence at account opening, multi-factor authentication at sign in1, and predictive risk signals for payments. At Mastercard, we remain committed to maintaining best-in-class security and data privacy for our Open Banking assets. This is why we are leveraging our rich network of global identity insights and device verification, and integrating them with our Open Banking offering. We believe Open Banking and fraud mitigation will continue to go hand-in-hand as the ecosystem matures.  

Spotlight on A2A Trend  What are A2A Payments?  Account-to-Account (A2A) payments are electronic money transfers from one bank account to another.​ A2A payments can be initiated in two ways, either as a push payment — initiated by the party making the payment — or as a pull payment — initiated by the party collecting the payment. Many consumers already use A2A payments by simply sending money between their own bank accounts or transferring money to someone using platforms like PayPal or Cash App. The 4 main use cases for A2A are Bill Payments, Me2Me, Person to Merchant (P2M), and Person to Person (P2P):  Growth in A2A is being driven by a number of factors:   However, A2A payments are still experiencing some challenges to widespread adoption:  Suboptimal A2A checkout process:  A2A payment methods have either required consumers to input bank account numbers or login to their bank’s portal for each purchase, which can be time consuming and error prone. In countries where A2A has gotten more traction (e.g., India, Brazil), it has been primarily through QR code which is a suboptimal experience.   Inadequate consumer purchase protections compared to card:  Many A2A payment methods lack the same protections that card payments have, and that both consumers and merchants want.  Lack of trust: There is a lack of trust from some consumers towards A2A payments, because they have a familiarity with methods like credit and debit payments and are accustomed to their reliability and ubiquity.   Lack of scaled use by merchants: Merchants face certain risks with traditional A2A payments, including declines due to insufficient funds, unauthorized returns, etc.   How does Open Banking enhance A2A?  

Without Open Banking: Traditional A2A is a clunky experience, as consumers need to either initiate bank transfers through their bank account directly or manually enter their banking account and routing number through a suboptimal checkout experience. In some markets, there is also limited transparency in payment settlement timing and risk of payment, for merchants/billers who are offering A2A to their customers. For example, merchants must manually verify customer bank accounts with micro-deposits, and there may be a multiple day delay for a successful A2A payment. Lastly, traditional A2A lacks the rich data insights to verify identity, and to prevent fraud/ non-sufficient funds returns.  

With Open Banking: Open Banking makes A2A payments seamless for consumers. Instead of the error-prone process of finding and manually entering account details – consumers can now leverage the latest technology to easily share their bank data. Powered by Open Banking, A2A payments can be made quickly, with extremely rich insights – such as account owner verification, balance checks, risk indicators, tokenization and fraud signals. In any market, Open Banking makes A2A payments easier, faster, and convenient. Additionally, Open Banking can help in the fight against fraud. For example, when a consumer initiates an account-based payment from their bank account, Mastercard enables account validation to confirm account ownership and validate identity details in real-time through Mastercard Open Banking, drawing on the safe exchange of consumer-permissioned data to facilitate frictionless and secure payments. 

Illustrative US A2A Payments flow (powered by open banking)2 What will it take to make A2A payments more mainstream?  

We believe that there is a positive trajectory for A2A payments. For A2A adoption to scale in use cases like ecommerce, it is important that consumers feel as secure using A2A as they do with other payment methods. Consumers also prefer a more user-friendly and streamlined user experience which removes friction from the A2A journey. Merchants and digital players are looking to provide consumers with a range of payment options, so helping to integrate A2A payments into their existing platforms will improve merchant acceptance and be vital in adoption. Lastly, we believe the scaling of A2A payments will be contingent on value-added services, which leverage consumer data (with consent) to create a secure and seamless payments ecosystem. We believe Open Banking can power many of these enhancements to A2A, to help scale.  

Looking Ahead 

In addition to A2A, there are a number of market forces and themes that we think will be prominent in the Open Banking landscape over the next 12-24 months. A few are highlighted below –   

There is untapped potential in Open Banking use cases for small businesses. We believe more small businesses will use Open Banking to easily and safely share their banking information, paving the way for an easier lending process and customized financial recommendations to help them with their cashflow.  92% of businesses surveyed believe that it is somewhat to very important to have the latest technology for risk decisioning and credit scoring. Mastercard already offers a comprehensive solution set for small businesses – including real-time business account data, rich cash flow and balance analytics, smarter credit decisioning, etc. and we are continuing to enhance based on what is priority for SMBs.3   Use cases for AI in Open Banking will continue to evolve, enabling more personalized financial services experiences. For example, Generative AI can power financial assistants that can make investment recommendations, help with data categorization to give a comprehensive picture of finances, enable more inclusive lending processes, as well as power smarter payments systems with predictive capabilities. We believe AI is a powerful tool for Open Banking, and this is why we’ve been leveraging it to categorize and extract insights from transaction data, which feed into downstream AI models that power our payments and lending solutions. We’ve also partnered with players like bunq, the second largest neobank in Europe, to power spending insights for users – leveraging AI. However, we recognize that data transparency, security, and protecting against bias will become even more important, as Open Banking and AI are intertwined to solve for new and innovative use cases.  Real-time payments (RTP) will accelerate, led by the launch of FedNow in the U.S., and the SEPA Instant Payments Mandate in Europe. RTP has already seen strong success in other countries around the world like PIX in Brazil, UPI in India, etc. For consumers, RTP provides the option for swifter bill payments and near instant payouts, especially important for gig economy workers. Businesses are afforded faster settlements, improved payroll, and reduced disputes due to more efficient reconciliation and refunds. Bank adoption and use of RTP rails in the U.S. are still emerging, due to issues such as coverage/interoperability, irrevocable funds, and fraud risk. ​However, government pushes for RTP in Europe and the U.S. may catalyze adoption. Open Banking providers have an opportunity to build out use cases that accommodate RTP and mitigate the fraud risks that come with it. For example, Open Banking can provide risk insights and recommendations around the timing of payment and rail choice. In the U.S., Mastercard Open Banking is providing merchants, fintechs and banks rail agnostic risk signals, enabling payment decisioning across payment methods, and supporting consumer choice and flexible merchant usage.   Open Banking will move towards Open Finance, as more expansive datasets are used to offer more personalized and actionable insights and value-added services for consumers. Open Finance moves beyond Open Banking by covering more financial data inputs (e.g., payroll, insurance, investment/brokerage data). The European Commission is working to establish an Open Finance framework that would outline clear rights and obligations to manage customer data sharing in the financial sector beyond payment accounts. In Australia, the CDR is expanding to Open Finance with non-bank lenders and BNPL product providers set to be brought into scope in early 2025 (with first compliance obligations to commence in mid-2026). We believe regulation and consumer demand will serve as a foundation for the expansion into Open Finance, and will create further innovation for services like employee benefits, wealth advisory, etc. Mastercard is already supporting Open Finance in the U.S. – we have connections to payroll and investment data, as well as mortgage data and auto loan data, and are continuing to expand datasets.  

Mastercard’s role in the Open Banking journey 

Our vision in Open Banking is driven by many of the trends we’re seeing in the market and enabling enhanced financial experiences for our customers. We remain diligent in advancing our four primary use cases: payments, account opening, lending, and small business, while leveraging the broader Mastercard ecosystem to provide incremental value to our customers. We are enabling an Open Banking future that empowers consumers and small businesses to share their data for their own benefit and allows all parties in the ecosystem to thrive. To learn more about our Open Banking solution set – please click here. You can also see how Mastercard Open Banking creates priceless possibilities for all here

Footnotes

1 – Strong customer authentication (SCA) under the EU’s Second Payment Services Directive (PSD2), mandates multi-factor authentication (MFA) to prevent unauthorized access (link); MFA is not mandated in the US, but FI’s can implement MFA according to their own discretion; Australia’s CDR governs MFA.

2 – Mastercard partners with companies to enable A2A payments in the US; payments flow shown may be supplemented with additional steps from Partner.

3 – Mastercard US Open Banking for Business solutions (illustrative, not comprehensive).

The post Open Banking 2025 Thoughts & Trends appeared first on Finicity.


ComplyCube

Understanding User Risk From Identity Fraud

In 2023, 1.9 million British consumers fell victim to financial account misuse. These shocking statistics clearly point to the need for increased measures against these fraudulent practices, starting with advanced biometrics. The post Understanding User Risk From Identity Fraud first appeared on ComplyCube.

In 2023, 1.9 million British consumers fell victim to financial account misuse. These shocking statistics clearly point to the need for increased measures against these fraudulent practices, starting with advanced biometrics.

The post Understanding User Risk From Identity Fraud first appeared on ComplyCube.


Tokeny Solutions

Fasanara Launches Tokenized Money Market Fund on Polygon

The post Fasanara Launches Tokenized Money Market Fund on Polygon appeared first on Tokeny.

Luxembourg, 21 January 2025 – Fasanara Capital Ltd (“Fasanara”), a London-based institutional investment manager and global leader in digital finance with over $4 billion in assets under management, has launched its first tokenized Money Market Fund, the “Fasanara MMF Token” (“FAST”), held on the Polygon PoS (Proof of Stake) public blockchain. Developed in collaboration with Apex Group, Tokeny, Chainlink, Fireblocks, and XBTO, FAST offers investors a faster, more cost-effective, and transparent way to access money market investments.

FAST integrates the stability of traditional money market investments with the operational efficiency of blockchain technology. By leveraging Polygon’s scalable infrastructure, FAST enables real-time settlement and open distribution, eliminating manual processes and broadening investor access. This digital approach streamlines subscriptions, redemptions, and ongoing fund management, providing investors with a seamless investment experience.

With FAST, we are not only reshaping the future of money market investments but also redefining how investors engage with financial markets. By harnessing blockchain technology, we provide an innovative and compliant investment solution that enables seamless access to liquidity, real-time processing, and enhanced transparency – all while maintaining the rigor of traditional asset management practices. Francesco FiliaFounder and CEO of Fasanara

The launch of Fasanara’s first tokenized Money Market Fund represents a significant milestone for the firm, positioning it as a pioneer in technology-enabled investing. Through FAST, Fasanara is not only modernizing fund management but also setting a new benchmark for digital innovation in asset management. By tokenizing a stable asset class like a money market fund, Fasanara aims to redefine how investors engage with these investments, making them more accessible and adaptable to today’s digital-first economy.

FAST is structured using ERC-3643 smart contracts, ensuring regulatory compliance and operational flexibility at the token level. Apex Group, the fund’s administrator, uses Tokeny’s blockchain-based platform for transfer agency management. Security is enhanced through Fireblocks’ key management and wallet infrastructure, safeguarding on-chain operations. To further enhance the transparency, utility, and liquidity of FAST, Fasanara will employ the Chainlink standard, including Proof of Reserve and Data Feeds to verify AUM and bring NAV data on-chain, and intends to leverage Chainlink’s Cross-Chain Interoperability Protocol (CCIP) to enhance connectivity and scalability across blockchain networks. To provide secure asset custody, XBTO’s regulated custodial division, Stablehouse, will act as custodian.

This comprehensive, blockchain-native infrastructure is purpose-built to meet the evolving needs of modern investors who seek greater transparency, speed, and liquidity. By bridging traditional finance and decentralized finance (DeFi), FAST is part of Fasanara’s strategic commitment to digital transformation in asset management, aligning with broader industry trends toward asset digitization.

We are proud to partner with Fasanara in delivering this innovative fund. By leveraging a standardized framework for compliant tokenization, we are enhancing operational efficiency, while ensuring seamless interoperability and distribution. This approach not only meets the growing demand for interoperable and on-chain solutions but also provides our clients with a future-ready platform for navigating the evolving financial landscape. Peter HughesFounder and CEO of Apex Group The market is reaching a new level of maturity, and leaders like Fasanara are setting the standard for the future of on-chain finance. We are thrilled to provide the platform that enables institutional-grade on-chain finance for this new ecosystem. With a token-centric approach, we ensure that tokens are interoperable on-chain with other applications, enforce all compliance rules in every transaction, and ensure, when necessary, that Fasanara and its fund administrator Apex Group have full control over FAST. Luc FalempinCEO at Tokeny We are thrilled to collaborate with Fasanara on this pioneering step toward the tokenization of money market funds. FAST exemplifies how financial institutions can leverage blockchain technology to deliver greater efficiency, transparency, and security in traditional assets, all while adhering to rigorous compliance standards. Thanks to the seamless integration of Tokeny’s smart contract capabilities with Fireblocks’ secure infrastructure, we’re helping to redefine operational standards and facilitate seamless digital asset management for the next generation of financial products. Varun PaulSenior Director and Business Lead for CBDC and Financial Market Infrastructure at Fireblocks We’re excited that Fasanara is adopting the Chainlink standard to bring AUM verifications and NAV data on-chain. This will show how Chainlink’s essential infrastructure for tokenized assets can help leading financial institutions enhance the utility, accessibility, and transparency of assets on-chain while paving the way for cross-chain interoperability through protocols like CCIP, accelerating the widespread adoption of tokenized assets. Angie WalkerGlobal Head of Banking and Capital Markets at Chainlink We are proud to leverage our bankruptcy-remote digital asset services platform to provide unparalleled security for FAST. This partnership with Fasanara not only underscores our commitment to asset protection but also sets a new standard for safeguarding digital assets within a tokenized framework. By utilizing blockchain’s efficiency, we are advancing secure, transparent access to traditional financial products in a rapidly evolving market. Philippe BekhaziCEO and Founder of XBTO Fasanara’s launch of the FAST token on Polygon PoS is a powerful example of how blockchain is transforming traditional finance. By leveraging Polygon PoS scalable infrastructure, Fasanara is creating a pathway for real-time settlement, transparency, and broader accessibility in money market funds – benefits that are only possible through blockchain. This milestone marks another step forward in merging DeFi with established financial products, opening up new opportunities for investors globally. Colin ButlerVP of Institutional Capital at Polygon Labs

Click https://www.fasanara.com/funds/tokenisation to request more information.

About Fasanara

Fasanara is an institutional investment manager that offers tech-enabled asset-based credit and digital assets solutions. Founded in 2011, Fasanara currently manages over $4 billion in assets under management, and is focused on delivering uncorrelated returns through a technology-centric and systematic investment approach. Fasanara operates one of the largest and best-performing institutional market-neutral digital asset hedge funds globally.

Fasanara offers institutional-grade investment opportunities across niche asset classes within specialty finance and digital assets. Fasanara’s digital asset operation was set up in 2018 and has grown to become a top liquidity provider to major exchanges worldwide. Within 2024 alone, Fasanara had transacted over $250 billion in crypto market volumes. Fasanara is authorised and regulated by the Financial Conduct Authority (Firm reference number: 551020).

About Polygon Technology

Polygon PoS is a blockchain scaling solution that enables faster, more cost-effective transactions on the Ethereum blockchain. As one of the most popular Layer 2 solutions, Polygon PoS provides a high-performance infrastructure for decentralized applications and financial products, supporting a growing ecosystem of tokenized assets, including funds like FAST, that benefit from enhanced speed, security, and scalability.

About Apex Group

Apex Group is dedicated to driving positive change in financial services while supporting the growth and ambitions of asset managers, allocators, financial institutions, and family offices. Established in Bermuda in 2003, the Group has continually disrupted the industry through its investment in innovation and talent.  Today, Apex Group sets the pace in fund and asset servicing and stands out for its unique single-source solution and unified cross asset-class platform which supports the entire value chain, harnesses leading innovative technology, and benefits from cross-jurisdictional expertise delivered by a long-standing management team and over 13,000 highly integrated professionals.

About Chainlink

Chainlink is the standard for secure onchain data and cross-chain interoperability, powering leading tokenized assets and unifying global markets. Chainlink has enabled over $18 trillion in transaction value across the blockchain economy. Major financial market infrastructures and institutions, such as Swift, Fidelity International, and ANZ Bank, as well as top DeFi protocols including Aave, GMX, and Lido, use Chainlink to power next-generation applications for banking, asset management, and other major sectors. Learn more by visiting chain.link.

About Fireblocks

Fireblocks is an easy-to-use platform to create new blockchain-based products, and manage day-to-day digital asset operations. Exchanges, banks, PSPs, lending desks, custodians, trading desks, and hedge funds can securely scale their digital asset operations through the Fireblocks Network and MPC-based Wallet Infrastructure. Fireblocks serves thousands of organizations in the financial, payments, and web3 space, has secured the transfer of over $6 trillion in digital assets, and has a unique insurance policy that covers assets in storage & transit. Find out why CISOs and Ops Teams love Fireblocks at www.fireblocks.com.

About Tokeny

Tokeny is a leading on-chain finance operating system. Tokeny has pioneered compliant tokenization with the open-source ERC-3643 standard. It provides an enterprise-grade platform and APIs to enable seamless issuance, transfer, and management of tokenized securities. By automating operations, offering innovative on-chain services, and connecting with any desired distributors, Tokeny helps financial actors attract more clients and improve liquidity.

Website | LinkedIn | X/Twitter

About XBTO

​​Founded in 2015, XBTO is a full-service digital asset platform that offers institutions, family offices and high net worth individuals access to best-in-class investment solutions, enabling them to navigate the digital asset market with confidence. XBTO is licensed by the Bermuda Monetary Authority under the Digital Asset Business Act and has received an IPA from the FSRA in ADGM and has presence across 6 locations: Bermuda, Miami, New York, London, Paris, and Abu Dhabi.

Disclaimer

Accuracy of information

Whilst considerable care has been taken to ensure the information contained within this press release (the “Press Release”) is accurate and up to date, no warranty, guarantee or representation is given as to the accuracy, reliability or completeness of any information and no liability is accepted for any errors or omissions in such information. The information included in the Press Release has been produced by Fasanara Capital Ltd and its affiliates, as appropriate (“Fasanara Group”). Fasanara Capital Ltd is authorised and regulated by the Financial Conduct Authority (the “FCA”), with the FRN: 551020.

Some of the information in the Press Release may contain projections or other forward-looking statements regarding future events or future financial performance of products, markets or companies. These statements are only predictions, opinions or estimates made on a general basis and actual events or results may differ materially. No information in the Press Release constitutes investment, tax, legal or any other advice.

Any investment strategies, products and services referred to in the Press Release are subject to change without notice. Fasanara Group may amend this Press Release (including this Disclaimer) and its investment strategies, products and services at any time with or would notice. Fasanara Group is under no obligation to update this Press Release or to correct inaccuracies which may become apparent. Fasanara Group shall have no liability for any direct, indirect, consequential or special losses or damages of any kind whatsoever arising from or in connection with any use of the Press Release or its contents.

No information, whether oral or written, obtained by or from this Press Release or from any conversation with Fasanara Group staff or a professional consultant will have the effect of varying this Disclaimer.

Not an offer

This Press Release is provided for information purposes only, and does not constitute either an offer, invitation, inducement or a solicitation to buy or sell any securities or investment products nor is it a recommendation for any security or investment product. This Press Release is qualified in its entirety by reference to the more comprehensive information memorandum and any supplements thereof in respect of FAST (the “Information Memorandum”) (as amended or supplemented from time to time) and the subscription documents related thereto.  Please also refer to Important Information in the Information Memorandum.

The information contained in the Press Release is not directed at or intended for distribution to, or use by, any person in any jurisdiction or country where such use or distribution would be contrary to any applicable local law or regulation or would subject Fasanara Group to any registration or licensing requirement in such jurisdiction. Accordingly, unless an exemption under the relevant securities law is applicable, and/or in case that you would ask for access to any materials relating to any securities or investment products from Fasanara Group referred to in this Press Release from your own initiative only (by means of “reverse solicitation”, “reverse enquiry”, “private placement non solicitation” or other similar regulation), any securities or investment products referenced in the Press Release may not be offered, sold, resold, taken up, exercised, renounced, transferred or delivered, directly or indirectly, in or into any jurisdiction if to do so would constitute a violation of the relevant laws of, or require registration thereof in, such jurisdiction. It is your responsibility to inform yourself of any applicable legal and regulatory restrictions and to ensure that your access and use of this information does not contravene any such restrictions and to observe all applicable laws and regulations of any relevant jurisdiction. Professional advice should be sought in cases of doubt, as any failure to do so may constitute a breach of the securities laws in any such jurisdiction.

Interests in FAST have not been and will not be registered under the U.S. Securities Act of 1933, as amended (the “1933 Act”) or qualified under any applicable U.S. state securities statutes, and such interests may not be offered, sold or transferred in the United States of America (including its territories and possessions) or to or for the benefit of, directly or indirectly, any U.S. Person (as defined in the following sentence), except pursuant to registration or an exemption.  In this context, a “U.S. Person” is a person who is in either of the following two categories: (a) a person included in the definition of “U.S. person” under Rule 902(k) of Regulation S under the 1933 Act or (b) a person excluded from the definition of a “Non-United States person” as used in CFTC Rule 4.7. Any investment vehicles referred to herein have not been and will not be registered as an investment company under the U.S. Investment Company Act of 1940, as amended (the “1940 Act”). Interests in FAST are subject to restrictions on transferability and resale and may not be transferred or resold in the United States or to any U.S. Person except as permitted under the 1933 Act and applicable state securities laws, pursuant to registration or exemption therefrom.

No investment advice

This Press Release is provided for information purposes only. Nothing in this Press Release will constitute legal, tax or investment advice or recommendations. Any funds or investment products described may not be available to, or suitable for, all investors. In addition, current levels, bases and reliefs from tax depend on individual circumstances, which may also change in the future. Investors should not invest in any funds or investment products referred to in this Press Release unless they understand its nature and the extent to their exposure to risk. Independent professional advice from a suitable authorised person, including tax advice, should be sought before making an investment decision.

Investment risk

The value of any investment made in any funds or investment products referred to in this Press Release and the income from such can go down as well as up, and the investor may not get back the full amount invested. Past performance is not a guarantee of future returns. Changes in the rate of exchange may also cause the value of overseas investments to go up or down. Funds and investment products that invest in asset classes carrying greater risk may have a higher risk of loss of capital.

The post Fasanara Launches Tokenized Money Market Fund on Polygon appeared first on Tokeny.


iComply Investor Services Inc.

Four AML Myths Commonly Found in US Companies

Debunk common myths about global sanctions, PEP, and AML screening in this guide for US businesses. Learn why even domestic companies need global compliance, and discover how iComply's tools streamline screening, uncover hidden risks, and ensure regulatory readiness.

Many US business managers believe that if their operations are strictly domestic, they don’t need to worry about global sanctions, PEP (Politically Exposed Person) screening, or AML (Anti-Money Laundering) compliance. This assumption may seem logical, but it’s a myth that can lead to serious consequences.

Let’s break down the common myths and set the record straight on why global screening matters—even for businesses that only operate within the US.

Myth #1: If My Business Is Domestic, I Don’t Need Global Screening

Fact: Even if you only serve US customers, their connections might not stop at the border. A customer or vendor could have ownership ties to a sanctioned individual overseas, or they might be based in a high-risk jurisdiction.

Without global screening, these connections can easily slip through unnoticed, leaving your business vulnerable to regulatory penalties and reputational harm.

For example, imagine processing a payment for a US-based entity, only to discover later that it’s controlled by a sanctioned party in another country. The consequences? Fines, investigations, potential jail time, not to mention – a major and longstanding hit to your company’s reputation.

Myth #2: US Regulators Only Care About Domestic Compliance

Fact: US regulators like OFAC and FinCEN expect businesses to monitor global connections. They understand how intertwined the world is today and require you to screen for international risks.

Neglecting global compliance can result in steep fines and even loss of operating licenses. Worse, it can damage your relationships with partners and customers. Staying ahead of these expectations is key to avoiding regulatory pitfalls.

Myth #3: Global Screening Is Too Complicated

Fact: While global sanctions lists and PEP databases are complex, advanced tools make screening manageable. Platforms like iComply provide real-time access to global data, automating much of the heavy lifting.

These tools identify hidden risks, such as complex corporate structures designed to obscure ties to high-risk individuals or sanctioned entities. With the right technology, global compliance becomes a streamlined process that protects your business and saves time.

Myth #4: Global Coverage Only Matters for Multinational Companies

Fact: Even small businesses can benefit from global screening. Suppose you’re a US-based firm working with a foreign supplier. If that supplier has ties to financial crime or sanctions violations, your business could be held accountable.

By implementing global screening now, you safeguard your operations and build a foundation for growth. Plus, when it’s time to expand into international markets, your compliance framework will already be in place.

The Role of Technology in Global Compliance

Managing global compliance manually is a daunting task, but technology makes it easier. iComply’s platform provides:

Real-time global data for sanctions and PEP screening. Robust tools to uncover hidden risks in complex ownership structures. Automated workflows to streamline screening, refresh, and review processes.

These tools help businesses like yours stay compliant, efficient, and ready for growth.

The Bottom Line

In today’s interconnected world, no US business is truly isolated from global risks. Whether it’s sanctions screening, PEP monitoring, or AML compliance, adopting a global perspective is essential for protecting your operations and building a sustainable future.

By busting the myths and embracing the realities of global compliance, your business can avoid pitfalls, earn trust, and thrive in a competitive marketplace.

Monday, 20. January 2025

liminal (was OWI)

Link Index for Age Estimation 2025

The post Link Index for Age Estimation 2025 appeared first on Liminal.co.

The post Link Index for Age Estimation 2025 appeared first on Liminal.co.


ComplyCube

The CryptoCubed Newsletter: January Edition

This month, we’re tracking the rise of the $Trump meme coin, which has gained serious traction. Turkey sharpened its crypto regulations, Malaysia cracked down on unlicensed exchanges, and lots more in January's CryptoCubed. The post The CryptoCubed Newsletter: January Edition first appeared on ComplyCube.

This month, we’re tracking the rise of the $Trump meme coin, which has gained serious traction. Turkey sharpened its crypto regulations, Malaysia cracked down on unlicensed exchanges, and lots more in January's CryptoCubed.

The post The CryptoCubed Newsletter: January Edition first appeared on ComplyCube.


UNION AVATARS

Transform Your NPCs with Union Avatars and NVIDIA ACE

Learn how to transform avatars with advanced AI for lifelike interactions in gaming, customer service, and virtual spaces Non-playable characters (NPCs) are […] The post Transform Your NPCs with Union Avatars and NVIDIA ACE appeared first on Union Avatars.
Learn how to transform avatars with advanced AI for lifelike interactions in gaming, customer service, and virtual spaces

Non-playable characters (NPCs) are an essential element in video games. They are vital to making your digital universe feel realistic and serve as companions for the players. However, creating these virtual characters has always been a challenging and time-consuming task. But now, things are changing for the better.

Thanks to Union Avatars and NVIDIA ACE, the process of creating NPCs is easier than ever.

These tools are revolutionizing the manner we design and animate our virtual characters, bringing them to life and making them more realistic and engaging. Thus, if you’re a game developer looking to enhance your game’s interactive experience, these tools are a game-changer. They not only streamline the character creation process but also save you a ton of time and effort. Are you ready to bring your virtual world to life like never before?

What is NVIDIA ACE? 

NVIDIA ACE is a suite of advanced AI technologies designed to bring digital humans and avatars to life. Leveraging generative AI, ACE enables the creation of highly interactive and realistic characters for various applications, including gaming, customer service, and virtual environments. 

With NVIDIA ACE, developers can integrate state-of-the-art models for speech recognition, natural language processing, and facial animation, allowing for dynamic and unscripted interactions with non-playable characters (NPCs) and avatars. This technology not only enhances the immersion and interactivity of digital experiences but also provides flexible deployment options, making it accessible for both cloud-based and local implementations.

Powering Union Avatars through NVIDIA ACE

To bring to life one of our avatars, we built a simple application based on microservices that provide intelligence, voice, and facial animation to the character. We used OpenAI and ElevenLabs for text and speech generation and NVIDIA ACE to generate facial animations and to provide lip sync. Then, everything is rendered by Unreal Engine 5 in real time. 

The following figure is a process diagram showing what happens each time the user sends a message to the avatar:

NVIDIA ACE Plugin for Unreal Engine

The NVIDIA ACE plugin allows your Unreal Engine application to communicate with NVIDIA ACE services. The ACE Plugin supports NVIDIA Audio2Face (minimum v1.0) to animate your character by sending to the service voice the audio you provide and it sends back the corresponding animation data.

ARKit standard: 

The ARKit blend shape standard is predefined facial expressions and movements used to animate 3D characters based on real-time facial tracking data. In Union Avatars these keys are always available, so avatars can replicate a wide range of facial expressions, from subtle eye movements to complex mouth shapes. NVIDIA Audio2Face will generate the animation using this standard, so our avatars can be used out-of-the-box without further tweaking.

Text and speech generation:

To provide the avatar with response generation we are using GPT-4o, one of the most advanced LLMs available. By providing some extra context we can give the avatar a background, and some information relevant to the user.

https://platform.openai.com/docs/api-reference/introduction

To generate the speech, we feed the text generated by GPT into a custom voice in Eleven Labs.

https://elevenlabs.io/docs/introduction

Custom REST API:

To easily handle all these requests, we built a custom REST API in Python to centralize all the different tasks into a single call. By calling the endpoint /response we can generate a reply, synthesize the speech, and start the ACE A2F stream.

Connecting Union Avatars and ACE Step by step: 

Download your avatar from Union Avatars Make sure to download it with blendshapes Download and install the NVIDIA ACE Plugin in Unreal: Download the plugin from this link: https://developer.nvidia.com/ace/get-started/#section-ace-tools-and-reference-workflows Drag and drop it inside your project’s /Plugin folder Enable the plugin in Menu Bar > Edit > Plugins Setup NVIDIA Audio2Face Microservice + Controller Clone the quick deployment docker-compose and config files from here: https://github.com/NVIDIA/ACE/tree/main/microservices/audio_2_face_microservice/quick-start  Follow the documentation below: https://docs.nvidia.com/ace/latest/modules/a2f-docs/text/deployment/containers.h tml#quick-deployment-of-audio2face-and-a2f-controller-microservices Once the setup is complete, run it using docker-compose Change the Audio2Face server config: Go to Menu Bar > Edit > Project Settings Scroll down to Plugins > NVIDIA ACE Change the Dest URL to: http://127.0.0.1:52000 127.0.0.1: Since we are running the container locally in host network mode 52000: The port used by a2f-controller Drag and drop your avatar into the project. Tweak the materials and scene to your preference. In the pop-up window, make sure the check the option “Import Morph Targets”. Create a new Animation Blueprint for the imported avatar Create a new Animation Blueprint And the following Anim Graph. The important bit here is the ‘Apply ACE Face Animations’ node. In our case we are also adding some idle animations and blinking. You can make your own setup using this as a reference. Add the ACE component to your avatar blueprint: Open your blueprint In the Components tab select the character Skeletal Mesh Click Add and choose ACE Audio Curve Source Sending a local WAV file to ACE Get a reference to your Avatar Blueprint in level  Invoke the blueprint Animate Character from the WAV File Done! Now if you press play you will see the avatar playing the generated motion and hear the audio playback inside Unreal as well.

Well done! Now your character is brought to life by Union Avatars and NVIDIA ACE, ready to captivate users like never before. Imagine what a custom chatbot with the same technology could do for your brand. Contact us to explore how Union Avatars can empower your business with immersive, AI-driven experiences.

The post Transform Your NPCs with Union Avatars and NVIDIA ACE appeared first on Union Avatars.


Spherical Cow Consulting

Digital Credentials That Can Be Verified: A Lesson in Terminology

The terminology swirling around the world of digital identity can be overwhelming. Are we talking about verifiable credentials? Digital credentials? What about verifiable digital credentials? Do these terms have profound technical distinctions? Barely (though I suspect some of the more deeply engaged individuals may disagree). The nuances mostly arise from standards politics, the English language,

The terminology swirling around the world of digital identity can be overwhelming. Are we talking about verifiable credentials? Digital credentials? What about verifiable digital credentials? Do these terms have profound technical distinctions? Barely (though I suspect some of the more deeply engaged individuals may disagree). The nuances mostly arise from standards politics, the English language, and some good old-fashioned product marketing.

The Birth of Verifiable Credentials (VCs)

In 2017, the W3C Verifiable Credentials working group was formed to define a framework for sharing and verifying digital claims. They published the Verifiable Credentials Data Model v1 in 2019, and version 2 is now in the Candidate Recommendation stage. The W3C defines a verifiable credential as: “A tamper-evident credential whose authorship can be cryptographically verified. Verifiable credentials can be used to build verifiable presentations, which can also be cryptographically verifiable.”

As the term “Verifiable Credentials” gained traction, other organizations started exploring similar ideas for digital credentials that could be cryptographically verified. As you might expect, they sought to avoid confusion with the W3C’s model and put their own stamp on things, which has led us to these to terminology shifts.

Terminology Overlap in Standards and Marketing

The IETF Secure Patterns for Internet Credentials (SPICE) working group and the WICG Digital Credentials API project chose to call their work “digital credentials.” According to the Digital Credential API, a digital credential is: “A cryptographically signed digital document containing one or more claims made by an issuer about one or more subjects.”

While clear and concise, this term lacks the specificity needed to encompass the complexities involved. SPICE WG adds further nuance, defining a digital credential as: “A digital credential expresses claims about a subject and links them with cryptographic keys. Some sets of claim names have already been defined by the IETF and other standards development groups (e.g., OpenID Foundation).”

Recognizing this, the U.S. National Institute of Standards and Technology (NIST) recently adopted the term Verifiable Digital Credentials (VDCs) to bridge the gap between descriptive clarity and brevity. NIST defines VDCs as: “A cryptographically verifiable, digital representation of a credential or attributes secured in a dedicated application, often referred to as a digital wallet.” NIST is careful not to promote any specific solution or organization, so they’ve had to be particularly careful in selecting a term that is market-neutral.

A Tale of Media Types and Standards Conflicts

So, knowing there is confusion in the terminology is one thing. Let’s look at how that actually plays out in standards development.

The OAuth working group meeting at IETF 121 highlighted historical and technical challenges with defining and typing credentials. Brian Campbell presented a session on “SD-JWT and SD-JWT VC,” which included a truly excellent perspective on the history that led to some of this confusion; you should watch the recording.

JWS/JWE/JWT: JWTs (JSON Web Tokens) initially included type headers and media types to describe payloads. However, their utility for typing was minimal, as the data type could often be inferred by parsing the payload. The IETF introduced explicit typing for tokens, such as application/at+jwt for access tokens, to clarify expectations for processing. Verifiable Credentials: The term originated from W3C but was perceived as inaccessible by some. A key debate arose around JSON-LD (a JSON-based format for Linked Data). While JSON-LD wasn’t initially mandatory, it later became a requirement for compliance with the W3C VC data model, leading some groups to pursue simpler alternatives within the IETF. Media Type Conflicts

The overlapping work between the W3C and IETF led to conflicts in media type registries; it’s basically a functional example of how definitions and politics impact standards development. In this case, the W3C registered media types like vc+ld+json+sd-jwt, while the IETF sought to define types for SD-JWT VCs (Selective Disclosure JSON Web Tokens). This duplicity caused confusion and poses a threat to interoperability.

Don’t get too anxious about this example; working group participants did figure out a potential path forward. What people in the know will refer to as “the Dublin Proposal,” the group agreed to recommend a new media type, dc+sd-jwt, for SD-JWT VCs and tighten the scope and accelerate the timeline for relevant RFCs to make sure their position is solidly established.

The Challenge of Naming Things

Naming things is one of the two hardest problems in computer science. Where we are with digital credentials that can be verified is reflected in terminology confusion for all sorts of things throughout the industry. IDPro®, a professional organization for identity practitioners, has a freely available Body of Knowledge (full disclosure: I’m the principal editor for that work) that includes a consolidated terminology document. The terminology includes definitions from every article in the BoK, resulting in multiple definitions for even basic terms like “authentication.” It’s like we are compelled to make things difficult for ourselves.

For identity professionals, here’s my suggestion: always clearly define your terms. This could mean explicitly referencing a specification that outlines the definition you’re using or providing your own definition if no clear standard exists. Even in code, include comments clarifying which model or framework you’re adhering to.

For product marketers, I get the need to differentiate your solutions, but it will be much more compelling if you indicate you are standards’ compliant AND what standards you are compliant with. It may result in more words, but those words will help your customers have a much better sense of what you’re offering. Educated customers are the best.

If you’d like to read more about how some of the digital credential protocols differ, I have a few posts from last year which might be of interest:

Verifiable Credentials and mdocs – a tale of two protocols More on the Options and Diversity of Verifiable Credentials

If you or your organization need support with standards development, let me know. With my experience across various SDOs, I’m here to help guide you through the complexities of Internet standards development.

The post Digital Credentials That Can Be Verified: A Lesson in Terminology appeared first on Spherical Cow Consulting.


iComply Investor Services Inc.

The Top Cybersecurity Threats of 2025 and How to Protect Yourself

Uncover the biggest cybersecurity threats of 2025, from advanced phishing to ransomware and deepfakes. Learn how iComply's innovative live face match technology revolutionizes security with real-time, on-device biometric authentication, protecting user privacy, ensuring consent, and eliminating vulnerabilities in the digital age.

The Top Cybersecurity Threats of 2025 and How to Protect Yourself

Imagine logging into your favorite e-commerce site only to discover that your account has been compromised. Even worse, the breach wasn’t your fault—it was the result of increasingly sophisticated cyber threats that dominate our digital age. In 2025, cyberattacks are evolving faster than ever, with new tactics and technologies putting individuals and organizations at risk. Here’s a look at the top threats and actionable steps you can take to protect yourself.

The Rise of Advanced Phishing Techniques

Phishing remains a cornerstone of cybercrime, but the 2025 version is far more advanced. Threat actors are leveraging generative AI to create hyper-realistic phishing emails, complete with personalized details and convincing logos. Variants like vishing (voice phishing) and quishing (phishing using malicious QR codes) are also becoming more prevalent. Cybercriminals now have the ability to spoof voice or video content, adding a layer of deception that even the savviest users may find challenging to detect.

What You Can Do:

Verify Links: Hover over URLs before clicking to confirm their legitimacy. Be Skeptical: If an offer or request feels too urgent or too good to be true, verify it directly through a trusted contact or platform. Invest in Training: Regular phishing simulations and awareness campaigns can help you and your organization stay vigilant.

Deepfake Manipulation

Deepfake technology, once a novelty, has matured into a powerful tool for deception. Threat actors use AI-generated videos and voice clips to impersonate trusted individuals or executives, gaining access to sensitive data or initiating fraudulent transactions. This technology is particularly dangerous in the context of spear phishing, where a single high-value target can compromise an entire organization.

What You Can Do:

Authenticate Communications: Establish multi-factor verification methods, such as requiring verbal confirmation of sensitive requests. Utilize Detection Tools: AI-powered tools can help identify manipulated audio and video content. Limit Personal Data Sharing: Reduce the amount of information shared on social media, which can be used to tailor convincing deepfake attacks.

Ransomware Evolution

Ransomware is no longer just about encrypting data. In 2025, attackers are doubling down on double extortion tactics: threatening to publicly release sensitive data if ransom demands aren’t met. Additionally, ransomware-as-a-service (RaaS) platforms make it easier for novice hackers to launch devastating attacks, democratizing cybercrime.

What You Can Do:

Regular Backups: Keep backups of critical data in secure, offline storage. Patch Vulnerabilities: Ensure your software and systems are always updated to prevent exploitation of known weaknesses. Adopt Zero-Trust Policies: Limit access to sensitive data and systems based on strict verification protocols.

IoT and Smart Device Exploitation

As homes and workplaces become more connected, the Internet of Things (IoT) introduces new vulnerabilities. Unsecured smart devices—from thermostats to security cameras—are being exploited to launch attacks or infiltrate networks. Attackers also exploit hardware manipulation techniques to bypass security measures.

What You Can Do:

Secure Devices: Use strong, unique passwords for IoT devices and change default settings. Network Segmentation: Keep IoT devices on separate networks from critical systems. Monitor Activity: Employ tools that can detect unusual behavior across connected devices.

Generative AI Exploits

Generative AI presents dual-edged capabilities in cybersecurity. While it aids in detecting threats, it also empowers cybercriminals to automate attacks, craft convincing fake identities, and develop sophisticated malware. AI-generated phishing emails or malicious code can now be created in seconds, making it imperative to bolster defenses.

What You Can Do:

Deploy AI Defenses: Invest in AI-driven cybersecurity tools to proactively detect and mitigate threats. Set Usage Policies: Restrict the use of generative AI in ways that could inadvertently expose sensitive data. Train Employees: Ensure staff understand the risks and ethical considerations of AI in the workplace.

How iComply Protects Your Customers and Users

The evolving threat landscape of 2025 requires more than traditional cybersecurity measures. iComply’s innovative live face match solution takes security and user privacy to the next level by introducing active, on-device live video biometric authentication. This cutting-edge approach not only simplifies security workflows but also ensures maximum data privacy, security, and consent capture. Here’s how iComply redefines protection:

Live Video Biometric Authentication: By requiring a live video of users during authentication, iComply ensures that only authorized individuals gain access, replacing outdated multi-factor authentication methods with a more secure and user-friendly alternative. Real-Time Verification: Facial recognition, liveness detection, and fraud prevention algorithms run directly on the user’s device, ensuring sensitive biometric data never leaves their control. Deepfake and Spoof Detection: Our solution identifies and neutralizes threats like deepfakes and hardware manipulation by analyzing subtle, dynamic cues, such as blinking and head movement. Enhanced Privacy and Consent: With edge-computing technology, biometric data is processed securely on the device itself, giving users full control over their information while maintaining regulatory compliance. A Seamless User Experience: By integrating live face match authentication, businesses can offer customers a fast and frictionless experience without compromising on security.

Imagine a world where passwords and multi-factor authentication are replaced by a single, secure step that combines biometric verification and consent capture. With iComply’s live face match technology, this future is now. Empower your business and protect your customers with the ultimate solution for combating phishing, deepfakes, and other advanced threats.


Herond Browser

What is Swap? How Swaps Work in Finance

Ever wonder how big companies stay ahead of financial risks or keep their costs low despite market chaos? The answer often lies in a powerful financial tool called a swap. Swaps are like behind-the-scenes deals where two parties agree to trade cash flows or assets to manage risks and seize financial opportunities. Whether it’s dodging […] The post What is Swap? How Swaps Work in Finance appeared

Ever wonder how big companies stay ahead of financial risks or keep their costs low despite market chaos? The answer often lies in a powerful financial tool called a swap. Swaps are like behind-the-scenes deals where two parties agree to trade cash flows or assets to manage risks and seize financial opportunities. Whether it’s dodging interest rate spikes or shielding against currency swings, swaps give businesses the flexibility they need to stay competitive. What is Swap? Let’s dive into the world of swaps and discover how they quietly drive smart financial decisions across industries.

Learn more: Understanding the Benefits and Challenges of ICOs

What is Swap?

What is Swap? A swap is a financial agreement where two parties agree to exchange cash flows or financial assets over a set period. This exchange usually helps businesses manage financial risks, like changing interest rates or currency values, and can also help lower costs. For example, two companies might agree to swap payments—one pays a fixed interest rate while the other pays a floating rate. This lets each company balance its financial plans with market conditions.

Swaps are flexible and can be customized to meet the specific needs of both sides. They’re commonly used by big companies and financial institutions to protect themselves from market changes or to access new financial opportunities.

However, most swaps are private deals (called over-the-counter or OTC contracts), meaning they aren’t traded on public markets. This makes them more flexible but also riskier since each party must trust the other to stick to the deal.

Overall, swaps are powerful tools in finance, helping businesses manage risks and make smarter financial decisions.

Learn more: The Role of Technical Analysis in Crypto Trading

How does Swap work?

After learning “What is Swap?”, we should have a look at how it woks. A swap works as a financial agreement between two parties to exchange cash flows or assets over a specific period, based on pre-agreed terms. The main goal is to help both sides manage financial risks, such as interest rate fluctuations or currency volatility, and sometimes to lower borrowing costs.

Here’s a simple breakdown of how swaps work:

Initial Agreement:
Both parties agree on the contract terms, which include the notional amount (the underlying amount used to calculate payments), the type of interest rates (fixed or floating), payment frequency, and the contract’s duration. Cash Flow Exchange:
Throughout the contract, the parties regularly exchange payments as outlined in the agreement. For instance, in an interest rate swap, one party might pay a fixed rate while receiving payments based on a floating rate from the other side. Contract Completion:
When the swap ends, both sides fulfill any remaining payment obligations. In some swaps, the original principal amounts are exchanged back at this stage. 5 Popular Types of Swap Contracts Interest Rate Swap (IRS)

An Interest Rate Swap (IRS) is a financial agreement between two parties to exchange interest payments on a notional principal amount. Typically, one party pays a fixed interest rate while the other pays a floating rate. The primary goal is to manage interest rate risk and optimize financial costs.

Key Features:

Notional Principal: Used to calculate interest payments but isn’t actually exchanged. Payment Structure: Interest payments are exchanged periodically—monthly, quarterly, or annually—based on the agreed fixed or floating rate. Flexible Duration: Contracts usually last from 1 to 5 years, depending on the agreement. Effective Risk Management: Helps companies stabilize borrowing costs or maximize investment returns by reducing exposure to interest rate fluctuations. Cost Savings: Allows parties to capitalize on market interest rate differences to lower financial expenses. Financial Flexibility: Supports organizations in adjusting debt or asset interest structures to fit their financial strategies.

Interest rate swaps are widely used by corporations, banks, and investors to manage debt risks and take advantage of changing market rates.

Currency Swap Contract

A Currency Swap Contract is a financial agreement between two parties to exchange principal amounts and interest payments in different currencies. In this arrangement, each party receives a principal amount and pays interest in one currency while simultaneously paying the principal and interest in another currency.

Key Features:

Principal Exchange: Both parties exchange principal amounts at an agreed-upon exchange rate at the start of the contract and reverse the exchange when the contract matures. Interest Payments: Throughout the contract term, both parties make periodic interest payments on the exchanged principal. These interest rates can be either fixed or floating, depending on the agreement. Combination with Interest Rate Swaps: In markets like Vietnam, currency swaps are often combined with interest rate swaps to enhance financial risk management. Risk Management Tool: Currency swaps are crucial for managing foreign exchange risk, optimizing borrowing costs, and leveraging interest rate differences between global markets.

Currency swaps are widely used by multinational corporations and financial institutions to hedge against currency fluctuations and secure more favorable borrowing terms in foreign markets. This flexibility allows companies to access foreign capital while minimizing exposure to volatile exchange rates.

Credit Default Swap (CDS) Contract

A Credit Default Swap (CDS) is a financial agreement where the buyer of the contract pays periodic fees to the seller in exchange for protection against the risk of a debt issuer (such as a corporation or government) defaulting on its obligations. Essentially, a CDS acts like insurance for loans or bonds, providing a safety net in case of credit events.

Key Features:

Regular Premium Payments: The CDS buyer pays regular premiums to the seller throughout the contract term, similar to paying insurance premiums. Payout on Credit Events: If the debt issuer defaults or experiences a credit event (like bankruptcy or missed payments), the CDS seller compensates the buyer for part or all of the loss. No Need to Own the Debt: Buyers of a CDS don’t need to own the underlying debt or bonds to purchase protection, allowing more flexibility in risk management. High Liquidity: CDS contracts can be traded on secondary markets, enabling investors to easily buy or sell protection as market conditions change. Counterparty Risk: If the CDS seller defaults, the buyer might not receive the promised payout, introducing potential counterparty risk.

CDS contracts are vital tools for managing credit risk, especially in volatile markets. They allow investors and financial institutions to hedge against potential defaults while also offering speculative opportunities for those willing to take on risk. However, the 2008 financial crisis highlighted how excessive use of CDS without proper risk controls can contribute to systemic financial instability.

Commodity Swap Contract

A Commodity Swap is a financial agreement between two parties to exchange cash flows based on the price of a specific commodity. In this contract, one party agrees to pay a fixed price for the commodity, while the other pays a variable amount tied to the market price. Common commodities involved in these swaps include crude oil, natural gas, metals, agricultural products, and other raw materials.

Key Features:

No Physical Delivery: The agreement involves only cash settlements based on price differences—no physical exchange of the actual commodity occurs. Price Risk Hedging: Commodity swaps help businesses stabilize production costs or secure profits despite volatile commodity prices. This is especially valuable for industries heavily reliant on raw materials. Scheduled Payments: Payments are made at agreed intervals—monthly, quarterly, or based on other predefined periods—allowing predictable cash flow management. Flexible Applications: Commodity swaps are widely used by producers, suppliers, and investors looking to hedge against price fluctuations or speculate on market trends. Financial Optimization: By locking in commodity prices, businesses can better plan budgets and safeguard profit margins, enhancing overall financial stability.

Commodity swaps are essential for industries facing unpredictable market prices, offering a strategic tool to manage risks and improve financial planning. For example, an airline company might use a commodity swap to fix fuel costs, protecting itself from sudden spikes in oil prices, while commodity traders may use these swaps to speculate on future price movements without handling physical goods.

Equity Swap Contract

An Equity Swap is a financial agreement between two parties to exchange cash flows based on the performance of a specific stock or stock index. In this contract, one party pays returns linked to the performance of a stock or index, while the other pays a fixed or floating interest rate. This tool allows investors to gain exposure to equity markets without directly owning the underlying stocks.

Key Features:

No Ownership Required: Participants can benefit from stock price movements without actually buying or holding the underlying shares. Risk Hedging: Equity swaps help investors and financial institutions protect their portfolios from stock price volatility. Tax Efficiency: Some investors use equity swaps to minimize tax liabilities associated with direct stock trading, depending on jurisdiction. Regular Payments: Cash flows are exchanged at agreed intervals (quarterly, annually) based on the performance of the underlying asset. Investment Flexibility: Investors can easily access various equity markets worldwide without facing legal or trading restrictions.

Equity swaps are powerful tools for diversifying investment portfolios, optimizing returns, and managing risks in the stock market. For example, a hedge fund might use an equity swap to gain exposure to foreign stock indices without dealing with international trading regulations, while a bank could hedge its stock holdings against potential losses.

Conclusion

What is Swap? Swaps might seem complex at first glance, but they’re vital tools that help businesses stay agile in unpredictable markets. From managing interest rates to protecting against currency shifts, swaps empower companies to control risks and sharpen their financial strategies. Whether you’re a business leader, an investor, or just curious about how financial markets tick, understanding swaps opens up a world of possibilities. In today’s fast-moving economy, knowing ‘what is swap?’ and how swaps work isn’t just smart—it’s essential.

Learn more: Pump and Dump in Cryptocurrency: A Growing Threat in the Digital Asset Market

About Herond Browser

Herond Browser is a cutting-edge Web 3.0 browser designed to prioritize user privacy and security. By blocking intrusive ads, harmful trackers, and profiling cookies, Herond creates a safer and faster browsing experience while minimizing data consumption.

To enhance user control over their digital presence, Herond offers two essential tools:

Herond Shield: A robust adblocker and privacy protection suite. Herond Wallet: A secure, multi-chain, non-custodial social wallet.

As a pioneering Web 2.5 solution, Herond is paving the way for mass Web 3.0 adoption by providing a seamless transition for users while upholding the core principles of decentralization and user ownership.

Have any questions or suggestions? Contact us:

On Telegram https://t.me/herond_browser DM our official X @HerondBrowser Technical support topic on https://community.herond.org

The post What is Swap? How Swaps Work in Finance appeared first on Herond Blog.

Friday, 17. January 2025

Anonym

Anonyome’s DI Mobile Wallet SDK Now Offers Even More DI Trust Infrastructure Options

With our bleeding-edge 3.0 release of the Anonyome Labs decentralized identity (DI) mobile wallet SDK just coming hot off the press, we’re excited to announce that we’ve already pushed the version 3.1 release out the door, packing new features to enhance the SDK even more. As a refresher, our DI mobile wallet SDK lets our customers easily integrate DI […] The post Anonyome’s

With our bleeding-edge 3.0 release of the Anonyome Labs decentralized identity (DI) mobile wallet SDK just coming hot off the press, we’re excited to announce that we’ve already pushed the version 3.1 release out the door, packing new features to enhance the SDK even more.

As a refresher, our DI mobile wallet SDK lets our customers easily integrate DI and verifiable credential (VC, or reusable credential) solutions into their applications. The DI mobile wallet SDK is a native SDK for both iOS and Android and notably does not rely on any third-party frameworks such as JavaScript frameworks.

Our 3.0 release primarily brought in European Union Digital Identity (EUDI) aligned standards, such as OpenID4VC (OpenID4VCI and OpenID4VP) and IETF SD-JWT VCs. Our 3.1 release continues this trajectory by adding support for the modern industry-leading DI trust infrastructure, Cheqd.

Consumers now have more choice of decentralized and scalable infrastructure to underpin their DI operations

Decentralized identifiers (DIDs) provide cryptographic infrastructure to many of the credential formats in the DI ecosystem. As such, it’s crucial that Anonyome supports a wide range of DID types (methods), so our customers can choose the best method for their use case.

Within the 3.1 release of the mobile wallet SDK, we bundle in new support for resolving three DID methods that are gaining mass adoption: cheqd, Web, and JWK.

With this integration, consumers now have more options for a decentralized and scalable infrastructure to support their DI operations. This is particularly timely because Sovrin, one of the original DI ledgers our edge agent supported, unfortunately announced it will probably end operations in 2025. cheqd is a comparable modern alternative.

We’ve also added support for the cheqd Anoncred method, allowing the mobile wallet SDK to receive Anoncred-formatted VCs, in addition to IETF SD-JWT VCs and W3C VCDM VCs, secured by cheqd Trust Infrastructure. This work is in tandem with cheqd’s recent efforts in ACA-Py, which allows ACA-Py cloud agents to issue and verify VCs backed by cheqd.

As usual, we’ve actively tested our SDK solution against the issuer and verifier open source software in the DI ecosystem, ACA-Py and Credo-ts, to ensure we remain interoperable with other agents.

Best of all, Anonyome has open sourced these new DID resolvers within VCX, a codebase we contribute to and maintain.

Where to next?

We are excited to have checked off these new DID suites from the roadmap outlined in our recent 3.0 release announcement. Looking ahead, we will continue to pursue the features on that roadmap, including enhancements to the OpenID4VC protocol suite—particularly as OpenID approaches 1.0 releases of these standards—and the ongoing expansion of DID methods, such as did:webvh (formerly did:tdw).

What’s more, we are actively developing a security enhancement to allow SDK consumers to leverage hardware security modules (HSMs), such as those built into modern mobile phones, for performing the cryptography that secures their DI use cases. This feature is in alignment with EUDI regulations, which you can read more about here.

Stay tuned for our next DI mobile wallet SDK announcement.

Anonyome Labs’ business solution combines a scalable identity foundation and menu of enterprise-ready APIs and SDKs, so you can quickly build and deploy next-generation privacy, cyber safety, and decentralized identity apps to help your customers communicate privately, navigate online safely, and transact securely in an increasingly connected world. 

Talk to us today 

The post Anonyome’s DI Mobile Wallet SDK Now Offers Even More DI Trust Infrastructure Options appeared first on Anonyome Labs.


liminal (was OWI)

The State of Identity – January 17, 2025

Liminal members enjoy the exclusive benefit of receiving daily morning briefs directly in their inboxes, ensuring they stay ahead of the curve with the latest industry developments for a significant competitive advantage. Looking for product or company-specific news? Log in or sign-up to Link for more detailed news and developments. Here are the main industry […] The post The State of Identity –

Liminal members enjoy the exclusive benefit of receiving daily morning briefs directly in their inboxes, ensuring they stay ahead of the curve with the latest industry developments for a significant competitive advantage.

Looking for product or company-specific news? Log in or sign-up to Link for more detailed news and developments.

Here are the main industry highlights of this week week impacting identity and fraud, cybersecurity, trust and safety, financial crimes compliance, and privacy and consent management.

🪄Innovation and New Technology Developments

Illinois to Introduce Mobile Driver’s Licenses in Apple Wallet by 2025

Illinois plans to introduce mobile driver’s licenses (mDLs) in Apple Wallet by late 2025, allowing residents to use iPhones or Apple Watches for ID. Led by Secretary of State Alexi Giannoulias, the program will expand to other digital wallets, focusing on security and privacy. Optional and complementary to physical IDs, Illinois joins 10 other states in adopting digital IDs, emphasizing benefits like real-time updates and privacy protection. (Source)

UK’s AI-Driven “Plan for Change” Targets Growth, Innovation, and Global Leadership

The UK government has launched an AI-driven “Plan for Change” to boost economic growth and living standards, committing to the AI Opportunities Action Plan and securing £14 billion in private tech investment. Key initiatives include AI Growth Zones, streamlining public sector processes, and forming an AI Energy Council. Labour leader Keir Starmer stressed the need for the UK to lead in AI, citing NHS advancements and insights from experts like Sir Demis Hassabis. Tony Blair underscored digital identity as vital for modern governance despite privacy concerns. Together, AI and digital ID aim to enhance productivity, public services, and economic competitiveness. (Source)

💰 Investments and Partnerships

iCapital Acquires Parallel Markets to Streamline Alternative Investments with Digital Identity Integration

iCapital has acquired Parallel Markets to integrate its reusable investor passport technology into alternative investments. This innovation streamlines KYC/AML verification and reduces redundant onboarding with a universal digital identity. The acquisition aims to enhance scalability for fund managers and wealth advisors while improving compliance in changing regulatory landscapes. While terms remain undisclosed, both companies highlight the potential for greater efficiency and cost savings in private market investing. (Source)

Orchid Security Secures $36M Seed Funding to Revolutionize Enterprise Identity Management with AI

Orchid Security, a New York-based identity-first security startup, has raised $36 million in a seed round co-led by Team8 and Intel Capital. The company leverages large language models (LLMs) to simplify enterprise identity and access management (IAM) across over 1,200 applications, from on-premise systems to SaaS. Orchid’s platform automatically discovers applications, evaluates authentication flows, and uses AI to identify vulnerabilities and suggest fixes without requiring code access or input from application owners. Founded by the team behind enSilo, the startup has partnered with companies like Costco and Repsol to enhance identity security management. (Source)

Daon Partners with ELEMENTS to Strengthen Japan’s Digital Identity Authentication Market

Daon, a Digital Identity Trust company, has partnered with Japan-based image recognition firm @ELEMENTS following ELEMENTS’ majority acquisition of Polarify Consulting Inc , a joint venture between SMFG , Daon, and NTT DATA. This deal strengthens ELEMENTS’ position in Japan’s identity authentication market, providing eKYC and authentication services. Leveraging Daon’s expertise as Polarify’s core identity provider, the partnership ensures continuity for existing customers while exploring new opportunities in identity authentication and fraud prevention, including collaborations with ELEMENTS subsidiary Liquid, specializing in online identity verification. (Source)

Float Financial Secures $48.5M Series B to Scale Expense Management and Corporate Cards for Canadian SMBs

Float, a Toronto-based fintech specializing in expense management and corporate cards for Canadian SMBs, has raised $48.5 million in a Series B round led by Goldman Sachs Growth Equity, with participation from OMERS Ventures and others, bringing total funding to $92.6 million since 2020. Dubbed the “Brex of Canada,” Float has grown its offerings to include bill pay, high-yield accounts, AP automation, and multi-currency cards. Despite economic challenges, the company reports a 50x revenue growth since its 2021 Series A. CEO Rob Khazzam highlights the untapped potential of Canadian SMBs, with plans to use the funding to expand products, scale regionally, and grow its team. (Source)

Darktrace to Acquire Cado Security to Enhance Cyber Investigation and Response Capabilities

Darktrace plans to acquire UK-based incident investigation firm Cado Security, with the deal expected to close in February, subject to regulatory approval. While financial terms remain undisclosed, reports suggest a valuation between $50 million and $100 million. Cado Security specializes in cyber investigation and response across multi-cloud, container, SaaS, and on-premises environments. Darktrace intends to integrate Cado’s technology with its ActiveAI platform while retaining Cado’s team and leadership. Since 2020, Cado Security has raised over $31 million through three funding rounds. (Source)

⚖️ Policy and Regulatory

Block Settles for $80 Million Over Cash App BSA/AML Violations and Commits to Compliance Overhaul

Block has agreed to pay an $80 million fine and implement corrective measures after 48 state financial regulators alleged its Cash App service violated Bank Secrecy Act (BSA) and anti-money laundering (AML) laws. The settlement includes hiring an independent consultant to review and improve its BSA/AML program within a year. Block stated it has increased compliance investments to meet regulatory standards. Separately, the company settled a $15 million lawsuit over a 2021 data breach that affected 8.2 million Cash App users. (Source)

Supreme Court to Decide Proper Legal Standard for Texas Pornography Age-Verification Law

The Supreme Court is reviewing the constitutionality of Texas’ 2023 age-verification law for pornography websites, which requires “reasonable age verification methods” for content harmful to minors. Opponents, including the Free Speech Coalition, argue it infringes on adults’ First Amendment rights and raises privacy concerns through mandatory digital or government ID checks. A district court blocked the law using “strict scrutiny,” but the 5th Circuit reversed, applying “rational-basis review” and allowing it to take effect. The Supreme Court will decide whether strict scrutiny applies, potentially sending the case back for reconsideration, or affirm the 5th Circuit’s decision. The Biden administration supports strict scrutiny while acknowledging states’ ability to protect children online. (Source)

UK Government Proposes Ban on Ransomware Payments for Public Sector and Critical Infrastructure

The U.K. government has proposed banning public sector and critical infrastructure organizations from paying ransomware demands to deter cybercriminals. The move follows major attacks, such as one on the NHS that disrupted patient care. The proposal includes mandatory reporting of ransomware incidents and safeguards to prevent payments to sanctioned entities. The National Cyber Security Center reports a rise in ransomware attacks, often by Russia-linked groups targeting critical infrastructure. A public consultation on the proposals runs until April 2025, though there are no immediate plans to present the measures to Parliament. (Source)

U.S. Disrupts Chinese State-Backed Hacking Campaign Using PlugX Malware

U.S. authorities have disrupted a Chinese state-backed hacking group, “Twill Typhoon” (aka “Mustang Panda”), which used the malware “PlugX” to infiltrate millions of computers worldwide in a long-term espionage campaign. On January 9, 2025, the Department of Justice revealed that, with court approval, the FBI removed PlugX malware from thousands of U.S. systems during an August 2024 operation led by French authorities with support from cybersecurity firm Sekoia. Active since 2014, PlugX, often installed via USB ports, was used to steal sensitive files, targeting European shipping firms, Indo-Pacific governments, and Chinese dissident groups. Despite allegations of funding the group, the Chinese government denies involvement. (Source)

Gravy Analytics Data Breach Exposes Sensitive Location Data of Millions Worldwide.

A breach at Gravy Analytics exposed millions of location data points from apps like fitness trackers and dating platforms, revealing movements through sensitive sites and private homes. Stolen via a misused Amazon cloud key, the data risks deanonymization, endangering vulnerable groups like LGBTQ+ individuals. Following an FTC ban on its data practices, Gravy’s reliance on real-time ad bidding highlights privacy risks. Experts advise using ad blockers, limiting location permissions, and disabling app tracking. (Source)

Supreme Court Weighs TikTok Ban Amid National Security Concerns and First Amendment Debate

The U.S. Supreme Court is reviewing TikTok’s challenge to a law requiring it to sever ties with ByteDance or face a U.S. app store ban by January 19, 2025. The government cites national security concerns over potential data misuse and disinformation, while TikTok argues the ban violates First Amendment protections. If enforced, TikTok would lose app store access, updates, and functionality. President-elect Donald Trump supports delaying the ban for negotiations, but legal and legislative issues persist. The U.S. would be the first Western democracy to impose a full ban, following India’s example, while NATO and European nations have limited restrictions. (Source)

Frank McCourt’s Project Liberty Leads Bid to Acquire TikTok’s U.S. Assets Amid Regulatory Deadline

Billionaire Frank McCourt’s Project Liberty, through The People’s Bid consortium, has formally proposed acquiring TikTok’s U.S. assets from ByteDance ahead of the January 19 divestment deadline. The consortium, backed by private equity, family offices, high-net-worth individuals, and debt financing from a major U.S. bank, aims to preserve TikTok while replacing its current algorithm. (Source)

Biden Administration’s Cybersecurity Order to Promote Mobile Digital Identity Adoption in Public Programs

An upcoming Biden administration cybersecurity executive order will promote digital identity documents like mobile driver’s licenses (mDLs) for public benefit verification. In development for seven months, the order focuses on interoperability, data minimization, and potential funding for state mDL adoption, guided by NIST standards. It also addresses privacy, bias, and identity proofing challenges while reducing reliance on data brokers and credit bureaus. A pilot notification system will alert individuals when their identity is used in benefit applications. (Source)

🔗 More from Liminal

New Research Available

Access the Market & Buyer’s Guide for Third-Party Risk Management in Link for insights to strengthen compliance and tackle emerging risks as the TPRM market nears $19.9 billion by 2030.

Access Market & Competitive Intelligence

Our award-winning Link™ platform empowers you to monitor trends, access benchmark research reports, explore use cases, and more.

Liminal CEO Summit 2025

Interested in attending? Request an invite to our 4th annual exclusive CEO event, which will be held in Laguna Beach, California.

The post The State of Identity – January 17, 2025 appeared first on Liminal.co.


Tokeny Solutions

Tokeny’s Talent | Christian’s Story

The post Tokeny’s Talent | Christian’s Story appeared first on Tokeny.
Christian Stricker is Digital Marketing Intern at Tokeny.  Tell us about yourself!

I’m Christian Stricker, born in Luxembourg to Danish parents. Currently finishing a Bachelor’s Degree in Media Design in Eindhoven, which is the latest on my big list of projects/problems to solve. Having something to work towards always keeps me motivated, and that can be something simple like creating my favorite dish, to more complex projects where I utilize my full potential.

I have a few hobbies but the main ones are motorsports and fitness. I often participate in virtual sim racing competitions in cars which I have designed myself. A perfect way to blend my professional skills and hobbies into one. For the fitness side, I play touch rugby with the Luxembourgish team every week, go on runs in the forest, and ski.

 

What were you doing before Tokeny and what inspired you to join the team?

Before Tokeny, while I was completing my bachelors degree, I was involved in a global project of building and managing a website overhaul for a factory automation company. This taught me a lot about web development, project management and marketing. I thoroughly enjoyed this, so when the opportunity to join Tokeny arose I was ecstatic. Especially since I have been looking at working in the web3 industry.

How would you describe working at Tokeny?

Innovative, challenging but very rewarding. The team is very motivated and everyone working here has a strong belief in what Tokeny is doing for the future. I am not just a number here, my inputs are valued and working alongside the others has taught me a huge amount about myself, and the web3 industry.

What are you most passionate about in life?

If I were to condense all my passions into one it would be: Learning and Improving. My main passion is racing. Ever since I was a kid, I always wanted to be a driver and as I grew up I tried making this a reality. I spent countless hours learning racecraft and how to handle a car, then I would apply my learnings to the track in karts. I have taken part in a few karting races and won 2 of them. Beating the competition is the motivation, and nothing is more rewarding than finally earning the top spot of the podium.

What is your ultimate dream?

To live a life knowing I did my best, even if I don’t achieve all my goals. As long as I have given it my best shot, I will never have to think, what if?

What advice would you give to future Tokeny employees?

Don’t be afraid of accepting new challenges, keep an open mind, and the team is always there to help you improve. Your hard work will be recognized.

What gets you excited about Tokeny’s future?

We are at the beginning of something that can completely change the way we do finance in the future. Opening up a whole new world of opportunities for institutions and investors. I am excited to be part of this journey and see where it leads us.

He prefers:

Coffee

check

Tea

check

Movie

Book

Work from the office

check

Work from home

check

Dogs

Cats

Call

check

Text

check

Burger

Salad

check

Mountains

Ocean

check

Wine

Beer

check

Countryside

City

check

Slack

Emails

check

Casual

Formal

check

Crypto

check

Fiat

Night

check

Morning

More Stories  Tokeny’s Talent|Barbora’s Story 28 May 2021 Tokeny’s Talent|Alexis’ Story 26 October 2022 Tokeny’s Talent|Nida’s Story 15 January 2021 Tokeny’s Talent|Barbel’s Story 17 December 2021 Tokeny’s Talent|Shurong’s Story 20 November 2020 Tokeny’s Talent|Ben’s Story 25 March 2022 Tokeny’s Talent|Mihalis’s Story 28 January 2022 Tokeny’s Talent|José’s Story 19 August 2021 Tokeny’s Talent | Jordi’s Story 1 November 2024 Tokeny’s Talent|Radka’s Story 4 May 2022 Join Tokeny Solutions Family We are looking for talents to join us, you can find the opening positions by clicking the button. Available Positions

The post Tokeny’s Talent | Christian’s Story appeared first on Tokeny.


PingTalk

How to Leverage Digital Identity to Strengthen Digital Operational Resilience in the DORA Landscape

Leverage converged IAM to accelerate your route to DORA compliance with Ping Identity Platform.

iComply Investor Services Inc.

How a CISO Transformed Their AML Program to Meet BCFSA Requirements

Discover how a CISO at a credit union transformed KYB, KYC, and AML compliance to meet BCFSA standards. Learn how iComply's holistic platform streamlined processes, reduced costs, enhanced security with edge computing, and improved member satisfaction.

David, the Chief Information Security Officer (CISO) at a mid-sized credit union in British Columbia, faced a daunting challenge. His credit union had been flagged in an internal audit for inadequate compliance processes related to KYB (Know Your Business), KYC (Know Your Customer), and AML (Anti-Money Laundering). With the British Columbia Financial Services Authority (BCFSA) tightening AML regulations, David knew that continuing with their web of disconnected solutions and manual workflows was no longer viable.

The stakes were high. Non-compliance could lead to hefty fines, reputational damage, and even restrictions on operations. To address the gaps, David and his team began exploring ways to overhaul their compliance processes. They quickly realized they had two choices: continue patching together multiple disconnected systems or adopt iComply’s holistic compliance platform. Here’s how David’s team turned their challenging and complicated compliance journey into a success story.

The Status Quo: A Web of Inefficiency

Before adopting iComply, David’s credit union relied on a fragmented system for compliance. KYB checks were done through multiple vendors, KYC was manual – usually requiring members to come to the branch for routine updates, and AML monitoring involved a time-consuming mix of spreadsheets and third-party tools. Each step required manual effort, from verifying documents to cross-checking sanctions lists and PEPs (Politically Exposed Persons).

This setup caused significant challenges:

Time-Consuming Workflows: Staff spent hours reconciling data across different platforms. High Costs: Licensing multiple solutions added up, with limited ROI. Increased Risk: Manual processes led to errors, exposing the credit union to potential non-compliance. Poor Member Experience: Onboarding new members was slow and frustrating, affecting satisfaction and retention. Existing members were frustrated by the credit union’s policiy to force members to come to the branch in order to provide updated documents for KYC refreshes.

David knew that meeting BCFSA’s stringent AML guidelines required a transformative solution—one that could consolidate systems, automate workflows, and enhance security.

The iComply Difference

When David’s team evaluated iComply, the benefits were clear. Unlike traditional solutions, iComply offered an end-to-end compliance platform designed to address the unique challenges of small to medium financial institutions. Here’s how iComply reshaped their approach:

Consolidation of Systems: iComply replaced eight disconnected systems with a single, unified platform. This meant KYB, KYC, and AML workflows could be managed seamlessly from one place, eliminating redundancies and errors while simplifying processes. Edge Computing for Enhanced Security: With iComply’s proprietary edge computing technology, sensitive member data was processed and encrypted directly on their devices. This ensured that no unencrypted data left the local environment, significantly reducing privacy risks and better aligning with their requirements around data governance and their members expectations for data privacy and security. Automation and Efficiency: Tedious tasks like document verification, sanctions screening, and biometric identity checks were automated. Real-time alerts flagged potential issues, allowing David’s team to focus on high-priority cases instead of getting bogged down in manual reviews. Improved Member Experience: By streamlining onboarding, iComply enabled new members to complete verification in minutes, not days. This frictionless experience boosted member satisfaction and reinforced the credit union’s commitment to member privacy, security, and service. Cost Savings: Consolidating systems and automating processes reduced licensing fees, as well as integration, maintenance, and operational costs. The ROI was immediate, with fewer resources spent on compliance operations and more available for growth initiatives.

Meeting BCFSA Requirements with Confidence

The BCFSA’s AML guidelines emphasize early identification of risks, robust documentation, and ongoing monitoring. With iComply, David’s credit union exceeded these standards:

Comprehensive Screening: Real-time access to global sanctions, PEP, and watchlist data ensured thorough due diligence. Transparency and Reporting: Automated audit trails and detailed reports made regulatory reviews straightforward and stress-free. Ongoing Monitoring: Continuous risk assessment tools allowed David’s team to stay ahead of potential threats.

A New Value Proposition for Members

Adopting iComply wasn’t just about compliance—it reinforced the credit union’s value to its members. By ensuring the highest levels of security and privacy, the credit union demonstrated its commitment to protecting members’ financial well-being. Additionally, faster onboarding and streamlined services enhanced member trust and loyalty.

Creating Exceptional Member Experiences

For David and his team, choosing iComply was a game-changer. The credit union now operates with confidence, knowing its compliance processes are robust, efficient, and fully aligned with BCFSA requirements. They’ve saved time, reduced costs, and significantly lowered their risk exposure—all while improving member satisfaction.

If your financial institution is still struggling with disconnected systems and manual workflows, it’s time to consider iComply. Like David’s credit union, you can transform compliance from a burden into a strategic advantage.


BlueSky

Bluesky 2024 Moderation Report

Throughout 2024, our Trust & Safety team has worked to protect our growing userbase and uphold our community standards.

2024 was a year of immense growth for Bluesky. We launched the app publicly in February and gained over 23M users by the end of the year. With this growth came anticipated challenges in scaling Trust & Safety, from adding workstreams to adapting to new harms.

Throughout 2024, our Trust & Safety team has worked to protect our growing userbase and uphold our community standards. Our approach has focused on assessing potential harms based on both their frequency and severity, allowing us to direct our resources to where they can have the greatest impact. Looking ahead to 2025, we're investing in stronger proactive detection systems to complement user reporting, as a growing network needs multiple detection methods to rapidly identify and address harmful content. In Q1, we'll be sharing a draft of updated Guidelines as we continue adapting to our community’s needs.

Overview

In 2024, Bluesky grew from 2.89M users to 25.94M users. In addition to users hosted on Bluesky’s infrastructure, there are over 4,000 users running their own infrastructure (Personal Data Servers), self-hosting their content, posts, and data.

To meet the demands caused by user growth, we’ve increased our moderation team to roughly 100 moderators and continue to hire more staff. Some moderators specialize in particular policy areas, such as dedicated agents for child safety. Our moderation team is staffed 24/7 and reviews user reports around the clock. This is a tough job, as moderators are consistently exposed to graphic content. At the start of September 2024, we began providing psychological counselling to alleviate the burden of viewing this content.

Reports

In 2024, users submitted 6.48M reports to Bluesky’s moderation service. That’s a 17x increase from the previous year — in 2023, users submitted 358K reports total. The volume of user reports increased with user growth and was non-linear, as the graph of report volume below shows:

Report volume in 2024

In late August, there was a large increase in user growth for Bluesky from Brazil, and we saw spikes of up to 50k reports per day. Prior to this, our moderation team handled most reports within 40 minutes. For the first time in 2024, we now had a backlog in moderation reports. To address this, we increased the size of our Portuguese-language moderation team, added constant moderation sweeps and automated tooling for high-risk areas such as child safety, and hired moderators through an external contracting vendor for the first time.

We already had automated spam detection in place, and after this wave of growth in Brazil, we began investing in automating more categories of reports so that our moderation team would be able to review suspicious or problematic content rapidly. In December, we were able to review our first wave of automated reports for content categories like impersonation. This dropped processing time for high-certainty accounts to within seconds of receiving a report, though it also caused some false positives. We’re now exploring the expansion of this tooling to other policy areas. Even while instituting automation tooling to reduce our response time, human moderators are still kept in the loop — all appeals and false positives are reviewed by human moderators.

Some more statistics: The proportion of users submitting reports held fairly stable from 2023 to 2024. In 2023, 5.6% of our active users1 created one or more reports. In 2024, 1.19M users made one or more reports, approximately 4.57% of our user base.

In 2023, 3.4% of our active users received one or more reports. In 2024, the number of users who received a report were 770K, comprising 2.97% of our user base.

The majority of reports were of individual posts, with a total of 3.5M reports. This was followed by account profiles at 47K reports, typically for a violative profile picture or banner photo. Lists received 45K reports. DMs received 17.7K reports. Significantly lower are feeds at 5.3K reports, and starter packs with 1.9K reports.

Our users report content for a variety of reasons, and these reports help guide our focus areas. Below is a summary of the reports we received, categorized by the reasons users selected. The categories vary slightly depending on whether a report is about an account or a specific post, but here’s the full breakdown:

Anti-social Behavior: Reports of harassment, trolling, or intolerance – 1.75M Misleading Content: Includes impersonation, misinformation, or false claims about identity or affiliations – 1.20M Spam: Excessive mentions, replies, or repetitive content – 1.40M Unwanted Sexual Content: Nudity or adult content not properly labeled – 630K Illegal or Urgent Issues: Clear violations of the law or our terms of service – 933K Other: Issues that don’t fit into the above categories – 726K

These insights highlight areas where we need to focus more attention as we prioritize improvements in 2025.

Labels

In 2024, Bluesky applied 5.5M labels, which includes individual post labels and account-level labels. To give an idea of volumes, in Nov 2024, 2.5M videos were posted on Bluesky2, along 36.14M images. This comes primarily from automation where every image as well as frames from each video is sent to a provider for assessment, they return verdicts that match to our specific labels, and those are the ones you see from Bluesky Moderation. None of the images or videos are retained by the vendor or used for training generative AI systems. In June 2024, we analyzed the effectiveness of this system and concluded that the overall system was 99.90% accurate (i.e. it labeled the right things with the right labels). Human moderators review all appeals on labels, but due to backlogs, there are currently delays.

The top human-applied labels were:

Sexual-figurative3 - 55,422 Rude - 22,412 Spam - 13,201 Intolerant - 11,341 Threat - 3,046 Appeals

In 2024, 93,076 users submitted at least one appeal in the app, for a total of 205K individual appeals. For most cases, the appeal was due to disagreement with label verdicts.

We currently handle user appeals for taken-down accounts via our moderation email inbox.

In 2025, we will transition to responding to moderation reports directly within the Bluesky app, which will streamline user communication. For example, we’ll be able to report back to users what action was taken on their reports. Additionally, in a future iteration, it will be possible for users to appeal account takedowns directly within the Bluesky app instead of having to send us an email.

Takedowns

In 2024, Bluesky moderators took down 66,308 accounts, and automated tooling took down 35,842 accounts for reasons such as spam and bot networks. Mods took down 6,334 records (posts, lists, feed etc.) while automated systems removed 282.

This month (January 2025), we’ve already built in policy reasons to Ozone, our open-source moderation tool. This will give us more granular data on the takedown rationale moving forward.

Legal Requests

In 2024, we received 238 requests from law enforcement, governments, legal firms, responded to 182, and complied with 146. The majority of requests came from German, U.S., Brazilian, and Japanese law enforcement.

In the chart below, User Data Requests are requests for user data; Data Preservation Requests are requests for Bluesky to store user data pending legal authorization to transfer the data; Emergency Data Requests are extreme cases where there’s a threat to life (i.e., someone actively discussing their own suicide with a time and date given for an attempt); Takedown Requests are requests for content removal; Subpoena Requests are largely user data requests, but if Bluesky fails to provide the data in a timely manner, it has to physically show up in court to defend not providing the data.

Type of Request Requests Responded User Data Request 111 87 Data Preservation Request 8 8 Emergency Data Request 13 12 Takedown Request 45 22 Inquiry 44 36 Subpoena 17 17 Totals 238 182

The demand for legal requests peaked between Sept and Dec 2024.

Legal requests in 2024 Copyright / Trademark

In 2024, we received a total of 937 copyright and trademark cases. There were four confirmed copyright cases in the entire first half of 2024, and this number increased to 160 in September. The vast majority of cases occurred between September to December.

We published a copyright form in late 2024, which provided more structure to our report responses. The influx of users from Brazil meant that professional copyright companies began scraping Bluesky data and sending us copyright claims. With the move to a structured copyright form, we expect to have more granular data in 2025.

Child Safety

We subscribe to a number of hashes (digital fingerprints) that match known cases of Child Sexual Abuse Material (CSAM). When an image or video is uploaded to Bluesky and matches one of these hashes, it is immediately removed from the site and our infrastructure without the need for a human to view the content.

In 2024, Bluesky submitted 1,154 reports for confirmed CSAM to the National Centre for Missing and Exploited Children (NCMEC). Reports consist of the account details, along with manually reviewed media by one of our specialized child safety moderators. Each report can involve many pieces of media, though most reports involve under five pieces of media.

CSAM is a serious issue on any social network. With surges in user growth also came increased complexity in child safety. Cases included accounts attempting to sell CSAM by linking off-platform, potentially underage users trying to sell explicit imagery, and pedophiles attempting to share encrypted chat links. In these cases, we rapidly updated our internal guidance to our moderation team to ensure prompt response times in taking down this activity.

To read more about how Bluesky handles child safety, you can find a co-published blog post on Thorn’s website.

Footnotes

users that have an account that hasn’t been suspended or deleted

Not inclusive of GIFs through Tenor

We haven’t managed to accurately separate figurative images from the rest in terms of our automated labelling as yet, so these are usually users who are appealing the automation applied labels on their art

Thursday, 16. January 2025

Indicio

How you can be ready for the new White House order to strengthen digital identity

The post How you can be ready for the new White House order to strengthen digital identity appeared first on Indicio.
The Biden administration’s latest Executive Order (EO), on “Strengthening and Promoting Innovation in the Nation’s Cybersecurity,” focuses on preventing digital identity theft as a critical component to reducing cybercrime and fraud.

By: Tim Spring

Stronger digital identities

The White House released the final Executive Order from the Biden administration today calling for strong cybersecurity measures, and one measure they pointed out specifically was “the acceptance of digital identity documents to access public benefits programs that require identity verification, so long as it is done in a manner that preserves broad program access for vulnerable populations and supports the principles of privacy, data minimization, and interoperability.”

This effectively means replacing the current account and password systems that most online portals use. While these current systems offer a convenient, quick way to gain access, they have been known to be insecure for years.

So what would these “digital identity documents” actually look like?

At the most basic level a digital identity document is a combination of personally identifiable information that you can tie to an individual to prove who they are online. One example that you might have heard of is a Mobile Driver’s License or mDL, which are also referenced in the order as a potential way to gain access to public benefit programs.

Moving past the basics, to get the most functionality and security out of these documents they will need a few additional features.

They need to be stored locally with the end user

Third party storage of personal data for identity authentication is always at risk of a data breach

They need to be tamper-proof and un-copyable

The integrity of the information must be verifiable and it must be bound to the person it belongs to in a way that someone else can’t use it.

They need to be interoperable

Being locked out because you’re on a mac and the other party is on PC and they don’t play well together won’t work at this scale, we need a universal solution

The Executive Order also stresses the privacy preserving nature of these documents, saying they should “support user privacy and data minimization by ensuring only the minimum information required for a transaction — often a “yes” or “no” response to a question, such as whether an individual is older than a specific age — is requested from the holder of the digital identity document.”

Decentralized identity

Decentralized identity is the solution to the White House Executive Order. Everyone controls their own personal data and that data can be verified as authentic, as bound to the person it rightfully belongs to, and that it has not been manipulated.

The benefit of decentralization is portable trust. Any information — and not just personal data — can be sealed in a digital container called a Verifiable Credential. The way that container is created means you always know where it came from. The way the data is sealed means that any attempt to tamper with it breaks the seal.

As an architecture for our information economy, decentralized identity takes out the weak points of our current system — centralized databases filled with personal data for verifying identity — and replaces them with a much simpler, resilient, seamless way of proving who we are to each other.

The result is that information can go from anywhere to everywhere and be immediately acted on — and of course, by providing a reliable method for individuals and organizations to prove their identities online, verifiable credentials help reduce the risk of identity theft and unauthorized access to sensitive systems.

Decentralized identity frameworks offer a transformative approach to identity management. Unlike traditional centralized systems, decentralized identity places control of personal data back in the hands of individuals. This model not only enhances privacy and security but also reduces the risk of large-scale data breaches that have plagued centralized databases.

The Executive Order’s promotion of innovative developments and use of emerging technologies is an acknowledgment of the potential of decentralized identity to strengthen the nation’s cybersecurity infrastructure. 

To better see how these technologies work, you can see a demonstration of using Verifiable Credentials to access your bank account, or fly internationally in a joint effort between Indicio, SITA, Delta Airlines, and the Government of Aruba.

The team at Indicio is ready to support this initiative with our proven solutions in Verifiable Credentials and decentralized identity. If you’d like to talk to us about how you can implement digital identities across your organization you can reach out to our team here.

Together, look forward to building a resilient and secure digital infrastructure that protects everyone’s critical assets and fosters innovation in the cybersecurity landscape.

Sign up to our newsletter to stay up to date with the latest from Indicio and the decentralized identity community

The post How you can be ready for the new White House order to strengthen digital identity appeared first on Indicio.


Spruce Systems

How Digital Documents Can Improve Cross-Border Travel and Security

SpruceID is advancing privacy-preserving Verifiable Digital Credentials (VDCs) to enhance security, streamline verification processes, and protect user privacy in international travel and immigration.

Digital credentials are on the road to broad availability in the U.S. These cryptographically signed digital documents are one variety of VDC, or Verifiable Digital Credential. They enhance user privacy while making credential checks faster and more trustworthy, using unforgeable cryptographic signatures to prove their authenticity and accuracy.

As VDC usage continues to grow within the United States and other nations, a new challenge rises ahead: creating digital versions of passports and international travel documents with the same privacy and security benefits as the mobile driver’s license. SpruceID is now contributing to the effort to push VDC-based digital identity beyond U.S. borders. Read on to learn more about the benefits of digital identity for travelers, immigrants, and the world.

User Privacy and National Security

Digital passports, immigration, and work authorization documents are still almost entirely analog documents – paper, usually backed up by a database. The next generation of these credentials, though, will be able to “live” on your smartphone or other mobile device. Cryptographic signatures will prevent them from being copied or altered while making it possible to verify them without checking a separate database.

Read More: Digital Signatures

These Verifiable Digital Credentials (VDCs) are sometimes also known as privacy-preserving digital credentials (PPDCs), highlighting how central privacy is to their technical design. One major privacy benefit of travel and immigration documents based on VDCs is selective disclosure – proving your citizenship, for instance, without sharing less relevant data like your spouse’s name. Similarly, part of the stated goal of the push for digital travel documents is to minimize the system’s reliance on biometrics, such as face-scanning, which can generate high-risk data. The potential to verify digital credentials without contacting a central server for confirmation also means VDCs can be used without leaving “footprints” that could be used for surveillance.

This doesn’t just serve individual privacy: the broader stakes for national security have also become increasingly clear. State-affiliated hacks targeting infrastructure and data are becoming larger, more frequent, and more pernicious. Though it sounds extreme, it’s not difficult to imagine a long-term compromise of digital travel control systems giving a foreign enemy or other bad actors detailed visibility into the movements of government officials or high-ranking business leaders.

Such a compromise could be a very powerful intelligence advantage for America’s enemies. That’s one reason for a recent U.S. government push for privacy-preserving data tools. If travel systems are digitized in a privacy-first way, the current moment is an opportunity to spread the privacy advantages of digital credentials around the world.

More Secure Processes and Borders

In addition to enabling more private verifications, VDCs are also more trustworthy compared to paper documents – particularly in situations where remote verification isn’t available or practical. Fully verifying a paper document generally requires access to a central database, but access to that database is often restricted. Just as regional driver’s license databases are often restricted to law enforcement, insurers, and a handful of other entities, passport information is even more strictly limited – in the U.S., to the State Department and Department of Homeland Security. 

Somewhat surprisingly, passports have in recent years been the most frequently forged identity documents around the world, according to Identity Week. This is driven not by individuals hoping to travel on a fake passport, as airport security checkpoints are far more likely to use a remote database for confirmations. Instead, forged passports are most often used to deceive employers trying to determine a job applicant’s work eligibility. For instance, forged British and Irish passports are widely used to circumvent eligibility requirements to work in France and mainland Europe – a situation where the document itself must stand as the final source of trust.

Thanks to physical security features, paper passports are difficult to forge—but clearly, not impossible. In fact, it appears that we are on the cusp of a potential flood of fake paper documents unleashed by AI: reports in 2024 found that AI is making forged identity documents much less expensive to produce.

Read More: AI is the Final Blow for an ID System Whose Time Has Passed

The signature scheme behind VDCs is vastly superior to paper documents in this and similar cases. While identity database access is constricted, a directory of valid signatures on a digital document can be entirely public, and the signature cannot be forged by anything short of a physical attack on the servers where a document issuer’s digital “keys” are securely stored.

Faster and More Convenient – Online and Off

Using digital signatures instead of paper documents to verify passports can also dramatically speed travel processing. Without access to a central database, individual screeners will often have to devote considerable time to evaluating individual documents. Verification of a digital document using cryptographic signatures is near-instant while also eliminating the ambiguities and risks of physical document review.

Another emergent benefit of digital credentials for migrants and travelers is the ability to store and manage virtual documents on the mobile phone you already carry. In regions where payments and identity tools are already available on smartphones, consumer preference is quickly shifting towards being able to leave the house with a phone but without physical credit cards or ID. While it’s a radical shift from as little as a decade ago, smartphones have become ubiquitous enough that the same habit is likely to become common worldwide. It seems likely to be particularly appealing for refugees or other migrants in unstable situations when keeping track of one smartphone is easier than a large sheaf of paperwork.

Finally, VDCs are a step-change in the accuracy and ease of verifying documents online. Physical documents are particularly vulnerable to forgery when presented online, particularly in the post-AI era. Presenting a passport as a digital photo, for instance, makes it impossible to accurately check physical security features like a hologram. A digital signature, by contrast, can be confirmed by a website or kiosk as quickly and accurately as by a human operating a scanning device. This dramatically increases the reliability of immigration and travel management through remote online portals.

A Safer, Freer World

The United States is pursuing VDC-based international travel systems in significant part because the technology comports with Western democratic values. VDC technology is easy to use to work outside of omnipresent surveillance while surpassing the trustworthiness of paper documents.

SpruceID’s work with the Department of Homeland Security is part of a broader U.S. national strategy to push VDCs and other privacy-preserving digital technology forward. We hope to help drive adoption outside of the U.S. as well, with potentially substantial benefits for privacy and security worldwide.

Learn About SpruceID’s Work With DHS

About SpruceID: SpruceID is building a future where users control their identity and data across all digital interactions.


Ocean Protocol

DF124 Completes and DF125 Launches

Predictoor DF124 rewards available. DF125 runs Jan 16— Jan 23th, 2024 1. Overview Data Farming (DF) is Ocean’s incentives program. In DF, you can earn OCEAN rewards by making predictions via Ocean Predictoor. Data Farming Round 124 (DF124) has completed. DF125 is live today, Jan 16. It concludes on January 23th. For this DF round, Predictoor DF has 37,500 OCEAN rewards and 20,000 ROSE&nbs
Predictoor DF124 rewards available. DF125 runs Jan 16— Jan 23th, 2024 1. Overview

Data Farming (DF) is Ocean’s incentives program. In DF, you can earn OCEAN rewards by making predictions via Ocean Predictoor.

Data Farming Round 124 (DF124) has completed.

DF125 is live today, Jan 16. It concludes on January 23th. For this DF round, Predictoor DF has 37,500 OCEAN rewards and 20,000 ROSE rewards.

2. DF structure

The reward structure for DF125 is comprised solely of Predictoor DF rewards.

Predictoor DF: Actively predict crypto prices by submitting a price prediction and staking OCEAN to slash competitors and earn.

3. How to Earn Rewards, and Claim Them

Predictoor DF: To earn: submit accurate predictions via Predictoor Bots and stake OCEAN to slash incorrect Predictoors. To claim OCEAN rewards: run the Predictoor $OCEAN payout script, linked from Predictoor DF user guide in Ocean docs. To claim ROSE rewards: see instructions in Predictoor DF user guide in Ocean docs.

4. Specific Parameters for DF125

Budget. Predictoor DF: 37.5K OCEAN + 20K ROSE

Networks. Predictoor DF applies to activity on Oasis Sapphire. Here is more information about Ocean deployments to networks.

Predictoor DF rewards are calculated as follows:

First, DF Buyer agent purchases Predictoor feeds using OCEAN throughout the week to evenly distribute these rewards. Then, ROSE is distributed at the end of the week to active Predictoors that have been claiming their rewards.

Expect further evolution in DF: adding new streams and budget adjustments among streams.

Updates are always announced at the beginning of a round, if not sooner.

About Ocean, DF and Predictoor

Ocean was founded to level the playing field for AI and data. Ocean tools enable people to privately & securely publish, exchange, and consume data. Follow Ocean on Twitter or TG, and chat in Discord. Ocean is part of the Artificial Superintelligence Alliance.

In Predictoor, people run AI-powered prediction bots or trading bots on crypto price feeds to earn $. Follow Predictoor on Twitter.

DF124 Completes and DF125 Launches was originally published in Ocean Protocol on Medium, where people are continuing the conversation by highlighting and responding to this story.


Metadium

Metadium Mainnet Update

Metadium Mainnet Update Notice [go-metadium m0.10.1 Update Notice] Dear Community, We want to provide information regarding the mainnet update scheduled for this week. [Schedule] • Expected release date: January 17, 2025, at 2 pm [Details] 1. Mainnet update for go-metadium version m0.10.1 to activate the TRS (Transaction Restriction Service) • What is TRS? TRS is
Metadium Mainnet Update Notice

[go-metadium m0.10.1 Update Notice]

Dear Community,

We want to provide information regarding the mainnet update scheduled for this week.

[Schedule]

• Expected release date: January 17, 2025, at 2 pm

[Details]

1. Mainnet update for go-metadium version m0.10.1 to activate the TRS (Transaction Restriction Service)

• What is TRS?

TRS is a feature that identifies specific wallet addresses and restricts transactions with those addresses. It is managed by the TRSList contract and aims to provide a more reliable transaction environment on the Metadium network.

2. Key Points of the Update

• Stability of version m0.10.1

This version was deployed to the testnet on June 20, 2024, allowing sufficient time for testing.

• Role of BP nodes

BP nodes, participating in Metadium governance can subscribe to the TRSList contract and choose to use the TRS service.

• TRS activation on the mainnet

All BP nodes on the Metadium mainnet will subscribe to the TRS service, creating a more trusted transaction environment.

• Operation of EN nodes

After upgrading to version m0.10.1, EN nodes on the Metadium network will stop broadcasting transactions from specific wallet addresses registered in the TRSList contract.

[Update Version Release Notes]

https://github.com/METADIUM/go-metadium/releases/tag/m0.10.1

Thank you for your continued interest and support. We will do our best to provide better services going forward.

Metadium Team

[go-metadium m0.10.1 업데이트 공지]

안녕하세요, 메타디움 팀입니다.

금주 예정된 메인넷 업데이트에 관해 안내드립니다.

[업데이트 일정]

- 배포 예정일: 2025년 1월 17일 14시

[업데이트 내용]

1. TRS(Transaction Restriction Service) 서비스 활성화를 위한 go-metadium 버전 m0.10.1 메인넷 업데이트

- TRS란? TRS는 특정 지갑 주소를 식별하여 해당 주소와의 거래를 제한하는 기능입니다.

이 기능은 TRSList 컨트랙트를 통해 관리되며, 메타디움 네트워크에 더욱 신뢰할 수 있는 거래 환경을 제공합니다.

2. 업데이트 주요 사항

- m0.10.1 버전의 안정성:

해당 버전은 2024년 6월 20일에 테스트넷에 배포되어 충분한 테스트 기간을 거쳤습니다.

- BP 노드의 역할:

메타디움 거버넌스 참여 노드인 BP 노드들은 TRSList 컨트랙트를 구독하여 TRS 서비스를 선택적으로 사용할 수 있습니다.

- 메인넷에서의 TRS 활성화:

메타디움 메인넷의 모든 BP 노드들은 TRS 서비스를 구독하여 더욱 신뢰할 수 있는 거래 환경을 제공합니다.

- EN 노드의 동작:

메타디움 네트워크의 EN 노드는 m0.10.1 버전 업그레이드 후 TRSList 컨트랙트에 등록된 특정 지갑 주소의 트랜잭션을 전파하지 않게 됩니다.

[업데이트 버전 릴리즈 노트]

https://github.com/METADIUM/go-metadium/releases/tag/m0.10.1

여러분의 지속적인 관심과 성원에 감사드리며, 앞으로도 더 나은 서비스를 제공하기 위해 최선을 다하겠습니다.

감사합니다.

메타디움 팀

Website | https://metadium.com

Discord | https://discord.gg/ZnaCfYbXw2

Telegram(EN) | http://t.me/metadiumofficial

Twitter | https://twitter.com/MetadiumK

Medium | https://medium.com/metadium

Metadium Mainnet Update was originally published in Metadium on Medium, where people are continuing the conversation by highlighting and responding to this story.


iComply Investor Services Inc.

How to do a KYC Refresh in Financial Services

Emily, a seasoned compliance officer, remembers the days when performing a KYC (Know Your Customer) refresh meant a mountain of manual work. Tasked with ensuring her financial services firm remained compliant with evolving regulations, Emily had to juggle stacks of outdated spreadsheets, endless email threads, and hours of manual data verification. But today, thanks to […]

Emily, a seasoned compliance officer, remembers the days when performing a KYC (Know Your Customer) refresh meant a mountain of manual work. Tasked with ensuring her financial services firm remained compliant with evolving regulations, Emily had to juggle stacks of outdated spreadsheets, endless email threads, and hours of manual data verification.

But today, thanks to iComply’s streamlined platform, Emily’s team has revolutionized their approach to KYC refreshes, making them faster, more accurate, and far less stressful. Here’s a look at how she transformed her processes and achieved compliance with confidence.

Step 1: Planning and Preparation

Previously, Emily’s KYC refresh process began with manually identifying accounts due for updates. This meant combing through spreadsheets to cross-reference customer profiles with regulatory requirements—a time-consuming and error-prone task.

Now, with iComply, Emily’s team uses automated workflows to flag accounts requiring a refresh based on predefined rules, such as changes in risk profile or regulatory deadlines. This automation ensures no account is missed and allows her team to focus on higher-value tasks.

Checklist for Planning and Preparation:

Identify accounts needing updates based on risk or regulatory timelines. Use automated tools to flag accounts requiring a refresh. Ensure all necessary customer data is centralized and accessible.

Step 2: Customer Outreach

In her previous role, Emily spent hours crafting individual email templates and following up with customers to gather updated documentation. Tracking responses was chaotic and often resulted in delays.

With iComply, Emily’s team now automates customer outreach. Personalized requests for updated documents are sent through a secure portal, complete with clear instructions. Customers appreciate the seamless experience, and Emily’s team can track responses in real time.

Checklist for Customer Outreach:

Automate personalized outreach to customers with secure communication tools. Provide clear instructions and a user-friendly portal for submitting updates. Monitor responses and set reminders for follow-ups.

Step 3: Document Verification

Manual document verification was one of the most time-consuming parts of Emily’s old workflow. Her team had to manually check IDs, match information, and ensure authenticity.

Now, iComply’s platform automates document verification with advanced AI-driven tools. These tools cross-reference submitted data against global watchlists, ensuring compliance while significantly reducing errors and processing time.

Checklist for Document Verification:

Use automated tools to verify submitted documents. Cross-check customer data with global sanctions and PEP lists. Flag discrepancies for manual review.

Step 4: Risk Assessment and Scoring

Previously, performing a risk assessment involved manually calculating scores based on various risk factors, often requiring input from multiple teams. This process was not only inefficient but also inconsistent.

With iComply’s integrated risk assessment tools, Emily’s team now generates consistent and accurate risk scores automatically. This allows for quick identification of high-risk customers who may require enhanced due diligence.

Checklist for Risk Assessment:

Automatically calculate risk scores based on predefined criteria. Review flagged accounts for potential issues. Update customer profiles with risk assessments.

Step 5: Reporting and Compliance

One of Emily’s biggest challenges used to be generating compliance reports for internal audits and regulatory reviews. Gathering data from disparate sources often led to delays and incomplete records.

With iComply, reporting is now effortless. The platform generates comprehensive audit trails, ensuring Emily’s team is always prepared for regulator inquiries. This gives her the confidence to demonstrate compliance at any time.

Checklist for Reporting:

Generate audit trails automatically to track all actions. Prepare compliance reports with detailed documentation. Ensure records are stored securely for easy access during audits.

Transforming Compliance with iComply

Today, Emily no longer dreads KYC refresh cycles. By leveraging iComply’s advanced platform, her team has:

Reduced manual work by automating repetitive tasks. Improved accuracy with AI-driven document verification and risk scoring. Enhanced customer experience with seamless, secure communication. Gained confidence in their compliance readiness through robust reporting tools.

For Emily, the difference is night and day. With iComply, her team not only meets regulatory requirements but also sets a higher standard for efficiency and customer trust.

Whether you’re a compliance officer like Emily or part of a team managing KYC processes, iComply can help you streamline workflows, reduce costs, and build a program that’s ready for the future of compliance.


PingTalk

User Access Review: Definition, Process & Best Practices

Explore the user access review process, benefits, challenges, and best practices to enhance compliance and security in enterprise environments.

Amid the constant changes that organizations endure — whether through personnel decisions, new vendor selection, tech stack updates, or department restructuring — they must ensure sensitive company resources and applications remain secure and are only accessible by authorized users.

 

Managing employee and third-party access privileges to enterprise applications, data, and networks is no easy feat, though it’s crucial to overall security, compliance, and operational efficiency.

 

Fortunately, automated user access reviews with identity and access management (IAM) systems allow organizations to verify proper user privileges and prevent unauthorized access.


paray

Crypto 2025 is not Internet 1995

On January 7, 2025, Fidelity Digital Assets rolled out its 2025 Look Ahead report.  The main message of financial behemoth Fidelity Investments is that it is not too late to invest in digital assets because “2025 has the potential to be the year that is looked back on as the pivotal time where the “chasm … Continue reading Crypto 2025 is not Internet 1995 →
On January 7, 2025, Fidelity Digital Assets rolled out its 2025 Look Ahead report.  The main message of financial behemoth Fidelity Investments is that it is not too late to invest in digital assets because “2025 has the potential to be the year that is looked back on as the pivotal time where the “chasm … Continue reading Crypto 2025 is not Internet 1995 →

Wednesday, 15. January 2025

Anonym

5 Trends to Watch in Data Privacy and Identity Protection in 2025

As we enter 2025, data privacy and identity protection will remain some of the hottest topics around. Watch out for the continued meteoric rise of digital identity verification and management, more data privacy laws, tighter regulations around artificial intelligence, and the continued emergence of quantum computing. Here’s our take on what lies ahead: As we […] The post 5 Trends to Watch in Dat

As we enter 2025, data privacy and identity protection will remain some of the hottest topics around. Watch out for the continued meteoric rise of digital identity verification and management, more data privacy laws, tighter regulations around artificial intelligence, and the continued emergence of quantum computing. Here’s our take on what lies ahead:

Digital identity verification and management will take centre stage

Impersonation and fraud, particularly in banking and finance, have become so prevalent and sophisticated that digital identity verification and management will fast become the go-to solution for protecting customers and building trust, replacing paper-based and other vulnerable systems. We agree with industry predictions that identity will be the “linchpin of business resilience” going forward, and that “digital identity verification will have a breakout year in 2025”. There’s likely to be a rush to digital identity wallets and digital and biometric credential verification methods, particularly since regulations like eIDAS 2.0 in the EU are driving the transition to decentralized identity technologies. Go Inside Version 3.0 of the Most Advanced Mobile Wallet SDK on the Market. Explore our guides.

The US will get more state privacy laws, but no federal privacy law

In an unsurprising development, most pundits agree that the United States’ chances of finally achieving a comprehensive federal privacy law are slim to none in 2025. IAPP and TechRadar commentators believe securing bipartisan agreement on such a law is likely to remain elusive under the Republican-controlled Congress, which TechRadar suggests “could leave Americans relying on digital tools to claim back their online privacy for themselves.” Anonyome Labs’ MySudo and RECLAIM apps are great examples of proactive consumer privacy tools.

As always, stepping into the breach from an absent federal privacy law will be state privacy laws, and we’ll see many more of those in 2025. Twenty-six of the 50 US states now have a state privacy law, expanding consumer rights and ratcheting up compliance obligations on business. In 2024, four more state laws came into effect:

Texas Data Privacy and Security Act (TDPSA), effective July 1, 2024
Florida Digital Bill of Rights (FDBR), effective July 1, 2024 
Oregon Consumer Privacy Act (OCPA), effective on July 1, 2024
Montana Consumer Data Privacy Act (MCDPA), effective October 1, 2024.

January 2025 saw four more state privacy laws come into effect—Delaware, Iowa, New Hampshire, and New Jersey—and later in 2025, Tennessee and Maryland will introduce theirs.

Regulation around AI will tighten but privacy and security issues will remain

Generative AI will be the thing to watch in 2025, with artificial intelligence becoming integral to core application design and service delivery for its efficiency, UX and cost-saving benefits. But this emerging tech will also remain acutely challenging, particularly from a data privacy and security perspective.

Regulation around AI will tighten in 2025, but the IAPP puts a good question: “While there is a consensus AI should be regulated, and there are increasing efforts in this sense — such as the highly anticipated EU AI Act [and Colorado’s AI Act] — the fact is AI privacy risks remain uncharted waters, leaving both AI practitioners and privacy professionals with a feeling of unease. After all, since AI technologies are advancing faster than regulation, how should privacy pros approach AI privacy risks in a way that makes new products viable, while safeguarding data subjects’ rights?” It’s a question that may linger well beyond 2025.

The IAPP highlights these 12 risks from AI, which come from Carnegie Mellon University and Oxford University’s adaptation of earlier work by Professor Daniel Solove:

Surveillance: AI exacerbates surveillance risks by increasing the scale and ubiquity of personal data collection.
Identification: AI technologies enable automated identity linking across various data sources, increasing risks related to personal identity exposure.
Aggregation: AI combines various pieces of data about a person to make inferences, creating risks of privacy invasion.
Phrenology and physiognomy: AI infers personality or social attributes from physical characteristics, a new risk category not in Solove’s taxonomy.
Secondary use: AI exacerbates use of personal data for purposes other than originally intended through repurposing data.
Exclusion: AI makes failure to inform or give control to users over how their data is used worse through opaque data practices.
Insecurity: AI’s data requirements and storage practices risk of data leaks and improper access.
Exposure: AI can reveal sensitive information, such as through generative AI techniques.
Distortion: AI’s ability to generate realistic but fake content heightens the spread of false or misleading information.
Disclosure: AI can cause improper sharing of data when it infers additional sensitive information from raw data.
Increased accessibility: AI makes sensitive information more accessible to a wider audience than intended.
Intrusion: AI technologies invade personal space or solitude, often through surveillance measures.

Debate and developments around these 12 risks from AI (and potentially others) will be a hallmark of 2025.

Quantum computing will make more headlines

We were interested to see quantum computing moving onto the “trends to watch” lists for 2025. The race to quantum computing has been going on for a while now, and things are definitely heating up.

Many industries have use cases for quantum computing for simulations (e.g. simulating molecular structures in drug discovery or climate modelling) and optimization (e.g. optimizing shipping routes and flight paths, enhancing machine learning algorithms, or developing advanced materials). But as we’ve said before the quantum age does present some real threats, particularly the looming arrival of quantum computers that are sufficiently powerful and error-resistant to break conventional encryption algorithms (RSA, DSS, Diffie-Hellman, TLS/SSL, etc.) and expose the world’s vast stores of secured data. The race is on to Q-Day and we’ll likely see more about that in 2025. 

The US Government has issued a quantum readiness guide to developing and building capabilities to secure critical information and systems from being compromised by quantum computers. 

More people will worry about data privacy and act to protect their personal information

Consumers are growing increasingly worried about the safety of their personal information, particularly on social media and around AI. With 2024 recording the biggest and most destructive data breaches, and new stats [NB1] showing most people worldwide have already had their personal information stolen, it’s not surprising that people fear data surveillance and scammers. Cisco’s annual privacy study did, however, reveal that all this worry is making people more proactive about protecting their own data, which can only be a good thing, and tools like Anonyome Labs’ consumer apps MySudo and RECLAIM make it easy. Anonyome also offers businesses a suite of next generation digital identity and privacy tools.

As we head into 2025, we wish everyone a happy and safe year. If you’d like to know more about Anonyome Labs’ privacy and identity protection tools, head here for consumer solutions and here for business solutions.

You might also like:

Americans Say Data Privacy is a Human Right: Here are 3 Apps that Achieve It 

Gartner Confirms Anonyome Labs’ Solutions Offer Competitive Edge

Anonyome Wins Prestigious SuperNova Award for Digital Wallet that Will Transform Agriculture

The post 5 Trends to Watch in Data Privacy and Identity Protection in 2025 appeared first on Anonyome Labs.


Kin AI

How to Improve Self-Evaluation for Better Personal and Professional Growth

Self-evaluation is one of the most important reflection exercises. Despite that, it’s still very hard to get right. What does ‘right’ look like, and can AI help?
Image courtesy Unsplash by Jamie Hagan

Try Kin - Personal AI

The performance review process has become increasingly complex in today's workplace. Whether you're preparing for an employee self-assessment, salary negotiation or conducting a self-appraisal of your own performance, looking inwards objectively feels almost impossible sometimes.

From formal performance evaluations where job performance needs assessment, to informal self-reflection about workflow and work ethic, seeing outside objectively can be challenging.

In fact, according to the Harvard Business Review, while 95% of people believe they have strong self-awareness, only 10-15% actually demonstrate true competencies in self-evaluation during behavioral studies. 1

So, how can actual self-awareness be increased to match what many people believe they have?

I’m Yngvi Karlson, Co-Founder of Kin. Born in the Faroe Islands, I’ve spent my career building startups, with two exits along the way, and five years as an active venture capitalist. Now, I’m dedicated to creating Kin, a personal AI people can truly trust.

Follow me on LinkedIn, TikTok and X

Read as I cover some performance management skills, and how AI like Kin can help support their growth, in the following sections:

Understanding the Evaluation Process

Why Self-Evaluation is Important

Barriers to Self-Evaluation

The Five Core Areas of Self-Evaluation

How to Write Effective Self-Evaluations

How Technology Enhances Self-Evaluation

Get Started with Your AI Companion Today

There are also some example self-evaluation questions at the end, so stay tuned!

Image courtesy Unsplash by Sven Mieke Understanding the Evaluation Process

Self-evaluation, also known as self-review, self-appraisal, or self-assessment, is more than just casual self-reflection—it's a systematic process of assessing individual performance against specific KPIs and competencies, either outlined in a job description, or of personal choosing.

In short, it’s a way to determine how well someone is meeting their goals.

While a professional performance evaluation might focus on measurable metrics of job performance like project management outcomes or leadership skills development, personal self-evaluation delves into areas of improvement in behavioral patterns, decision-making abilities, and interactions with friends, family, and team members.

Professional Self-Evaluations

For a professional evaluation, employees are often asked to consider a review period of the last year's achievements, though some organizations’ performance review processes may be shorter- or longer-term than the past year.

Human Resources departments often provide a template to guide the employee self-evaluation process, which ensures company-critical questions are answered by team members while allowing for constructive feedback about individual skill sets and core competencies.

This process is usually accompanied by regular one-on-one meetings with supervisors throughout the year to discuss progress, identify any discrepancies between self-assessment and manager perception, and plan new projects that align with demonstrated strengths.

Personal Self-Evaluations

On the other hand, personal self-evaluations are often undertaken independently—though some companies do ask their employees to do them. These measure how well personal goals are being reached, often in the context of personal life, such as managing anxiety, learning a new hobby, or building a new habit.

Templates are available online, but given the personal nature of these evaluations, they don’t need to use standardized worksheets.

People are Professional and Personal

These two domains—professional and personal evaluation—aren't separate, but instead are inherently connected. According to McKinsey, executives who demonstrate high levels of self-awareness of their personal actions and goals are up to four times more likely to demonstrate strong leadership capabilities. 2

This connection exists because the core competencies built by proper self-evaluation, like problem-solving skills, a positive attitude, and teamwork, benefit both areas of life.

Image courtesy Unsplash by Nick Morrison Why Self-Evaluation is Important

Self-evaluations help people understand how well they’re doing the things they want to be doing, and how they can improve. This makes it much easier for people to adjust their behavior to reach their goals, whether those goals are professional or personal.

As such, self-evaluations build the following skills:

Self-Awareness: Understanding personal strengths, weaknesses, and patterns is perhaps the biggest benefit of self-evaluation.

Increased Accountability: Regular evaluation helps show personal control over growth, encouraging people to harness it.

Decision-Making: Regular self-reflection increases self-awareness, which makes appropriate choices about career paths and personal development easier to identify.

Better Goal Setting: Clear self-assessment leads to more realistic and achievable objectives based on skill, money, and time levels.

Stronger Relationships: Greater self-awareness often leads to better communication and collaboration with colleagues, friends, and family alike.

Stress Reduction: Understanding personal patterns and triggers, and having plans in place to support them, helps manage day-to-day pressures more effectively.

The Impact on Professional Growth

In professional settings, strong self-evaluation skills can dramatically impact career trajectory. According to Gallup's 2023 State of the Global Workplace report, employees who regularly participate in self-evaluation and feedback processes are 3.6 times more likely to be engaged at work and 2.5 times more likely to report being satisfied with their career progression. 3

This advantage comes from multiple factors. Self-aware professionals better understand their strengths and areas of improvement, leading to more targeted skill development. They're also more receptive to constructive feedback during one-on-one meetings, as they've developed the ability to process criticism constructively. Additionally, their enhanced self-awareness often translates to better project management and more effective workplace relationships.

The impact extends to workflow optimization as well. When employees regularly evaluate their processes and competencies, they can better identify inefficiencies and propose improvements.

This proactive approach not only enhances individual performance, but as employee engagement and retention are crucial metrics for organizational success today, employee self-awareness benefits companies by maintaining productive workflows and reducing turnover through better job satisfaction.

Image courtesy Unsplash by Christian Wiediger Barriers to Self-Evaluation

Because self-evaluation is done by oneself, it faces a unique set of challenges.

Discrepancies between perception and reality can lead to confirmation bias, causing people to seek information that supports their existing beliefs about their own work, and ignore information that proves them wrong.

Similarly, emotional attachment to outcomes can cloud judgment of overall performance, as people seek to protect who they love and punish who they don’t.

And perhaps most challenging, people often lack the structured approach needed to make self-assessment a consistent, productive practice.

The Five Core Areas of Self-Evaluation

Before diving into actionable guides, it's important to understand the five key areas that a comprehensive, high-performance self-evaluation should cover:

1. Skills and Knowledge: Assess both technical capabilities and soft skills, identifying areas of expertise and knowledge gaps. For example, a marketing manager might evaluate their proficiency in digital analytics tools, alongside their team leadership abilities and understanding of their actions.

2. Performance and Achievements: Review specific accomplishments against set goals, including both quantitative metrics (like sales numbers or amount of social outings) and qualitative outcomes (such as improved team dynamics or stronger relationships).

3. Habits and Behaviors: Examine daily practices, time management skills, collaboration styles, and both professional and personal conduct. This might include analyzing how a deadline is met, and what continuous learning strategy is being used, if any.

4. Personal Growth and Development: Evaluate progress in career development goals, new skill acquisition, and both professional and personal relationships. Consider both formal learning opportunities and mentoring experiences, whether as a mentor or mentee. This includes assessing how effectively you've engaged with mentoring relationships and contributed to others' personal and professional development while advancing your own.

5. Values and Satisfaction: Assess alignment between personal values, personal actions, and current role; overall job satisfaction; and work-life balance. This includes examining whether a current position and trajectory matches long-term career goals, or whether recent actions build the relationships desired with others.

Other Essential Components of Effective Self-Evaluation

There are a few more important points to make:

Objectivity is crucial but challenging. The key is focusing on observable behaviors and measurable outcomes rather than interpretations. Instead of thinking "I'm bad at presentations," consider the specific aspects that prompt that thought, like "My last three presentations went over time by an average of 10 minutes." This will make it easier to tackle.

Evidence-based assessment requires collecting concrete data. This might mean tracking project completion times at work, or monitoring emotional responses to specific situations in personal life.

Self-evaluations are most useful when accompanied by effective goal-setting and dedication to creating a plan to reach those goals. The evaluations help people understand where they are in that plan, and what they need to adjust to advance further.

Image courtesy Unsplash by Imagine Buddy How to Write Effective Self-Evaluations

Now, as promised. Writing a self-evaluation for any purpose requires a structured approach, similar to the one below:

Decide What’s Being Evaluated: Whether it's professional performance, or a personal goal to learn crochet, ensure what’s being examined is clear.

Start with Data: Gather concrete examples and metrics of personal and/or professional performance. Include project outcomes, feedback received, conversations, and situations that feel indicative of performance.

Use the STAR Method: When describing achievements, use the Situation, Task, Action, Result format to make it easier to understand. For example:

"When our team faced a 20% decline in social media engagement (Situation), I was tasked with improving our content strategy (Task). I implemented a new content calendar and engagement tracking system (Action), resulting in a 45% increase in engagement over three months (Result)."

Be Specific and Honest: Instead of evaluating communication skills as ‘good’, write down the reasoning behind that—e.g. '“led 12 client presentations, was well-received by 9, and had three complain about the talking speed and lack of slide detail.”

Consider Meanings: Self-evaluations exist to promote thought. Consider why things went the way they did, and how the good things can be maintained and improved, as well as how the bad things can be avoided.

Building a Self-Evaluation Routine

Second only to a good evaluation structure is a good evaluation routine. Without regular revisiting and re-application, self-evaluations are not being used to their full potential.

Start by choosing specific times for evaluation—perhaps Sunday evenings for weekly reviews and the last day of each month for broader assessments. Based on the goal progress being evaluated, create templates or frameworks to guide these sessions,

Regular one-on-one meetings with mentors or supervisors should be considered if possible, too. These can help identify any discrepancies between self-perception and reality, while also offering opportunities to discuss new projects and learning opportunities.

For more tips on building routines, check out our guides on time management and effective goal-setting guides.

Image courtesy Unsplash by Aaron Burden How Technology Enhances Self-Evaluation

Today, technology has made effective and regular self-evaluation easier than ever. Phones and laptops mean digital calendars, reminders, and AI assistants can track events and provide reminders at any time or place, while AI tools like AI chatbots and personal AI can prompt and even assist in self-evaluation based on a user’s data.

Online project management tools can even allow tracking of personal and professional progress in real-time across remote teams, so anyone can understand their workflow from anywhere.

How Personal AI like Kin Supports Self-Evaluation

Artificial Intelligence has emerged as a particularly powerful tool for self-evaluation, and we feel Kin is a great example of that.

Kin's ability to provide emotionally intelligent conversation and guidance for its users during self-evaluation makes these introspections less biased, judgment-free, and more profound, while its advanced memory system recalls every past situation and self-evaluation shared with it.

This allows Kin to build a comprehensive, visual picture of someone’s personality, and, unlike traditional journaling or note-taking apps, Kin actively evaluates this information against a user’s stated goals to estimate progress, identify trends, provide insights, and highlight potential areas and solutions for improvement.

Users can even ask Kin to create notification reminders for things they might forget, or the next time they’d like to evaluate themselves.

And, all of this happens with strict data privacy, as Kin stores and processes information local-first. This means it stores everything on the user’s device unless a process must use a Kin-approved third party in the cloud. That ensures that the personal data and insights Kin stores remain secure, and you can trust that it’s safe.

Get Started with Your AI Companion Today

Sound helpful? Download the Kin app here, fill in the following message, and send it to Kin to start improving your self-evaluations:

“Hey, Kin. I’m aiming to _____, and I’m wondering how to evaluate my progress. What do you need to know to help me?”

Sample Self-Evaluation Questions Professional Performance:

- What were my most significant achievements during this period?

- How did I contribute to company/personal goals?

- Which projects or tasks challenged me most, and how did I handle them?

- How have I improved my workflow since the last evaluation?

- What new projects have I taken on, and what were the outcomes?

Skill Development:

- What new skills or knowledge did I acquire?

- How have I applied learning opportunities to my work?

- Which areas need further development?

- How have I enhanced my core competencies?

- What mentoring relationships have I developed or maintained?

Behavioral Assessment:

- How effectively do I collaborate with others?

- How do I handle stress and deadlines?

- What feedback patterns have I noticed from colleagues and supervisors?

- How do I demonstrate a good work ethic and positive attitude?

- How have my problem-solving skills improved?

Future Focus:

- What are my key goals for the next period?

- What resources or support do I need to achieve these goals?

- How do my current activities align with my long-term career objectives?

- What new projects would I like to take on?

- How can I further optimize my workflow?

1

Eurich, T. 2018. ‘Working with People Who Aren’t Self-Aware’. hbr.org. Available at: https://hbr.org/2018/10/working-with-people-who-arent-self-aware [Accessed 01/08/25].

2

Anon. 2015. ‘When to change how you lead’. www.mckinsey.com. Available at: https://www.mckinsey.com/featured-insights/leadership/when-to-change-how-you-lead [Accessed 01/08/25]

3

McLain, D. and Nelson, B. 2022. ‘How Fast Feedback Fuels Performance’. Gallup.com. Available at: https://www.gallup.com/workplace/357764/fast-feedback-fuels-performance.aspx [Accessed 01/08/25]


The Blockchain Company.io LLC

BTC/USD: Sellers Capitulate January 15, 2025

Sometimes all you need is a 5 minute chart against the backdrop of a broader trend to realize where things are headed next. If you look at this first 5 minute chart, you'll see the price bounce off the EMA with volume so minimal that it appears the

Sometimes all you need is a 5 minute chart against the backdrop of a broader trend to realize where things are headed next. If you look at this first 5 minute chart, you'll see the price bounce off the EMA with volume so minimal that it appears the sellers have all but disappeared.

Below we have the two 5 minute windows that followed. You'll see the first was a test to the downside and then the next move back up with even greater volume than the previous 5 minute window. This is a very strong indication that the short-term indecisiveness of the market has resolved itself and the broader bull trend discussed in our article BTC/USD trading activity January 13th, 2025 will resume.

As of the time of publication, the above thesis has proven correct and Bitcoin is now back above $99,000.


playhaus.tv

26 – A Heated Fight w/ Political Influence | Weekly Mojo w/ Madison Jesseka


Trinsic Podcast: Future of ID

Diego Fernández - Driving Decentralized Identity in Buenos Aires with QuarkID

In this episode of The Future of Identity Podcast, I’m joined by Diego Fernández, co-founder of QuarkID and Sovra, to discuss the innovative decentralized identity solution rolled out by the city of Buenos Aires. QuarkID has garnered international attention for its self-custodial identity wallet app, and Diego provides a fascinating behind-the-scenes look at its development, challenges, and growin

In this episode of The Future of Identity Podcast, I’m joined by Diego Fernández, co-founder of QuarkID and Sovra, to discuss the innovative decentralized identity solution rolled out by the city of Buenos Aires. QuarkID has garnered international attention for its self-custodial identity wallet app, and Diego provides a fascinating behind-the-scenes look at its development, challenges, and growing adoption.

In this episode, we explore:

The journey of QuarkID, from its origin story to its evolution as a decentralized identity solution. Insights into adoption challenges when launching a self-custodial identity wallet app in February and the breakthrough moment of integrating it into the government mobile app. The impressive growth of QuarkID, with over 200,000 users onboarded in just 40 days and adoption accelerating at an increasing rate. Diego’s visionary perspective on the shortcomings of current identity systems and how improved digital identity can drive prosperity and empowerment. Practical lessons for governments and organizations looking to implement decentralized identity systems.

This episode is a must-listen for professionals in digital identity, government innovation, and technology ecosystems. Whether you’re interested in decentralized identity, user adoption strategies, or creating impactful public-private partnerships, this conversation offers valuable insights.

Enjoy the episode, and don’t forget to share it with others who are passionate about the future of identity!

Learn more about QuarkID at https://quarkid.org/.

Subscribe to our weekly newsletter for more announcements related to the future of identity at trinsic.id/podcast

Reach out to Riley (@rileyphughes) and Trinsic (@trinsic_id) on Twitter. We’d love to hear from you.


The Blockchain Company.io LLC

Mooove Over DEX's, CoW Swap is Something Better: Welcome to the Meta DEX Era

If you're reading this article you're more than likely familiar with decentralized finance (DeFi) and decentralized exchanges (DEX). And you may even be familiar with DEX aggregators who essentially search DeFi platforms like Uniswap for the optimal price on your trade and finalize the trade without

If you're reading this article you're more than likely familiar with decentralized finance (DeFi) and decentralized exchanges (DEX). And you may even be familiar with DEX aggregators who essentially search DeFi platforms like Uniswap for the optimal price on your trade and finalize the trade without navigating to the platforms themselves. DEX Ags also enable what's known as a non-custodial trading experience whereas trades are executed directly from the users wallet rather than being required to deposit the funds to the aggregators wallet.

In addition to optimal pricing and shear convenience, DEX Ags provide price impact protection by dividing trades of illiquid pairs across multiple exchanges thereby reducing price impact and affording better prices. Intent based aggregators are the most advanced form of DEX Ags and provide protection from a type of bot induced price exploitation called maximum extractable value (MEV) that has cost unaware traders over 1 billion $USD.

Intent Based Ags not only aggregate on-chain liquidity across exchanges and other aggregators, they also delegate execution to third parties referred to as "solvers". Solvers provide additional sources of liquidity by holding private inventory and matching trades peer-to-peer. This method avoids protocol fees and provides some of the best trades in DeFi.

CoW Swap is an Intent Based Meta DEX aggregator that utilizes solvers and additional features including MEV protection. Any time you make a DeFi trade whether its in the form of trading token pairs or NFTs or lending tokens to a liquidity pool, opportunistic users, typically known as "searchers", may manipulate your trades resulting in poor prices, failed execution, and missed opportunities. CoW Swap eliminates this issue as it's engineered and built with MEV protection. CoW Swap also provides users with an array of order types to choose from including:

Market orders Limit orders TWAP orders - allow trades to be distributed over time Programmatic orders - customizable, conditional orders that fire when certain on-chain conditions are met including asset prices, wallet balances, elapsed time and more. CoW Hooks - allows users to pair any Ethereum action or set of actions with an order on the CoW Protocol while leveraging solvers to execute the actions together in sequence.

CoW Swap is not only the largest Intent Based Aggregators, it's also one of largest DEX Ag's in the world and in November 2024 settled $6.2 billion USD of trades - more than twice as much volume as all intent based aggregators combined. Yet with a market cap of $236 million USD, CoW Swap (ticker COW) remains relatively unknown to the market and undervalued. Even with its recent move from around $0.25 to its current price of $0.78, there is plenty of upside potential from here especially considering the nearly $8 billion USD market cap touted by Uniswap. Learn more about CoW Swap at cow.fi.


Elliptic

2025 Regulatory outlook: US regulators will pave the way for banks to use digital assets

This blog post forms part of our 2025 Regulatory Outlook series. Over the next several weeks, we’ll be outlining key regulatory and policy trends we expect to see across the coming year. 

This blog post forms part of our 2025 Regulatory Outlook series. Over the next several weeks, we’ll be outlining key regulatory and policy trends we expect to see across the coming year. 


PingTalk

2025 Predictions for IAM Leaders

Top 2025 IAM predictions: Explore AI’s role, decentralized identity trends, and evolving consumer trust demands with insights from industry leaders.

iComply Investor Services Inc.

Liveness Detection: The Key to Secure and Seamless Identity Verification

Liveness Detection: The Future of Identity Verification Enhance security and streamline workflows with liveness detection. Learn how this technology is transforming identity verification and why businesses should move beyond outdated methods like selfie uploads and emailed IDs.

Imagine needing to notarize an important document, but the nearest notary is miles away. The alternative? Sending a photo of your ID via email or uploading a selfie to a platform. While convenient, these methods are rife with vulnerabilities—photos can be stolen, identities forged, and trust compromised. Enter liveness detection, a technology that ensures the person verifying their identity is physically present and not a spoof created with static images or videos.

Here’s a look at how liveness detection transforms workflows like notarizing identity documents and why businesses should move beyond outdated methods like selfie uploads or emailed IDs.

The Traditional Workflow: Notary Visits and Emailed IDs

In a manual identity verification process, a customer gathers their identity documents and heads to a notary. The notary inspects the ID, validates it against the customer’s appearance, and notarizes the document.

Alternatively, some platforms ask customers to email a photo of their ID and a selfie for verification. While these steps eliminate travel, they introduce new risks:

Photo Spoofing: Fraudsters can easily find or fabricate a customer’s image from online searches. Static Verification Flaws: Static selfies and emailed images lack the depth to confirm whether the person is present. Trust Erosion: Customers are increasingly wary of sharing sensitive documents via unsecured emails.

These workflows can be time-consuming, risky, and frustrating for customers and businesses alike.

The Liveness Detection Revolution

Liveness detection changes the game by verifying that an individual is physically present during the identity verification process. Unlike static photos or emails, this technology uses advanced algorithms to detect subtle, dynamic cues—like blinking, head movement, or depth perception—to confirm the presence of a real person.

Here’s how this plays out in a modern, digital verification process:

Step 1: Customer Initiates Verification

Using a secure KYC or KYB portal, the customer is prompted to upload a government-issued ID and participate in a quick liveness detection session.

Step 2: Liveness Detection in Action

The system guides the customer through simple actions, such as turning their head or blinking, while simultaneously scanning their biometric features. These real-time movements make it nearly impossible for fraudsters to use photos, videos, or masks to spoof the system.

Step 3: Automated Cross-Checks

Advanced AI validates the ID’s authenticity, matches it to the live biometric data, and cross-references the information against global sanctions lists or other risk databases.

Step 4: Instant Results

Within seconds, the verification is complete, and the business receives a secure, detailed report confirming the customer’s identity.

Why Selfie Uploads and Emailed IDs Are Risky

While selfie uploads and emailed IDs are still common, they’re increasingly insufficient in today’s threat landscape:

Easy to Spoof: With a simple Google search or basic editing tools, fraudsters can create convincing forgeries. Lack of Depth Analysis: Static photos can’t confirm whether a person is physically present. Data Security Concerns: Sensitive documents sent via email are prone to breaches and unauthorized access.

For businesses focused on security, compliance, and trust, relying on these outdated methods is no longer viable.

The Role of KYC and KYB Portals

With integrated KYC and KYB portals, businesses can deliver secure, seamless identity verification at scale. Here’s how these solutions enhance the liveness detection process:

Scalability: Both individual customers and businesses can verify identities in real-time without the need for physical presence. Privacy-First Architecture: Biometric data is processed securely, adhering to regulations like GDPR. Ease of Use: Customers enjoy a frictionless experience, completing verification from their smartphone or computer in minutes. Compliance Made Simple: Built-in checks for AML regulations and global sanctions ensure adherence to the highest standards.

Whether verifying a customer for a financial transaction or conducting due diligence on a new business partner, these portals provide an all-in-one solution for secure identity verification.

Building Trust Through Better Verification

Liveness detection isn’t just about meeting regulatory requirements—it’s about building trust in every interaction. When customers know that their identities are verified securely, they’re more likely to engage confidently with your business.

For businesses, adopting advanced liveness detection technologies through KYC and KYB portals reduces fraud, streamlines workflows, and protects sensitive data. It’s a win-win for compliance and customer satisfaction.

The Future of Secure Verification

As fraudsters become more sophisticated, businesses must stay one step ahead. Liveness detection, paired with robust KYC and KYB solutions, offers a secure, scalable way to verify identities while delivering a seamless user experience.

Gone are the days of emailing IDs or relying on static selfies. The future of identity verification is dynamic, secure, and designed to build trust at every step. Whether notarizing an identity document or verifying a business partner, liveness detection ensures that the person on the other side of the screen is exactly who they claim to be.


FastID

Fastly Bot Management Wins at the 2025 DEVIES

Fastly Bot Management proudly wins the 2025 DEVIES Award in AppSecOps, showcasing innovation and excellence in developer technology for modern teams.
Fastly Bot Management proudly wins the 2025 DEVIES Award in AppSecOps, showcasing innovation and excellence in developer technology for modern teams.

Tuesday, 14. January 2025

Indicio

How to save billions of hours per year with Verifiable Credentials

The post How to save billions of hours per year with Verifiable Credentials appeared first on Indicio.
One of the key benefits of Verifiable Credentials is the time savings from reduction in repetitive, manual data entry. Here we will examine just how much time can be saved by using decentralized identity to automatically fill in information for us.

By: Tim Spring

The time cost of forms

How many hours a year do you spend filling out forms? While it might seem like an annoyance that comes up every now and then, the US Chamber of Commerce Technology Engagement Center released a report in 2022 that found that the government has 9,881 unique forms, which took an estimated 10.3 billion hours to complete.

And these numbers are only increasing, if you use the tool provided by the Office of Information and Regulatory Affairs and apply it to 2024 numbers, you can see that we are up to almost 12.3 billion hours. 

There are five stand out departments with the most forms and impact. 2022 numbers provided by the US Chamber of Commerce Technology Engagement Center report:

Department of the Treasury: 1,838 forms 

Department of Health and Human Services 1,242 forms 

Department of Agriculture 553 forms 

Department of Commerce 437 forms 

Federal Communications Commission 436 forms

Have you ever wondered why there is so much paperwork to see a doctor? Or why you need to fill it in every time? It could have something to do with the 1,242 federal forms that the hospital or clinic will need to fill out to comply with the department of Health and Human services, not to mention updating your own charts and patient data. 

Accuracy and user experience improvement

What we could all benefit from is a way to create authenticated data once and reuse it often —  instantly, conveniently, with the touch of a button. 

Here is where Verifiable Credentials come to the rescue, the thing that will make you say “why haven’t we been doing this before?” Verifiable credentials can store any authenticated data (and especially personal data) in a tamper-proof way and allow the user to share it without the need for the verifier to check in with the source. Think of your web browser’s autofill function that remembers your name, email address, phone number, etc, but for the real world. These credentials can store any information that could be on that doctor’s form, such as height, eye color, name, address, or medical history, and share it accurately, instantly. Which is particularly handy because if you need a doctor, you’re probably not in the mood to do paperwork. 

The usefulness grows exponentially when you take a look at what this technology can do for organizations. An American Hospital Association survey found that there are 6,120 hospitals in the United States, and between them had admitted 33,679,935 patients in 2022. 

Fraud reduction

Aside from the time saved from not having to manually enter all this patient data, businesses can benefit in the form of eliminating human error and reducing fraud. If you have almost 33.7 million forms to fill out annually, there are going to be some errors or fraudulent information, which often take time and money to correct. By sharing pre-authenticated data digitally (which is what is inside a Verifiable Credential) you can instantly trust the data and use it however you need, such as verifying a patient’s identity and medical history to begin treatment. This technology also enables biometric patient check-in, which reduces fraud (getting treated under someone else’s name) or giving the incorrect medications due to not reliably identifying the patient as they leave the waiting room for treatment.

Verifiable Credentials have already seen traction in several industries for their ability to fast-track processes. An excellent example of this is in airports and travel, where their authenticated data can be used for pre-authorization for each traveler and leads to significantly faster international border and border crossing. To learn more about this use case you can read a recent article from Indicio. 

No one enjoys paperwork, it is a necessary part of life, but it doesn’t need to be such a big part.

If you would be interested in exploring how you can start using Verifiable Credentials to save your team and users time while providing a significantly better experience, you can learn more about Indicio’s complete solution for Verifiable Credentials, Indicio Proven®, or reach out to our team to discuss your specific needs.

Sign up to our newsletter to stay up to date with the latest from Indicio and the decentralized identity community

The post How to save billions of hours per year with Verifiable Credentials appeared first on Indicio.


Elliptic

Huione: the company behind the largest ever illicit online marketplace has launched a stablecoin

Huione Guarantee is a Telegram-based marketplace serving fraudsters in South East Asia, including those responsible for so-called “pig butchering” scams. Merchants on the platform sell technology, personal data and money laundering services. With transactions totaling at least $24 billion, it is the largest illicit online marketplace to have ever operated. Huione Group has r
Huione Guarantee is a Telegram-based marketplace serving fraudsters in South East Asia, including those responsible for so-called “pig butchering” scams. Merchants on the platform sell technology, personal data and money laundering services. With transactions totaling at least $24 billion, it is the largest illicit online marketplace to have ever operated. Huione Group has recently launched a range of crypto-related products including a US dollar stablecoin, blockchain, crypto exchange and messaging app. Our analysis shows that Huione Group entities have received at least $89 billion in cryptoassets to date. Elliptic has identified thousands of wallet addresses associated with Huione businesses and illicit vendors operating on Huione Guarantee, enabling our customers to protect themselves from exposure to this activity.

 


The Blockchain Company.io LLC

BTC/USD trading activity January 13th, 2025

Bitcoin traded below $90,000 for the first time in more than 3 weeks and below it's 50-day monthly EMA around $93,000. Opportunistic bulls more than likely added to their holdings in this range while short term bears and momentum traders cover their shorts to lock in

Bitcoin traded below $90,000 for the first time in more than 3 weeks and below it's 50-day monthly EMA around $93,000. Opportunistic bulls more than likely added to their holdings in this range while short term bears and momentum traders cover their shorts to lock in profits. For those looking for an entry point, this may be a solid opportunity to wade into the market.

If you take a look at the daily Coinbase chart for January 13th 2025, you'll see a long wick rising from the lows of the day below 90,000 to nearly turn positive for the day. Similar action occurred during the two days prior possibly indicating the formation of a triple bottom.

The 6-hour chart below shows the rise from the lows on heavy volume with nearly twice the amount trading hands compared to the prior 6 hour window.

Over the next 24 to 48 hours, the price should continue to rise to at least test $95-$96K and may rapidly accelerate back over $100K and on to new all-time highs. This article is not to be construed as financial advice. Please perform your own due diligence and consult your financial advisor with any questions you may have.

Monday, 13. January 2025

Extrimian

Tendencias en tech para el 2025: IA, SSI y más

La información verificable está transformando rápidamente el panorama de la tecnología Web3. En Extrimian creemos que 2025 será un año clave para potenciar ecosistemas digitales seguros, eficientes e interoperables. Aquí te compartimos 5 tendencias clave para este año: 1. Ecosistemas integrados con identidades verificables Imagina a un estudiante universitario que utiliza su credencial digital emi

La información verificable está transformando rápidamente el panorama de la tecnología Web3. En Extrimian creemos que 2025 será un año clave para potenciar ecosistemas digitales seguros, eficientes e interoperables. Aquí te compartimos 5 tendencias clave para este año:

1. Ecosistemas integrados con identidades verificables

Imagina a un estudiante universitario que utiliza su credencial digital emitida por su institución para acceder a una cuenta fintech, contratar un seguro médico, alquilar una vivienda de confianza, resolver situaciones académicas y disfrutar de beneficios exclusivos. 

Esta interoperabilidad ya es una realidad gracias a soluciones basadas en SSI, como IDConnect de Extrimian, que resuelven problemas de identidad y verificación al conectar múltiples verticales en un solo ecosistema. Durante este año, veremos más adopción, más atracción y mayor sinergia entre actores e industrias.

2. IA como motor para la eficiencia

En 2025 los frameworks con inteligencia artificial revolucionarán la gestión de la identidad digital. Según un reporte de IBM, los procesos de gestión de datos impulsados por IA incrementarán su eficiencia en un 40%. 

En este contexto, tecnologías como IDConnect integrarán IA para automatizar procesos clave, como la creación y verificación de credenciales, la detección de errores y la asistencia de un copiloto. Esto no solo mejorará la experiencia del usuario, sino que también incrementará la seguridad, la productividad y la eficiencia en la gestión operativa.

3. Crecimiento exponencial tras casos de éxito

El éxito de QuarkID y su implementación en miBA, que posicionó a Buenos Aires como la primera ciudad del mundo en usar credenciales verificables para gestión pública, ha marcado un antes y un después. Este modelo no solo ha inspirado a más gobiernos y empresas a adoptar SSI, sino que también abre las puertas a una expansión global. 

El reporte de Cybersecurity Ventures estima que, para 2025, los costos del cibercrimen alcanzarán los $10.5 billones anuales, destacando la importancia de sistemas descentralizados como QuarkID para fortalecer la seguridad de los datos personales.

4. Idoneidad y conocimiento como ventaja competitiva


Durante este año, la diferencia clave en SSI estará en el conocimiento profundo y la experiencia. Las empresas con trayectoria en esta tecnología, que lideran su implementación y están a la vanguardia, ofrecerán soluciones más robustas, eficientes e integradas. La idoneidad será un valor diferencial frente a quienes recién comienzan, certificando la capacidad de integrar SSI de manera efectiva y maximizar su impacto en ecosistemas digitales interoperables.

5. SSI: Soluciones prácticas para Latinoamérica

En una región marcada por burocracia, costos elevados y fraude, SSI maximiza el ROI al simplificar procesos críticos como la validación de empleo, acceso seguro a plataformas y verificación de edad. Al reutilizar datos verificables, reduce costos, agiliza trámites y promueve la inclusión digital, fortaleciendo un ecosistema confiable y accesible para todos.

💡 ¿Te interesa saber más sobre lo que hacemos en Extrimian? Conversemos y construyamos juntos este futuro presente tan prometedor.

The post Tendencias en tech para el 2025: IA, SSI y más first appeared on Extrimian.


Ontology

Ontology Weekly Report: Jan 7th — Jan 13th, 2025

Ontology Weekly Report: Jan 7th — Jan 13th, 2025 Catch up with all things Ontology and Decentralized Identity Ontology Network 🌐 Latest Updates Thank you to everyone who participated in UQUID’s ONT giveaway poll! Privacy Hour continues to explore critical topics in decentralized identity and privacy! Fireverse joined our community update — welcome aboard! Oran
Ontology Weekly Report: Jan 7th — Jan 13th, 2025 Catch up with all things Ontology and Decentralized Identity Ontology Network 🌐 Latest Updates Thank you to everyone who participated in UQUID’s ONT giveaway poll! Privacy Hour continues to explore critical topics in decentralized identity and privacy! Fireverse joined our community update — welcome aboard! Orange Protocol 🍊 Upcoming Campaigns

We’re preparing for the 4Everland Community Campaign, with winners receiving 4Ever points. Make sure you’re following Orange and 4Everland on X so you don’t miss out!

Are you ready to Enter the Fireverse? There are Fearless Explorer Badges up for grabs in this exciting campaign starting this week. Make sure you’re following along on X!

This Week in Decentralized Identity Advancements in Travel with Self-Sovereign Identity (SSI)

The travel industry is accelerating its adoption of digital identity solutions to enhance passenger experiences. Self-sovereign identity (SSI) systems, which empower individuals with control over their digital identities, are being implemented to streamline processes such as airport check-ins and border crossings. By reducing reliance on physical documents, these innovations are expediting procedures while improving security.

Projections for Digital Identity in 2025

Experts foresee substantial transformations in digital identity by 2025, with decentralized systems playing a pivotal role. These systems promise enhanced security, scalability, and privacy, reshaping how enterprises, consumers, and mobile operators interact in digital ecosystems. The future of digital identity is moving towards more secure, user-centric solutions, driving significant shifts across industries.

These developments underline the growing momentum of decentralized identity technologies and their potential to redefine digital interactions across various sectors.

Community 🌍

Engagement and Growth

Our Ontology Wordle Challenge will feature in this week’s Tuesday community discussion! Join us and test your skills while connecting with others. Regular weekly discussions are back, every Tuesday! Wishing everyone a successful start to the new year as we continue building a more secure and decentralized future together. Stay Connected 📱

Stay engaged and informed by joining these key events this week:

Tuesday 9am UTC: Telegram Community Discussion (featuring the Ontology Wordle Challenge!) Thursday 8pm UTC: X Spaces Privacy Hour Friday 7am UTC: X Spaces Community Catch-up

Follow us: Ontology website / ONTO website / OWallet (GitHub) / Twitter / Reddit / Facebook / LinkedIn / YouTube / NaverBlog / Forklog / Telegram / Announcement / Telegram English / GitHubDiscord

Ontology Weekly Report: Jan 7th — Jan 13th, 2025 was originally published in OntologyNetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


Spherical Cow Consulting

Understanding NHIs: Key Differences Between Human and Non-Human Identities

Non-Human Identities (NHIs) are finally making friends and influencing people—or at least they seem to be, given how much people are talking about them! This is great. People need to have a better sense of this brave new world of workloads, bots, and services. But this also means people need to have a better sense Continue Reading The post Understanding NHIs: Key Differences Between

Non-Human Identities (NHIs) are finally making friends and influencing people—or at least they seem to be, given how much people are talking about them! This is great. People need to have a better sense of this brave new world of workloads, bots, and services. But this also means people need to have a better sense of what NHIs are not.

Whether you’re navigating workloads, APIs, or automated systems, the buzz around NHIs reflects their growing significance in everything from cloud computing to academic research. But as with any hot topic, there’s some confusion and waaaaaay too much marketing hype. I’ve written about NHIs before; today’s focus is on some of the main areas NHIs are different from human identities. The distinctions matter.

What NHIs Are Not

NHIs aren’t just API keys or OAuth tokens. Treating them as such would be like calling a password or a passkey a person’s digital identity—it oversimplifies their function and importance. Tokens, keys, and even credentials like X.509 certificates might help manage access, but they’re tools in the more extensive toolkit of workload identity management. (Natoma has published an interesting white paper on machine-to-machine authentication if you’re interested in more detail.)

NHIs represent software entities like batch processes, machine learning training models, or microservices operating independently of human identities. They operate at different speeds and have different selective disclosure requirements (yes, NHI use cases may include the need for selective disclosure). Proving who they are to access other systems or resources goes beyond simple authentication. Unlike human authentication, which often revolves around confirming a single user’s identity via passwords, passkeys, or biometrics, NHIs must establish trust and authorization in highly dynamic, machine-driven environments.

Comparing NHIs and Human Identities

Part of what makes understanding that NHIs are different is that, if you tilt your head just right, their requirements sound very familiar. They need to demonstrate their identity and the purpose and scope of their request. They benefit from cryptographic proofs, such as JSON Web Tokens (JWTs) or X.509 certificates, to securely bind their identity to a specific action. They have a lifecycle that must be managed. And let’s not forget they may need to cross trust boundaries in a federated workflow.

I’ll go into more detail next, but here’s the summary for those who want to get straight to the good stuff.

LayerHuman IdentitiesNon-Human Identities (NHIs)Contextual ValidationRole-based access; occasional risk checksTask-specific; continuous granular checksCryptographic AssurancePasswords, passkeys, MFAJWTs, OAuth tokens, mTLS, certificatesDynamic/Ephemeral IdentitiesPersistent, lifecycle-drivenTransient, task-drivenCross-Boundary TrustSSO, federation (SAML, OIDC)Federated workload identities, SPIFFE Contextual Validation

For Human Identities:

Humans typically authenticate using static credentials like passwords, passkeys, or biometric scans. Access is often role-based, with permissions tied to organizational hierarchies or specific job functions (e.g., an employee accessing their email). Context, like geolocation or time of access, may be used for risk-based decisions (e.g., blocking a login attempt from an unusual location).

For NHIs:

NHIs rely on detailed, task-specific validation. For example, a microservice might only access a database during specific operational windows and for specific query types. Permissions are highly granular and tied to the NHI’s role in a larger process, such as allowing read-only access to one API endpoint while granting full control over another. Unlike humans, NHIs may operate across various environments, requiring continuous validation at scale. Cryptographic Assurance

For Human Identities:

Credentials often include usernames, passwords, or passkeys, validated via a central authentication server. Additional layers like multi-factor authentication (MFA) involve OTPs or hardware tokens, but the process remains human-centric.

For NHIs:

NHIs use cryptographic credentials, such as JWTs, OAuth tokens, or X.509 certificates, to prove their identity and integrity. These credentials are typically short-lived and dynamically issued, ensuring they can’t be reused if intercepted. Cryptographic proofs (e.g., mutual TLS) are used to establish secure, trust-bound connections between services. Unlike humans, NHIs don’t rely on password-based authentication, making credential management more complex and secure when implemented correctly. Dynamic and Ephemeral Identities

For Human Identities:

Human identities are persistent and change only during significant lifecycle events, such as onboarding, promotions, or terminations. Joiner/mover/leaver workflows handle these transitions in directories like Active Directory or IAM systems.

For NHIs:

NHIs are transient and may exist for just seconds or minutes, such as a containerized workload in Kubernetes that spins up to handle a specific task. Unlike human-centric workflows, they require dynamic provisioning and de-provisioning of identities without manual intervention. (It would be nice if human-centric flows did this, too, but that’s not common. Yet.) The absence of a natural lifecycle like “hiring” or “firing” makes traditional directory models ineffective for NHIs. Cross-Boundary Trust

For Human Identities:

Trust boundaries for humans are typically managed within a single organization or via federated identity systems like SAML or OpenID Connect. Federated access is often used to enable single sign-on (SSO) across organizational or application boundaries.

For NHIs:

NHIs frequently operate in multi-cloud or hybrid environments, where they must authenticate across disparate trust domains. Identity federation for NHIs requires advanced mechanisms, such as SPIFFE or OAuth token exchanges, to securely share identity and permissions between services in different ecosystems. Unlike humans, NHIs may not have a single source of truth (like an HR system), necessitating more robust and decentralized trust models. A Better Way to Think About NHIs

If you’re still thinking that NHIs belong in your human identity systems, I’m just not sure what to tell you. I would say we can agree to disagree, but getting this wrong has implications for how everyone interacts online, so I will continue to make a stand on this hill. NHIs require a different approach to identity management, including:

• Workload Identity Federation: To seamlessly authenticate across cloud providers.

• Dynamic Secrets and Token-Based Authentication: To enhance security and minimize exposure risks.

• Standards Efforts Like WIMSE and SPICE: To ensure consistent, secure service interactions.

Final Thoughts

Embracing NHIs means rethinking your identity systems and recognizing that traditional identity paradigms need to evolve. I know it’s hard work and requires even more resources for your IAM programs, but NHIs are not magic. They cannot bring security and efficiency to your organization without investment. There are vendors out there (I am not one of them) who can guide you through designing or redesigning your systems to account for NHIs. You’ve got this.

If you or your organization need support with standards development, let me know. With my experience across various SDOs, I’m here to help guide you through the complexities of Internet standards development.

The post Understanding NHIs: Key Differences Between Human and Non-Human Identities appeared first on Spherical Cow Consulting.


iComply Investor Services Inc.

How to Build an AML Program: A Step-by-Step Guide

Learn how to build an AML program with this step-by-step guide. Follow Mark, a UK fintech cofounder, as he creates a compliant AML framework with streamlined policies, KYB/KYC automation, and team training using iComply's platform. Save time, reduce costs, and ensure regulatory confidence.

When Mark, a cofounder of a fast-growing fintech startup in the UK, realized his company needed to adhere to the Financial Conduct Authority (FCA) standards for KYB, KYC, and AML, he was overwhelmed. As his business scaled rapidly, the complexities of compliance threatened to slow down operations and erode investor confidence. Here’s how Mark built an effective AML program that not only met regulatory requirements but also became a cornerstone of his company’s success—all with the help of iComply’s innovative platform.

Step 1: Understand the Regulatory Requirements

Mark started by diving into the regulatory frameworks his company needed to follow. In the UK, the FCA’s stringent requirements on KYB and KYC processes set the standard. Mark also reviewed global guidelines from the Financial Action Task Force (FATF) and the EU’s AML Directives to ensure his company’s policies aligned with international best practices.

Mark’s Checklist for Understanding Regulations:

Identify the specific regulations relevant to your industry and jurisdiction. Consult official resources from regulatory bodies like the FCA or FATF. Seek expert guidance or use tools that summarize complex requirements.

Step 2: Conduct a Risk Assessment

Next, Mark conducted a detailed risk assessment, analyzing his fintech’s customer base, transaction types, and geographic exposure. With iComply’s support, he categorized his customers by risk levels and identified high-risk activities requiring Enhanced Due Diligence (EDD).

Mark’s Checklist for Risk Assessment:

Map out your customer demographics and transaction patterns. Identify high-risk geographies and customer profiles. Document risks and prioritize them for action.

Step 3: Develop and Document Policies and Procedures

Mark knew that robust policies and procedures would be the backbone of his AML program. iComply’s policy and procedure documentation tools helped him create clear guidelines for:

Customer Due Diligence (CDD): Verifying identities and monitoring activities. Enhanced Due Diligence (EDD): Extra checks for high-risk scenarios. Reporting Mechanisms: Filing Suspicious Activity Reports (SARs) efficiently.

Mark’s Checklist for Policies and Procedures:

Use customizable templates to address specific business needs. Ensure policies cover all required areas, from CDD to reporting. Review and update documentation regularly.

Step 4: Appoint an AML Compliance Officer

Mark appointed Emily, a dedicated AML Compliance Officer, who used iComply’s tailored training resources to hit the ground running. Emily took charge of:

Implementing and managing the AML program. Acting as the primary contact for regulators. Ensuring the team’s adherence to policies.

Mark’s Checklist for Appointing an Officer:

Select someone with expertise in AML and compliance. Provide them with authority and resources to act effectively. Offer ongoing training and support.

Step 5: Train Your Team

Mark’s entire team needed to understand their roles in compliance. Using iComply’s AML training modules, he ensured employees could recognize and report suspicious activities.

Mark’s Checklist for Training:

Schedule regular training sessions tailored to job roles. Include practical examples of red flags and reporting processes. Update training materials as regulations evolve.

Step 6: Implement Technology Solutions

To support compliance, Mark integrated iComply’s platform into his operations. The platform provided holistic, integrated solutions to streamline and connect his KYB, KYC, and AML workflows. iComply provided:

Policy and Procedures: Streamlined creation of up-to-date workflow documentation. KYB Automation: Onboard corporates and identify their directors, officers, beneficial owners, and other related parties. KYC Automation: Simplified customer onboarding, identity verification, risk scoring, refresh and reviews. AML Automation: Screen and monitor all clients and related parties in real time for new sanctions, political exposure, crime, money laundering and terrorist financing. Audit Support: Tools for managing records and preparing reports for reviews.

Mark’s Checklist for Technology:

Identify gaps in your compliance processes that technology can address. Select scalable, user-friendly solutions. Test systems thoroughly before implementation.

Step 7: Monitor and Audit Regularly

Regular audits became a cornerstone of Mark’s compliance strategy. iComply’s platform helped him organize documentation and streamline audit preparation, ensuring a smooth process during regulatory reviews.

Mark’s Checklist for Monitoring and Auditing:

Conduct regular internal reviews of compliance practices. Maintain a clear audit trail with organized records. Engage third-party experts for independent assessments.

Step 8: Foster a Culture of Compliance

Mark and his cofounders led by example, embedding compliance into the company’s values. 

Mark’s Checklist for Culture:

Communicate the importance of compliance at all levels. Recognize and reward compliance efforts. Encourage employees to report concerns without fear of retaliation.

Step 9: Report and Respond to Incidents

When suspicious activity arose, Mark’s team acted quickly. This ensured prompt submission of SARs and effective incident resolution.

Mark’s Checklist for Incident Response:

Establish clear procedures for identifying and reporting issues. Train staff on how to handle incidents. Review incidents to strengthen future prevention efforts

Step 10: Stay Current with Regulatory Changes

With iComply’s regulatory updates to their platform, Mark stayed ahead of new requirements. This proactive approach allowed his company to adapt seamlessly to evolving standards without the need for a big technical lift.

Mark’s Checklist for Staying Current:

Subscribe to updates from relevant regulatory bodies. Participate in industry forums and workshops. Regularly review and update AML policies

Building Trust Through Compliance

Thanks to iComply, Mark transformed a daunting compliance challenge into a streamlined, cost-effective process. His fintech now operates with confidence, meeting FCA standards and building trust with customers, investors, and regulators. By following Mark’s example, you too can create an AML program that safeguards your organization and supports sustainable growth.


FastID

Profiling Fastly Compute Applications

Unlock superior web performance with Fastly Compute. Utilize our edge network and WebAssembly to build fast, secure applications tailored for your users.
Unlock superior web performance with Fastly Compute. Utilize our edge network and WebAssembly to build fast, secure applications tailored for your users.

Sunday, 12. January 2025

Safle Wallet

Weekly Safle Update!

📈 Marketing Updates We’ve had an exciting week of community activities, and your participation has been incredible! Here’s a quick recap: Quizzes: 147 participants 📜 Polls: 199 participants 📊 Puzzles (Time-Based): 19 participants 🧩 Thank you for your continued support and enthusiasm. Your engagement fuels our innovation and growth. 🔧 Product Updates 📱Mobile App Updates
📈 Marketing Updates

We’ve had an exciting week of community activities, and your participation has been incredible! Here’s a quick recap:

Quizzes: 147 participants 📜 Polls: 199 participants 📊 Puzzles (Time-Based): 19 participants 🧩

Thank you for your continued support and enthusiasm. Your engagement fuels our innovation and growth.

🔧 Product Updates 📱Mobile App Updates: Revamped UI: Our team is working diligently on the revamped user interface to enhance your experience. Stay tuned for a sleeker and more intuitive design. Cross-Chain Swaps: We’ve addressed some bugs and are currently in the QA phase to ensure seamless swaps across different chains. 🔎Safle Lens: Code Restructuring: We’re making minor fixes and restructuring the codebase to improve performance and scalability. 🕹️Gaming Developments: Wallet Attestations: We’re in the planning phase for integrating wallet attestations using SafleID v2, aiming to strengthen security and user trust. Bot Detection: Pre-development has started for our bot detection feature, which will enhance fairness in our gaming ecosystem. 🎮 Safle ID for Web3 Games

We’re re-envisioning Safle ID with a focus on Web3 Games. Know any game that should integrate SafleID? Let us know!

Discover more: SafleID for Web3 Gaming

Thank you for your continued support in shaping the future of Web3 with Safle.

The Safle Team

🚀 More updates coming soon!

Saturday, 11. January 2025

playhaus.tv

34 – Strong Convictions, Loosely Held

GM HEARTLAND Our New Year’s resolution was to touch grass. Evidently, that’s working out well. —El Prof, Muhammed & Chad MONEY MONEY MONEY TOKEN PRICE CHANGE PRICE Solana ($SOL) -13.77% $187.66 Helium ($HNT) -20.32% $5.32 Pyth ($PYTH) -16.03% $0.33 Save ($SLND) -6.42% $0.63 (Price changes reflect past 7 days as of 1.10.25) BUZZWORD OF THE […]
GM HEARTLAND

Our New Year’s resolution was to touch grass. Evidently, that’s working out well.

—El Prof, Muhammed & Chad

MONEY MONEY MONEY

TOKEN

PRICE CHANGE

PRICE

Solana ($SOL)

-13.77%

$187.66

Helium ($HNT)

-20.32%

$5.32

Pyth ($PYTH)

-16.03%

$0.33

Save ($SLND)

-6.42%

$0.63

(Price changes reflect past 7 days as of 1.10.25)

BUZZWORD OF THE WEEK comp-os-ability:

a principle for building systems that lets developers mix and match modular components. useful for creating flexible, scalable tech stacks.

enables quick adaptation to changing needs. found in software, cloud, and even business strategy.

modularity ensures pieces work together seamlessly. like building a LEGO set that powers websites, apps, or entire networks.

Check out more of our favorite buzzwords here.

Strong Convictions, Loosely Held: El Prof’s DeFi Predictions for 2025

What’s in a prediction that makes it worthwhile? Is it predicting tomorrow’s closing Bitcoin price? Maybe. Surely the finance people who read this say definitely, but the information arbitrage gap is closing so fast these days that competing algorithms predicting the price create a new chaos unto themselves.

My philosophy when it comes to predicting trends and the future is “strong convictions, loosely held.” I’m easily swayed by compelling new data. Anyone who wants to consider themselves rational has to be — even, especially when it conflicts with our priors, or our ego. (The latter of which is usually the problem when it comes to making accurate predictions in the first place.)

Case in point: Solana is hovering around $180. I said it wouldn’t go below $200. Just goes to show you should not take any advice on financial positioning from me. A qualified investment advisor can coach you on when to buy it. I can just tell you if it’s building towards a real market or not. So, with those obligatory risk disclosures aside, here’s my wildest speculations for what 2025 could have in store.

The obvious potential catalyst is Trump’s looming inauguration. (For more on that, read to the end.) With a leader in charge of the nation’s ego — and as obviously sensitive of his own — you bet your ass leading innovation in the fields of security, cryptography, distributed ledgers and filestore systems, peer2peer protocols, and quantum computing are going to be prioritized over anything else. Why? These are the technologies required to operate as sovereign individuals in an increasingly unified and artificially intelligent world, and that’s good for business.

To that end, here are my official predictions for 2025:

Q1

Community-managed AI agents with personalities. (s/o @newgleen.eth for inspo on this one.) In other words, personified tokens used to control the weights of different interests that can be held, governed, and stored on a chain. Now that these LLM agent systems have been connected to social media accounts and the like, there are channels for investors to interact with these “characters” and watch them come to life. 

Crypto payments to creators led by X, followed by Meta, Reddit, and TikTok (if it survives the next couple weeks). The normalization of crypto as social media compensation could in turn stoke the development of utility tokens across all major platforms to reward quality content production programmatically. X already started creator payouts and has been teasing wanting to have a wallet app for years. This one doesn’t seem too far-fetched, or far off.

Q2

A social credit scoring system. Elon Musk is already flirting with this one on the app formerly known as Twitter, although the logical extreme of leveraging ZK proofs for identity management is more likely to come from Black Mirror rejects like Sam Altman’s Worldcoin project. Let’s grok about that.

Meta will push their AI agents even further to promote products and engage with its real users. Given the success of the meta narrative of AI agents in general, it’s only a matter of time until the gap is bridged. Maybe it will finally land on a genuinely cool product in the process. I’m thinking one-click AI image generation with the finalized outputs minted to chain as NFTs? Feel free to steal this idea, Zuck. I know you’re no stranger to that.

Q3

Tokenized brand loyalty programs. Your contact information, the ability to communicate with you, and some basic information about your demographics are worth $10 to $100s per year to brands. That’s how much their advertising calculations tell them their customer retention costs, on a unit economics basis. Imagine capturing a share of that value from the hundreds to thousands of brands for which you’re a potential consumer. The ability to reward your social behavior, which services their marketing and promotion aims, is a more efficient deployment of that capital. With two consistent years of hype behind the web3 space again, loyalty-oriented platforms could emerge to service the major brands interested in the space again.

First major learn-to-earn platform. On-chain game mechanics are still too slow for the quality gameplay expected of the latest systems. But in pursuit of those game mechanics, retro style games will enable the creation of learning management systems that can leverage the game mechanics to offer a learn-to-earn platform, where a course of information with quizzes can be planned and the completion of levels will be rewarded with tokens. I expect companies to be early adopters, creating novel structures for incentivizing workforce development.

Q4

Personal finance agents. We’ve already seen some mainstream use cases for agentic management of finances. Bots in web3 are nothing new, but many are a group pot that share and distribute risk. I think the next evolution will be to have a chatbot interface powered by an LLM and your personal data, aimed at helping you build a more aligned financial portfolio over time. (One without the misaligned incentives of traditional financial agents.) With rumors of a tokenized stock exchange in Texas, it’s only a matter of time. What should I buy schwabot?

Digital ID wallets will emerge as a public utility — like the one we are building here at playhaus.  The data that represents you digitally is valuable to systems like AI. “DID wallets” will allow you to capture that value through chain mechanics that designate you as the originator of the data, not the platform you executed the transaction on, and that will make all the difference. And it’s all built on the back of our buzzword of the week: composability.

—El Prof

SPONSORED BY 1440 MEDIA Daily News for Curious Minds

Be the smartest person in the room by reading 1440! Dive into 1440, where 4 million Americans find their daily, fact-based news fix. We navigate through 100+ sources to deliver a comprehensive roundup from every corner of the internet – politics, global events, business, and culture, all in a quick, 5-minute newsletter. It’s completely free and devoid of bias or political influence, ensuring you get the facts straight. Subscribe to 1440 today.

Sign up now!

  How Long Can the Trump Bump Last?

The crypto sphere has been celebrating the 2024 U.S. election for the past month, with Bitcoin breaching $100,000 and peaking above $106,000 in December. But at the time of writing, it has dropped back down to just above $93,500, and Solana, as the venerable El Prof mentioned, is below its peak as well.

Has the Trump rally hit its ceiling before inauguration day?

Maybe not. But in the spirit of predictions, I’d argue it’s a safe bet that the major tokens won’t regain their recent highs on hype alone. Much of the rally has been predicated on what traders assume President-elect Donald Trump will do upon his return to the White House in 2025. His campaign has made clear intentions to turn the United States into the “crypto capital of the planet.” But with said return right around the corner, any future catalysts are less likely to be based on intentions than on actions.

To be sure, Trump’s earliest actions do suggest an intent to follow through on that campaign promise. Under the Biden administration, outgoing SEC Chairman Gary Gensler’s aggressive regulatory stance caused ripples across the crypto community. Trump, in contrast, has tapped Paul Atkins, a former SEC commissioner and known crypto advocate, to lead the charge at the SEC. Atkins’ support for cryptocurrencies could lead to looser regulations and a more welcoming environment for digital assets, at least in the early days of Trump’s second term.

Trump has also taken steps to fill key positions with figures who also heavily invested in the success of the crypto sector — quite literally. He appointed David Sacks, a venture capitalist with ties to both the crypto and AI industries, as a “crypto czar.” However, the rush to embrace digital assets without significant oversight comes with its own set of challenges. Critics, including financial expert Carol Alexander, warn that relaxing regulations could lead to greater market manipulation by professional traders at the expense of average investors. These concerns are valid, especially given the chaotic and speculative nature of meme coins and other cryptocurrencies that could benefit from looser rules.

Then of course there’s Trump’s suggestion of a U.S. “strategic national bitcoin stockpile” — a proposal that the U.S. government begin actively purchasing bitcoin to build a reserve, leveraging seized assets from criminal investigations. Whether this comes to pass, or is viewed as a positive development by the crypto space, remain up in the air. A bitcoin reserve doesn’t exactly smack of MAGA-world priority, and even if it does materialize, it would seem to us to be a decisive blow against the democratization and decentralization of digital assets. Of course, crypto degens aren’t well-known for their rational, in-depth analysis. So such a move could still prove to be a short-term catalyst. If nothing else, it might incite some buying activity as Bitcoin maxis hurry to shore up their holdings, with the G-Men throwing their Fed-oras in the ring.

Another stumbling block could be the ample crypto-related conflicts of interest in Trump World. Eric Trump, for example, is reportedly linked to the launch of World Liberty Financial, a new crypto company. While Trump Jr. is not directly part of his father’s administration, his involvement in this space raises eyebrows, especially when paired with Trump’s ongoing relationships with major international players, including those from Saudi Arabia and the UAE. Then again, DeFi enthusiasts have shown a persistent willingness to overlook obvious corruption in the quest for quick gains, and there’s no reason to believe that will change on a federal scale.

In other words, there are plenty of reasons to remain both optimistic — and cautious — for the trajectory of crypto over the next four years. When the future of a technology hinges on the rationality (or lack thereof) of degenerate gamblers and our Reality Show Host in Chief, it will probably pay to stay on your toes.

—Muhammed

Friday, 10. January 2025

liminal (was OWI)

The State of Identity – January 10, 2025

Liminal members enjoy the exclusive benefit of receiving daily morning briefs directly in their inboxes, ensuring they stay ahead of the curve with the latest industry developments for a significant competitive advantage. Looking for product or company-specific news? Log in or sign-up to Link for more detailed news and developments. Here are the main industry […] The post The State of Identity –

Liminal members enjoy the exclusive benefit of receiving daily morning briefs directly in their inboxes, ensuring they stay ahead of the curve with the latest industry developments for a significant competitive advantage.

Looking for product or company-specific news? Log in or sign-up to Link for more detailed news and developments.

Here are the main industry highlights of this week week impacting identity and fraud, cybersecurity, trust and safety, financial crimes compliance, and privacy and consent management.

🪄Innovation and New Technology Developments

Texas Lottery Implements Mandatory ID Scans for Age Verification at Self-Serve Vending Machines

The Texas Lottery Commission has introduced mandatory age verification for purchasing lottery tickets from self-serve vending machines, requiring buyers to scan a government-issued photo ID. This measure, implemented using the American Association of Motor Vehicle Administrators verification system, ensures compliance with the 18-and-over age requirement. The Commission assures that no data is collected or stored during the process, emphasizing that it is solely for age verification. (Source)

India’s Draft Digital Personal Data Protection Rules, 2025: Age Verification, Parental Consent, and Data Oversight Under Scrutiny

India’s draft Digital Personal Data Protection Rules, 2025, by MeitY, require age assurance and parental consent for minors under 18 to access social media. Platforms must verify parental identity via government sources like DigiLocker but lack clarity on age verification methods, excluding tools like biometric facial estimation. The rules mandate data breach notifications, dormancy-based data deletion, and establish a Data Protection Board with penalties up to ₹2.5 billion (~$29.2M). Critics, including the Internet Freedom Foundation, cite transparency issues and limited regional language access. Public comments are invited until February 18, 2025. (Source)

Telegram Introduces Third-Party Verification, NFT Gifts, and Enhanced Search for Safer, Interactive Platform Experience

Telegram has launched a third-party account verification system, enabling verified organizations, such as food-quality regulators or educational consortiums, to authenticate accounts with unique logos instead of blue checkmarks. This decentralized model aims to combat scams and misinformation while raising safety standards on social platforms. Other updates include NFT-based gifts created with Telegram Stars, tradeable on external platforms, new message search filters for chats, groups, and channels, expanded cryptocurrency monetization options, and emoji reactions for service messages to boost user engagement. (Source)

Pakistan Introduces Biometric Registration for Children to Enhance Security and Digital Identity Systems

Pakistan has introduced biometric registration for children aged 10 to 18 as part of civil registry updates. Starting January 1, 2025, the Child Registration Certificate (CRC) will feature fingerprint biometrics and facial photos, enhancing passport applications and security. Initiated by Federal Interior Minister Mohsin Naqvi, the measure aims to curb fraud, combat human trafficking, and improve services via the Pak ID mobile app. Future plans include adding iris scans and linking NADRA’s database with Union Councils for a unified digital ID system. (Source)

India’s MOSIP Seeks Collaboration with SADC to Strengthen Digital Identity Systems Across Southern Africa

India’s Modular Open-Source Identity Platform (MOSIP) is working with the Southern African Development Community (Sadc) to enhance identification systems across its 16 member states. The platform enables governments to create scalable, customizable identity systems without vendor lock-in. MOSIP has collaborated with South Africa, is engaging Zambia, and is being considered by Nigeria for its digital identity system. Inspired by the EU’s Digital Identity Wallet, MOSIP prioritizes secure data transfer and user consent in its digital identity framework. (Source)

💰 Investments and Partnerships

TransUnion to Fully Acquire UK-Based Credit Platform Monevo, Boosting Consumer Credit Solutions

TransUnion has signed a definitive agreement to acquire the remaining ownership of Monevo, a UK-based credit prequalification and distribution platform, after initially acquiring a 30% stake in 2021. The transaction, expected to close by Q2 2025 pending regulatory approvals, will be funded with existing cash-on-hand and is not projected to materially impact TransUnion’s 2025 financial performance. The acquisition aims to enhance both companies’ value propositions by offering optimised credit solutions at scale and expanding their direct-to-consumer strategy in the U.S. and UK. Monevo’s platform connects over 150 global lenders and publishers, allowing consumers to compare tailored credit offers, improving approval visibility and minimizing credit score impact from unnecessary searches. (Source)

1Password Acquires Trelica to Enhance SaaS Access Management and Strengthen Extended Access Platform

TransUnion has agreed to acquire full ownership of Monevo, a UK-based credit prequalification and distribution platform, after acquiring a 30% stake in 2021. The deal, expected to close by Q2 2025 pending regulatory approvals, will be funded with existing cash and is not anticipated to significantly affect TransUnion’s 2025 financial performance. The acquisition aims to scale optimized credit solutions and expand direct-to-consumer offerings in the U.S. and UK. Monevo’s platform connects over 150 global lenders and publishers, enabling consumers to compare tailored credit offers with improved approval transparency and reduced credit score impact from unnecessary searches. (Source)

ClearScore Acquires Aro Finance to Strengthen Embedded Finance and Secured Loan Offerings

ClearScore Group has acquired Aro Finance Ltd to expand into embedded finance and secured loan broking, leveraging partnerships with major UK retailers like Argos, Very.co.uk, and Asda. This acquisition combines Aro’s lending marketplace capabilities with ClearScore’s platform, enhancing borrowing options and integrating the Group’s debt consolidation tool, “Clearer,” which directly settles consumer debts. Following its 2022 acquisition of Money Dashboard, ClearScore has bolstered its open banking expertise to improve underwriting and risk management. Pending FCA approval, Aro’s Manchester team will join ClearScore, advancing its strategy to diversify offerings and serve its 24 million global users. (Source)

⚖️ Policy and Regulatory

EU General Court Fines European Commission for GDPR Breach in Landmark Ruling

The EU General Court has fined the European Commission €400 ($412) for violating its own data protection laws, marking a precedent-setting decision. The Commission unlawfully transferred a German citizen’s personal data, including their IP address, to Meta Platforms in the U.S. without proper safeguards. The breach occurred when the citizen used the “Sign in with Facebook” feature on the EU login webpage to register for a conference. This ruling underscores the EU’s commitment to enforcing GDPR compliance, which has previously resulted in fines for major companies like Meta and LinkedIn. (Source)

U.S. Defense Department Expands Chinese Military Companies List to Include Biometrics and Tech Giants

The U.S. Department of Defense has updated its Section 1260H list of Chinese military companies, adding firms like Cloudwalk, Dahua, Hikvision, Huawei, Tencent, Yitu, and SenseTime for their dual-use technologies supporting China’s military. While the listing has no immediate legal impact, it raises the risk of sanctions and has caused market disruptions, including stock declines. Some firms, such as Dahua and Hikvision, face allegations of involvement in Xinjiang human rights abuses, while others, like Tencent and SenseTime, deny military ties. Megvii was removed from the list, which China criticized as exaggerating the “China threat” for national security purposes. (Source)

Rivers Casino Philadelphia Faces Lawsuits Over Major Data Breach Exposing Sensitive Employee and Customer Information

Rivers Casino Philadelphia, operated by Rush Street Gaming, faces legal scrutiny after a November 2024 data breach exposed sensitive employee and customer information, including Social Security numbers and bank details. Disclosed in December, the breach has prompted lawsuits, including a class-action complaint citing negligence and weak data security. Critics claim the casino’s response was delayed and inadequate, with victims reporting phishing and fraud. The incident underscores growing cybersecurity concerns in the gaming industry, a prime target for hackers due to its valuable data. (Source)

SEBI Fines Stockholding Services ₹9 Lakh for Systemic KYC Violations and Data Discrepancies

SEBI fined Stockholding Services Ltd ₹9 lakh for multiple KYC violations, including listing 1,103 clients aged 34-100 as “dependent children.” Inspections uncovered issues like mismatched contact details, incorrect bank information, and the use of authorized persons’ contact details instead of clients’. While the brokerage attributed errors to outdated practices and client confusion, it updated 947 accounts and suspended 156. SEBI stressed the systemic nature of the violations and the importance of robust KYC norms for transparency and preventing illegal activities. (Source)

Washington State Sues T-Mobile Over 2021 Data Breach That Exposed Millions’ Personal Information Due to Alleged Cybersecurity Failures

Washington State has sued T-Mobile over a 2021 data breach that exposed sensitive information of over 79 million customers. The lawsuit alleges failure to address known cybersecurity weaknesses, inadequate customer notification, and misrepresentation of data protection measures. Exposed data included names, Social Security numbers, and driver’s license details, some of which surfaced on a cybercriminal forum. The suit cites technical flaws like weak credentials, no login rate-limiting, and poor monitoring. T-Mobile disputes the claims, calling the lawsuit unexpected and expressing willingness to engage in further discussions. (Source)

China-Linked Hackers Breach U.S. Treasury in Cyberattack, CISA Finds No Evidence of Wider Federal Intrusion

CISA reported no evidence of U.S. federal agencies being hacked beyond the Treasury Department in a December cyberattack. China-backed hackers accessed Treasury employee workstations and unclassified documents using a stolen private key from vendor BeyondTrust. The method of theft remains unclear, but the hackers targeted the global sanctions office. China denies involvement, while CISA continues monitoring and coordinating the response. (Source)

InfoCert Data Breach Exposes 5.5 Million Users’ Personal Data Amid Third-Party Supplier Vulnerability

Italian digital identity provider InfoCert suffered a data breach affecting 5.5 million customers, with stolen data, including names, tax codes, and contact details, appearing on the dark web. The breach stemmed from a third-party supplier, not InfoCert’s systems, and no passwords or service credentials were compromised. InfoCert, part of the Tinexta Group and managing 1.8 million SPID identities, disclosed the incident before removing the notice and is investigating while reporting to authorities. The breach underscores cybersecurity challenges in the digital identity sector amid rising threats. (Source)

U.S. Sanctions Chinese Firm Integrity Tech Over Alleged Cyber Espionage Links to Flax Typhoon

The U.S. sanctioned Beijing-based Integrity Technology Group, linked to China-backed hacking group Flax Typhoon, for aiding cyberattacks on U.S. entities, including critical infrastructure, universities, and media. Between 2022 and 2023, Integrity Tech allegedly operated a botnet of 260,000 devices to hide Flax Typhoon’s activities, dismantled by the FBI in September 2024. The sanctions follow a December cyberattack on the Treasury Department’s OFAC, attributed to China-backed hackers, potentially exposing sensitive sanctions-related data. The U.S. has labeled Chinese cyber actors a persistent national security threat. Integrity Tech has not responded to the allegations. (Source)

Hong Kong Police Bust AI-Powered Deepfake Syndicate Behind $4.4 Billion Global ‘Pig Butchering’ Scams

Hong Kong authorities dismantled a syndicate using AI deepfakes and dating apps to defraud victims in Taiwan, Singapore, and Malaysia, stealing over HK$34 million. Operating from Kowloon Bay, 31 suspects were arrested, and HK$100 million in assets, including cash and luxury goods, was seized. The group used face-swapping technology to create fake personas, luring victims into romantic relationships and convincing them to invest in fraudulent cryptocurrency platforms. Victims were blocked from withdrawing funds under pretexts like taxes, a hallmark of “pig butchering” scams. The operation, involving extensive money laundering, was led by the Commercial Crime Bureau. (Source)

Apple Settles $95 Million Lawsuit Over Siri Privacy Violations and Unintentional Recordings

Apple has agreed to a $95 million settlement to resolve a class-action lawsuit alleging Siri violated user privacy by unintentionally recording conversations and sharing them with third parties, including advertisers. Filed in October 2023 in Oakland, California, the settlement awaits approval from US District Judge Jeffrey White. The lawsuit claims Siri’s accidental activations led to targeted ads based on overheard discussions, covering a class period from September 2014 to December 2024, spanning the “Hey, Siri” feature’s release. (Source)

U.S. Court Rules FCC Lacks Authority to Reinstate Net Neutrality, Shifting Focus to State Laws and Congress

A U.S. appeals court ruled that the FCC cannot reinstate net neutrality rules, citing the Supreme Court’s Loper Bright decision limiting federal agency powers. The decision blocks Biden administration efforts to restore open internet principles but leaves state-level rules, like California’s, intact. FCC Chair Jessica Rosenworcel called on Congress to legislate net neutrality, while industry leaders and former FCC Chair Ajit Pai praised the ruling, favoring investment over federal oversight. The decision may hinder federal internet regulation, though further legal action is possible. (Source)

🔗 More from Liminal

New Research Available

Access the Market & Buyer’s Guide for Third-Party Risk Management in Link for insights to strengthen compliance and tackle emerging risks as the TPRM market nears $19.9 billion by 2030.

Access Market & Competitive Intelligence

Our award-winning Link™ platform empowers you to monitor trends, access benchmark research reports, explore use cases, and more.

Liminal CEO Summit 2025

Interested in attending? Request an invite to our 4th annual exclusive CEO event, which will be held in Laguna Beach, California.

The post The State of Identity – January 10, 2025 appeared first on Liminal.co.


PingTalk

Ping Identity Scores Highest in All Gartner® Critical Capabilities Use Cases

Ping Identity scores highest in all five 2025 Gartner® Critical Capabilities for Access Management Use Cases, including Customer, Workforce, Partner, Machine, and Application Development Support.

FastID

DDoS in December

Discover the latest trends and actionable insights on application DDoS attacks in December 2024. Strengthen your security with our expert analysis and guidance.
Discover the latest trends and actionable insights on application DDoS attacks in December 2024. Strengthen your security with our expert analysis and guidance.

Thursday, 09. January 2025

The Blockchain Company.io LLC

Unlocking Value With Blockchain Tech

DeFi vs. TradFi: A Tale of Two Workforces (and a Whole Lot More) As an avid blockchain user and developer, one of the more common questions I reecive from non-technical family and friends is "where and how does blockchain technology make money?". The answer to this very valid
DeFi vs. TradFi: A Tale of Two Workforces (and a Whole Lot More)

As an avid blockchain user and developer, one of the more common questions I reecive from non-technical family and friends is "where and how does blockchain technology make money?". The answer to this very valid question could be explained using complex blockchain vernacular or boiled down to a few familiar business metrics and statistics. In this article we'll look at the impact legacy and blockchain technologies have on employment in Decentralized Finance (DeFi) and Traditional Finance (TradFi) industries. The numbers may surprise some and be a cause for concern for others, especially for those in the TradFi industry.

DeFi has emerged as a disruptive force in the financial world, challenging the established norms of traditional finance (TradFi). While many discussions focus on the technological underpinnings and financial mechanisms, a key differentiator often overlooked is the stark contrast in organizational structure and the number of employees required to operate. This difference has profound implications for efficiency, accessibility, and the overall nature of financial services.

Let's explore this contrast by comparing a DeFi giant like Uniswap with a traditional centralized exchange operating within the US banking system.

Uniswap: The Lean, Mean, DeFi Machine

Uniswap is a decentralized exchange (DEX) built on the Ethereum blockchain. It operates using automated market makers (AMMs), which rely on smart contracts to facilitate trading. These smart contracts automatically execute trades based on pre-defined algorithms and liquidity pools provided by users.

Minimal Human Intervention: The core functionality of Uniswap requires virtually no human intervention for day-to-day operations. There's no need for order books managed by human traders, no settlement processes requiring back-office staff, and no need for extensive customer support teams to handle trade execution issues. Small Core Team: Uniswap Labs, the company initially behind Uniswap's development, focuses primarily on protocol development and upgrades. The core team is relatively small compared to traditional financial institutions. The protocol itself operates autonomously once deployed. Uniswap employs approximately 140-190 people. Community Governance: Governance of the Uniswap protocol is largely decentralized, with UNI token holders having voting rights on proposals for protocol changes. This further reduces the need for a large internal management structure while extending the arm of decentralized opportunity across the globe.

Traditional Exchanges: The Workforce Heavyweights

In contrast, traditional centralized exchanges and other financial institutions within the US banking system require significantly larger workforces. Consider a typical stock exchange or a large bank:

Extensive Operations Staff: These institutions require numerous employees for various functions, including: Trading Desk: Traders execute orders, manage risk, and ensure market stability. Back Office: Settlement, clearing, and reconciliation processes require substantial human oversight. Compliance and Legal: Strict regulatory requirements necessitate large compliance and legal teams. Customer Service: Handling customer inquiries, resolving issues, and providing support requires a large customer service department. IT and Security: Maintaining complex IT infrastructure and ensuring security requires dedicated teams. Hierarchical Structure: Traditional financial institutions typically have complex hierarchical structures with multiple layers of management, further increasing the number of employees. The average TradFi company listed on the NASDAQ employs 5000+ People.

The Implications of Workforce Size

The difference in workforce size between DeFi and TradFi has several important implications:

Efficiency: DeFi protocols like Uniswap can operate with significantly lower overhead costs due to their minimal staffing needs. This can translate to lower fees for users. Accessibility: Decentralization and automation can make financial services more accessible to a wider audience, as there's less reliance on physical branches and human interaction. Transparency: Smart contracts are publicly auditable, offering greater transparency compared to the often opaque operations of traditional financial institutions. Security Considerations: While DeFi offers transparency, it also introduces new security challenges related to smart contract vulnerabilities and exploits. The smaller teams may have limited resources to address these issues compared to the larger security teams of TradFi. Regulatory Scrutiny: DeFi's decentralized nature makes it challenging for regulators to oversee. This lack of regulatory clarity created a period of uncertainty and slowed wider adoption until the SEC, CFTC and Central Banks worldwide began to relax their stance a few months prior to approving BitCoin Exchange Traded Funds (ETFs) on January 10, 2024. With 2024 in the rearview along with Bitcoin $100K, regulatory headwinds have clearly shifted to tailwinds while the largest investment banks are slated to invest trillions of $USD in blockchain technology and begin tokenizing real world assets (RWA) in earnest. Estimating the Value: Reports suggest that blockchain deployments could enable banks to save billions on operational costs. For example, one study estimated potential savings of up to $27 billion annually on cross-border settlement transactions by 2030. Faster Transactions: Blockchain transactions can settle much faster than traditional systems, especially for cross-border payments that can take days to process. 24/7 Availability: DeFi markets operate continuously, unlike traditional markets with limited trading hours. This increases capital utilization and allows for greater flexibility.

Conclusion

The contrast in workforce size between DeFi platforms like Uniswap and traditional financial institutions highlights a fundamental difference in their operational models. DeFi's reliance on automation and smart contracts allows for lean operations and greater efficiency, while TradFi's complex structures require substantial human capital. This difference has profound implications for the future of finance, with DeFi potentially offering greater accessibility and lower costs, while TradFi continues to provide established regulatory frameworks and well-defined security protocols. As both sectors continue to evolve, it's likely that they will influence and learn from each other, shaping the future of finance in ways we are only beginning to understand. Blockchain technology has incredible potential to foster economic dynamics that result in a much needed modernization of nearly every industry from supplain chain logistics to healthcare to waste management infrastructure and many more.


Indicio

Top 5 exciting use cases for Verifiable Credentials to look out for in 2025

The post Top 5 exciting use cases for Verifiable Credentials to look out for in 2025 appeared first on Indicio.
Verifiable credentials are transforming how organizations verify, share, and manage data in new and powerful ways. Discover the top industries where verifiable credentials are reshaping digital interactions and unlocking new possibilities for individuals, businesses, and governments worldwide.

By: Ken Ebert

In the rapidly evolving digital identity landscape, Verifiable Credentials (VCs) are becoming more than just an emerging technology — they are establishing themselves as essential tools for secure, privacy-respecting identity verification. Organizations around the world are deploying this technology to simplify processes, enhance security, and give users control over their data. 

This blog looks at five of the top use cases for Verifiable Credentials that we see for 2025, providing insight into how this technology is driving efficiency, transparency, and trust. Each example highlights how industries are using VCs to meet the increasing demand for secure, interoperable, and user-centric identity solutions. From improving how we manage biometric data to enabling seamless travel and streamlining compliance in finance, VCs are proving their versatility and value.

International Travel

Using digital identities for domestic proof of identity and travel has already seen some adoption, see our recent article on Mobile Driver’s Licenses. But the next step is being able to travel internationally faster and more conveniently. Michael Zureik of SITA recently presented the findings of a proof of concept for flying internationally using a Digital Travel Credential (DTC) and the IATA One ID in collaboration with Indicio, the Government of Aruba, and Delta Airlines. Aruba plans to have their solution operational to all travelers to the island in 2025, but keep an eye out for a quick adoption by other countries and airports.

Biometric Authentication

Biometric authentication solves the problem of passwords and logins for many organizations and users; unfortunately, it still relies on the underlying problem that passwords face: reliance on a centralized database. The solution to removing this reliance on a database is what we call “Bring Your Own Biometrics.” Once a biometric is authenticated, it is issued as a Verifiable Credential. When a person presents for a liveness check, they also present their biometric VC and the relying party compares the liveness check with the biometric in the VC. This solution keeps all of the benefits of biometric authentication, while removing the risk of data breach and reducing liability for the organization. Indicio Deputy CTO Sam Curren recently held an in-depth discussion on this topic with real world examples and implementations if you would like to learn more. As data breaches continue to rise and more systems switch to biometric authentication to combat fraud, we see this use case for eliminating databases for sensitive personal information being critical.

Education

Schools of all levels are currently generating a mountain of paperwork per student per year. They need records of each student’s grades, transcripts, awards won, participation in sports or activities, and the list goes on. The current process to verify a student’s accomplishments requires the student to go back to the school and get the documents, and present them to the verifying party, either an employer or a higher education institution, and then for that part to also check in with the school to ensure they are authentic, resulting in a time consuming, manual process. The use of Verifiable Credentials and Open badges 3.0 will allow everyone to skip the wait and be able to immediately verify the student’s accomplishments without the need to check in with the school or a third party system. Students and faculty would also be able to use Verifiable Credentials for identity and access management, allowing users to access their accounts and documents in a faster, more secure, passwordless way. Indicio is already working on implementing this solution for the United School Administrators of Kansas, but this issue applies to everyone in education, and we see the entire industry being quick to adopt once they see the time and cost savings to be had.

Agriculture 

Farmers have a lot of data to share. From organic growing practices to emissions data or water usage, they have a lot to keep track of and share with a variety of stakeholders, including regulators, governments, suppliers, and consumers. Historically they have relied on third-party identity providers and centralized databases, which have proven complex to integrate and slow to operate, and can share the farmer’s data without their knowledge or permission. With a decentralized identity approach their information can be shared directly, and can also create a more transparent supply chain and prove provenance. Recently, the Trust Alliance New Zealand in partnership with Indicio and Anonyme Labs has showed that all of this information can be securely held locally in a digital wallet and shared in a decentralized way, offering a faster, simpler approach to data management that saves time and money for everyone that relies on farming data. This solution won the Constellation Research 2024 SuperNova Award for “Digital Safety, Governance, Privacy, and Cybersecurity.” Agriculture and farming is a data intensive activity and we see growing interest and applications for digital farm wallets in 2025.

Finance

No one is targeted more by fraudsters than financial institutions. In fact, it’s likely that your bank receives thousands of deepfake scam phone calls per year trying to gain access to customer accounts. Decentralized identity can stop this problem at its source by providing mutual authentication through DIDComm to both banks and the customers they service before every interaction or transaction, removing the ability for any party to be impersonated. Historically banks have had to identify customers through passwords and MFA, while customers had no way to truly identify their bank without extra due diligence on their part. Fraud prevention and faster customer interactions will be a driving force for finance being a big adopter of Verifiable Credentials and decentralized identity in 2025.

Do you see a use case you’d like to discuss further? Curious how Verifiable Credentials can help your organization? Get in touch with our team of technical experts or learn more about Indicio’s complete solution Indicio Proven.

Sign up to our newsletter to stay up to date with the latest from Indicio and the decentralized identity community

The post Top 5 exciting use cases for Verifiable Credentials to look out for in 2025 appeared first on Indicio.


Ocean Protocol

DF123 Completes and DF124 Launches

Predictoor DF123 rewards available. DF124 runs Jan 9 — Jan 16th, 2024 1. Overview Data Farming (DF) is Ocean’s incentives program. In DF, you can earn OCEAN rewards by making predictions via Ocean Predictoor. Data Farming Round 123 (DF123) has completed. DF124 is live today, Jan 9. It concludes on January 16th. For this DF round, Predictoor DF has 37,500 OCEAN rewards and 20,000 ROSE 
Predictoor DF123 rewards available. DF124 runs Jan 9 — Jan 16th, 2024 1. Overview

Data Farming (DF) is Ocean’s incentives program. In DF, you can earn OCEAN rewards by making predictions via Ocean Predictoor.

Data Farming Round 123 (DF123) has completed.

DF124 is live today, Jan 9. It concludes on January 16th. For this DF round, Predictoor DF has 37,500 OCEAN rewards and 20,000 ROSE rewards.

2. DF structure

The reward structure for DF124 is comprised solely of Predictoor DF rewards.

Predictoor DF: Actively predict crypto prices by submitting a price prediction and staking OCEAN to slash competitors and earn.

3. How to Earn Rewards, and Claim Them

Predictoor DF: To earn: submit accurate predictions via Predictoor Bots and stake OCEAN to slash incorrect Predictoors. To claim OCEAN rewards: run the Predictoor $OCEAN payout script, linked from Predictoor DF user guide in Ocean docs. To claim ROSE rewards: see instructions in Predictoor DF user guide in Ocean docs.

4. Specific Parameters for DF124

Budget. Predictoor DF: 37.5K OCEAN + 20K ROSE

Networks. Predictoor DF applies to activity on Oasis Sapphire. Here is more information about Ocean deployments to networks.

Predictoor DF rewards are calculated as follows:

First, DF Buyer agent purchases Predictoor feeds using OCEAN throughout the week to evenly distribute these rewards. Then, ROSE is distributed at the end of the week to active Predictoors that have been claiming their rewards.

Expect further evolution in DF: adding new streams and budget adjustments among streams.

Updates are always announced at the beginning of a round, if not sooner.

About Ocean, DF and Predictoor

Ocean was founded to level the playing field for AI and data. Ocean tools enable people to privately & securely publish, exchange, and consume data. Follow Ocean on Twitter or TG, and chat in Discord. Ocean is part of the Artificial Superintelligence Alliance.

In Predictoor, people run AI-powered prediction bots or trading bots on crypto price feeds to earn $. Follow Predictoor on Twitter.

DF123 Completes and DF124 Launches was originally published in Ocean Protocol on Medium, where people are continuing the conversation by highlighting and responding to this story.


PingTalk

Radius Authentication - How it Works

Learn how RADIUS authentication works, including server functions, authentication processes, and use cases in network security.

RADIUS (Remote Authentication Dial-In User Service) authentication is a widely used protocol that plays a key role in many organizations’ security stacks. It ensures that users or devices attempting to connect to a network are properly authenticated, safeguarding access and preventing unauthorized use.

 

This article explains what RADIUS authentication is, how it works, and why it’s an important component of identity management.

Wednesday, 08. January 2025

Anonym

Go Inside Version 3.0 of the Most Advanced Mobile Wallet SDK on the Market

Anonyome Labs has the most advanced decentralized identity mobile wallet SDK on the market—and the newly released version 3.0 is packed with features that customers can apply to their own products.   The new features in the latest version of our DI Mobile Edge Agent SDK represent the bleeding edge of decentralized identity (DI), align with European Union Digital […] The

Anonyome Labs has the most advanced decentralized identity mobile wallet SDK on the market—and the newly released version 3.0 is packed with features that customers can apply to their own products.  

The new features in the latest version of our DI Mobile Edge Agent SDK represent the bleeding edge of decentralized identity (DI), align with European Union Digital Identity (EUDI) regulations, and maintain the modularity, reliability, and security of Anonyome Labs’ products.

Our DI Mobile Edge Agent SDK currently allows customers to easily integrate DI and verifiable credential (VC, or reusable credential) solutions into their applications and now, with version 3.0, these capabilities go even further. The DI Mobile Edge Agent SDKis a native SDK for both iOS and Android, and does not rely on any third party frameworks such as Javascript frameworks.

In nutshell:

Anonyome Labs Edge Agent SDK 3.0 adds support for OpenID4VC (OpenID4VCI and OpenID4VP), expanding its suite of protocols for receiving and presenting credentials, in addition to the already supported Aries protocols. Anonyome Labs Edge Agent SDK 3.0 builds on its collection of supported credential formats (Anoncreds and W3C) with the addition of IETF SD-JWT VCs, increasing interoperability and supporting new privacy-preserving use cases. Anonyome Labs Edge Agent SDK 3.0 updates its supported Aries protocols, maintaining interoperability with the latest Aries agents in the ecosystem. Anonyome Labs Edge Agent SDK continues to exist in the ecosystem of Anonyome’s DI offerings, such as in the Anonyome Labs Cloud Agent Service and the Anonyome Labs Decentralized Identity Relay. Having accomplished what was on the roadmap we set out in our previous article, we’ve outlined our new enhanced roadmap, including continued investment into OpenID4VC capabilities, and expansion for new DID Methods (such as Cheqd).

Let’s break these down:

Adds support for OpenID4VC protocols

With our DI Mobile Edge Agent SDK already having support for Aries protocols for receiving and presenting VCs (Issue Credential and Present Proof), version 3.0 ventures into the new OpenID4VC protocol suite (OpenID4VCI and OpenID4VP).

This move allows for wider interoperability with the DI ecosystem, including within the EUDI ecosystem where these protocols are being used in technical specifications (such as the Architecture Reference Framework) and pilot deployments.

These new protocols also help achieve new use cases and wallet UX flows alongside the existing Aries protocol’s use cases. A few of the notable differences are:

Being rooted in industry-standard OAuth 2.0 flows, OpenID4VC allows standard OAuth authorization flows to be used in credential issuance flows. Multiple credentials can be offered in the same flow, where the Edge Agent SDK consumer can browse and request the desired credential. The issuer now conveys support for UI display data in the credential exchange, including issuer and credential colors, text, and logos. There’s no prerequisite to establish an existing DIDComm connection. Credential and presentation exchange flows can begin immediately from an initial QR code scan or deep link click.

The possibilities and protocol variations in OpenID4VC are vast. To home in on the variations the Edge Agent SDK will support in this release, we’ve targeted interoperability with the OpenID4VC verifier and issuer capabilities of the popular open-source projects credo-ts and ACA-Py.

Builds on supported VCs formats, with IETF SD-JWT VCs

IETF’s SD-JWT VCs is the latest credential format to enter our Edge Agent’s suite of supported formats, alongside W3C VCs and Anoncreds.

Like the new OpenID4VC features, this new credential format enables new use cases and wider interoperability with the DI ecosystem, since SD-JWT VC is a preferred format in the EUDI ecosystem.

SD-JWT VCs are designed with selective disclosure in mind, allowing for the building of user-centric privacy-preserving use cases. Using SD-JWT VC, the holder can selectively choose to hide certain attributes of their credential (if the issuer permits it), so that when they present their credential in some use cases, they present only the bare minimum to satisfy that use case. By default, our Edge Agent SDK will always disclose as little as possible when presenting SD-JWT VCs, protecting the privacy of our consumers.

Our Edge Agent SDK could already support some of these use cases via Anoncreds and the BBS-variant of W3C VCs, but SD-JWT VCs differ from these formats in that they use NIST FIPS-compliant cryptography—an attractive feat for EUDI regulation.

Updates supported Aries protocols

In addition to our major venture into the new OpenID4VC protocol suite, we continue to maintain and expand our Aries protocol suite. Since 2.0, the Edge Agent SDK has added support for the latest Aries connection protocol, DID Exchange.

This new protocol has new UX optimizations for Edge Agent SDK consumers where DIDComm connections can be re-used if a duplicate connection is detected when receiving a DIDComm invitation. But, just as importantly, this feature ensures the Edge Agent SDK remains aligned with the latest Aries Interoperability Profile (AIP).

Exists in the ecosystem of Anonyome’s DI offerings

As a market leader in innovative decentralized identity (DI) technology offerings, Anonyome Labs continues to advance its DI solutions, supporting a wide range of use cases. Our Edge Agent SDK continues to seamlessly integrate with our highly scalable DI message relay solution, the Sudo DI Relay SDK, allowing the edge agent to reliably receive messages from the DIDComm peers it connects with. What’s more, we continue to thoroughly test our Edge Agent against our Cloud Agent Service offering (in addition to a suite of open source DI agents) to make sure all our features remain interoperable in the DI ecosystem. 

Rich roadmap ahead

With this extensive third release, Anonyome’s DI Mobile Edge Agent SDK has once again exceeded its roadmap, going beyond the plan laid out since the previous release announcement. But we are not slowing down: we plan to keep adding features to every new release of the SDK so our customers’ applications can stay up to date with the latest and greatest in the DI ecosystem.

Going forward for the SDK, we plan to continue updating our OpenID4VC protocol suite. Despite being deployed in many EUDI pilots, OpenID4VC protocols are still in draft status. We plan to stay up to date with these protocols as they approach their official 1.0 release, aligning with the EUDI. We also plan to:

Enhance our OpenID4VC protocol implementations with new capabilities, such as OpenID4VCI’s “Authorization code flow”, enabling use cases where users must perform a standard OAuth login to access a credential Add support for OpenID’s SIOPv2 protocol, allowing for new “login with decentralized identifier” use cases Continue expanding the set of DID methods we support, such as did:cheqd, did:tdw, and did:jwk, again increasing the level of interoperability with more DI agents.

Anonyome Labs’ business solution combines a scalable identity foundation and menu of enterprise-ready APIs and SDKs, so you can quickly build and deploy next-generation privacy, cyber safety, and decentralized identity apps to help your customers communicate privately, navigate online safely, and transact securely in an increasingly connected world. 

Talk to us today 

The post Go Inside Version 3.0 of the Most Advanced Mobile Wallet SDK on the Market appeared first on Anonyome Labs.


playhaus.tv

25 – The Cell that Keeps on Dividing | Weekly Mojo w/ Madison Jesseka


Tokeny Solutions

Tokeny and Ditobanx Partner to Transform El Salvador into a Tokenization Leader

The post Tokeny and Ditobanx Partner to Transform El Salvador into a Tokenization Leader appeared first on Tokeny.

Luxembourg, 8 January 2025 – Tokeny, a leading provider of onchain finance solutions, has partnered with Ditobanx, a licensed Digital Asset Service Provider (DASP) in El Salvador, to help the country build a standardized framework for tokenized regulated assets and position the nation as a leader in the tokenization era.

By leveraging Tokeny’s proven technology, Ditobanx has successfully overcome the challenges of launching a robust platform to issue, manage, and distribute tokenized assets in a seamless and compliant way, without recreating operational silos. The company plans to issue $300 million in tokenized assets in 2025, with a pipeline of 22 clients ready to onboard.

Ditobanx’s mission goes beyond simplifying investment access through tokenization. The team is committed to building an ecosystem that extends the reach of El Salvador’s securities and enhances liquidity in private markets. This ecosystem vision hinges on collaboration and standardization, ensuring that participants across the financial landscape can connect and operate seamlessly.

Ditobanx, Tokeny, and over 90 industry players are collaborating through the non-profit ERC3643 Association to ensure the adoption of the market standard ERC-3643 (“T-REX”) for compliant tokenization. This standard defines how compliance, permissions, data, and onchain workflows are managed, enabling participants to interact effortlessly within a standardized framework.

However, the lifecycle management of tokenized securities remains complex, involving the integration of both on-chain and off-chain processes and data. Developing an orchestrated platform from scratch is both time-intensive and costly, often taking years to complete. To overcome these challenges, Ditobanx chose Tokeny’s onchain operating system, which enabled them to launch their platform within weeks. This swift deployment allows Ditobanx to focus on their core business while benefiting from a proven and scalable solution.

To ensure that other licensed providers in El Salvador can overcome similar challenges and adopt the market standard, Ditobanx will offer tailored guidance and access to its expertise and tools. By supporting these providers in implementing the ERC-3643 T-REX standard, Ditobanx aims to create a more streamlined and standardized ecosystem across the country, eliminating silos and unlocking the full potential of tokenization through seamless interoperability and open distribution.

Launching tokenized assets is a complex process, but it is essential for the future of our industry. We believe in making this journey easier for others by sharing what we’ve learned and providing access to proven solutions. Standardization is critical for creating a more connected, liquid, and innovative market, and we are committed to making this vision a reality for El Salvador and beyond. Guillermo ContrerasCEO of Ditobanx El Salvador has been a trailblazer in adopting and regulating digital assets, demonstrating an active and forward-thinking approach to innovation. The country is uniquely positioned to take full advantage of the opportunities that tokenization offers. With a visionary partner like Ditobanx, making significant strides toward nationwide standardization, we are proud to support their efforts. By providing the right tools and expertise tailored to local jurisdictions and specific needs, we are enabling institutions across El Salvador to confidently and efficiently embrace tokenization. Luc FalempinCEO of Tokeny

With Tokeny and Ditobanx working together, El Salvador is taking another major step toward making tokenized assets a core part of its economy. This partnership not only creates a clear path for licensed providers to succeed but also builds the foundation for a stronger, more efficient tokenization market that benefits issuers, investors, distributors, and the nation as a whole.

About Ditobanx

Ditobanx is a digital financial solutions company dedicated to transforming the way individuals and businesses interact with their finances. With a strong presence in Latin America and plans for expansion, Ditobanx continues to innovate to provide the best financial tools on the market.

About Tokeny

Tokeny is a leading onchain finance operating system. Tokeny has pioneered compliant tokenization with the open-source ERC-3643 T-REX standard and advanced white-label software solutions. The enterprise-grade platform and APIs unify fragmented onchain and offchain workflows, integrating essential services to eliminate silos. It enables seamless issuance, transfer, and management of tokenized securities. By automating operations, offering innovative onchain services, and connecting with any desired distributors, Tokeny helps financial actors attract more clients and improve liquidity. Trusted globally, Tokeny has successfully executed over 120 use cases across five continents and facilitated 3 billion onchain transactions and operations.

Website | LinkedIn | X/Twitter

The post Tokeny and Ditobanx Partner to Transform El Salvador into a Tokenization Leader appeared first on Tokeny.


Elliptic

Crypto regulatory affairs: As MiCA takes effect, ESMA releases final guidance

The European Union’s Markets in Cryptoasset (MiCA) Regulation has officially come fully online, as requirements for cryptoasset service providers (CASPs) took effect from the end of 2024. 

The European Union’s Markets in Cryptoasset (MiCA) Regulation has officially come fully online, as requirements for cryptoasset service providers (CASPs) took effect from the end of 2024. 


Ocean Protocol

Season 9 of the Ocean Zealy Community Campaign!

We’re happy to announce Season 9 of the Ocean Zealy Community Campaign, an initiative that has brought together our vibrant community and rewarded the most active and engaged members. 💰 Reward Pool 5,000 ($FET) tokens that will be rewarded to the Top100 users in our leaderboard 🚀 📜Program Structure Season 9 of the Ocean Zealy Community Campaign will feature more engaging tasks and ac

We’re happy to announce Season 9 of the Ocean Zealy Community Campaign, an initiative that has brought together our vibrant community and rewarded the most active and engaged members.

💰 Reward Pool

5,000 ($FET) tokens that will be rewarded to the Top100 users in our leaderboard 🚀

📜Program Structure

Season 9 of the Ocean Zealy Community Campaign will feature more engaging tasks and activities, providing participants with opportunities to earn points. From onboarding tasks to Twitter engagement and content creation, there’s something for everyone to get involved in and earn points and rewards along the way.

⏰Campaign Duration: 8th of January— 7th of February 12:00 PM UTC

🤔How Can You Participate?

Follow this link to join and earn:

https://zealy.io/cw/onceaprotocol/questboard

Season 9 of the Ocean Zealy Community Campaign! was originally published in Ocean Protocol on Medium, where people are continuing the conversation by highlighting and responding to this story.


iComply Investor Services Inc.

Customer Identification Procedures: A Smarter Approach to CIP for Modern Businesses

Revolutionizing Customer Identification Procedures (CIP) in 2025 Discover how technology is transforming CIP, enabling businesses to achieve seamless customer experiences, enhance security, and ensure global regulatory compliance.

Customer Identification Procedures (CIP) have long been a cornerstone of regulated industries like financial services and real estate. But for the businesses implementing them, the experience can feel like a balancing act—managing compliance obligations, maintaining security, and delivering a seamless customer experience.

Fast forward to 2025, and technology is reimagining how businesses handle CIP. By replacing manual workflows with scalable, digital-first solutions, companies can verify customers more efficiently, prevent fraud, and ensure global regulatory compliance—all while keeping the customer journey smooth and secure.

The Manual Method: A Customer’s Perspective

Imagine this: a customer walks into a branch office to verify their identity. They’re armed with multiple documents—government-issued ID, proof of address, and perhaps even supplementary paperwork. A staff member painstakingly photocopies each piece, manually inputs the data into a system, and cross-references it with additional sources.

For the customer, the process is tedious and time-consuming. For the business, it’s an operational bottleneck. Manual CIP methods are prone to:

Delays: Processing times can stretch from hours to days. Errors: Manual data entry increases the risk of inaccuracies. Fraud Risks: Human oversight often fails to detect sophisticated forgery or tampering.

This traditional approach, while once sufficient, is increasingly out of step with modern customer expectations and regulatory demands.

The 2025 CIP Experience: Seamless and Scalable

Now, imagine a different scenario. The same customer initiates the process from their smartphone. They upload a photo of their government-issued ID and snap a quick selfie. Within seconds, advanced technology verifies the document’s authenticity, matches the selfie to the ID, and cross-checks the data against trusted sources like global sanctions lists.

For businesses managing hundreds—or thousands—of customer verifications, this shift to digital CIP is transformative. Two key innovations are leading this change:

Turnkey Solutions for KYB and KYC

Modern CIP platforms are built to handle both Know Your Business (KYB) and Know Your Customer (KYC) needs. These solutions are designed to scale, offering:

Automated Data Validation: Verifications are completed in seconds, reducing wait times and manual effort. Multi-Jurisdictional Support: Compliance with global regulations becomes seamless, even for businesses operating across multiple regions. Biometric Verification: Facial recognition or fingerprint matching adds an extra layer of security, ensuring that identity fraud is mitigated at the source. Scalability Without Complexity

Unlike legacy systems, digital CIP solutions don’t require complex custom builds. Turnkey options like iComply’s KYB and KYC modules allow businesses to roll out fully compliant identity verification systems quickly, without sacrificing flexibility or security.

Building a Smarter CIP Process

A smarter CIP process isn’t just about speed—it’s about trust, security, and adaptability. In a digital-first approach, businesses can:

Enhance Security with Advanced Technology: AI and biometric tools identify anomalies, verify documents, and flag high-risk profiles in real-time. Ensure Data Privacy Compliance: Privacy-first architectures, such as edge computing, process sensitive customer data locally, meeting regulatory standards like GDPR and CCPA. Reduce Costs and Complexity: By automating processes, businesses can lower operational expenses and eliminate redundant workflows.

For companies like Dye & Durham, where large-scale customer verifications are routine, these advancements make CIP not only a compliance task but also a strategic advantage.

CIP as a Customer-Centric Opportunity

The days of viewing CIP solely as a regulatory hurdle are over. In 2025, businesses recognize that customer identification is a touchpoint to build trust and loyalty. A seamless onboarding experience shows customers that their data is secure and their time is respected.

By adopting scalable, digital solutions, organizations can enhance their CIP processes without compromising on compliance or the customer experience. The result? Faster, safer, and more reliable identity verification that aligns with both business goals and customer expectations.

In an industry where trust is paramount, turning CIP into a streamlined, secure process is a powerful way to differentiate your business and build lasting relationships.

Tuesday, 07. January 2025

Indicio

How to put billions into people’s pockets by transforming cross-border payments with Verifiable Credentials

The post How to put billions into people’s pockets by transforming cross-border payments with Verifiable Credentials appeared first on Indicio.
The economic benefits from streamlining cross-border transactions are massive — and decentralized identity provides the digitally transformative infrastructure to do so. 

By Trevor Butterworth and Tim Spring

According to the European central bank, global cross-border payments are expected to increase from 190 trillion USD in 2023 to 290 trillion USD by 2030 as global commerce becomes more digitally integrated.

Yet in practice, cross border payments are complex and difficult for businesses to execute and often punishing for individuals. Currency conversion rates, fees, and regulatory compliance all conspire to slow down and increase the cost of payments in real time; and for remittances — people sending money from one country to another (typically a foreign worker sending money to relatives) — these fees are brutal. According to the World Bank, the average cost of sending a remittance is 6.65% of the amount sent, rising to 8.37% for Sub-Saharan Africa.

As a recent World Bank report notes, “In more than 60 countries, remittances account for 3 percent or more of the Gross Domestic Product (GDP), and small/fragile states are more heavily dependent on remittances. As such, it is critical that both remittance senders and receivers have access to a multitude of payment methods and channels in order to deliver and receive remittances in an affordable and fast manner.”

Even a modest 1 percentage point reduction in fees, says the European Central Bank’s Fabio Panetta, “would leave those most in need with USD 6 billion in their pockets every year.”

Everyone’s looking for better solutions, with the goal of making cross border payments cheaper, faster, more flexible, and more secure. Here’s how we believe Decentralized identity and Verifiable Credentials can deliver those solutions, fast.

Validating account ownership and status

Identity fraud is the specter haunting all financial transactions. The key benefit of a Verifiable Credential solution is cryptographic trust: If you trust the source of a Verifiable Credential, you can trust the contents, and immediately act on the data.

Verifiable Credentials enable people or organizations to hold data about themselves, such as the financial account data required to meet “know your customer” and AML requirements. Verifiable Credentials enable people to share and reuse that data in a way that doesn’t require checking in with the original issuer of the information or storing the same data in order to cross check it.

Authentication is seamless because the origin of the credential is instantly verifiable through cryptography. The information in a credential is digitally signed so that any alteration will be instantly detected. And the credential is bound to the person and their device and their digital wallet both by cryptography and biometrics so you can know that it is the rightful owner is presenting their information. The credential can also be programmed to expire or it can be revoked depending on whether its terms of use have been violated.

Verifiable Credentials are capable of delivering “government-grade” digital identities that can be bound to biometrics (see 4 below) and verified using simple software anywhere and at any time.

Know Your Customer’s Biometrics (KYCB). 

Biometrics are increasingly being incorporated into payments so that you can “pay with your face.” But the rapid rise of generative AI-driven biometric fraud threatens to derail confidence in conventional biometric authentication. Biometric theft represents a much higher existential risk to people than account or password theft. Similarly, the need to store personal biometric data in order to verify it represents a much higher privacy and security risk to all parties involved.

This is where Verifiable Credential technology comes to the rescue. By submitting an authenticated biometric template from a trusted credential provider while performing a liveness check, a relying party has a simple, reliable way to cross check that the person really is the face in front the camera — and without the relying party having to store any biometric data or change their biometric infrastructure.

This “bring your own validated biometrics” approach is driving seamless digital travel, enabling people to seamlessly cross borders. This kind of “government-grade” digital identity is ideal for payments, domestic and international.

Cross-border technical interoperability

Decentralized identity both simplifies the architecture and workflows for sharing data. The first is accomplished by eliminating the need for direct integrations. If you trust the issuer of a credential (Bank A), you can trust the information in the credential, and connect the verifying software to internal systems through an API. This makes data portable and immediately actionable.

Second, it is easy to establish governance rules for how information in a credential is processed. This is because a) there’s a global specification for these governance rules, and b) the rules are encoded in machine-readable files propagated to issuers, holders, and verifiers alike.

In other words, a governance authority can publish a list of trusted credential issuers in a file and send it to every organization with verifying software. A merchant in a village with a mobile verifier on their phone is able to immediately authenticate whether a credential presented has come from a trusted organization. The file can be rapidly updated and, as it is cached, it can be configured to handle offline verification.

While the technical complexities of cross border transactions are not to be underestimated, decentralized identity — and specifically, decentralized ecosystem governance — can radically simplify workflows needed to deliver efficient, cost-effective real-time payments.

Seamless, connected experiences

When you combine Verifiable Credentials with a powerful communications protocol such as DIDComm (Decentralized Identifier Communications), you get even more flexibility. DIDComm enables two powerful features.

First, it is the engine that enables parties to mutually authenticate each other before exchanging any data.

The second is that it allows a mobile device to operate as if it had a very powerful API for data exchange, one that is much more secure than any conventional API. This is groundbreaking, as the inability (for a variety of technical reasons) of mobile phones to use APIs has limited their functionality.

When these two features combine, we have a very powerful way to integrate services in a seamless, secure way. For example, a fintech AI could be permissioned to access and analyze account data in real time.

But the point is that it makes it easy to permission and process any kind of complex workflow between parties; it turns digital wallets and their owners into verifiable data platforms.

Platformless infrastructural transformation

Verifiable Credentials are not a platform. They are not stand-alone systems that replace existing infrastructure; they are, rather, a set of tools you drop into existing systems. Just as a catalytic converter renders harmful emissions less harmful, Verifiable Credentials make the digital data you already have verifiable, portable, private, and secure — and they do so without this data being stored or controlled by the tech developer.

This is critical for data privacy compliance, transparency, and trust. It is the key to why decentralized identity can scale to, and interoperate as, cost-effective global digital infrastructure accessible to all.

The challenge

The travel sector is rapidly transitioning to decentralized identity and “government-grade” digital identities in order to deliver streamlined and more secure customer experiences as global air passenger numbers are set to double in the near future. Airlines and airports get it.

For finance, the challenge is first, to understand how powerful this technology is and how easily it can be deployed to manage the complex tangle of regulatory and technical challenges across multiple stakeholders; second, to then make the policy decisions to allow implementation.

In this, the technology is, in many ways, the easy bit; it’s the talking and coordinating that’s hard.

But there is an incentive for everyone to align around: reducing the cost of cross border remittances are a Sustainable Development Goal (SDG10) — and the clock is ticking on 2030. The savings are considerable; the impact of these savings, life transforming. The time to implement Verifiable Credentials has never been better.

We can do it; we can do it quickly. Contact the Indicio team to get started here.

Sign up to our newsletter to stay up to date with the latest from Indicio and the decentralized identity community

The post How to put billions into people’s pockets by transforming cross-border payments with Verifiable Credentials appeared first on Indicio.


FastID

Thanks to the internet’s on-call teams

Thank you for the essential role that on-call teams play in ensuring internet reliability and security, particularly during the holiday season. We appreciate your dedication.
Thank you for the essential role that on-call teams play in ensuring internet reliability and security, particularly during the holiday season. We appreciate your dedication.

Monday, 06. January 2025

Finicity

New report: Building trust in the age of open banking

To gain even greater insight into business and consumer views of open banking, Mastercard and the Harris Poll recently conducted a survey in the U.S., U.K., Nordic and Australian markets.… The post New report: Building trust in the age of open banking appeared first on Finicity.

To gain even greater insight into business and consumer views of open banking, Mastercard and the Harris Poll recently conducted a survey in the U.S., U.K., Nordic and Australian markets.

The survey delves into open banking usage and momentum at large, including drivers and barriers to adoption, top use cases for today and tomorrow and the most important factors to consider when choosing an open banking partner.

Explore some of the highlights or download the full report here.

The post New report: Building trust in the age of open banking appeared first on Finicity.


Elliptic

2025 Crypto regulatory and policy outlook: 5 Trends to expect for the year ahead

With the coming of the New Year there’s no better time to look ahead at what’s in store in the ever-changing world of crypto policy and regulation. 

With the coming of the New Year there’s no better time to look ahead at what’s in store in the ever-changing world of crypto policy and regulation. 


liminal (was OWI)

2024 Reflections: Major Trends and How Our Predictions Stood the Test of Time

Now that 2024 has come to a close, it’s the perfect time to reflect on the digital identity landscape and evaluate how the year’s trends have shaped the market. In our annual tradition, we look back on our predictions at the start of the year and assess how they measure up against reality. This year, […] The post 2024 Reflections: Major Trends and How Our Predictions Stood the Test of Time appea
Now that 2024 has come to a close, it’s the perfect time to reflect on the digital identity landscape and evaluate how the year’s trends have shaped the market. In our annual tradition, we look back on our predictions at the start of the year and assess how they measure up against reality. This year, instead of rating each prediction individually, we’ll focus on the major industry trends and discuss how our forecasts align with them.

2024 has been a transformative year for Liminal as well. As a technology company offering market and competitive intelligence through our Link Platform, we’ve empowered businesses with actionable insights to navigate these trends. Let’s explore the major takeaways from 2024 and how our predictions fared.

2024 Reflections in Digital Identity The Big Picture: 2024 Reflections in Digital Identity

The cybersecurity and digital identity space continued to experience rapid growth, innovation, and regulatory scrutiny in 2024. Key trends included:

Trust & Safety Become Core to Platform Integrity: Social media platforms prioritized Trust & Safety initiatives, with age assurance and age verification emerging as critical capabilities to address regulatory pressures, user demands, and platform integrity. Convergence of Identity and Cybersecurity: The increasing sophistication of identity-based threats and deepfakes drove the convergence of cybersecurity and identity solutions, with advancements in frameworks, content provenance, and fraud prevention capabilities leading the way. Evolving Regulatory Landscapes: Global regulations targeting AI privacy, age assurance, and data usage placed organizations under greater scrutiny, requiring them to balance compliance, innovation, and ethical practices to maintain market credibility. Market Consolidation and Innovation: Strategic acquisitions and private equity investments reshaped the identity and fraud markets, with adjacent players like Visa, Experian, and Mastercard driving innovation, while identity-first vendors expanded their market influence. The Continued Struggle for Reusable Identity Adoption. Despite the promise of reusable identity networks, slow consumer uptake and market pivots highlight ongoing challenges in achieving scalability and trust for widespread adoption.

These trends underscored the market’s complexity and opportunity, shaping the decisions of buyers, providers, and investors alike.

“2024 marked a pivotal year in the fight for digital trust. Breakthroughs in age assurance, AI-driven deepfake detection, and passkeys laid the foundation for a safer, more authentic online ecosystem. At Liminal, we turned complexity into clarity—empowering businesses to navigate these shifts with confidence and shape the strategies that protect integrity in the digital age.”
Jennie Berry, Liminal

Revisiting Our 2024 Predictions

Our 2024 predictions, which drew on the collective expertise of the Liminal team, anticipated many of these developments. Here’s how they aligned with the year’s major trends:

Age Assurance as a Core Pillar for Trust & Safety Convergence of Identity and Cybersecurity Market Consolidation Regulatory Shifts Continued Struggle for Reusable Identity Adoption 1. Age Assurance as a Core Pillar for Trust & Safety

Our prediction that major social media platforms would initiate voluntary age verification has proven mostly correct, as platforms like Meta and Snapchat have taken significant steps to enhance age assurance measures, including testing tools such as biometric-based age estimation and document verification to comply with growing regulatory pressures. According to Liminal’s 2024 B2B survey of age assurance practitioners, in regulated sectors, age verification coverage is expected to grow from 60% to 66%, while unregulated industries are moving faster, with adoption rising from 64% to 73% in the next year. This shift reflects the growing recognition of age assurance as essential for Trust & Safety, even outside traditionally regulated areas. 

While we anticipated a blow to state-level regulations in the U.S., the outcome has been mixed. We use Link’s Market Monitor to anticipate actionable impacts of proposed legislation, and although the Supreme Court has yet to rule on this issue decisively, recent developments—such as Florida’s new HB 3 bill mandating parental consent for minors under 14 to access social media —demonstrate states’ continued attempts to impose online protections. Internationally, Australia introduced the world-first legislation in its Online Safety Act, which bans children younger than 16 from platforms including X, Instagram, Facebook, and TikTok. 

Age Assurance has emerged as a core focus of our coverage and research this year, driven by its critical role in Trust & Safety initiatives across digital platforms. Throughout the year, we’ve closely tracked market sentiment through buyer surveys, which highlight the growing demand for solutions that balance regulatory compliance, user experience, and platform integrity. The gap between understanding and effectively implementing age assurance regulations presents a significant challenge for businesses, with confusion around the scope of specific regulations being a major issue. 46% of practitioners incorrectly identify the Children’s Internet Protection Act (CIPA) – which primarily applies to schools and libraries – as one of the top regulations impacting businesses. Our Link Use Case Explorer includes an analysis of product capabilities and technical features, including a detailed view of how solutions are evolving to meet the stringent requirements of this use case, such as biometric age estimation, data enrichment, and parental consent tools. At the same time, we’ve identified key technology gaps—particularly in accuracy and user experience—that remain opportunities for innovation. By mapping the capabilities of emerging technologies to real-world buyer needs, we’ve gained a clear view of how the market is maturing to address the complexities of age assurance, setting the stage for future advancements that ensure safer digital environments for all users.

2. Convergence of Identity and Cybersecurity

Our predictions regarding the convergence of digital identity and cybersecurity were largely correct, with developments across deepfake mitigation, bot detection, and authentication. 

Deepfakes are more prevalent today than ever before due to a combination of technological advancements and increased accessibility to AI-powered tools. The proliferation of generative AI models, such as GANs (Generative Adversarial Networks) and large language models, has enabled the creation of hyper-realistic audio, video, and image content with minimal expertise or resources. The rapid spread of misinformation on social platforms and the rise of identity-based attacks, such as impersonation fraud and synthetic identities, have made deepfakes an increasingly potent tool for bad actors targeting individuals, organizations, and even nation-states. Solutions that integrate identity verification tools—such as biometric authentication, liveness detection, and digital watermarking—combined with cybersecurity techniques like content provenance, anomaly detection, and cryptographic hashing are essential to detect and authenticate the origin and integrity of digital media. Based on survey data conducted in Liminal’s 2024 Seminar Research Report: The Market for Identity Authorization Networks, 88% of financial services institutions expect GenAI fraud and deepfakes to grow substantially over the next two years. New frameworks and consortiums have emerged to combat deepfakes, and in the Solution Segment for User-Generated Content Moderation within our Liminal Landscape, we are tracking the Content Authenticity Initiative and Coalition for Content Provenance and Authenticity (C2PA), which have made progress in establishing technical standards for identifying manipulated media.

Midjourney Image Generations Over Time – Liminal’s 2024 Seminar Research Report: The Market for Identity Authorization Networks

Our prediction that Chrome’s third-party cookie deprecation would drive demand for bot detection was incorrect, as Google has decided not to phase out third-party cookies. However, as companies shift toward first-party ad strategies, there remains a heightened requirement to ensure that all website impressions are legitimate. The growing reliance on first-party data amplifies the need for identity-centric approaches to cybersecurity, particularly in bot detection. Automated threats like ad fraud, fake traffic, and click bots can severely undermine the accuracy and value of first-party strategies, impacting advertising ROI and business performance. Organizations are adopting advanced solutions such as behavioral analytics, device fingerprinting, and real-time anomaly detection to differentiate between genuine users and malicious bots to combat this. By ensuring the legitimacy of website impressions, businesses protect their advertising investments and reinforce trust and data integrity in an increasingly privacy-driven digital landscape.

Finally, while passkeys have gained traction, particularly with big tech players like Google and Apple, our prediction remains correct that they remain largely secondary authentication methods rather than primary solutions, as adoption faces challenges in user behavior and enterprise readiness. Passkeys are a form of passwordless authentication that leverages public key cryptography to verify a user’s identity without requiring a traditional password. According to Liminal’s 2024 B2B surveys of authentication practitioners, despite nearly 100% of businesses that have yet to adopt passkeys expressing a willingness to transition to them, only about a third are expecting to do so in the next two years. Our ongoing research on a passwordless future highlights the critical role that CISOs and IT leaders can play in promoting the internal adoption of passkeys within the workforce. We hypothesize that workforce adoption can catalyze widespread customer deployments by proving their effectiveness, ease of use, and security benefits in real-world environments. This workforce-first approach enhances identity-centric cybersecurity by removing the vulnerabilities associated with passwords and helps organizations build trust and familiarity with passkey solutions.

Buyer Barriers to Passwordless Implementation – Liminal’s Q2 2024 Investment Trends Report

3. Market Consolidation

Our predictions around market consolidation were partially correct, with significant activity but slightly different dynamics than anticipated. While at least two publicly traded identity companies did choose to go private—such as Proofpoint’s acquisition by Thoma Bravo and ZeroFox’s buyout by Haveli Investments—the broader trend focused on strategic acquisitions.

Key deals like Visa’s acquisition of Featurespace and Experian’s acquisition of NeuroID and ClearSale highlight how financial giants integrate advanced fraud prevention and behavioral analytics capabilities into their platforms. Mastercard’s acquisition of Recorded Future also points to a growing appetite for cybersecurity and identity intelligence convergence. We also saw Entrust’s acquisition of Onfido for up to $600M, despite prior speculation to IPO over $1B. 

However, our expectation that Okta and Ping would aggressively expand into identity verification and fraud prevention—particularly at account opening—was only partially realized. While both expanded capabilities, their focus remained on core IAM/CIAM, leaving traditional identity verification players like Socure, Prove, and others to capture significant market share in fraud prevention and onboarding solutions. The acquisitions and private equity activity seen this year reaffirm that the market is consolidating, but the momentum is being driven by adjacent entrants and strategic investors looking to integrate identity and fraud solutions into larger ecosystems rather than large-scale mergers within the digital identity space.

Market Consolidation – Exit deal volume and size – Liminal’s Q3 2024 Investment Trends Report

4. Regulatory Shifts

Our predictions regarding regulatory shifts were only somewhat correct, particularly in relation to generative AI and its impact on privacy and data advantage. As generative AI adoption surged, organizations faced increasing privacy concerns and regulatory scrutiny. For instance, the EU’s AI Act introduced strict guidelines around data usage, transparency, and accountability in generative AI systems, while jurisdictions like California pushed forward tech regulations to safeguard personal data from misuse in AI training models. 

Simultaneously, companies struggling to articulate their unique data advantage in the generative AI space encountered notable market criticism. This was particularly evident with firms unable to differentiate their AI solutions from competitors or justify the quality of their proprietary datasets, leading to investor skepticism and concerns about overinflated claims. These developments reaffirm that regulatory shifts are driving organizations to strike a balance between AI-driven innovation, privacy protections, and transparency, with a clear data advantage increasingly serving as a competitive differentiator.

5. Continued Struggle for Reusable Identity Adoption

Unfortunately, our prediction that reusable identity networks would not gain consumer adoption in 2024 was correct, as significant hurdles around scalability, trust, and consumer behavior persisted. Notably, Mastercard has lost momentum with its ID Network, reflecting the challenges even well-funded, globally recognized players face in driving the adoption of reusable digital identities. Sovrin, a pioneer in self-sovereign identity, is preparing to deprecate its MainNet ledger by April of this year, signaling technological hurdles and a marked reduction in transaction activity. Trinsic, a startup that sought to enable decentralized identity solutions, shifted its focus away from its original vision, citing slow market readiness and unclear demand. These developments underscore the difficulty of achieving network effects, interoperability, and end-user trust required for reusable identity solutions to thrive. While reusable identity networks continue to show promise, particularly in niche ecosystems or regulated environments, the broader market remains hesitant, and adoption struggles have reinforced the need for clearer value propositions, regulatory support, and incentives to drive consumer engagement.

Liminal’s Role in 2024: Turning Complexity into Clarity with Actionable Market and Competitive Intelligence

2024 marked Liminal’s full transformation into a technology company, with our Link Platform at the center of our offerings. Combining human expertise with AI-driven insights provided actionable market and competitive intelligence to practitioners, solution providers, and investors looking for technologies that identify and protect their customers and businesses. Key highlights of our impact include:

Driving Strategic Decisions: Our platform enabled clients to anticipate market shifts and capitalize on emerging trends. Enabling Growth and Compliance: By leveraging Liminal’s research, businesses implemented scalable solutions that balanced innovation with regulatory adherence. Building Connections: The Link Platform created a centralized place for buyers and providers to connect, fostering collaboration and unlocking new opportunities.

Liminal remains committed to delivering actionable future intelligence as we move forward, helping our clients stay ahead in an ever-evolving market. Watch out for some bold moves we’re about to make to give our customers an unfair competitive advantage. 

As we reflect on the past year, we’re also looking ahead to 2025. Our upcoming blog will explore the predictions shaping the digital identity landscape for the next year, offering a forward-looking perspective grounded in the events and signals we continue to monitor. Together, we can unlock new opportunities and drive meaningful impact in the digital identity space.

Discover how the Link Platform can help you stay ahead of market trends. Learn More or Sign-Up for a Free Account.

Subscribe to our newsletter to stay current on research, events and the latest product updates.

The post 2024 Reflections: Major Trends and How Our Predictions Stood the Test of Time appeared first on Liminal.co.


Ontology

Ontology Network Weekly Update

Dec 30, 2024 — Jan 6, 2025 As we kick off 2025, here’s everything you need to know about Ontology’s latest developments, the growing influence of decentralized identity, and our plans for the future. Highlights from Ontology Network 🌐 🎤 Exclusive: Geoff’s Chat with Santa This holiday season, we brought some blockchain magic to the North Pole! In a lighthearted and insightfu
Dec 30, 2024 — Jan 6, 2025

As we kick off 2025, here’s everything you need to know about Ontology’s latest developments, the growing influence of decentralized identity, and our plans for the future.

Highlights from Ontology Network 🌐 🎤 Exclusive: Geoff’s Chat with Santa

This holiday season, we brought some blockchain magic to the North Pole! In a lighthearted and insightful conversation, Geoff sat down with Santa to talk about decentralization, self-sovereign identity, and how blockchain could streamline gift deliveries.

💸 Get $ONT in ChangeNOW Wallet

Managing your ONT tokens just got easier! Now you can secure $ONT directly in the ChangeNOW wallet, simplifying your transactions and opening new doors to Ontology’s ecosystem.

🏆 Zealy Winners Announced!

Our Zealy winners have been revealed! Check your wallet — you might just find your well-deserved rewards waiting for you. Congratulations to everyone who participated in making this campaign a success!

This Week in Decentralized Identity Redefining Digital Identity in a Decentralized World

A recent report sheds light on the limitations of centralized identity systems. These legacy approaches often struggle with security, scalability, and privacy in today’s digital era. Enter Distributed Identities, which leverage technologies like network segmentation, zero trust principles, and dynamic user access controls to deliver a future-ready identity management framework.

Web3: The Key to Digital Rights and Privacy in 2025

Web3 and blockchain are redefining privacy and data ownership. Edison Chen, CEO of CUDIS, a Web3 health and wellness company, highlights how decentralized identity solutions empower users to take control of their data — and even monetize it. This shift from corporate-owned data to individual autonomy is a cornerstone of the Web3 revolution.

Historically, big companies have controlled user data, often monetizing it without consent. That’s changing. People now want to own their data and decide how it’s shared and monetized.
Updates from the Decentralized Identity Foundation (DIF)

The Decentralized Identity Foundation (DIF) has launched DIF Labs, a forward-looking initiative to advance the development and scalability of decentralized identity solutions. This reinforces DIF’s mission to drive innovation and reshape digital identity on a global scale.

These updates emphasize the rapid progress in the decentralized identity space, pushing boundaries and empowering individuals with privacy-first solutions.

Community Updates 🌍 Engagement and Growth

With the holiday season in full swing, we paused our weekly discussions to let everyone enjoy time with family and friends. Wishing you all a wonderful start to the new year — thank you for making 2024 an unforgettable chapter in our journey!

Stay Connected 📱

Stay engaged and informed by following us on our social media channels. Your participation is essential as we continue to build a more secure and inclusive digital world together.

Follow us: Ontology website / ONTO website / OWallet (GitHub) / Twitter / Reddit / Facebook / LinkedIn / YouTube / NaverBlog / Forklog / Telegram / Announcement / Telegram English / GitHubDiscord

Your participation is essential as we build a more secure, inclusive, and decentralized digital world. Together, let’s continue making strides in Web3 and decentralized identity.

Ontology Network Weekly Update was originally published in OntologyNetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.

Friday, 03. January 2025

liminal (was OWI)

Everybody Works in TPRM: The Multi-Billion Dollar Industry Lacking a True Organizational Champion

The post Everybody Works in TPRM: The Multi-Billion Dollar Industry Lacking a True Organizational Champion appeared first on Liminal.co.

If It Is Broken, Fix It: A Deep-Dive into TPRM Due Diligence

The post If It Is Broken, Fix It: A Deep-Dive into TPRM Due Diligence appeared first on Liminal.co.

IDnow

Is efficiency and trust AI’s Achilles heel?

Learn more about IDnow’s latest collaborative project, ACHILLES, which sets out to revolutionize the development and use of AI throughout Europe. In a world where artificial intelligence is becoming increasingly integrated into our daily lives, the importance of having access to transparent, robust and sustainable AI increases. Inspired by the legend of the mythological warrior, […]
Learn more about IDnow’s latest collaborative project, ACHILLES, which sets out to revolutionize the development and use of AI throughout Europe.

In a world where artificial intelligence is becoming increasingly integrated into our daily lives, the importance of having access to transparent, robust and sustainable AI increases.

Inspired by the legend of the mythological warrior, the ACHILLES project aims to tackle the traditional limitations and weaknesses of AI, which are typically considered to be efficiency and trust.

With funding of over €8 million from Horizon Europe, and collaboration between 16 partners including IDnow, ACHILLES will run for a four year period (2024-2028) and focus on four areas:

People: Promoting ethical, transparent and explainable AI.

Data: Reducing the use of real data through the use of synthetic alternatives.

AI models: Optimizing efficiency and guaranteeing fairness.

Deployment: Ensuring sustainable, regulatory-compliant implementation.

With ACHILLES, we want to put people at the heart of AI innovation. Our aim is to ensure that every technology not only performs well, but is also transparent and ethical, to inspire trust in the long term.

André Carreiro, Project Coordinator and Researcher at Fraunhofer AICOS (Portugal).
The 6 objectives of the ACHILLES project. Identify ethical and legal frameworks in order to design AI systems that are based on human values. Create frameworks to guarantee high quality, diverse and representative data for AI use. Protect consumer privacy when using data and models in machine learning. Optimize AI model training and deployment processes to reduce energy and IT costs. Enable the development of robust and transparent algorithms. Offer researchers and developers an integrated development environment based on machine learning to facilitate efficient, regulatory-compliant and trustworthy AI. What sectors is ACHILLES focused on?

The ACHILLES project will focus on creating multiple use cases across various industries, including healthcare by optimizing models to provide faster and more reliable diagnostics, and identity verification by developing more secure, privacy-friendly solutions. By ensuring compliance with regulations, ACHILLES will also offer use cases as far and wide as content creation and pharmaceutical development.

Plus, by aligning with the ethical standards of the European Union, ACHILLES demonstrates that innovation and responsibility can, in fact, coexist to create trusted AI. The ACHILLES project is split into three major milestones.

Year 1 (2024-2025): Define use cases and specifications, start of technical developments.

Year 2 (2025-2026): Continue technical developments, assessment of project use cases.

Years 3 and 4 (2026-2028): Implement and evaluate the efficacy of ACHILLES solutions on project use cases.

IDnow’s role in the ACHILLES project.

As a leader in the European identity verification market, IDnow’s chief role in the project is to provide identity verification expertise and work to maximize the efficiency of datasets that comply with privacy standards, including GDPR. This includes:  

Creating synthetic data that is representative of real data.   Optimizing data annotation to minimize human resources and guarantee reliable results.   Renewing datasets without affecting model performance.  

Throughout the project IDnow will be evaluating ACHILLES innovations on real-life use cases linked to identity verification. These tests will enable us to improve the robustness of our algorithms and propose more reliable, secure and privacy-friendly solutions.

Thanks to the ACHILLES project, we hope not only to improve the quality and robustness of our algorithms, but also to reduce dependence on real data. This represents a major step toward more sustainable and regulatory-compliant AI.

Montaser Awal, Director of Research at IDnow.

The ACHILLES project marks a decisive step in the development of sustainable, human-centered AI. With its multidisciplinary approach and rigorous framework, it promises to lay the foundations for a more transparent and safer artificial intelligence that meets the needs of tomorrow. Stay tuned: the first results will be available in 2026!  

Find out more about our other research projects, including Soteria, which investigated the feasibility of balancing digital security with user privacy.

By

Mallaury Marie
Content Manager at IDnow
Connect with Mallaury on LinkedIn


liminal (was OWI)

From Insight to Action: Enhancing Actionable Outcomes in Third-Party Risk Management

The post From Insight to Action: Enhancing Actionable Outcomes in Third-Party Risk Management appeared first on Liminal.co.

Safle Wallet

Safle: 2024 Year in Review

As we step into 2025, it’s the perfect time to reflect on the incredible journey we shared in 2024. This year has been a testament to Safle’s commitment to innovation, strategic partnerships, and empowering our community. Thank you for being an integral part of our mission to shape the future of Web3. 💰Funding Milestone In 2024, SAFLE successfully secured private funding from investors base

As we step into 2025, it’s the perfect time to reflect on the incredible journey we shared in 2024. This year has been a testament to Safle’s commitment to innovation, strategic partnerships, and empowering our community. Thank you for being an integral part of our mission to shape the future of Web3.

💰Funding Milestone

In 2024, SAFLE successfully secured private funding from investors based in the Republic of Ireland through equity sales, achieving a combined valuation of $77 million USD. This financial backing will accelerate SAFLE’s expansion plans for 2025.

👉 Know More!
🏦LBank Listing

We celebrated our debut centralized exchange (CEX) listing on LBank, bringing greater accessibility and liquidity to $SAFLE.

👉Know More!
🌐Safle at India Blockchain Week 2024

Hosted 3 events VC’s Afterhours, Founder’s Afterhours and BTC 100K Afterparty

🤝Safle at Devcon SEA and Token2049 Singapore

Safle had the privilege of attending Devcon SEA and Token49 Singapore, where we connected with global Web3 innovators, showcased our cutting-edge wallet solutions, and explored collaborative opportunities. These events reinforced our commitment to keep building and deliver next-gen solutions for the community.

⚙️Product Updates Safle Wallet Enhancements

⛓️New Chains Integrated: Now supporting Polygon zkEVM, Base, Avalanche, Solana, Rootstock, BEVM, opBNB, Ronin, Sei, Skale (Nebula), and Immutable zkEVM.

🤝WalletConnect Support: Seamlessly link Safle Wallet with any dApp.

☮️Decentralized Onboarding: No emails required! Onboard securely with Safle ID.

🌐In-App dApp Browser: Simplified dApp interactions within the wallet.

🔁Cross-Chain Swaps: Effortlessly swap assets across blockchain networks in one platform.

📱Mobile App Revamp: Light/dark mode toggle and a refreshed UI for a sleek user experience.

Safle Lens v1.0 Launched

Safle Lens, our view-only crypto portfolio tracker, now supports 12+ EVM chains, enabling real-time analytics for tokens, NFTs, and transactions.

👉See Announcement
Key Features:

🔎Comprehensive Insights: Track tokens, NFTs, and transaction history without logging in.

🤖Safle AI Integration: Token-specific queries and blockchain insights powered by AI.

🚨Spam Detection: Automatic filtering of suspicious tokens for enhanced security.

📜NFT Overview: Real-time collection tracking across EVM chains.

📃Detailed Analytics: Portfolio health metrics and transaction history.

🤝Strategic Partnerships The Binary Holdings

Safle is excited to announce a strategic investment from The Binary Holdings, positioning Safle as the default wallet for 169 million users across Southeast Asia. This partnership combines Safle’s multichain wallet with The Binary’s enterprise reach to drive mass Web3 adoption and bridge traditional and digital economies.

Zokyo

Safle partnered with Zokyo.io for robust security audits, ensuring top-notch infrastructure protection.

Moralis

Integration with Moralis.io enables automatic data detection across EVM chains, elevating asset management.

Rootstock

Send, Receive tokens and access dApps on Rootstock natively via SafleID, as safleID now supports Rootstock chain!

Other Partnerships

Coin Liquidity Crypto Oasis BEVM QuickSwap 🎉 Community Engagement & Growth

Our community growth has been phenomenal in 2024:

Telegram: +134% X (formerly Twitter): +49% Discord: +2400% Galxe Campaign

Thanks to our vibrant community for making the Galxe campaign a success! Participants enjoyed rewards by downloading the Safle Wallet and creating a SafleID.

Engagement Activities

We introduced quizzes, polls, and puzzles to foster community interaction, yielding impressive participation rates and bolstering long-term retention.

🎁 Grants Spotlight

We’re excited to support grantees like Innoteg and Tokenscapes with $5,000 worth of SafleID registrations. These grants enable seamless integration of SafleID into their platforms, advancing digital identity solutions within the gaming and Web3 industries.

🎮 Safle ID for Web3 Gaming

We’re reimagining Safle ID with a focus on gaming. SafleID offers seamless digital identity integration for Web3 games, creating new avenues for innovation.

👉Know More!

📚 Documentation & Resources

Explore our newly launched product documentation:

👉 SafleID
👉 Safle Vault
👉 Safle Wallet

Thank you for supporting Safle’s mission to build the future of Web3! Here’s to more innovation and growth in 2025.

Stay Connected


uquodo

Why Are Anti-Money Laundering Services Essential for Your Business Growth?

The post Why Are Anti-Money Laundering Services Essential for Your Business Growth? appeared first on uqudo.

Metadium

Metadium 2024 H2 Activity Report

Dear Community, As we conclude the second half of 2024, we want to look back and share Metadium’s journey with you. Metadium has maintained continuous growth and innovation thanks to your unwavering interest and participation. Through this report, we would like to share the major achievements and developments from the year’s second half. Summary The fourth quarter of 2024 saw a total of 1

Dear Community,

As we conclude the second half of 2024, we want to look back and share Metadium’s journey with you. Metadium has maintained continuous growth and innovation thanks to your unwavering interest and participation. Through this report, we would like to share the major achievements and developments from the year’s second half.

Summary

The fourth quarter of 2024 saw a total of 1,726,792 transactions, and 67,607 DID wallets created. 2025–27 Circulation Disclosure and Distribution Plan has been announced. The Metadium governance Contract has been updated. A year-end event for the community has been hosted.

Technology

Q4 Monthly Transactions

During the fourth quarter of 2024, there were a total of 1,726,792 transactions, and 67,607 DID wallets (as of December 31).

Governance Update

To provide a safer and more reliable blockchain environment, the Metadium Governance Contract has been updated.

For more details, check here.

Supply Plan

We have announced a new circulation plan for 2025–2027. The annual circulation will be appropriately distributed among Miner rewards, maintenance, ecosystem activation, and foundation operating expenses to maintain a balanced ecosystem.

For more details, please check here.

Year-End Quiz Event

We conducted a year-end quiz event to give back to our community for the love we received throughout the year.

For more details, please check here.

As we wrap up the year, we extend our heartfelt gratitude to everyone who has been part of Metadium’s journey. We will continue to build a more robust and reliable blockchain ecosystem based on transparency and innovation. Your opinions and feedback are our greatest driving force; we will continue growing with you.

안녕하세요, 메타디움 팀입니다.

2024년 하반기를 마무리하며, 메타디움의 발자취를 돌아보고 함께 나누고자 합니다. 여러분의 변함없는 관심과 참여 덕분에 메타디움은 지속적인 성장과 혁신을 이어갈 수 있었습니다. 이번 리포트를 통해 하반기의 주요 성과와 발전 사항을 상세히 공유드립니다.

요약

2024년 10월부터 12월 간 총 1,726,792 건의 트랜잭션과 67,607 개의 DID 월렛이 생성되었습니다. 2025년- 2027년 유통량 공시 및 배분 계획을 발표했습니다. 보다 안전하고 신뢰할 수 있는 블록체인 환경을 제공하기 위해 메타디움 거버넌스 컨트랙트의 업데이트를 진행했습니다. 커뮤니티 활성화를 위해 2024년 연말 퀴즈 이벤트를 진행했습니다.

기술 업데이트

Q2 월간 트랜잭션

2024년 10월부터 12월 간 총 1,726,792 건의 트랜잭션과 67,607 개의 DID 월렛이 생성되었습니다.

거버넌스 컨트랙트 업데이트 진행

보다 안전하고 신뢰할 수 있는 블록체인 환경을 제공하기 위해 메타디움 거버넌스 컨트랙트의 업데이트가 진행되었습니다. 이번 업데이트는 거버넌스 투표가 완료된 후 적용되었으며, 주요 내용은 다음과 같습니다.

2025–2027년 유통량 공시 및 배분 계획 발표

2025년부터 2027년까지의 새로운 유통량 계획을 발표했습니다. 각 연도별 유통량은 Miner 보상, 유지보수, 생태계 활성화, 재단 운영비에 적절히 분배될 예정이고 이는 균형 있는 생태계를 유지하기 위한 계획입니다.

자세한 내용은 여기를 확인해보세요.

연말 퀴즈 이벤트 진행

메타디움이 한해동안 받은 사랑을 돌려드리기 위해 연말 퀴즈 이벤트를 진행했습니다.

자세한 내용은 여기를 확인해보세요.

한 해를 마무리하며, 메타디움과 함께해 주신 모든 분들께 진심 어린 감사의 마음을 전합니다. 우리는 앞으로도 투명성과 혁신을 바탕으로, 더욱 견고하고 신뢰할 수 있는 블록체인 생태계를 구축해 나가겠습니다. 여러분의 의견과 피드백은 우리의 가장 큰 원동력이며, 앞으로도 여러분과 함께 성장하는 메타디움이 되도록 하겠습니다.

— 메타디움 팀

Website | https://metadium.com

Discord | https://discord.gg/ZnaCfYbXw2

Telegram(EN) | http://t.me/metadiumofficial

Twitter | https://twitter.com/MetadiumK

Medium | https://medium.com/metadium

Metadium 2024 H2 Activity Report was originally published in Metadium on Medium, where people are continuing the conversation by highlighting and responding to this story.

Thursday, 02. January 2025

playhaus.tv

24 – Pirate Queen of the Pacific | Weekly Mojo w/ Madison Jesseka


UNION AVATARS

The Best Ebooks for Understanding the Virtual Worlds

The Metaverse, an interactive virtual space created by augmented reality and virtual reality (AR/VR) tech that seamlessly integrates digital and physical environments, […] The post The Best Ebooks for Understanding the Virtual Worlds appeared first on Union Avatars.
The Metaverse, an interactive virtual space created by augmented reality and virtual reality (AR/VR) tech that seamlessly integrates digital and physical environments, is rapidly expanding

A Grand View Research report has estimated that the global Metaverse market size had a value of $82.02 billion in 2023 and is expected to grow until 2030. Promoting immersive experiences is one of the critical features of this virtual space. Our previous article Who Can I Be in the Metaverse?  discusses how users can personalize avatars to interact with others in the Metaverse and highlights opportunities to expand customization options to promote diversity and inclusivity. 

Although tech innovations drive the Metaverse’s growth, many people still lack an awareness of its full potential. In the US, YouGov research shows only 12% of respondents fully know about the Metaverse, while only two in five partially understand it. Luckily, several resources are available to help introduce the Metaverse to curious minds, including ebooks. Below, we look at why ebooks are helpful and recommend the best titles for understanding the Metaverse.

Why ebooks?

Our tech-driven society has enabled the digital world to intertwine with our lives, and ebooks are one example of how tech makes daily tasks like reading more convenient. Research published in Springer Open found that the interactive features of ebooks, like highlighting and annotating text, are more efficient in helping readers learn about complex concepts like artificial intelligence compared with other forms of books. If you’re wondering where to access them, Everand hosts a wide range of tech-related ebooks to help you understand the Metaverse, including Mark Van Rijmenam’s Step into the Metaverse and Jaron Lanier’s Dawn of the New Everything. Readers can customize their reading experience by adjusting font sizes and highlighting relevant passages. If you want a range of options, other platforms like Libby might also provide access to titles about the Metaverse through your local library’s ebook catalog.

Here are some titles to check out:

Ebooks on the Metaverse and virtual worlds The Metaverse Handbook by QuHarrison Terry and Scott Keeney

There’s nothing like learning from the best. In this ebook, tech and culture experts QuHarrison Terry and Scott Keeney highlight the fundamental concepts of the Metaverse, its history, and how to leverage its opportunities to your advantage. The Metaverse Handbook provides case studies of over 100 Metaverse creators and offers concise and actionable insights into navigating, exploring, and implementing emerging Metaverse tech like blockchain, making it an essential read for beginners.

Navigating the Metaverse by Cathy Hackl, Dirk Lueth, and Tommaso Di Bartolo

Research shows that nearly a third of US adults are scared of the Metaverse. To help soothe these fears and foster more understanding, Navigating the Metaverse provides a comprehensive guide and valuable tips on navigating the Metaverse economy and launching an effective Metaverse project. This ebook offers business executives and innovators helpful knowledge on existing frameworks that can capitalize on the Metaverse’s innovative features for their businesses, including spatial computing and Web3 technology. 

Dawn of the New Everything by Jaron Lanier 

Learning about VR as a foundation for developing the Metaverse is essential in understanding how immersive technology can shape the future of the digital space. In Dawn of the New Everything, the father of virtual reality, Jaron Lanier, explores the power and potential of VR and how it impacts not only the Metaverse but also our daily lives. It’s an essential read for those interested in understanding the Metaverse’s key components.

Step into the Metaverse by Mark Van Rijmenam

Perfect for readers who want to understand the business side of the digital space, Mark Van Rijmenam’s Step into the Metaverse explores the untapped potential for Metaverse entertainment. Rijmenam examines the Metaverse’s potential to unlock a trillion-dollar social economy and the challenges that come with it. The ebook also provides commentaries on potential risks, including data breaches, avatar imposters, and surveillance, highlighting the need for a Metaverse law.

The idea of the Metaverse might be too confusing or overwhelming for beginners. With these ebooks, you’ll be well on your way to understanding the basics of the Metaverse and its incredible potential.

The post The Best Ebooks for Understanding the Virtual Worlds appeared first on Union Avatars.

Tuesday, 31. December 2024

Ockam

We didn’t fail because we haven’t Tryed

That’s a wrap to 2024 Continue reading on Medium »

That’s a wrap to 2024

Continue reading on Medium »

Monday, 30. December 2024

The Blockchain Company.io LLC

Sui: Delivering the Benefits of Web 2 with the Ease of Web 3

On August 10, 2024, I predicted the price of Sui (symbol SUI) would experience a 500%+ increase: Sui looks like it could hit $3.53 in the next 2-4 weeks. https://t.co/ii63Y99dKD#Crypto#cryptotrading #BTC#SUI$SUI$BTC — Robert Mourey Jr. (@r_mourey_jr) August 10, 2024

On August 10, 2024, I predicted the price of Sui (symbol SUI) would experience a 500%+ increase:

Sui looks like it could hit $3.53 in the next 2-4 weeks. https://t.co/ii63Y99dKD#Crypto#cryptotrading #BTC#SUI$SUI$BTC

— Robert Mourey Jr. (@r_mourey_jr) August 10, 2024

Although the trade timeline was inaccurate, my fundamental and technical analysis was spot on as SUI traded to a new all time high on December 14, 2024 of 4.85 $USD. What about SUI was and remains compelling?

Sui has engineered several industry 1st products including a zero-knowledge oauth2 login aptly called zkLogin and a Rust based smart contract language called Move. As a web 2 and blockchain engineer, I naturally gravitated towards these two products because they solve some of the greater challenges on the road to mass adoption.

What is zkLogin?

zkLogin enables users to transact on Sui using the familiar OAuth login flow, eliminating the friction of handling cryptographic keys or remembering mnemonics while using externally owned accounts (EOAs). With a bit of engineering ingenuity, zkLogin could enable instant and private identity authentication to extract billions of $USD locked up in antiquated ​customer onboarding flows all while paving a highway toward the post quantum era.

zkLogin Design Goals Streamlined onboarding: zkLogin enables you to transact on Sui using the familiar OAuth login flow, eliminating the friction of handling cryptographic keys or remembering mnemonics. Self-custody: A zkLogin transaction requires user approval via the standard OAuth login process--the OAuth provider cannot transact on the user's behalf. Security: zkLogin is a two-factor authentication scheme; sending a transaction requires both a credential from a recent OAuth login and a salt not managed by the OAuth provider. An attacker who compromises an OAuth account cannot transact from the user's corresponding Sui address unless they separately compromise the salt. Privacy: Zero-knowledge proofs prevent third parties from linking a Sui address with its corresponding OAuth identifier. Optional verified identity: A user can opt in to verify the OAuth identifier that was used to derive a particular Sui address. This serves as the foundation for a verifiable on-chain identity layer. Accessibility: zkLogin is one of several native Sui signature schemes thanks to Sui's cryptography agility. It integrates with other Sui primitives, like sponsored transactions and multisig. What is Move?

The most important feature of Move is it's ability to create smart contracts in a blockchain agnostic manner meaning it works seamlessly with all blockchains. Sui made a brilliant design choice in writing Move in Rust, and considering Microsoft plans to migrate its codebase to Rust, the implications and potential of Move are profound. Coupled with zkLogin, developers have unprecedented opportunity to engineer the future of public blockchain technology as the world rapidly accelerates into the post quantum era.

Move was originally created for the "Diem" blockchain and has evolved into a powerful, hghly expressive language with an execution layer offering unmatched efficiency.

Move's design enables unparalleled flexibility with it's object data model, composable dynamic fields, and programmable transaction blocks that allow up to 1024 separate homogeneous or heterogenous function calls per transaction. Coupled with zkLogin, Move provides the optimal developer and user onboarding experiences to foster the mass adoption of public blockchain technology. Learn more at Sui.io.


Shyft Network

Shyft Network’s 2024 Progress: Enabling Compliance, Protecting Privacy

The blockchain industry entered 2024 amidst transformative shifts driven by regulatory pressures and technological advancements. Virtual Asset Service Providers (VASPs) faced escalating compliance demands, compelling them to navigate a delicate balance between operational efficiency and the preservation of user privacy. Shyft Network emerged as a leader in this evolving landscape, delivering innov

The blockchain industry entered 2024 amidst transformative shifts driven by regulatory pressures and technological advancements. Virtual Asset Service Providers (VASPs) faced escalating compliance demands, compelling them to navigate a delicate balance between operational efficiency and the preservation of user privacy. Shyft Network emerged as a leader in this evolving landscape, delivering innovative solutions that address the industry’s most pressing challenges without compromising its foundational values.

A Turning Point in Crypto Compliance

For VASPs worldwide, the Financial Action Task Force (FATF) Travel Rule remained a pressing challenge. Compliance historically demanded cumbersome manual processes, often at the expense of operational efficiency and user trust. These outdated methods left exchanges and their customers exposed to potential breaches while struggling to meet evolving regulatory expectations.

Shyft Network addressed these issues head-on. In January, the company introduced its groundbreaking User Signing feature to the Veriscope Travel Rule solution. This innovation enabled VASPs to cryptographically verify wallet ownership while safeguarding user data. The technical leap bridged the gap between regulatory demands and the crypto community’s core values.

From Vision to Real-World Impact: Strategic Partnerships

The adoption of Shyft’s solutions spread rapidly across the industry. India’s burgeoning crypto market, navigating its own regulatory maze, became an early proving ground.

Giottus, one of the country’s leading exchanges, replaced manual verification processes with Veriscope’s automated system. Similarly, OmniEX, a prominent over-the-counter (OTC) desk, integrated Veriscope and User Signing to streamline operations for institutional clients.

OnMeta further showcased Veriscope’s adaptability by enabling seamless payment services for digital assets, while Mudrex exemplified how emerging platforms could build compliance infrastructure without sacrificing user experience.

Shyft Network’s collaborative efforts in 2024 extended to influential industry players. Chipper Cash, a platform enabling free cross-border payments and financial services for Africans, integrated Shyft’s Veriscope and User Signing solutions to comply with the FATF Travel Rule. This partnership underscored the potential for blockchain-powered compliance tools to support inclusive financial ecosystems.

These collaborations highlight Shyft’s impact in driving both technological and regulatory advancements globally, setting a benchmark for the industry’s future direction.

Advancing Technology for a Private Future

Beyond compliance, 2024 saw Shyft Network’s research arm also become a beacon of industry insight. In addition to the Veriscope Regulation bi-weekly newsletter, the Shyft Perspectives profound analysis of critical issues:

Global Crypto Regulatory Outlook for 2024: A detailed analysis of worldwide trends, including the European Union’s Transfer of Funds Regulation and developments in AML/KYC standards. L2 Solutions and Scalability: Exploring solutions to the blockchain trilemma, with insights into advancements and future prospects in Layer 2 technology. The Role of Zero-Knowledge (ZK) Protocols: Examining why ZK matters for blockchain’s future, emphasizing privacy, scalability, and anticipated innovations.

Guides like the “User Signing Guide,” “EU Transfer of Funds Regulation Overview,” and “Global Crypto Regulatory Outlook 2024” provided actionable insights for VASPs navigating these challenges. Explore these resources and insights at Shyft Publications and Shyft Newsroom.

A Culture of Education and Collaboration

Shyft Network complemented its technological advances with three major educational campaigns. The first focused on the implications of the Transfer of Funds Regulation, fostering dialogue and practical solutions among industry leaders. The second campaign centered around User Signing, exploring its implementation strategies and benefits for VASPs. Lastly, their in-depth report on Zero-Knowledge (ZK) protocols highlighted the critical role of privacy-preserving technology in the blockchain ecosystem.

The Road Ahead

As digital asset markets mature, the balance between regulatory compliance and privacy preservation will remain paramount. Shyft Network’s achievements in 2024 illustrate that these goals are not mutually exclusive. By delivering tools that prioritize privacy without compromising compliance, Shyft has proved that these two are complimenting rather than contradicting.

“It’s about maintaining crypto’s core values while meeting our obligations,” remarked one exchange operator. The sentiment underscores a broader shift: privacy-preserving compliance is no longer a lofty ideal but an attainable reality.

With regulatory landscapes evolving, challenges persist. However, Shyft Network’s 2024 innovations provide a blueprint for how crypto businesses can thrive without abandoning their foundational principles. By combining blockchain as the backbone of technology with cryptocurrency as the transactional fuel, Shyft illuminates a promising path forward.

About Shyft Network

Shyft Network powers trust on the blockchain and economies of trust. It is a public protocol designed to drive data discoverability and compliance into blockchain while preserving privacy and sovereignty. SHFT is its native token and fuel of the network.

Shyft Network facilitates the transfer of verifiable data between centralized and decentralized ecosystems. It sets the highest crypto compliance standard and provides the only frictionless Crypto Travel Rule compliance solution while protecting user data.

Visit our website to read more, and follow us on X (Formerly Twitter), GitHub, LinkedIn, Telegram, Medium, and YouTube. Sign up for our newsletter to keep up-to-date on all things privacy and compliance.

Shyft Network’s 2024 Progress: Enabling Compliance, Protecting Privacy was originally published in Shyft Network on Medium, where people are continuing the conversation by highlighting and responding to this story.


Okta

How to Submit Your System for Cross-domain Identity Management (SCIM) Integration to the Okta Integration Network

You have an app with SSO capabilities. What else can you do with Okta to transform it into an enterprise-ready powerhouse? Today’s enterprises face critical identity management challenges that directly impact their operations; this includes: Rapid business growth outpacing their current user management capabilities Scattered user accounts creating administrative chaos User manage

You have an app with SSO capabilities. What else can you do with Okta to transform it into an enterprise-ready powerhouse?

Today’s enterprises face critical identity management challenges that directly impact their operations; this includes:

Rapid business growth outpacing their current user management capabilities Scattered user accounts creating administrative chaos User management that doesn’t scale with company growth (access free-for-all to resources) Bottlenecks in user provisioning slowing down productivity (i.e., manual provisioning)

and more critically,

Security vulnerabilities from inconsistent user deprovisioning

This is where you come in as a partner. By integrating with Okta through SCIM (System for Cross-domain Identity Management), a standard for managing users, you can offer enterprise customers a solution that addresses these pain points.

Why System for Cross-domain Identity Management (SCIM) is your gateway to enterprise success

It facilitates:

Real-time user synchronization, which keeps customer organizations agile with instant updates as employees join, leave, or move within the company Automated lifecycle management, which eliminates manual processes with streamlined provisioning, updates, and de-provisioning Enhanced security controls, which give enterprises precise control over user access and permissions Standards-based integration, which leverages open Internet Engineering Task Force (IETF) protocols for reliable, interoperable, and consistent implementation Reduced operational complexity, which helps customers save on their identity management costs and overhead Accelerate your growth by joining the Okta Integration Network (OIN)

And once you have a SCIM-compliant integration with Okta, we invite you to Okta’s Integration Network (OIN). Here, you can unlock potential growth by tapping into Okta’s massive customer base of 18,000+ organizations, including leading companies and government institutions that rely on Okta as their identity security foundation. Furthermore, fast-track enterprise deals with your pre-built integration and reduces sales friction with verified enterprise-ready status. More importantly, you’ll be able to differentiate your offering with premium security features.

How to submit your SCIM integration to the Okta Integration Network (OIN)

Here is a video walkthrough on creating your SCIM provisioning instance for OIN testing and submission.

Prerequisites

Okta Developer Account Runscope test links (2): CRUD and SPEC tests Manual Okta SCIM integration tests Provisioning-enabled instance and confirmation

Lastly, you must have a publicly accessible SCIM server for Okta to send requests to. I used the SCIM server from this Enterprise Workshop on SCIM to demo the submission process.

Learn more about Secure Identity Integrations

For more resources, check out Okta’s Saas Security page and integrator help hub.

Enterprise workshop series on building a SCIM server and other integrations Posts in the on-demand workshop series 1. How to Get Going with the On-Demand SaaS Apps Workshops 2. Enterprise-Ready Workshop: Authenticate with OpenID Connect 3. Enterprise-Ready Workshop: Manage Users with SCIM 4. Enterprise Maturity Workshop: Terraform 5. Enterprise Maturity Workshop: Automate with no-code Okta Workflows 6. Enterprise-Ready Workshop: How to Instantly Sign a User Out Across All Your Apps Stay in touch!

Follow OktaDev on X and subscribe to our YouTube channel to learn about additional integrator resources as soon as they’re available. We also want to hear from you about topics you want to see and questions you may have. Leave us a comment below!


BlueSky

2024 In Review

It’s been a big year for Bluesky! Let's take a look back at everything that’s happened in the past year.

It’s been a big year for Bluesky! As 2024 draws to a close, I’m excited to take a look back at everything that’s happened in the past year.

Alongside users, creators, and the AT Protocol developer community, Bluesky has grown from an invite-only app with only 3 million people to a public app of over 25.9 million people. In the last month and a half, Bluesky has grown by over 13M people, with organizations reporting a 2-10x increase in the amount of engagement they receive.

Here’s a look back at some key milestones of this past year:

Opening Our Doors

Bluesky officially launched in just February of this year. When we opened the app to the public, we removed invites, which were a tool to help us grow the app sustainably and safely.

At launch, Bluesky had an early community of 3M people. One week later, over a million new users had signed up.

Implementing Federation

Just weeks after our public launch, we achieved a long-standing goal by implementing federation. This milestone represents our commitment to creating an open, interconnected social network that respects user choice. Users can now run their own personal data servers, and thousands have opted to use their own servers instead of Bluesky’s infrastructure.

Stackable Moderation

In March, we launched labelers, the first piece of our stackable moderation system that empowers users to take control of their experience. Additionally, we open-sourced Ozone, a collaborative moderation tool that enables independent organizations and people to more easily run their own moderation service.

More Big Features

In 2024, we also launched:

Hashtags: We added hashtags to make finding content easier. Direct Messages: In May, we launched DMs, creating new avenues for connection. Starter packs: In June, we launched starter packs, helping communities onboard to Bluesky more easily. Video Sharing: In September, we launched videos. Trending topics: In December, right around Christmas, we launched trending topics. Many Small Features

We also launched:

Account deactivation (June), Priority notifications (July), Self-moderation tools like detach quotes and hide reply (August), Pinned posts (October), and The thread composer (November). Looking forward to 2025

Building on this year's achievements, we're excited to introduce more features and improvements. Your feedback continues to shape Bluesky’s evolution, and we deeply appreciate the trust you've placed in Bluesky this year.

Wednesday, 25. December 2024

Kin AI

How Personal AI Tools Are Revolutionizing Career Development

AI’s growth into the mainstream has been explosive–and career development hasn’t remained untouched. So, how has it changed?

Try Kin - Personal AI

Career paths have transformed dramatically over the past decade. With remote work becoming standard, AI technologies entering workplaces, and career trajectories becoming increasingly non-linear, traditional approaches to professional growth and continuous learning are struggling to keep pace.

This is reflected in research. According to LinkedIn's 2024 Workplace Learning Report, job seekers and employees feel learning and development is more essential to their career opportunities than ever—and they feel artificial intelligence can scale mentorship and career planning to match demand.1

I’m Yngvi Karlson, Co-Founder of Kin. Born in the Faroe Islands, I’ve spent my career building startups, with two exits along the way, and five years as an active venture capitalist. Now, I’m dedicated to creating Kin, a personal AI people can truly trust.

Follow me on LinkedIn, TikTok and X

So, how is it changing, and what does personal AI have to do with it? I’ll cover the following topics to find out:

What is Career Development?

The Rise of Artificial Intelligence and AI Tools

Practical Applications of AI Assistants in Today’s Workplace

The Future of AI-Driven Career Development

Maximizing Personal AI Tools Like Kin for Career Growth

Get Started with Your AI Companion Today

So, let’s go.

What is Career Development?

Career development is the ongoing process of building professional growth through career planning, continuous learning, and targeted skill development. Essentially, it’s the way people create the careers and salaries they want to have. And it’s changing.

Why is Career Development Changing?

Traditional career development has long relied on a combination of career counselors, mentors, professional books, and workshops.

While valuable, these methods have significant limitations in today's fast-paced and economically unequal work environment. According to the International Coach Federation, the average cost of career coaching is around $244 per hour,2 which can make them inaccessible to many busy junior professionals.

Similarly, mentors, while invaluable for their experience, often have limited time and may not be available when needed most—especially when some can be volunteers.

Books and workshops remove some of the time and cost issues but instead offer static information that can't adapt to individual circumstances or changing market conditions. This one-size-fits-all approach becomes particularly problematic in today's dynamic job market, where roles and required skills evolve rapidly.

The modern workplace demands a more agile and personalized approach.

DALL-E/Kin Illustration The Rise of Artificial Intelligence and AI Tools

So, an opening has appeared for a new kind of career support: AI-powered tools.

These AI-driven career coaches are available 24/7, process vast amounts of data from interactions, and provide data-driven insights based on an individual's unique situation and career aspirations. Through sophisticated algorithms and machine learning, tools built on AI systems like OpenAI’s ChatGPT and Microsoft’s Copilot are revolutionizing how people approach upskilling and professional development.

In short, AI helps in career development by making the guidance it requires cheaper, faster, and more analytical than ever before.

The Five Core Areas of AI-Powered Career Development

They’re doing this, because modern AI systems generally excel at several essential areas of career development:

Skill assessment and Enhancement: AI’s affinity for data analysis helps it easily identify someone’s current skills, skill gaps, and how they can bridge them.

Adaptability Training: AI can empower professionals to navigate market trends by illustrating and explaining previous trends, and using data analysis to predict future ones.

Career Exploration: AI’s predictive analytics can combine knowledge of an individual’s skills with current job market insights to suggest potential new opportunities that are within reach.

Social media and networking optimization: With an ability to analyze user profiles, current trends, and platform reviews, personal AI assistants can help individuals transform their online reach and in-person presence.

Automated Routine Tasks: AI can cover a range of small tasks across job searches and career advancement, from simply drafting messages, to summarising information, to providing guides and code for more advanced automation.

The Power of AI Memory and Personalization

However, perhaps the most revolutionary aspect of personal AI in career development is its advanced memory capabilities. Unlike human coaches, AI systems can maintain perfect recall of every conversation, goal, and milestone.

This doesn’t just make interacting with them easier, but allows AI-driven tools to reliably track and interpret long-term data to provide more insightful advice and support.

For example, our personal AI, Kin, has an advanced memory system which not only remembers what users share, but also analyzes how their attitudes toward work and career goals evolve alongside their skills over time. This helps our users understand their professional growth trajectory, and make more informed decisions about their future.

The Role of Emotional Intelligence in AI Career Support

While AI's analytical capabilities are impressive, its role in emotional support and motivation is often downplayed—in part down to its bad reputation, thanks to early AI tools and simple AI chatbots.

Modern AI systems now include sophisticated emotional intelligence, which allows them to recognize and respond appropriately to user emotions during discussions. Whether that means recognising the user is upset or angry, and adapting accordingly; facilitating the growth of trust, or realizing that a user is struggling to see the impact of their emotions on a situation, AI systems can help people not only feel supported, but also increase their own emotional intelligence and resilience.

Those kinds of soft skills are also incredibly powerful in the workplace, so finding easier and cheaper ways to build them effectively is beneficial.3

DALL-E/Kin Illustration Practical Applications of AI Assistants in Today's Workplace

So, how does this actually look in practice?

AI tools based on LLMs like ChatGPT and Copilot have revolutionized content optimization, continuous learning, and adaptability in organizations, by making analytical reports, practical information, and bespoke examples much more accessible and easily digestible. As a result, more time can be spent working with the information than working it out.

Because of this, AI is in the process of getting involved in teaching workers how to use it for career enhancement in these ways. While new frameworks for measuring professional growth, with metrics tracking both technical and soft skill development are the gold standard, they’ve not been deployed much outside of healthcare settings.

Right now, AI-driven tools for career development are largely initiatives focused around decision-making and job satisfaction enhancements. They provide spaces for employees to log their achievements, skills, and struggles, and then provide real-time feedback for how employees can improve their collaboration, productivity, and their own skillsets.

Investment in employee upskilling has already been shown to improve employee retention, so some of these initiatives are a natural extension of that.

For freelancers and jobseekers, the ability of AI tools on job sites like LinkedIn to summarise skillsets in the context of the job market has made finding a development pathway, or even relevant job opportunities, easier than it's ever been.

In short, personal AI tools are revolutionizing career development by making it easier for people to be more aware of their emotions, goals, and skillsets, and to be better guided to turning them into what their aspirations require.

The Future of AI-Driven Career Development

With Deloitte's 2024 Human Capital Trends report claiming only 5% of executives currently feel they’re doing enough to keep employees sufficiently skilled,4 how might the technology grow throughout more widespread use?

The most likely future seems to be the continued integration of AI-powered tools, like personal AI, into workplaces and professional spaces. AI processing and insights don’t just allow companies to better track how their employees are working and learning, and how to improve it, but allow these employees themselves to work toward their own goals. That just makes them happier and more productive in turn.

Personal AI tools take this a step further, by allowing employees to better focus on self awareness and individual growth with less effort. These tools, especially when integrated with more company-based AI systems, can and will make it much easier for employees to have difficult conversations, navigate a work-life balance, make time for continuous learning, and keep a growth mindset focused around expanding their abilities.

Unlike traditional upskilling courses and chatbots, which follow rigid, pre-programmed response patterns, these AI systems can analyze context, remember past interactions, and provide increasingly personalized guidance over time.

However, this advanced capability also raises important considerations about privacy and ethics—especially given the recent behaviour of the AI industry. As Deloitte has acknowledged alongside us, AI has lost a lot of trust, and needs to focus on being transparent and ethical in its data storage and processing to win it back.

Maximizing Personal AI Tools Like Kin for Career Growth

With all that said, how can AI tools be used right now for career development? We’ll use our own personal AI, Kin, as an example.

The nature of Kin, and of personal AI as a whole, means that it is most effective when used strategically and consistently. All of its benefits rely on a detailed and up-to-date understanding of its users.

Kin’s advanced, chat-agnostic memory, for instance, becomes more valuable when users regularly and honestly share their professional experiences, challenges, and victories. This helps it build a comprehensive understanding of their current and desired levels in their career journey. As such, Kin can provide more nuanced guidance to where they want to go from where they actually are.

To aid this, Kin has Chat and Journal features to encourage information, discussion and reflection. These interactive features make it easy for users to express their thoughts, feelings, challenges, and aspirations to Kin, which it then analyzes to reveal personal patterns, insights and advice. This can reveal valuable information about professional strengths, growth areas, and potential career development directions.

These sessions also supply Kin with workplace relationships and dynamics, which its memory allows it to analyze to provide real-time support in navigating complex professional situations and building stronger workplace connections.

Kin then helps users stay consistent through a customizable push-notification reminder system. In addition to default reminders, users can set up notifications for regular check-ins to review progress toward goals, prepare for important meetings, or reflect on recent professional experiences.

And, Kin stores and processes as much of this information as possible on user devices—not in the cloud—for maximum privacy. Every piece of information it remembers is also viewable and deletable at any time.

Get Started with Your AI Companion Today

If that sounds good to you, beginning your career development journey with Kin is straightforward. Just download the app here, complete this message, and send it to Kin:

"Hi Kin! I'm looking to develop my career with your support. I'm currently [your role] at [your company/industry], and I'm aiming to [your specific goal]. My biggest challenge right now is [your challenge], and I'd like to develop [specific skills/areas]. Could you help me?"

From there, Kin will begin building a personalized understanding of your professional situation through conversation. It will ask clarifying questions about your goals and challenges, helping you articulate, plan for, and achieve your career aspirations more clearly.

1

Anon. 2024. 2024 Workplace Learning Report. Available at: https://learning.linkedin.com/resources/workplace-learning-report#skills [Accessed 12/19/24]

2

Anon. 2021. ICF - Global Coaching Study. coachingfederation.org. Available at: https://coachingfederation.org/research/global-coaching-study [Accessed 12/19/24]

3

Price, A. 2024. “The Importance Of Emotional Intelligence At Work”. forbes.com. Available at: https://www.forbes.com/councils/forbeshumanresourcescouncil/2023/07/18/the-importance-of-emotional-intelligence-at-work/ [Accessed 12/19/24]

4

Anon. 2024. “2024 Global Human Capital Trends”. Available at: https://www2.deloitte.com/us/en/insights/focus/human-capital-trends.html [Accessed 12/19/24]

Monday, 23. December 2024

Shyft Network

Bridging Privacy and Regulation: 2024’s Defining Moment

In 2024, the anticipated collision between regulation and innovation gave way to an unprecedented collaboration. This year marked a turning point, where regulatory frameworks and technological advancements joined forces to prioritize privacy without compromising compliance. The narrative of “regulation versus innovation” evolved into one of mutual reinforcement, with privacy emerging as the corne

In 2024, the anticipated collision between regulation and innovation gave way to an unprecedented collaboration. This year marked a turning point, where regulatory frameworks and technological advancements joined forces to prioritize privacy without compromising compliance.

The narrative of “regulation versus innovation” evolved into one of mutual reinforcement, with privacy emerging as the cornerstone of progress.

Privacy Innovation: The Cornerstone of 2024

The transformation began with a bold proposition: privacy technology can enhance regulatory compliance. Financial institutions and digital asset firms recognized that privacy-preserving tools not only safeguarded user data but also addressed regulators’ demands for transparency.

Consider the Travel Rule, once a daunting compliance challenge for exchanges. Innovative solutions redefined it, allowing platforms to share only the essential data required for oversight. This shift, driven by mathematical precision and technological ingenuity, highlighted the potential of privacy-centered compliance.

Unexpected Pioneers in Privacy-First Regulation

Remarkable advancements emerged from surprising quarters. Once-overlooked markets became leaders in regulatory innovation. Experimental regulatory sandboxes transformed into thriving innovation hubs, while central banks integrated privacy features into their digital currency initiatives — reframing them as tools for protecting user rights rather than instruments of surveillance.

Technologies That Redefined Compliance

Privacy-preserving compliance tools reshaped the regulatory landscape in 2024. These advancements bridged the gap between privacy and oversight:

Identity verification without exposing personal data. Transaction monitoring that maintains confidentiality. Regulatory reporting designed to protect user security.

Notably, Shyft Network’s Veriscope became a global solution for Travel Rule compliance, enabling secure identity verification and private transaction validation. Similarly, zero-knowledge proofs (ZKPs) matured from theoretical concepts to practical applications, driving innovation in transaction verification and identity management.

A Global Shift Toward Privacy and Compliance North America

The SEC’s approval of spot Bitcoin ETFs set the stage, but the real breakthroughs lay in privacy-enhanced systems developed by exchanges like Coinbase and Kraken. Canada’s advanced frameworks for private institutional trading raised the global bar.

Europe

MiCA’s implementation propelled European markets to adopt privacy-preserving compliance solutions. French and German exchanges led with tools balancing stringent oversight with robust user privacy. The UK’s emphasis on “privacy by design” influenced global regulatory practices.

Asia Pacific

Japan’s regulatory framework prioritized privacy, while Singapore introduced cutting-edge compliance tools that became benchmarks for the region. South Korea’s strict approach to oversight spurred creative solutions, and Hong Kong integrated privacy into institutional finance practices.

Latin America

Brazil’s privacy-preserving compliance measures in payments and Mexico’s advances in remittance privacy showcased the region’s adaptability. Argentina demonstrated that even in challenging economic conditions, confidentiality could be maintained.

Middle East and Africa

Dubai’s VARA framework enabled groundbreaking cross-border confidentiality tools. Africa’s mobile-first innovations, particularly Nigeria’s, offered solutions that balanced financial inclusion with robust privacy protections.

Australia and Oceania

Australia’s token mapping initiative redefined asset classification with privacy at its core. Smaller markets in the region demonstrated leadership in adopting and advancing privacy-focused technologies.

Key Takeaways 2024 proved that privacy and regulation can complement each other, reshaping financial compliance. Privacy-preserving tools like zero-knowledge proofs and Veriscope transformed oversight processes. Unexpected markets, including Latin America and Africa, emerged as leaders in privacy innovation. Regulatory frameworks like MiCA and the Travel Rule drove technological progress globally. Privacy-focused compliance is becoming a cornerstone for bridging traditional and decentralized finance. The Road Ahead: A Privacy-Driven Future

As the foundation laid in 2024 takes hold, privacy-preserving compliance is becoming a fundamental aspect of financial innovation. Institutional investors, once hesitant, are now embracing these tools to bridge the divide between traditional and decentralized finance.

The lessons of 2024 underscore a vital truth: addressing regulatory challenges can drive meaningful progress. By prioritizing privacy alongside compliance, the financial ecosystem has grown stronger, demonstrating that these objectives are not mutually exclusive.

The next chapter in financial history will focus on leveraging innovation to achieve both oversight and confidentiality, paving the way for a secure, inclusive, and privacy-conscious future.

About Shyft Network

Shyft Network powers trust on the blockchain and economies of trust. It is a public protocol designed to drive data discoverability and compliance into blockchain while preserving privacy and sovereignty. SHFT is its native token and fuel of the network.

Shyft Network facilitates the transfer of verifiable data between centralized and decentralized ecosystems. It sets the highest crypto compliance standard and provides the only frictionless Crypto Travel Rule compliance solution while protecting user data.

Visit our website to read more, and follow us on X (Formerly Twitter), GitHub, LinkedIn, Telegram, Medium, and YouTube. Sign up for our newsletter to keep up-to-date on all things privacy and compliance.

Bridging Privacy and Regulation: 2024’s Defining Moment was originally published in Shyft Network on Medium, where people are continuing the conversation by highlighting and responding to this story.


Safle Wallet

Weekly Safle Update!

📈 Marketing Updates We’re excited to share the latest engagement activity results! Here’s how our community is interacting with the content: 📜Quiz: 265 participants 📊Polls: 269 responses 🧩Puzzle (Time-based Bonus Activity): 16 participants Stay tuned for more updates, and thank you for your continued participation! 🔧 Product Updates 🔁Cross-Chain Swaps “Seamlessly perform cross-
📈 Marketing Updates

We’re excited to share the latest engagement activity results! Here’s how our community is interacting with the content:

📜Quiz: 265 participants 📊Polls: 269 responses 🧩Puzzle (Time-based Bonus Activity): 16 participants

Stay tuned for more updates, and thank you for your continued participation!

🔧 Product Updates 🔁Cross-Chain Swaps

“Seamlessly perform cross-chain swaps directly within the Safle app. Access 23+ blockchain networks and swap across 3,000+ assets effortlessly, all in one secure and intuitive platform.”

📱Mobile App UI Revamp

Our mobile app is getting a makeover! The revamped UI will include a sleek light/dark mode toggle, ensuring a personalized experience for every user. Stay tuned for the launch!

🔗New Chain Integrations Complete

Integration of the following chains into Safle Vault is now complete:

opBNB Ronin Sei Skale — Nebula Immutable zk-EVM

Additionally, the backend and data pipelines for these chains have also been finalized, making asset management on these networks more efficient than ever.

👛Wallet Attestations with SafleID

We’re in the planning phase for introducing wallet attestations via SafleID. This will bring enhanced security and trust to your Web3 interactions.

🔍Safle Lens Improvements

Minor UI fixes are currently underway for Safle Lens, ensuring a smoother and more polished user experience.

🎮 Safle ID for Web3 Games

We’re re-envisioning Safle ID with a focus on Web3 Games. Know any game that should integrate SafleID? Let us know!

Discover more: SafleID for Web3 Gaming

Thank you for your continued support in shaping the future of Web3 with Safle.

The Safle Team

🚀 More updates coming soon!

Friday, 20. December 2024

Indicio

Digital wallet for farmers developed by Indicio and Anonyome wins SuperNova award

Biometric Update The post Digital wallet for farmers developed by Indicio and Anonyome wins SuperNova award appeared first on Indicio.

Spruce Systems

Reflecting on 2024: Highlights from SpruceID’s Year

This year, we made strides in building partnerships, driving innovation, and developing privacy-first solutions that let users control their data.

As we wrap up 2024, our team is filled with gratitude and excitement for all the hard work we've done this year. It’s been a time of meaningful progress, growth, and significant contributions to the future of digital identity.

This year, SpruceID continued to build innovative solutions and strengthen partnerships across industries and at events and initiatives around the globe. Together with our community, we’ve achieved milestones that pave the way for a more privacy-focused and user-controlled digital world.

Let’s take a moment to celebrate some of the defining moments of the last year.

Our Team

This year, we welcomed new talent to our global team, bringing a wealth of expertise across engineering, product development, and design. While staying lean and agile, our team’s dedication and creativity have driven impactful solutions and positioned us to meet the demands of a fast-evolving industry.

As a remote-first company, we understand the value of coming together in person to strengthen our connections and align on our company mission. Twice a year, we host offsite retreats, which are essential for collaboration, strategic alignment, and connecting outside of work projects. In 2024, these gatherings took us to Rio de Janeiro, Brazil, and Montreal, Quebec—creating unforgettable experiences and building the foundation for the year ahead.

Spring Offsite in Rio De Janeiro, Brazil

Interested in joining our awesome team? Check out our open roles here.

Events and Hackathons

This year, SpruceID participated in events and hackathons, showcasing our digital identity solutions and advancing privacy-first verifiable digital credential innovation. A few notable events included:

Facilitating CA DMV Hackathons: This year, we played a key role in facilitating the CA DMV hackathons, fostering collaboration among developers, government, and public sector organizations to promote the adoption of mobile driver's licenses (mDLs) through hands-on tooling, troubleshooting, and building out new use cases. Utah's Outdoor Recreation Day on the Hill: We showcased our verifiable digital credential pilot program in partnership with Utah’s Division of Technology Services and Department of Natural Resources. We demonstrated privacy-first, verifiable credentials for off-highway vehicle certificates while engaging with policymakers, legislators, and the public. Internet Identity Workshop: At IIW (Internet Identity Workshop), SpruceID contributed to discussions on key digital identity topics like personhood credentials and Zero-Knowledge Proofs while engaging in collaborative efforts with global leaders to discuss everything from theoretical frameworks to real-world implementations, and driving privacy-first innovation. Silicon Valley Innovation Program (SVIP) Demo Week: At SVIP Demo Week, we showcased our cutting-edge digital identity solutions, highlighting advancements in privacy-preserving credentials and how we are working with the Department of Homeland Security to bring privacy and security to cross-border credentials. American Association of Motor Vehicle Administrators (AAMVA) Conferences: In 2024, SpruceID sponsored multiple AAMVA conferences, supporting advancements in secure, interoperable, verifiable digital credentials for motor vehicle administrations and law enforcement agencies. Verifiable Digital Credentials in U.S. Government

Our products continue to drive innovation in digital identity for customers like the California DMV, Utah's Division of Technology Services, and the Department of Homeland Security. They offer cutting-edge solutions for verifiable digital credential management and empower organizations and developers to build secure, user-centric systems.

Utah's Division of Technology Services

In partnership with Utah’s Division of Technology Services, SpruceID introduced verifiable digital credentials across the state of Utah to replace paper and plastic permits, such as off-highway vehicle certificates and food handler permits. This initiative has enhanced security, improved user experience, and empowered residents with privacy-preserving digital credentials. Read the full story to learn more about our work with Utah.

California DMV

Throughout this year, we have continued our work with the California DMV, we helped implement and expand the state’s award-winning mobile driver’s license program, which prioritizes privacy, security, and interoperability. This program enables millions of Californians to securely use their credentials online and offline for travel and identity verification, and currently has a 4.8 star rating across 60K app reviews on both the Google Play and App store.

Department of Homeland Security

Through the Silicon Valley Innovation Program, we are collaborating with DHS to develop privacy-preserving digital credentials for cross-border travel and immigration. This initiative enhances security and interoperability while ensuring users maintain control over their personal data.

Standards and Working Groups

A key milestone this year was the release of ISO/IEC18013-7, a standard enabling remote use of mobile driver's licenses (mDLs) for digital identity verification. This standard supports secure online identity proofing and onboarding, ensuring interoperability and flexibility across diverse systems and simplifying digital identity verification for users.

Additionally, SpruceID collaborated with the National Cybersecurity Center of Excellence (NCCoE) at NIST on initiatives to strengthen the adoption of open standards for verifiable credentials. By contributing to frameworks and best practices, we are working to ensure digital identity solutions remain secure, interoperable, and privacy-preserving, aligning with industry needs and advancing the adoption of trustworthy identity systems.

We're looking forward to seeing more innovative use cases using these standards in the upcoming year.

Here’s to Another Year!

This year has been one of incredible growth, innovation, and impact for SpruceID. As we reflect on everything we’ve accomplished, we’re more committed than ever to empowering individuals to take control of their identity and personal data in today’s digital world.

Each milestone we’ve reached has strengthened our ability to create trusted, privacy-first digital experiences. We’re excited to carry this momentum into 2025, shaping the future of digital identity together and seeing what new opportunities will be in store.

About SpruceID: SpruceID is building a future where users control their identity and data across all digital interactions.


Holochain

Holochain 0.4.0

Dev Pulse 142

🎁 An early gift! Holochain 0.4.0 has been quietly released and is now our recommended version for general use. Holochain 0.3 (currently at 0.3.6) and its infrastructure are still supported and will get maintenance updates as needed, while Holochain 0.2 and its infrastructure are now retired.

🤏🏻 The big news is that 0.4.0 comes with less – we've disabled unstable features by default, allowing more time for testing. This probably won't affect your app, but just in case, read the upgrade guide https://developer.holochain.org/resources/upgrade/upgrade-holochain-0.4/ . There are other breaking changes you'll want to know about too!

🏗 Along with 0.4.0 you'll see a bunch of small quality-of-life improvements in the scaffolding tool. Setting up your first DNA is streamlined, you can edit your entry type's fields before committing to code (super useful feature), and the templates are simpler. Try it over the holidays! https://developer.holochain.org/get-started/

Thank you for journeying with us in 2024. There have been a lot of changes for our organization and the Holochain project, and we deeply appreciate your support through it all. See you in 2025, where we'll keep sharing regular updates on our progress!


IDnow

A collaborative affair: How IDnow works with its customers to innovate and tackle industry challenges.

In 2024, we launched our much-anticipated Customer Advisory Board (CAB). Here, we reflect on the top 5 learnings and what we hope to take into 2025.  At IDnow, the CAB is more than just a platform to communicate with our customers. IDnow CABs are valuable opportunities to collaborate toward the shared goals of shaping the […]
In 2024, we launched our much-anticipated Customer Advisory Board (CAB). Here, we reflect on the top 5 learnings and what we hope to take into 2025. 

At IDnow, the CAB is more than just a platform to communicate with our customers. IDnow CABs are valuable opportunities to collaborate toward the shared goals of shaping the future of identity verification, meeting regulatory requirements, and anticipating upcoming technological and industry challenges. 

We organized two CABs in 2024 – one in Munich in June and the other in Paris in October. Both featured strategic discussions, where we covered topics as wide-ranging as eIDAS compliance to fraud prevention and optimal user experience (UX). We also showcased demos of some of our newly launched products like YRIS, Videoident Flex and InstantSign.  

As forums for gathering customer feedback, we also utilize CABs to align our solutions with real market needs and share our strategic vision for the future.  

“Our CABs serve two primary functions,” said Ellie Burns, Head of Product, Customer and Partner Marketing at IDnow.

For our customers, they get to play an active advisory role to influence IDnow’s innovation priorities and product roadmap. While for IDnow, it is an invaluable opportunity to tailor our solutions to specific customer challenges.

Ellie Burns, Head of Product, Customer and Partner Marketing at IDnow.
IDnow’s top 5 key takeaways from 2024 CABs.  1. Client collaboration is essential for innovation. 

The success of our solutions relies on a deep understanding of client needs. IDnow’s CABs provide a collaborative framework where participants get to share their experiences and directly influence innovation priorities. This process ensures our solutions address tangible challenges across various industries while paving the way for new use cases. 

CABs help us stay aligned with real market needs while giving our clients the opportunity to co-create tomorrow’s solutions.

Élodie Poulain, Marketing Director at IDnow. 
2. Regulatory compliance is a shared priority. 

In the face of increasingly complex regulations, such as eIDAS 2.0 and upcoming Anti Money Laundering Authority requirements, CABs can help raise awareness of industry warning signs and important milestones so customers can prepare. Plus, by integrating customer feedback, we can develop solutions that comply with the highest standards while meeting expectations for speed, security and efficiency. 

eIDAS 2.0 – A simple update or fundamental change? Download to discover: What is eIDAS? The birth of eIDAS 2.0 The countries and industries affected by eIDAS 2.0 Read now 3. Fraud prevention requires a collaborative approach. 

With threats like deepfakes and synthetic identity fraud on the rise, CABs can be vital forums for discussing best practices of dealing with fraud. It is these insights that allow us to co-create solutions capable of detecting emerging fraud that also enhance overall security. Innovations such as photoswap detection and video injection prevention are direct outcomes of these strategic discussions. 

4. User experience (UX) is a key differentiator. 

Feedback gathered from CAB participants allows us to regularly refine and optimize our products. For example, customer feedback on InstantSign enabled us to add additional features and advanced functionality and a flawless user experience. 

5. CABs act as accelerators for cross-sector synergies. 

By bringing customers together from a range of industries, including financial services, telecoms, gaming and mobility, the IDnow CABs foster unique synergies. Exchanging opinions on diverse topics leads to unique perspectives and innovative approaches that have applications across multiple sectors. They are valuable opportunities to explore new horizons while strengthening our industry expertise. 

IDnow’s product roadmap for 2025: Solutions for a changing market. 

IDnow is committed to becoming Europe’s leading KYC provider with a comprehensive and innovative product offering. Here are just some of the major milestones we have achieved in the last five years: 

AI QES (2021): Launch of qualified electronic signature solution.  ETSI Certification (2022): Compliance with European security standards for QTSPs.  ISO 27001 (2023): Certification ensuring the security of sensitive data.  PVID Certification (2023): ANSSI approval for identity verification solutions.  InstantSign (2024): Launch of fast, fully compliant electronic signature product.  YRIS Certification (2024): Substantial assurance level for digital identity. 

In 2025, IDnow will focus on: 

Fraud prevention: Introduction of new fraud prevention technology, including Photoswap detection, deepfake identification and IBAN verification.  eIDAS 2.0: Implementing product changes to ensure our products comply with this European regulation.  European connectivity: IDnow is developing a platform that can connect to all European digital wallets and is also creating its own Wallet. The goal: to deliver an optimal UX while adhering to growing regulatory demands. 

With over 900 customers around the globe, we have a busy 2025 coming up with CABs planned in major cities throughout Europe and beyond. 

Read our ‘Fraud in 2024: IDnow customers have their say.’ blog to discover the most common fraud challenges that our customers have been facing in 2024 and how they plan to address them in 2025. 

To keep up to date with the latest happenings from IDnow, follow us on Linkedin. 

By

Mallaury Marie
Content Manager at IDnow
Connect with Mallaury on LinkedIn