Last Update 1:18 PM October 17, 2025 (UTC)

Company Feeds | Identosphere Blogcatcher

Brought to you by Identity Woman and Infominer.
Support this collaboration on Patreon!

Friday, 17. October 2025

Shyft Network

G20’s Crypto Dilemma: Regulation Without Coordination

The Financial Stability Board (FSB) — the G20’s global risk watchdog — released a sobering statement: there remain “significant gaps” in global crypto regulation. It wasn’t the typical bureaucratic warning. It was a clear signal that the world’s financial governance structures are lagging behind the speed and fluidity of decentralized systems. For an industry built on cross-border code and border

The Financial Stability Board (FSB) — the G20’s global risk watchdog — released a sobering statement: there remain “significant gaps” in global crypto regulation.

It wasn’t the typical bureaucratic warning. It was a clear signal that the world’s financial governance structures are lagging behind the speed and fluidity of decentralized systems. For an industry built on cross-border code and borderless capital, national rulebooks no longer suffice.

But the FSB’s concern reaches beyond oversight. It exposes an unresolved paradox at the heart of digital finance: how to regulate what was designed to resist regulation.

Fragmented Governance, Unified Risk

The FSB’s assessment underscores a growing structural mismatch. The world’s regulatory responses to crypto have been disparate, reactive, and jurisdictionally fragmented.

The United States continues to rely on enforcement-driven oversight, led by the Securities and Exchange Commission (SEC) and Commodity Futures Trading Commission (CFTC), each defining “crypto assets” through its own lens. The European Union is pursuing harmonization through the Markets in Crypto-Assets Regulation (MiCA), creating the first comprehensive regional rulebook for digital assets. Asia remains diverse: Japan and Singapore operate under established licensing regimes, while India and China take more restrictive, state-centric approaches.

To the FSB, this regulatory pluralism is not innovation — it’s exposure. The lack of standardized frameworks for risk management, consumer protection, and cross-border enforcement creates vulnerabilities that can spill over into the traditional financial system.

In a market where blockchain transactions flow without borders, inconsistent regulation becomes the new systemic risk.

Regulatory Arbitrage: The Silent Threat

This fragmented environment fuels what the FSB calls “regulatory arbitrage” — the quiet migration of capital, operations, and data to jurisdictions with the weakest oversight.

Stablecoin issuers, decentralized finance (DeFi) platforms, and digital asset exchanges can relocate at the speed of software. For regulators, national boundaries have become lines on a digital map that capital simply ignores.

The result is a patchwork of supervision. Entities can appear compliant in one jurisdiction while operating opaque structures in another. Risk becomes mobile, and accountability becomes ambiguous.

Ironically, this dynamic mirrors the early years of global banking — before coordinated frameworks like Basel III sought to standardize capital rules. Crypto now faces the same evolution: a system outgrowing its regulatory perimeter.

Privacy as a Barrier and a Battleground

One of the FSB’s most striking observations concerns privacy laws. Regulations originally designed to protect individual data are now obstructing global financial oversight.

Cross-border supervision depends on data sharing — but privacy regimes like the EU’s General Data Protection Regulation (GDPR) and similar frameworks in Asia restrict what can be exchanged between authorities.

This creates a paradox:

To monitor crypto markets effectively, regulators need visibility. To protect users’ rights, privacy laws impose opacity.

The collision of these principles reveals a deeper tension between financial transparency and digital sovereignty.

For blockchain advocates, this friction isn’t a flaw — it’s the point. Privacy, pseudonymity, and autonomy were not accidental features of decentralized systems; they were foundational responses to surveillance-based finance.

Now, as regulators push for traceability “from wallet to wallet,” the original ethos of blockchain — self-sovereignty over data and identity — faces its greatest institutional test.

The Expanding Regulatory Perimeter

The FSB’s report marks a turning point: the global regulatory community no longer debates whether crypto needs rules, but how far those rules should reach.

Stablecoins have become the front line. The Bank of England (BoE) recently stated it will not lift planned caps on individual stablecoin holdings until it is confident such assets pose no systemic threat. Meanwhile, the U.S. Federal Reserve has warned that the growth of privately backed digital currencies could undermine monetary policy if left unchecked.

These positions signal that regulators see crypto not as a niche market, but as a parallel financial infrastructure that must be integrated or contained.

Yet, as oversight expands, so does the distance from decentralization’s original promise. The drive to institutionalize crypto — through licensing, capital controls, and compliance standards — risks turning decentralized finance into regulated middleware for the existing system.

The innovation remains, but the autonomy fades.

From Innovation to Integration

What the FSB implicitly acknowledges is that crypto’s mainstreaming is no longer hypothetical. Tokenized assets, on-chain settlement, and programmable money are being adopted by major banks and financial institutions.

However, this adoption often comes with a trade-off: decentralized architecture operated under centralized control.

The example of AMINA Bank — which recently conducted regulated staking of Polygon (POL) under the Swiss Financial Market Supervisory Authority (FINMA) — illustrates this trajectory. The blockchain may remain decentralized in code, but its operation is now filtered through institutional risk, compliance, and prudential oversight.

Crypto is entering a phase of institutional assimilation, where its tools survive but its principles are moderated.

The Ethical Undercurrent: Control vs. Autonomy

At its core, the FSB’s warning is not only about risk but about control. Global regulators see the same infrastructure that enables open, peer-to-peer exchange also enabling opaque, borderless financial activity that escapes accountability.

Their response — standardization and supervision — is rational from a stability standpoint. But it introduces a new ethical question: who governs digital value?

If every decentralized protocol must operate through regulated entities, if every wallet must be traceable, and if every transaction must comply with jurisdictional mandates, then blockchain’s promise of financial self-determination becomes conditional — granted by regulators, not coded by design.

This doesn’t make regulation wrong. It makes it philosophically consequential.

A Call for Coordination, Not Convergence

The FSB’s call for tighter global alignment does not mean a single, monolithic framework. True coordination will require mutual recognition, data interoperability, and respect for jurisdictional privacy laws, not their erosion.

Without this nuance, global harmonization risks turning into regulatory homogenization, where innovation bends entirely to institutional comfort.

A sustainable balance will depend on how regulators treat decentralization:

As a risk to be mitigated, or As an architecture to be understood and integrated responsibly.

The distinction is subtle but defining.

The Architecture of Financial Sovereignty

The G20’s warning marks a pivotal moment. It is a reminder that the future of digital finance will not be decided by code alone, but by the alignment — or collision — of regulatory philosophies.

Crypto began as a rejection of centralized financial power. It now faces regulation not as an external force, but as an inevitable layer of the system it helped create.

The question ahead is not whether crypto will be regulated. It already is.
The real question is whose definition of sovereignty will prevail — that of the individual, or that of the institution.

About Shyft Network

Shyft Network powers trust on the blockchain and economies of trust. It is a public protocol designed to drive data discoverability and compliance into blockchain while preserving privacy and sovereignty. SHFT is its native token and fuel of the network.

Shyft Network facilitates the transfer of verifiable data between centralized and decentralized ecosystems. It sets the highest crypto compliance standard and provides the only frictionless Crypto Travel Rule compliance solution while protecting user data.

Visitour website to read more, and follow us on X (Formerly Twitter), GitHub, LinkedIn,Telegram,Medium, andYouTube.Sign up for our newsletter to keep up-to-date on all things privacy and compliance.

Book your consultation: https://calendly.com/tomas-shyft or email: bd@shyft.network

G20’s Crypto Dilemma: Regulation Without Coordination was originally published in Shyft Network on Medium, where people are continuing the conversation by highlighting and responding to this story.


Elliptic

Elliptic’s Typologies Report: Detecting the money flows behind the global pig butchering ecosystem

In recent years, the growing scale and profitability of so-called pig butchering scams has sparked increasing concern among law enforcement and regulatory agencies around the world. 

In recent years, the growing scale and profitability of so-called pig butchering scams has sparked increasing concern among law enforcement and regulatory agencies around the world. 

Thursday, 16. October 2025

auth0

September 2025 in Auth0: Advanced Security Controls and Auth0 for AI Agents

Explore Auth0's September 2025 product updates, featuring Auth0 for AI Agents, Tenant Access Control List in GA, Dry Run for Auth0 Deploy CLI, and more.
Explore Auth0's September 2025 product updates, featuring Auth0 for AI Agents, Tenant Access Control List in GA, Dry Run for Auth0 Deploy CLI, and more.

Spruce Systems

Designing Digital Guardianship for Modern Identity Systems

Considerations for how states can responsibly represent parental, custodial, and delegated authority without compromising privacy.

In the move toward more inclusive and privacy-respecting digital government services, guardianship (when one person is legally authorized to act on behalf of another) is a core, but often overlooked, component.

Today, guardianship processes are fragmented across probate court, family court, and agency-level determinations, with no clear mechanism for digital verifications. Without clarity, agencies risk legal challenges if they inadvertently allow the wrong person to act on behalf of a dependent.

Rather than treating guardianship as an abstract capability, we believe states should identify a non-exhaustive list of key use cases they want to enable. For example, a parent accessing school records on behalf of a minor, a guardian applying for healthcare or social services on behalf of a dependent senior adult, or a foster parent temporarily authorized to pick a child up. Each of these may require a different level of assurance, auditability, and inter-agency coordination.

Why Legal Infrastructure Falls Short

Several legal and regulatory barriers may affect the implementation of a state digital identity. At the state level, existing statutes were drafted for physical credentials and may not clearly authorize digital equivalents in all contexts. Without explicit recognition of state digital identity as a legally valid proof of identity, agencies may be constrained in adopting digital credentials for remote service delivery.

This legal ambiguity creates friction for both agencies and residents, limiting the full potential of digital identity solutions.

Mapping Authority: Who Can Issue What, and When

Guardianship in digital identity is a complex and, as yet, unsolved problem. A guardianship solution should accept decisions from the entities legally empowered to make them, represent those decisions in credentials rather than recreating them, and keep endorsements current as circumstances change.

The first step is to enumerate today’s pathways to establishing guardianship and to identify which entities are authorized to issue evidence. This mapping enables cohesive implementation and prevents confusion about who can issue what.

In parallel, a program should also clarify which agencies authorize which actions and what evidence each verifier needs. Where authorities differ, the state can allow agencies to issue guardianship credentials that reflect their scope while still unifying common steps to reduce friction.

A Taxonomy for Real-World Guardianship Scenarios

We believe that states should define a clear guardianship credential taxonomy.

There are multiple ways to define guardianship depending on legal and operational context, such as parental authority, foster care, medical consent, or financial guardianship. This will naturally lead to multiple guardianship credential types, tailored to definitions, use cases, and issuing agencies.

Design for Flexibility and Change

Digital delivery introduces several challenges that the program should address up front. Endorsements need to change cleanly at the age of majority or when a court modifies an order, including a clear transfer of control to the individual. Reissuance and backstops should be specified for lost devices or keys and calibrated to the chosen technical models. 

The design should remain flexible enough to accommodate emerging topics, including AI agent-based interactions, without locking in assumptions that are likely to shift.

Support Human Judgment and Prevent Abuse

The overall system for guardianship should maximize the ability for appropriate and contextualized exercise of human judgement by responsible individuals. All of these systems, even protected with cryptography, security measures, and fraud detection, will still be faulty. They should be designed to prioritize humans and their wellbeing, even with failures and fraud present.

A state digital identity framework should require that as much credential validity information as is appropriate and necessary to be made available to the relying party, and that clear indicators of the credential’s current status are available to holders.

It is equally important to prevent abuse of the system. A state must ensure that guardianship credentials cannot be issued or accumulated in ways that could enable fraud, such as one person holding dozens of guardian endorsements to unlawfully access benefits or facilitate trafficking.

The Future of Digital Guardianship

Guardianship in digital identity is not a future problem, it’s a present-day requirement. A successful state digital identity framework must support these relationships with clarity, flexibility, and privacy at its core.

SpruceID helps states design systems that reduce the risk of fraud without sacrificing individual autonomy. Contact us to learn more.

Contact Us

About SpruceID: SpruceID is building a future where users control their identity and data across all digital interactions.


SC Media - Identity and Access

Extensive US civil servant credential exposure uncovered

U.S. civil servants had 53,070 passwords leaked publicly since the beginning of last year, FedScoop reports.

U.S. civil servants had 53,070 passwords leaked publicly since the beginning of last year, FedScoop reports.


Thales Group

Thales Celebrates 60 Years in Mexico, driving technological innovation and local development

Thales Celebrates 60 Years in Mexico, driving technological innovation and local development prezly Thu, 10/16/2025 - 16:00 Mexico Share options Facebook X
Thales Celebrates 60 Years in Mexico, driving technological innovation and local development prezly Thu, 10/16/2025 - 16:00 Mexico

Share options

Facebook X Whatsapp Linkedin Email URL copied to clipboard 16 Oct 2025 Thales, a global leader in advanced technologies, marks 60 years in Mexico, supporting the country’s technological development with solutions in Defence, Aerospace, Cybersecurity, and Digital. With more than 1,300 employees, the company has established a strong industrial footprint, spearheading key strategic projects for national growth. In this milestone year, Thales has proudly received the official “Hecho en México” label from the Mexican government, recognizing products and services that are designed and manufactured locally.

Mexico City, October 15, 2025 – Since 1965, Thales has been part of Mexico’s technological transformation. Today, with over 1,300 employees, it maintains a strong industrial presence that includes two production and personalization centers for payment cards and SIM/eSIM, an Air Traffic Management Service and Integration Center, and a Cyber Academy that trains professionals in cybersecurity. These operations serve not only the domestic market but also customers around the world, positioning Mexico as a strategic hub for the Group.

Over the past six decades, Thales has become an integral part of the daily lives of millions of Mexicans—from every phone call or mobile connection, every card or digital payment transaction, to the safety of their air travel and national defense. Thales’ radars and control centers manage 100% of Mexico’s airspace traffic. Additionally, the Mexican Navy’s Long-Range Oceanic Patrol Vessel (POLA) is equipped with Thales combat systems and sensors.

Thales is present wherever defence, security, and technological innovation are essential to advancing and safeguarding society. This journey has been made possible thanks to the trust of government entities, private companies, institutions, and cities that, for six decades, have chosen Thales as a strategic partner to face critical moments and explore new frontiers with confidence in an increasingly interconnected and complex world. In the face of every challenge, we reaffirm our commitment to building a future we can all trust.

This year, Thales proudly received the “Hecho en México” designation, awarded by the Ministry of Economy, recognizing not only the local origin of its production, but also its ongoing commitment to innovation, job creation, and specialized talent development in the country. This recognition underscores the company’s dedication to Mexico’s growth and global competitiveness.

"We look to the future with the same enthusiasm that marked the beginning of our journey 60 years ago, ready to remain a driver of change and progress in Mexico’s strategic sectors. And what better way to celebrate 60 years in the country than by honoring our people, strengthening national innovation, and reaffirming our commitment to this nation. At Thales, we proudly carry the 'Hecho en Mexico' label, because behind every project, client, and solution, there are Mexican engineers, researchers, and professionals making world-class technological advancements possible," said Analicia García, Country Director of Thales in Mexico.

Thales plays a key role in strengthening Mexico’s defence and security, with advanced systems that help safeguard its sovereignty and protect its citizens. It is also the leading provider of air traffic management systems in Mexico and a key player in the financial sector, where its cybersecurity and digital identity solutions protect the transactions and sensitive information of millions of citizens. In the field of defence and security, the Group contributes to strengthening national capabilities with advanced technologies that support the protection of territory, sovereignty, and the security of critical infrastructure. Its technology promotes trust in the national financial ecosystem and enhances the country’s resilience against emerging digital threats.

With pride in its legacy and eyes firmly on the future, Thales in Mexico will continue to expand its talent pool, investing in Mexican engineers whose high level of expertise and ability to excel on the international stage are undeniable. The company remains committed to promoting local talent, innovation, and research—solidifying its role as a strategic partner in building a safer, more competitive, and globally connected Mexico.

About Thales in Latin America

With six decades of presence in Latin America, Thales, a global tech leader for the Defence, Aerospace, Cyber & Digital sectors. The Group is investing in digital and “deep tech” innovations – Big Data, artificial intelligence, connectivity, cybersecurity and quantum technology – to build a future we can all trust.

The company has 2,500 employees in the region, across 7 countries - Argentina, Bolivia, Brazil, Chile, Colombia, Mexico and Panama - with ten offices, five manufacturing plants, and engineering and service centres in all the sectors in which it operates.

Through strategic partnerships and innovative projects, Thales in Latin America drives sustainable growth and strengthens its ties with governments, public and private institutions, as well as airports, airlines, banks, telecommunications and technology companies.

View PDF countries : Americas > Mexico https://thales-group.prezly.com/thales-celebrates-60-years-in-mexico-driving-technological-innovation-and-local-development thales-celebrates-60-years-mexico-driving-technological-innovation-and-local-development On Thales Celebrates 60 Years in Mexico, driving technological innovation and local development

LISNR

4 Ways Ultrasonic Proximity Solves the Security-Friction Trade-Off

The Payments Paradox: The financial services landscape is defined by a relentless drive for frictionless commerce. Yet, the industry remains trapped in a payments paradox: increasing convenience often comes at the expense of security and reliability. The current generation of low-friction solutions, primarily QR codes, are highly susceptible to spoofing and fraud. Conversely, secure methods […]
The Payments Paradox:

The financial services landscape is defined by a relentless drive for frictionless commerce. Yet, the industry remains trapped in a payments paradox: increasing convenience often comes at the expense of security and reliability. The current generation of low-friction solutions, primarily QR codes, are highly susceptible to spoofing and fraud. Conversely, secure methods like NFC are costly, hardware-dependent, and struggle with mass deployment.

This trade-off is untenable.

LISNR has introduced the definitive answer: Radius. By utilizing ultrasonic data-over-sound, Radius provides the industry with the missing link—a secure, hardware-agnostic, and offline-reliable method for token exchange and proximity verification. This technology is not an iteration; it is the strategic shift required to future-proof mobile payments.

 

The Current Vulnerability and Reliability Gaps

For financial institutions and payment processors, the challenge lies in securing high-value transactions across a fractured ecosystem:

QR Code Spoofing: QR code payments are vulnerable to “quishing” (QR code phishing). A fraudster can easily overlay a malicious code onto a legitimate one, hijacking payments or stealing credentials. This simplicity is its greatest security flaw. Offline Transaction Liability: In environments with poor connectivity (e.g., transit, emerging markets), most digital wallets revert to a hybrid system where transactions are batched. This exposes merchants to greater fraud liability and introduces a dangerous delay in payment certainty. Deployment Bottlenecks: Scaling a payment solution for tap-to-pay payment solutions quickly requires high capital expenditure. The mandatory, dedicated hardware required for NFC makes global deployment slow and expensive, hindering financial inclusion. Radius: The Strategic Imperative for Payment Modernization

LISNR’s Radius SDK addresses these strategic deficiencies by decoupling transactional security from reliance on hardware and the network. It transforms every device with a speaker and microphone into a secure payment endpoint.

Here are the four non-negotiable benefits of adopting Radius for your payments platform:

1. Absolute Security 

LISNR eliminates the core vulnerability of open-source payment modalities by building security directly into the data transfer protocol.

Spoofing Elimination: ToneLock® uses a proprietary security precaution to obfuscate the payload before transmission. Only receivers with the correct, authorized key can demodulate the tone, making it impossible for unauthorized apps to read or spoof the payment data. End-to-End Encryption: For the highest security standards, the SDK offers optional, built-in AES 256 Encryption for all payloads, ensuring data remains unreadable. 2. Unrivaled Offline Transaction Certainty

Radius is engineered for mission-critical reliability, ensuring transactions are secure and auditable even when the network fails.

Network Agnostic Reliability: The entire ToneLock and AES 256 Encryption/Decryption process can occur offline. This enables the secure exchange and validation of payment tokens without requiring an active internet connection. Radius ensures instant transaction certainty and lowers merchant liability in disconnected environments. Bi-Directional Exchange: The SDK supports bidirectional transactions, allowing two devices (e.g., customer wallet and merchant terminal) to simultaneously transmit and receive tones on separate channels. This two-way handshake initiates payment instantly while simultaneously delivering a merchant record to the consumer device. 3. High-Velocity, Zero-Friction Commerce

The speed of a transaction directly correlates with consumer satisfaction and throughput in high-volume settings. Radius accelerates the process with specialized tone profiles.

Rapid High-Throughput: For point-of-sale environments, LISNR offers Point 1000 and Point 2000 tone profiles. These are optimized for sub-1 meter range and engineered for high throughput, enabling near-instantaneous credential exchange for rapid checkout and self-service kiosks. Seamless User Experience: The process can be nearly entirely automated: the user simply opens the app, and the transaction is initiated and verified by proximity, eliminating manual input, scanning, or tapping. 4. Low-Cost, Universal Deployment

Radius is a software-only solution that democratizes access to secure, contactless payment infrastructure.

Hardware-Agnostic: The SDK is integrated into existing applications and requires only a device’s standard speaker and microphone. This removes the need for costly upgrades to POS hardware, dramatically reducing the capital expenditure barrier for global payment modernization. Scalability: As a software solution, upgrading the entire payment infrastructure is as easy as updating the app. Because there is no new hardware to manage, payment providers can achieve unparalleled scale and speed in deploying secure payment functionality across millions of endpoints instantly.

LISNR is the worldwide leader in proximity verification because our software-first approach delivers the security and reliability the payments industry demands, without sacrificing the frictionless experience consumers expect.

Want to Learn more?

We’d love to learn more about your payment solution and discuss how data-over-sound can help improve your consumer experience. Learn more about our solutions in finance on our website or contact us to set up a meeting. 

 

 

The post 4 Ways Ultrasonic Proximity Solves the Security-Friction Trade-Off appeared first on LISNR.


Ockto

Efficiënter beoordelen zonder gedoe: documentloos is de nieuwe standaard

De tijd dat je stapels documenten nodig had om een klant goed te beoordelen, loopt op z’n einde. In een wereld waarin snelheid, compliance en klanttevredenheid steeds belangrijker worden, is werken met pdf’s, bijlagen en handmatige controles niet meer houdbaar. Zeker in de credit management sector leidt het oude proces tot vertraging, fouten en frustratie – voor zowel de klant als de or

De tijd dat je stapels documenten nodig had om een klant goed te beoordelen, loopt op z’n einde. In een wereld waarin snelheid, compliance en klanttevredenheid steeds belangrijker worden, is werken met pdf’s, bijlagen en handmatige controles niet meer houdbaar. Zeker in de credit management sector leidt het oude proces tot vertraging, fouten en frustratie – voor zowel de klant als de organisatie.


Ontology

Building What Matters

The Future of Web3 Communities Everyone in Web3 talks about community. It is the word every project uses. The badge everyone wears. But what does it actually mean? Too often, “community” becomes a checkbox. A Telegram channel. A Discord server with NFT giveaways. Some quick incentives to drive engagement. It looks alive, but it is often built on borrowed attention. When the rewards stop, so
The Future of Web3 Communities

Everyone in Web3 talks about community. It is the word every project uses. The badge everyone wears. But what does it actually mean?

Too often, “community” becomes a checkbox. A Telegram channel. A Discord server with NFT giveaways. Some quick incentives to drive engagement. It looks alive, but it is often built on borrowed attention. When the rewards stop, so does the activity.

That is not a community. That is marketing.

Real community building is slower. It is harder. It is the process of aligning people who build with people who use what is built. It is finding the point where incentives and intention meet. Because incentives bring people in, but intention keeps them there.

Ontology has been working at this intersection for years. Its ecosystem, Ontology Network, ONT ID, ONTO Wallet, and Orange Protocol, is designed to make digital identity, reputation, and ownership usable. The mission is not to promise a new world. It is to build the tools that make that world functional.

The challenge, and the opportunity, lies in connection. How do we connect the builders who create new infrastructure with the users who actually need it? How do we make sure that what gets built is not only possible, but wanted?

The Two Paths to Community

There are two basic ways to grow a Web3 community.

The first is bottom-up. Builders and users start together, often from an open-source idea or shared need. Growth is organic. The intent is pure. It can lead to real innovation, but it often lacks structure. Without incentives or direction, momentum slows. Projects fade before reaching scale.

The second is top-down. A project defines the mission, creates incentives, and drives participation. This works in the short term. It brings clear goals and resources. But it risks becoming transactional. When participation is driven only by reward, genuine buy-in disappears.

Ontology’s view is that neither path works alone. Bottom-up builds belief. Top-down brings clarity. The right approach mixes both. You need intent to guide action, and incentives to accelerate it.

Incentives Are Not the Enemy

Incentives get a bad reputation in Web3, mostly because they are often misused. Too much focus on token rewards can distort priorities. But incentives are not the problem. Misalignment is.

Used correctly, incentives can do what they are meant to do: attract attention, reward effort, and encourage collaboration. They should not replace purpose. They should amplify it.

A healthy Web3 community does not reward speculation. It rewards contribution. The best projects find ways to recognize value that is created, not just traded. That is where Ontology’s focus on verifiable identity and reputation becomes powerful.

Through tools like ONT ID and Orange Protocol, participants can prove who they are and what they have done. This makes contribution measurable. It lets communities recognize real participation, not just noise. Builders can see who their users are. Users can trust who they are working with.

That is how you turn incentives from a gimmick into a growth engine.

What People Need vs. What People Want

Every product in Web3 faces a simple question: do people need it, or do they want it?

The truth is that need alone is not enough. People need security, privacy, and control of their data, but they rarely act on those needs until they want the solution. Want drives action.

At the same time, want without need leads to hype. Short-term excitement, no lasting value.

The strongest projects meet both. They make people want what they need. That is the balance Ontology’s tools aim to strike. Identity and reputation are not new ideas, but in Web3 they become essential. Users are learning that decentralized identity is not just a feature. It is freedom. It is usability.

When developers build with that in mind, they create products that solve real problems. ONTO Wallet gives users control of their assets and identity in one place. Orange Protocol turns reputation into a building block for trust. ONT ID lets applications integrate secure, verifiable identity without friction.

These are not abstract innovations. They are the foundation for the next generation of apps, games, and communities.

The Bridge Between Builders and Users

Community building in Web3 is not just about size. It is about structure. Builders and users need to meet in the middle.

That is where Ontology wants to focus: creating spaces and systems where developers and users can collaborate directly. Builders should understand what users need before they design. Users should influence what gets built. The result is not just adoption, but alignment.

How that happens can vary. Incubators can bring early projects into focus. Incentives can reward experimentation. Retrospective funding can support what already works. The structure is flexible. The principle is constant. Connect intent with incentive.

Ontology’s ecosystem gives that structure a home. It already supports tools for identity, data, and trust. The next step is bringing those who build with those who use. Because Web3 only scales when both sides grow together.

From Incentives to Intent

The early years of Web3 were about speculation. The next phase is about utility. The projects that last will be the ones that shift from short-term incentives to long-term intent.

That means building for real people, not just wallets. It means communities where participation has meaning, and contribution has visibility. It means giving users a reason to stay even when rewards change.

Ontology’s technology is ready for that shift. But technology alone is not enough. It needs people. Builders who see the value of decentralized identity and reputation. Users who want control and trust. Contributors who believe in open collaboration.

The future of Web3 will not be built by one group or the other. It will be built by both, together.

The Next Step

If the goal of Web3 is freedom, then community is the mechanism that gets us there. Not through marketing or speculation, but through shared purpose.

Ontology is ready to help build that future. To connect the developers who create with the users who validate. To make collaboration not just possible, but natural.

It starts by asking the right question: what do people need, and what do they want? Then building where those answers overlap.

Let us bring you together. Builders, meet your users. Users, meet your builders. The next phase of Web3 begins with both.

Building What Matters was originally published in OntologyNetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


ComplyCube

19 Virtual Asset Providers Fined up to $163,000 by Dubai Regulators

Nineteen Virtual Asset firms in Dubai have been charged with penalties amounting to $163,000. These firms were fined for operating without a Virtual Assets Regulatory Authority (VARA) license and breaching Dubai's marketing rules. The post 19 Virtual Asset Providers Fined up to $163,000 by Dubai Regulators first appeared on ComplyCube.

Nineteen Virtual Asset firms in Dubai have been charged with penalties amounting to $163,000. These firms were fined for operating without a Virtual Assets Regulatory Authority (VARA) license and breaching Dubai's marketing rules.

The post 19 Virtual Asset Providers Fined up to $163,000 by Dubai Regulators first appeared on ComplyCube.


Recognito Vision

Why ID Verification Services Are the Smart Choice for Businesses Verifying Customers

You know that moment when a new app asks for your ID and selfie before letting you in? You sigh, snap the photo, and in seconds it says “You’re verified!” It feels simple, but behind that small step sits an advanced system called ID verification services that keeps businesses safe and fraudsters out. In today’s...

You know that moment when a new app asks for your ID and selfie before letting you in? You sigh, snap the photo, and in seconds it says “You’re verified!” It feels simple, but behind that small step sits an advanced system called ID verification services that keeps businesses safe and fraudsters out.

In today’s digital world, identity verification isn’t a luxury. It’s a necessity. Without it, online platforms would be a playground for scammers. That’s why more companies are turning to digital ID verification to secure their platforms while keeping user experiences smooth and fast.

 

How ID Verification Evolved into a Digital Superpower

Not too long ago, verifying someone’s identity meant visiting a bank, filling out forms, and waiting days for approval. It was slow and painful. Today, online identity verification has turned that ordeal into a 10-second selfie check.

Feature Traditional ID Checks Digital ID Verification Time Days or weeks Seconds or minutes Accuracy Prone to human error AI-powered precision Accessibility In-person only Anywhere, anytime Security Paper-based Encrypted and biometric

According to a Juniper Research 2024 report, businesses using digital identity checks have reduced onboarding times by 55% and cut fraud by nearly 40%. That’s not an upgrade, that’s a revolution.

 

How ID Verification Services Actually Work

It looks easy on your screen, but behind the scenes, it’s like a full orchestra performing perfectly in sync. When you upload your ID, OCR technology instantly extracts your details. Then, facial recognition compares your selfie to the photo on your document, while an ID verification check cross-references the data with secure global databases.

All this happens faster than your coffee order at Starbucks. And yes, it’s fully encrypted from start to finish.

If you want to see how global accuracy standards are tested, visit the NIST Face Recognition Vendor Test (FRVT). This benchmark helps developers measure the precision of their facial recognition algorithms.

 

Why Businesses Are Making the Shift

Let’s be honest, no one likes waiting days to get verified. Businesses know that, and users expect speed. So, they’re shifting from manual checks to identity verification solutions that deliver results in real time.

ID verification software gives businesses an edge by:

Cutting down on manual reviews

Reducing fraud risks through AI analysis

Staying compliant with rules like GDPR

Enhancing global accessibility

A McKinsey & Company study found that businesses using automated ID verification checks experienced up to 70% fewer fraudulent sign-ups. Another Gartner analysis (2023) reported that automation in verification reduces onboarding costs by over 50%.

So, businesses aren’t just going digital for fun; they’re doing it to stay alive in a market where users expect instant trust.

 

The Technology Making It All Possible

Every smooth verification hides some serious tech genius. Artificial intelligence detects tampered IDs or fake lighting, while machine learning improves detection accuracy over time. Facial recognition compares live selfies to document photos, even if your hair color or background lighting changes.

The FRVT 1:1 results show that today’s best facial recognition models are over 20 times more accurate than they were a decade ago, according to NIST.

Optical Character Recognition (OCR) handles the text on IDs, and encryption ensures data privacy. It’s these small but powerful innovations that make modern ID document verification fast, secure, and scalable.

Want to explore real-world tech examples? Visit the Recognito Vision GitHub, where you can see how advanced verification systems are built from the ground up.

 

Why It’s a Smart Investment

Investing in reliable ID verification solutions isn’t just about compliance, it’s about building customer trust. When users feel safe, they’re more likely to finish sign-ups and come back.

According to Statista’s 2024 Digital Trust Report, companies using digital identity verification saw conversion rates increase by 30–35%. That’s because users today value both speed and security.

So, when you invest in this technology, you’re not just protecting your business. You’re giving users the confidence to engage without hesitation.

Where ID Verification Shines

The beauty of user ID verification is that it works across every industry. It’s not just for banks or fintech startups.

In finance, it prevents money laundering and fraud.

In healthcare, it confirms patient identities for telemedicine.

In eCommerce, it helps fight fake orders and stolen cards.

In gaming, it enforces age restrictions.

In ridesharing and rentals, it keeps both parties safe.

According to a 2022 IBM Security Study, 82% of users say they trust companies more when those companies use digital identity checks. That’s how powerful this technology is; it builds credibility while keeping everyone safe.

 

Recognito Vision’s Role in Modern Verification

For businesses ready to step into the future, Recognito Vision makes it simple. Their ID document recognition SDK helps developers integrate verification directly into apps, while the ID document verification playground lets anyone test the process firsthand.

Recognito’s platform blends AI accuracy, fast processing, and user-friendly design. The result? Businesses verify customers securely while users hardly notice it’s happening. That’s efficiency at its best.

 

Challenges to Consider

Of course, nothing’s perfect. Some users hesitate to share IDs online, and global documents come in thousands of formats. Integrating verification tools into older systems can also feel tricky.

However, choosing a trustworthy ID verification provider can solve most of these issues. As Gartner’s 2024 Cybersecurity Trends Report points out, companies that adopt verified digital identity frameworks see significantly fewer data breaches than those using manual checks.

So while there are challenges, the benefits easily outweigh them.

 

The Road Ahead

The next phase of digital identity verification is all about control and privacy. Imagine verifying yourself without even sharing your ID. That’s what decentralized identity systems and zero-knowledge proofs are bringing to life.

According to the PwC Global Economic Crime Report 2024, widespread digital ID verification could save over $1 trillion in fraud losses by 2030. That’s not science fiction, it’s happening right now.

The world is heading toward frictionless, instant trust. And businesses that adopt early will lead the pack.

 

Final Thoughts

At its core, ID verification services aren’t just about checking who someone is. They’re about creating confidence for users, for businesses, and for the digital world as a whole.

If you’re a company ready to modernize and protect your platform, explore Recognito Vision’s identity verification solutions. Because in an era of deepfakes, scams, and cyber tricks, the smartest move is simply knowing who you’re dealing with safely, quickly, and confidently.

 

Frequently Asked Questions

 

1. What are ID verification services and how do they work?

ID verification services confirm a person’s identity by analyzing official ID documents and matching them with facial or biometric data using AI technology.

 

2. Why are ID verification services important for businesses?

They help businesses prevent fraud, comply with KYC regulations, and build customer trust through secure and fast verification processes.

 

3. Is digital ID verification secure for users?

Yes, digital ID verification is highly secure because it uses encryption, biometric checks, and data protection standards to keep user information safe.

 

4. How do ID verification services help reduce fraud?

They detect fake or stolen IDs, verify real users instantly, and prevent unauthorized access, reducing fraud risk significantly.

 

5. What should businesses look for in an ID verification provider?

Businesses should look for providers that offer fast results, global document support, strong data security, and full regulatory compliance.

Wednesday, 15. October 2025

Anonym

DVAM 2025: MySudo discount for survivors of domestic violence

October is National Domestic Violence Awareness Month (DVAM), an annual event dedicated to shedding light on the devastating impact of domestic violence and advocating for those affected.  The theme for DVAM 2025 is With Survivors, Always, which is exploring what it means to be in partnership with survivors towards safety, support, and solidarity. Anonyome Labs […] The post DVAM 2025: MySud

October is National Domestic Violence Awareness Month (DVAM), an annual event dedicated to shedding light on the devastating impact of domestic violence and advocating for those affected. 

The theme for DVAM 2025 is With Survivors, Always, which is exploring what it means to be in partnership with survivors towards safety, support, and solidarity.

Anonyome Labs stands #WithSurvivors this National Domestic Violence Awareness Month and every day—and is proud to help empower safety through privacy for survivors of domestic violence via our Sudo Safe Initiative.

What is the Sudo Safe Initiative?

The Sudo Safe Initiative is a program developed to bring privacy to those at higher risk of verbal harassment or physical violence.

Sudo Safe offers introductory discounts on the MySudo privacy app, to help people to keep their personally identifiable information private.

You can get a special introductory discount to try MySudoby becoming a Sudo Safe Advocate.

Here’s how it works:

Visit our website at anonyome.com. Sign up to be a Sudo Safe Advocate — it’s quick and easy. Once you’re signed up, you’ll receive details on how to access your exclusive discount and start using MySudo.

In addition to survivors of domestic violence, the Sudo Safe Initiative also empowers safety through privacy for:

Healthcare professionals Teachers Foster care workers Volunteers Survivors of violence, bullying, or stalking.

How can MySudo help survivors of domestic violence?

MySudo allows people to communicate with others without using their own phone number and email address, to reduce the risk of that information being used for tracking or stalking.

With MySudo, a user creates secure digital profiles called Sudos. Each Sudo has a unique phone number, handle, and email address for communicating privately and securely.

The user can avoid making calls and sending texts and emails from their personal phone line and email inbox by using the secure alternative contact details in their Sudos.

No personal information is required to create an account with MySudo through the app stores. 

Download MySudo

Four other ways to help survivors of domestic violence Educate yourself and others

Learn and share the different types of abuse (physical, emotional, sexual, financial, and technology-facilitated) and how to find local resources and support services. 

Listen without judgment

One of the most powerful things you can offer a domestic violence survivor is support, by doing things like:

Creating a safe space for them to share their experiences without fear of judgment or blame Letting them express their feelings while validating their emotions Being willing to listen  Helping them create a safety plan.

Encourage professional support

Encourage your friend or family experiencing domestic violence to seek help from counselors, therapists, or support groups that specialize in trauma and abuse. You can assist by researching local resources, offering to accompany them to appointments, or helping them find online support communities. Professional guidance can provide victims with the tools they need to rebuild their lives.

Raise awareness and advocate for change

Support survivors not just during DVAM, but year-round. Find ideas here and learn about the National Domestic Violence Awareness Project.

Become a Sudo Safe Advocate

If your organization can help us spread the word about how MySudo allows at-risk people to interact with others without giving away their phone number, email address, and other personal details, we invite you to become a Sudo Safe Advocate.

As an advocate, you’ll receive:

A toolkit of shareable privacy resources A guide to safer communication Special MySudo promotions Your own digital badge.

Become a Sudo Safe Advocate today.

More information

Contact the National Domestic Violence Hotline.

Learn about the National Domestic Violence Awareness Project.

Learn more about Sudo Safe Initiative and Anonyome Labs.

Anonyome Labs is also a proud partner of the Coalition Against Stalkerware.

The post DVAM 2025: MySudo discount for survivors of domestic violence appeared first on Anonyome Labs.


SC Media - Identity and Access

How to secure corporate social media accounts before they become a breach vector

Many company social-media accounts don't follow security policies or best practices, creating opportunities for attackers and risks for the organizations. Here's how to get the accounts under control.

Many company social-media accounts don't follow security policies or best practices, creating opportunities for attackers and risks for the organizations. Here's how to get the accounts under control.


HYPR

HYPR Delivers the First True Enterprise Passkey for Microsoft Entra ID

For years, the promise of a truly passwordless enterprise has felt just out of reach. We’ve had passwordless for web apps, but the desktop remained a stubborn holdout. We’ve seen the consumer world embrace passkeys, but the solutions were built for convenience, not the rigorous security and compliance demands of the enterprise. This created a dangerous gap, a world where employees could

For years, the promise of a truly passwordless enterprise has felt just out of reach. We’ve had passwordless for web apps, but the desktop remained a stubborn holdout. We’ve seen the consumer world embrace passkeys, but the solutions were built for convenience, not the rigorous security and compliance demands of the enterprise. This created a dangerous gap, a world where employees could access a sensitive cloud application with a phishing-resistant passkey, only to log in to their workstation with a phishable password.

That gap closes today.

HYPR is proud to announce our partnership with Microsoft to deliver the industry's first true enterprise-grade passkey solution. By integrating HYPR’s non-syncable, FIDO2 passkeys directly with Microsoft Entra ID, we are finally eliminating the last password and providing a unified, phishing-resistant authentication experience from the desktop to the cloud.

What is the Difference Between Enterprise and Other Passkeys?

The term "passkey" has become a buzzword, but not all passkeys are created equal. The synced, consumer-grade passkeys offered by large tech providers are a fantastic step forward for the public, but they present significant challenges for the enterprise:

Loss of Control: Synced passkeys are stored in third-party consumer cloud accounts, outside of enterprise control and visibility. Security Gaps: They are designed to be shared and synced by users, which can break the chain of trust required for corporate assets. The Workstation Problem: They do not natively support passwordless login for enterprise workstations (Windows/macOS), leaving the most critical entry point vulnerable.

For the enterprise, you need more than convenience. You need control, visibility, and end-to-end security. You need an enterprise passkey.

Introducing HYPR Enterprise Passkeys for Microsoft Entra ID

HYPR’s partnership with Microsoft directly addresses the enterprise passkey gap. Our solution is purpose-built for the demands of large-scale, complex IT environments that rely on Microsoft for their identity infrastructure.

This isn't a retrofitted consumer product. It's a FIDO2-based, non-syncable passkey that is stored on the user's device, not in a third-party cloud. This ensures that your organization retains full ownership and control over the credential lifecycle.

With a single, fast registration, your employees can use one phishing-resistant credential to unlock everything they need:

Passwordless Desktop Login: Users log in to their Entra ID-joined Windows workstations using the HYPR Enterprise Passkey on their phone. No password, no phishing, no push-bombing.
Seamless SSO and App Access: That same secure login event grants them a Primary Refresh Token (PRT), seamlessly signing them into all their Entra ID-protected applications without needing to authenticate again. Why Is This a Game-Changer for Microsoft Environments?

This partnership isn't just about adding another MFA option; it's about fundamentally upgrading the security posture of your entire Microsoft ecosystem.

Effortless Deployment: Go Passwordless in Days, Not Quarters

You’ve invested heavily in the Microsoft ecosystem. Now, you can finally maximize that investment by eliminating the #1 cause of breaches: the password. The HYPR and Microsoft partnership makes true, end-to-end passwordless authentication a reality.

There are no complex federation requirements, no painful certificate management, and no AD dependencies. It's a simple, lightweight deployment that allows you to roll out phishing-resistant MFA across your entire workforce in days, not quarters.

Empower your employees with fast, frictionless access that works everywhere they do. And empower your security team with the control and assurance that only a true enterprise passkey can provide.

Ready to bring enterprise-grade passkeys to your Microsoft environment? Schedule your personalized demo today.

Enterprise Passkey FAQ

Q: What is a "non-syncable" passkey?

A:  A non-syncable passkey is a FIDO2 credential that is bound to the user's physical device and cannot be copied, shared, or backed up to a third-party cloud. This provides a higher level of security and assurance because the enterprise maintains control over where the credential resides.

Q: How is this different from using an authenticator app for MFA?

A: Authenticator apps that use OTPs or push notifications are still susceptible to phishing and push-bombing attacks. HYPR Enterprise Passkeys are based on the FIDO2 standard, which is cryptographically resistant to phishing, man-in-the-middle, and other credential theft attacks

Q: What does the deployment process look like?

A: Deployment is designed to be fast and lightweight. It involves deploying the HYPR client to workstations and configuring the integration within your Microsoft Entra ID tenant. Because there are no federation servers or complex certificate requirements, many organizations can go from proof-of-concept to production rollout in a matter of days.

Q: Does this support Bring-Your-Own-Device (BYOD) scenarios?

A: Yes. The solution is vendor-agnostic and supports both corporate-managed and employee-owned (BYOD) devices, providing a simple, IT-approved self-service recovery flow that keeps users productive without compromising security.


Ocean Protocol

CivicLens : Building the First Structured Dataset of EU Parliamentary Speeches

CivicLens : Building the First Structured Dataset of EU Parliamentary Speeches A new Annotators Hub challenge The European Parliament generates thousands of speeches, covering everything from local affairs to international diplomacy. These speeches shape policies that impact millions across Europe and beyond. Yet, much of this discourse remains unstructured, hard to track, and difficult to
CivicLens : Building the First Structured Dataset of EU Parliamentary Speeches

A new Annotators Hub challenge

The European Parliament generates thousands of speeches, covering everything from local affairs to international diplomacy. These speeches shape policies that impact millions across Europe and beyond. Yet, much of this discourse remains unstructured, hard to track, and difficult to analyze at scale.

CivicLens, the second and latest task in the Annotators Hub, invites contributors to help change that. Together with Lunor, Ocean is building a structured, research-grade dataset based on real EU plenary speeches. Your annotations will support civic tech, media explainers, and political AI, and will give you the chance to earn a share of the $10,000 USDC prize pool.

What you’ll do

You’ll read short excerpts from speeches and answer a small set of targeted questions:

Vote Intent: Does the speaker explicitly state how they will vote (yes/no/abstain/unclear)? Tone: Is the rhetoric cooperative, neutral, or confrontational? Scope of Focus: Is the emphasis on the EU, the speaker’s country, or both? Verifiable Claims: Does the excerpt contain a factual, checkable claim (flag and highlight the span)? Topics (multi-label): e.g., economy, fairness/rights, security/defense, environment/energy, governance/procedure, health/education, technology/industry. Ideological Signal (if any): Is there an inferable stance or framing (e.g., pro-integration, national interest first, market-oriented, social welfare-oriented), or no clear signal?

Each task follows a consistent schema with clear tooltips and examples. Quality is ensured through overlap assignments, consensus checks, and spot audits.

Requirements Good command of written English (reading comprehension and vocabulary) Ability to recognize when political or ideological arguments are being made Basic understanding of common political dimensions (e.g., left vs. right, authoritarian vs. libertarian) Minimum knowledge of international organizations and relations (e.g., what the EU is, roles of member states) Awareness of what parliamentary speeches are and their general purpose in the context of EU roll call votes Why it matters

Your contributions will help researchers and civic organizations better understand political debates, predict voting behavior, and make parliamentary discussions more transparent and accessible.

The resulting dataset isn’t just for political analysis, but it has broad, real-world applications:

Fact-checking automation: AI models trained on this data can learn to distinguish checkable assertions from opinions or vague claims, helping organizations like PolitiFact, Snopes, or Full Fact prioritize their verification workload Compliance and policy tracking: Financial compliance platforms, watchdog groups, and regtech firms can detect and monitor predictive or market-moving statements in political and economic discourse Content understanding and education: News aggregators, summarization tools, and AI assistants (like Feedly or Artifact) can better tag and summarize political content. The same methods can also power educational apps that teach critical thinking and media literacy Rewards

A total prize pool of $10,000 USDC is available for contributors.

Rewards are distributed linearly based on validated submissions, using the formula:

Your Reward = (Your Score ÷ Sum of All Scores) × Total Prize Pool

The higher the quality and volume of your accepted annotations, the higher your share.

For full participation details, submission rules, and instructions, visit the quest details page on Lunor Quest.

CivicLens : Building the First Structured Dataset of EU Parliamentary Speeches was originally published in Ocean Protocol on Medium, where people are continuing the conversation by highlighting and responding to this story.


SC Media - Identity and Access

Credential compromise possible via old Windows protocols

Organizations leveraging legacy Windows communication protocols Link-Local Multicast Name Resolution and NetBIOS Name Service could have their credentials pilfered without the exploitation of software flaws, according to Infosecurity Magazine.

Organizations leveraging legacy Windows communication protocols Link-Local Multicast Name Resolution and NetBIOS Name Service could have their credentials pilfered without the exploitation of software flaws, according to Infosecurity Magazine.


Infocert

VPN for lawyers, labour consultants, accountants

Lawyers, labour consultants, accountants: 5 practical ways in which a Business VPN can protect your work and data   Are you a lawyer working away? A smartworking accountant? Do you provide consulting services at clients’ premises? If so, read this article to learn why you should use a Business VPN to connect to a network […] The post VPN for lawyers, labour consultants, accountants appeared
Lawyers, labour consultants, accountants: 5 practical ways in which a Business VPN can protect your work and data

 

Are you a lawyer working away? A smartworking accountant? Do you provide consulting services at clients’ premises? If so, read this article to learn why you should use a Business VPN to connect to a network other than your own. A VPN for business is a valuable professional ally because it helps protect highly sensitive information while guaranteeing secure remote access to professional content wherever you are, even abroad.

 

So, what exactly can a VPN – a virtual private network – do for you when you work remotely? Here are five practical ways in which using a VPN for remote work can make a difference to professionals and small businesses.

Work from home security

You are working from home and, as always, you have to access business management systems, dashboards, customer and supplier databases. You may also need to consult or send confidential documents like balance sheets, contracts and court procedures. You even have crucial calls and meetings on your agenda to finalise agreements or submit reports. To do all this, you rely on your home router and perhaps use your own laptop or smartphone. Without a VPN to protect your connection, your home network can become a point of vulnerability – a potential entry point for eavesdropping and data breaches. Have you ever thought what would happen if all the information you work with were to fall into the wrong hands? Your clients’ confidentiality, the security of your work and your own professional reputation would be severely compromised.

 

A VPN creates an encrypted and therefore secure tunnel between your device and company servers, ensuring cybersecurity and protecting resources and internal communications. In this way, even remotely sharing files with co-workers or customers is absolutely secure. Many premium VPNs also offer additional security tools that protect you from malware, intrusive advertisements, dangerous sites and trackers, and warn you in case of data leaks.

 

Public Wi-Fi security

On a business trip, you are highly likely to use hotel or airport lounge Wi-Fi to complete a presentation or access your corporate cloud. What could happen without a VPN? Imagine you are waiting for your flight and want to check your email. The moment you connect to the public network and access your mail server, a hacker intercepts your traffic, reads your email and steals your login credentials. You don’t know it, but you have just suffered what is called a man-in-the-middle attack. With a virtual private network, no hacker can see what you do online, even on open Wi-Fi networks.

Accessing national services and portals, even abroad

If you are abroad and need to access essential international websites, portals and services like National Insurance, Inland Revenue, or corporate intranets, you may encounter access limitations and geo-blocking. This is because, for security reasons, some public portals and corporate networks choose to restrict access from foreign IPs. In some cases, the site may not function properly or may not show certain sections.

 

In these cases, a VPN is absolutely indispensable. Irrespective of where you are physically located, all you need to do is connect to a server in another country to simulate a presence there, bypass geo-blocking and gain access the content you want, while still enjoying an encrypted and protected connection.

Privacy and data security

This aspect is often overlooked. Surfing online without adequate protection endangers the security not only of your own information but also that of your employees, collaborators, suppliers and customers, risking potentially enormous economic and reputational damage.

 

If you think data breaches only concern big tech companies like Meta, Amazon and Google, you are wrong. Very often hackers and cybercriminals choose to target professional firms or small businesses that fail to pay attention to IT security, underestimating the need for proper tools and protective infrastructures to prevent data breaches.

 

When dealing with sensitive data, health, legal or financial information on a daily basis, keeping it secure is not just common sense in today’s fully digitalised world, but a legal duty.

 

Data privacy is as crucial for individuals as it is for companies, because it represents a key element of protection, trust and accountability. It means maintaining control over your personal information and protecting yourself against abuse or misuse that may damage brand reputation or personal security.

 

Using a VPN for business travel is one of the tools that cybersecurity experts recommend to protect privacy and client data, since, as we have seen, VPNs change your IP address and encrypt your Internet connection, preventing potential intrusions.

Access to international websites and content

If you work with international customers or suppliers, a virtual private network is indispensable. As we have seen, for security reasons, some institutional and professional sites and portals restrict access based on your geographical location. With a VPN, you can simulate your presence in a country other than the one in which you are physically located.

For instance, do you ever need to consult public registers or legal databases in non-EU countries, access tax or customs portals, use SaaS software for foreign markets or monitor the pricing strategies of foreign competitors by accessing local versions of their sites? With a VPN you only need to connect to the server of the country or geographical area you are interested in to bypass geo-blocking and access the financial resources you need.

 

Whatever your profession, whatever the size of your company, and wherever you are, a VPN is indispensable to the security and privacy of your work.

The post VPN for lawyers, labour consultants, accountants appeared first on Tinexta Infocert international website.


VPN: a non-technical guide for professionals

What is a VPN? A non-technical guide for professionals We have been living in a vast digital workplace for some time now, a permanently connected environment that transcends the boundaries of the traditional office to include the sofa at home, airport lounges, hotel rooms, coffee shops and train carriages. In this fluid and constantly evolving […] The post VPN: a non-technical guide for professi
What is a VPN? A non-technical guide for professionals

We have been living in a vast digital workplace for some time now, a permanently connected environment that transcends the boundaries of the traditional office to include the sofa at home, airport lounges, hotel rooms, coffee shops and train carriages. In this fluid and constantly evolving digital space, you read the news, shop online, download apps, participate in calls and meetings, answer emails, access sensitive data, perform banking transactions, and more besides, on a daily basis. But do you ever wonder what happens to your data while you are online? Are you really in control of the information you share, the sites you visit, and the actions you take? Spoiler: a large number of others can see what you do during your daily visits to the Internet. Unless, of course, you use a VPN – a Virtual Private Network to protect your Internet connection and online privacy. So, how does a VPN work? A VPN acts as a vigilant and attentive guardian to protect you from prying eyes and malicious attacks.

Who can see what you do online?

Though it might seem so, surfing online is by no means private. Every click you make leaves a trace. These traces form what is called a “digital shadow” or fingerprint. Every time you “touch” something online, many actors monitor, collect or intercept what you do. Who are these people?

 

1. Your Internet Service Provider (ISP): your provider can track all the sites you visit, when you visit them, and for how long. Not only that, but your provider may store and share certain information with third parties (not only the police and judicial authorities, but even advertisers) for a variable period of time, depending on the type of content, the consent you have given, internal policies and legislation (national and European). In Italy, for example, Internet service providers may retain certain data for up to 10 years.

 

2. Network administrators: if you connect to corporate or public Wi-Fi, e.g. a hotel network, the network administrator can monitor its traffic and thus have access to information on your online activities.

 

3. Websites and online platforms: many sites collect browsing data, including through cookies (just think of all those pop-ups that constantly interrupt your browsing), pixels and trackers. This allows them to profile you in order to show you personalised advertisements or sell your data to third parties.

 

4. Search engines: if you use a traditional search engine like Google, Bing or Yahoo, everything you do is traceable – even if you use “Incognito mode”. If you want to keep your searches private, we suggest using non-traceable search engines such as DuckDuckGo, Qwant, Startpage or Swisscows.

 

5. Hackers and criminals: surfing online exposes you to daily risks, especially when you choose to connect to unprotected public Wi-Fi networks or surf without the use of security tools like antivirus software, VPNs or anti-malware tools. Credentials, emails, bank details, even your identity, are valuable commodities.

The Internet is not a private house; it is a public square.

Every time you connect to the Internet, your device uses an Internet Protocol (IP) address, which can reveal not only your online identity, but also the location from which you connect. Technically, an IP address is a numerical label assigned by the Internet service provider. Because it is used to identify individual devices among billions of others, it can be regarded as a postal address in the digital world.

 

When you enter the name of a website (example.com) in your browser’s address bar, your computer has to perform certain operations because it cannot actually read words, only numbers. First of all, the browser locates the IP address corresponding to the site you want (example.com = 192.168.1.1), then, once the location is found, it loads the site onto the screen. An IP address functions like a home address, ensuring that data sent over the Internet always reaches the correct destination.

 

This identifier is visible to all the subjects listed above.

 

Not only that, but the information you routinely exchange online – passwords, emails, documents and sensitive data – often travel in “plaintext” i.e. without being encrypted. This means that anyone who manages to intercept them on their way through the network can read or copy them. Think of sending a postcard: anyone intercepting it on the way can read its contents, your name, the recipient’s address and so on. The same happens with your online data. Not using adequate protection systems, like a VPN, is like leaving your front door open. Would you ever do that?

How does a VPN work?

Typically, when you attempt to access a website, your Internet provider receives the request and directs it straight to the desired destination. A VPN, however, directs your Internet traffic through a remote server before sending it on to its destination, creating an encrypted tunnel between your device and the Internet. This tunnel not only secures the data you send and receive, but also hides it from outside eyes, providing you with greater privacy and online security. A VPN also changes your real IP address (i.e. your digital location), e.g. Milan, and replaces it with that of the remote server you have chosen to connect to, e.g. Tokyo. In this way, no one – neither your Internet provider, nor the sites you visit, nor any malicious attackers – can know where you are really connecting from.

 

It is as if the virtual public square, where everyone sees and listens, turns into a closed room, invisible to those outside, at the click of a button.

 

This, in brief, is how a virtual private network works:

 

1. First, the VPN server identifies you by authenticating your client.

2. The VPN server applies an encryption protocol to all the data you send and receive, making it unreadable to anyone trying to intercept it.

3. The VPN creates a virtual, secure “tunnel” through which your data travels to its destination, so that no one can access it without authorisation.

4. The VPN wraps each data packet inside an external packet (an “envelope”) which is encrypted by encapsulation. The envelope is the essential element of the VPN tunnel that keeps your data safe during transfer.

5. When the data reaches the server, the external packet is removed through a decryption process.

Using a VPN should be part of your digital hygiene

Every professional should use a VPN, not only when working remotely or using public Wi-Fi, but as an essential tool to surf more securely, privately and responsibly, day after day. You can think of a VPN as a habit of digital hygiene that provides greater privacy and an additional layer of protection against potential online threats.

A VPN:

 

● encrypts your data, protecting you from prying eyes
● changes your real IP, protecting your identity
● routes your data through remote servers, creating a secure and private tunnel
● stops your Internet provider and other third parties tracking your data.

 

To sum up, a VPN is not just a tool for special situations, like using public Wi-Fi, accessing restricted content. Neither is it only for experienced users and cybersecurity enthusiasts. On the contrary, it is an essential tool – a “must-have” – for all professionals and individuals who want to inhabit the digital space that surrounds us with greater awareness and less fear.

The post VPN: a non-technical guide for professionals appeared first on Tinexta Infocert international website.


auth0

Understanding ReBAC and ABAC Through OpenFGA and Cedar

In this blog post, we’ll explore the differences between ReBAC and ABAC with an in-depth comparison of OpenFGA and Cedar
In this blog post, we’ll explore the differences between ReBAC and ABAC with an in-depth comparison of OpenFGA and Cedar

Tuesday, 14. October 2025

Spruce Systems

Digital Identity Policy Momentum

This article is the second installment of our series: The Future of Digital Identity in America.

Read the first installment in our series on The Future of Digital Identity in America here.

Technology alone doesn’t change societies; policy does. Every leap forward in digital infrastructure (whether electrification, the internet, or mobile payments) has been accelerated or slowed by policy. The same is true for verifiable digital identity. The question today isn’t whether the technology works; it does. The question is whether policy frameworks will make it accessible, trusted, and interoperable across industries and borders.

Momentum is building quickly. State legislatures, federal agencies, and international bodies are beginning to treat verifiable digital identity not as a niche experiment, but as critical public infrastructure. In this post, we’ll explore how policy is shaping digital identity, from U.S. state laws to European regulations, and why governments care now more than ever.

States Leading the Way: Laboratories of Democracy

In the U.S., states have become the proving ground for verifiable digital identity. Seventeen states, including California, New York, and Georgia, already issue mobile driver’s licenses (mDLs) that are accepted at more than 250 TSA checkpoints. By 2026, that number is expected to double, with projections of 143 million mDL holders by 2030, according to ABI Research forecasts.

Seventeen states now issue mobile driver’s licenses accepted at more than 250 TSA checkpoints - digital ID is already real, growing faster than many expected.

California’s DMV Wallet offers one of the most comprehensive examples. In less than two years, over two million Californians have provisioned mobile driver’s licenses, which can be used at TSA checkpoints, in convenience stores for age-restricted purchases, and even online to access government services—real, everyday transactions that people recognize. In addition to the digital licenses, more than thirty million vehicle titles have been digitized using blockchain, making it easier for people to transfer ownership, register cars, or prove title history without mountains of paperwork. Businesses can verify credentials directly, residents can present them online or in person, and the system is designed to work across states and industries. In other words, this program demonstrates proof that digital identity can scale to millions of people and millions of records while solving real problems.

California’s DMV Wallet has issued over two million mDLs and has digitized over 42 million vehicle titles using blockchain - demonstrating trustworthiness at scale.

Utah took a different approach by legislating principles before widespread deployment. SB 260, passed in 2025, lays down a bill of rights for digital identity. Citizens cannot be forced to unlock their phones to present a digital ID. Verifiers cannot track or build profiles from ID use. Selective disclosure must be supported, allowing people to prove an attribute, like being over 21, without revealing unnecessary details. Digital IDs remain optional, and physical IDs must continue to be accepted. Utah’s framework shows how policy can proactively protect civil liberties while enabling innovation.

Utah’s SB 260 doesn’t just pilot identity tech - it builds in privacy and choice from day one, naming those values as rights.

Together, California and Utah illustrate a spectrum of policymaking. One demonstrates what’s possible with rapid deployment at scale - how quickly millions of people can adopt new credentials when the technology is made practical and widely available. The other shows how legislation can proactively embed privacy and choice into the foundations of digital identity, creating durable protections that guard against misuse as adoption grows. Both approaches are valuable: California proves the model can work in practice, while Utah ensures it works on terms that respect civil liberties. Taken together, they show that speed and safeguards are not opposing forces, but complementary strategies that, if aligned, can accelerate trust and adoption nationwide.

Federal Engagement: Trust, Security, and Compliance

Federal agencies are also stepping in, linking digital identity to national security and resilience. The Department of Homeland Security (DHS) is piloting verifiable digital credentials for immigration—a use case where both accuracy and accessibility are essential.

Meanwhile, the National Institute of Standards and Technology (NIST), through its National Cybersecurity Center of Excellence (NCCoE), has launched a hands-on mDL initiative. In collaboration with banks, state agencies, and technology vendors (including 1Password, Capital One, Microsoft, and SpruceID, among others), the project is building a reference architecture demonstrating how mobile driver’s licenses and verifiable credentials can be applied in real-world use cases: CIP/KYC onboarding, federated credential service providers, and healthcare/e-prescribing workflows. The NCCoE has already published draft CIP/KYC use-case criteria, wireframe flows, and a sample bank mDL information page to show how a financial institution might integrate and present mDLs to customers—bringing theory into usable models for regulation and deployment. 

Why the urgency? Centralized identity systems are prime targets for adversaries. Breach one large database, and millions of people’s information is compromised. Decentralized approaches change that risk equation by sharding and encrypting user data, reducing the value of any single “crown jewel” target.

Decentralized identity reshapes the risk equation—no single crown jewel database for adversaries to breach.

Policy is also catching up to compliance challenges in financial services. In July 2025, Congress passed the Guiding and Establishing National Innovation for U.S. Stablecoins (GENIUS) Act, which, among other provisions, directs the U.S. Treasury to treat stablecoin issuers as financial institutions under the Bank Secrecy Act (BSA). Section 9 of the Act requires Treasury to solicit public comment on innovative methods to detect illicit finance in digital assets, including APIs, artificial intelligence, blockchain monitoring, and (critically) digital identity verification.

Treasury’s August 2025 Request for Comment (RFC) builds directly on this mandate. It seeks input on how portable, privacy-preserving digital identity credentials can support AML/CFT and sanctions compliance, reduce fraud, and lower compliance costs for financial institutions. Importantly, the RFC recognizes privacy as a design factor, asking specifically about risks from over-collection of personal data, the sensitivity of information reviewed, and how to implement safeguards alongside compliance.

This is a significant shift: digital identity is not only being framed as a user-rights issue or a convenience feature, but also as a national security and financial stability priority. By embedding identity into the GENIUS Act’s framework for stablecoins and BSA modernization, policymakers are effectively saying that modernized, cryptographically anchored identity is essential for the resilience of U.S. markets.

The European Example: eIDAS 2.0

While the U.S. pursues a patchwork of state pilots and federal engagement, Europe has opted for a coordinated regulatory approach. In May 2024, eIDAS 2.0 came into force, requiring every EU Member State to issue a European Digital Identity Wallet by 2026.

The regulation mandates acceptance across public services and major private sectors like banks, telecoms, and large online platforms. Privacy is baked into the requirements: wallets must be voluntary and free for citizens, support selective disclosure, and avoid central databases. Offline QR options are also mandated, ensuring usability even without connectivity.

Europe is treating digital identity as a right: free, voluntary, private, and accepted across borders.

Why does this matter? For citizens, it means one-click onboarding across borders. For businesses, it means lower compliance costs and reduced fraud. For the EU, it’s a step toward digital sovereignty, reducing dependency on foreign platforms and asserting leadership in global standards.

Identity as Infrastructure

Look closely, and a pattern emerges: policymakers are treating identity as infrastructure. Like roads, grids, or communications networks, identity is a shared resource that underpins everything else. Without it, markets stumble, governments waste resources, and citizens lose trust. With it, economies run smoother, fraud drops, and individuals gain autonomy.

Identity is infrastructure—like roads or grids, it underpins every modern economy and democracy.

This framing (identity as infrastructure) helps explain why governments care now. Fraud losses are staggering, trust in institutions is fragile, and AI is amplifying risks at unprecedented speed. Policy is not just reacting to technology; it’s shaping the conditions for decentralized identity to succeed.

Risks of Policy Done Wrong

Of course, not all policy is good policy. Poorly designed frameworks could centralize power, entrench surveillance, or create vendor lock-in. Imagine if a single state-issued wallet were mandatory for all services, or if verifiers were allowed to log every credential presentation. The result would be digital identity as a tool of control, not freedom.

That’s why principles matter. Utah’s SB 260 is instructive: user consent, no tracking, no profiling, open standards, and continued availability of physical IDs. These are not just policy features; they are guardrails to keep digital identity aligned with democratic values.

Privacy as Policy: Guardrails Before Growth

Alongside momentum in statehouses and federal pilots, civil liberties organizations have raised a critical warning: digital identity cannot scale without strong privacy guardrails. Groups like the ACLU, EFF, and EPIC have cautioned that mobile driver’s licenses (mDLs) and other digital ID systems risk entrenching surveillance if designed poorly.

The ACLU’s Digital ID State Legislative Recommendations outline twelve essential protections: from banning “phone-home” tracking and requiring selective disclosure, to preserving the right to paper credentials and ensuring a private right of action for violations. EFF warns that without these safeguards, digital IDs could “normalize ID checks” and make identity presentation more frequent in American life .

The message is clear: technology alone isn’t enough. Policy must enshrine privacy-preserving features as requirements, not optional features. Utah’s SB 260 points in this direction by mandating selective disclosure and prohibiting tracking. But the broader U.S. landscape will need consistent frameworks if decentralized identity is to earn public trust.

We'll explore these principles in greater depth in a later post in this series, where we examine how civil liberties critiques shape the design of decentralized identity and why policy and technology must work together to prevent surveillance creep.

SpruceID’s Perspective

At SpruceID, we sit at the intersection of policy and technology. We’ve helped launch California’s DMV Wallet, partnered on Utah’s statewide verifiable digital credentialing framework, and collaborated with DHS on verifiable digital immigration credentials. We also contribute to global standards bodies, such as the W3C and the OpenID Foundation, ensuring interoperability across jurisdictions.

Our perspective is simple: decentralized identity must remain interoperable, privacy-preserving, and aligned with democratic principles. Policy can either accelerate this vision or derail it. The frameworks being shaped today will determine whether decentralized identity becomes a tool for empowerment or for surveillance.

Why Governments Care Now

The urgency comes down to four forces converging at once:

Fraud costs are exploding. In 2024, Americans reported record losses - $16.6 billion to internet crime (FBI IC3) and $12.5 billion to consumer fraud (FTC). On the institutional side, the average U.S. data breach cost hit $10.22 million in 2025, the highest ever recorded (IBM). AI is raising the stakes. Synthetic identity fraud alone accounted for $35 billion in losses in 2023 (Federal Reserve). FinCEN has warned that criminals are now using generative AI to create deepfake videos, synthetic documents, and realistic audio to bypass identity checks and exploit financial systems at scale. Global trade requires interoperability. Cross-border commerce depends on reliable, shared frameworks for verifying identity. Without them, compliance costs balloon and innovation slows. Citizens expect both privacy and convenience. People want frictionless, consumer-grade experiences from digital services, but they will not tolerate surveillance or being forced into a single system.

Policymakers increasingly see decentralized identity as a way to respond to all four at once. By reducing fraud, strengthening democratic resilience, supporting global trade, and protecting privacy, decentralized identity offers governments both defensive and offensive advantages.

The Policy Frontier

We are standing at the frontier of decentralized identity. States are pioneering real deployments. Federal agencies are tying identity to national security and compliance. The EU is mandating wallets as infrastructure. Around the world, policymakers are realizing that identity is not just a product, it’s the scaffolding for digital trust.

The decisions made in statehouses, federal agencies, and international bodies over the next few years will shape how identity works for decades. Done right, verifiable digital identity can become the invisible infrastructure of freedom, convenience, and security. Done wrong, it risks becoming another layer of surveillance and control.

That’s why SpruceID is working to align policy with technology, ensuring that verifiable digital identity is built on open standards, privacy-first principles, and user control. Governments care now because the stakes have never been higher. And the time to act is now.

This article is part of SpruceID’s series on the future of digital identity in America.

Subscribe to be notified when we publish the next installment.


SC Media - Identity and Access

Scattered Lapsus$ Hunters release stolen data from Salesforce customers

More data releases are expected, as the industry appears unwilling to negotiate with Scattered Lapsus$ Hunters.

More data releases are expected, as the industry appears unwilling to negotiate with Scattered Lapsus$ Hunters.


Horizons of identity report highlights challenges, opportunities for modern identity programs

Identity evolves from security control to business enabler, driving automation and agility.

Identity evolves from security control to business enabler, driving automation and agility.


Elliptic

$15 billion seized by US originates from Iran/China bitcoin miner "theft"

The US Department of Justice (DOJ) today announced the seizure of bitcoin worth $15 billion from Prince Group's operation of forced-labor scam compounds across Cambodia. Elliptic’s analysis shows that these bitcoins were “stolen” in 2020 from LuBian, a bitcoin mining business with operations in China and Iran.  
The US Department of Justice (DOJ) today announced the seizure of bitcoin worth $15 billion from Prince Group's operation of forced-labor scam compounds across Cambodia.

Elliptic’s analysis shows that these bitcoins were “stolen” in 2020 from LuBian, a bitcoin mining business with operations in China and Iran.

 


Prince Group targeted with $15B crypto seizure and sanctions for pig butchering operations

New sanctions target the Prince Group Transnational Criminal Organization, for its involvement in online scams such as pig butchering. Elliptic has identified crypto wallets associated with the newly-sanctioned entities, which have received transactions worth billions of dollars. Prince Group chairman Chen Zhi was also indicted in a U.S. court today, and has had $15 bill
New sanctions target the Prince Group Transnational Criminal Organization, for its involvement in online scams such as pig butchering.

Elliptic has identified crypto wallets associated with the newly-sanctioned entities, which have received transactions worth billions of dollars.

Prince Group chairman Chen Zhi was also indicted in a U.S. court today, and has had $15 billion in Bitcoin seized. These bitcoins were previously "stolen" from a Chinese bitcoin mining business.

 


Crypto regulatory affairs: UK lifts ban on crypto ETNs for retail investors as government makes digital asset innovation push

UK lifts ban on crypto ETNs for retail investors as government makes digital asset innovation push The UK’s Financial Conduct Authority (FCA) has formally lifted a ban on the offering of cryptoasset exchange traded notes (cETNs) to retail investors - an important indication that the UK is responding to changing market dynamics in an effort to boost innovation and growth. 
UK lifts ban on crypto ETNs for retail investors as government makes digital asset innovation push

The UK’s Financial Conduct Authority (FCA) has formally lifted a ban on the offering of cryptoasset exchange traded notes (cETNs) to retail investors - an important indication that the UK is responding to changing market dynamics in an effort to boost innovation and growth. 


Ocean Protocol

DF159 Completes and DF160 Launches

Predictoor DF159 rewards available. DF160 runs October 16th — October 23rd, 2025 1. Overview Data Farming (DF) is an incentives program initiated by Ocean Protocol. In DF, you can earn OCEAN rewards by making predictions via Predictoor. Data Farming Round 159 (DF159) has completed. DF160 is live, October 16th. It concludes on October 23rd. For this DF round, Predictoor DF has 3,750 OCEAN
Predictoor DF159 rewards available. DF160 runs October 16th — October 23rd, 2025 1. Overview

Data Farming (DF) is an incentives program initiated by Ocean Protocol. In DF, you can earn OCEAN rewards by making predictions via Predictoor.

Data Farming Round 159 (DF159) has completed.

DF160 is live, October 16th. It concludes on October 23rd. For this DF round, Predictoor DF has 3,750 OCEAN rewards and 20,000 ROSE rewards.

2. DF structure

The reward structure for DF160 is comprised solely of Predictoor DF rewards.

Predictoor DF: Actively predict crypto prices by submitting a price prediction and staking OCEAN to slash competitors and earn.

3. How to Earn Rewards, and Claim Them

Predictoor DF: To earn: submit accurate predictions via Predictoor Bots and stake OCEAN to slash incorrect Predictoors. To claim OCEAN rewards: run the Predictoor $OCEAN payout script, linked from Predictoor DF user guide in Ocean docs. To claim ROSE rewards: see instructions in Predictoor DF user guide in Ocean docs.

4. Specific Parameters for DF160

Budget. Predictoor DF: 3.75K OCEAN + 20K ROSE

Networks. Predictoor DF applies to activity on Oasis Sapphire. Here is more information about Ocean deployments to networks.

Predictoor DF rewards are calculated as follows:

First, DF Buyer agent purchases Predictoor feeds using OCEAN throughout the week to evenly distribute these rewards. Then, ROSE is distributed at the end of the week to active Predictoors that have been claiming their rewards.

Expect further evolution in DF: adding new streams and budget adjustments among streams.

Updates are always announced at the beginning of a round, if not sooner.

About Ocean and DF Predictoor

Ocean Protocol was founded to level the playing field for AI and data. Ocean tools enable people to privately & securely publish, exchange, and consume data. Follow Ocean on Twitter or TG, and chat in Discord.

In Predictoor, people run AI-powered prediction bots or trading bots on crypto price feeds to earn $. Follow Predictoor on Twitter.

DF159 Completes and DF160 Launches was originally published in Ocean Protocol on Medium, where people are continuing the conversation by highlighting and responding to this story.


Spherical Cow Consulting

Why Tech Supply Chains, Not Protocols, Set the Limits on AI and the Internet

I had one of those chance airplane conversations recently—the kind that sticks in your mind longer than the flight itself. My seatmate was reading a book about artificial intelligence, and at one point they described the idea of an “infinitely growing AI.” I couldn’t help but giggle a bit. The post Why Tech Supply Chains, Not Protocols, Set the Limits on AI and the Internet appeared first on Sph

“I had one of those chance airplane conversations recently—the kind that sticks in your mind longer than the flight itself.”

My seatmate was reading a book about artificial intelligence, and at one point, they described the idea of an “infinitely growing AI.” I couldn’t help but giggle a bit. Not at them, but at the premise.

An AI cannot be infinite. Computers are not infinite. We don’t live in a world where matter and energy are limitless. There aren’t enough chips, fabs, minerals, power plants, or trained engineers to sustain an infinite anything.

This isn’t just a nitpicky detail about science fiction. It gets at something I’ve written about before:

In Who Really Pays When AI Agents Run Wild? I noted that scaling AI systems isn’t just about clever protocols or smarter algorithms. Every prompt, every model run, every inference carries a cost in water, energy, and hardware cycles. In The End of the Global Internet, I argued that we are already moving toward a fractured network where national and regional policies shape what’s possible online.

The “infinite AI” conversation is an example that ties both threads together. We may dream about global systems that grow without end, but the reality is that technology is built on finite supply chains. It’s those supply chains that are turning out to be the real bottleneck for the future of the Internet.

A Digital Identity Digest Why Tech Supply Chains, Not Protocols, Set the Limits on AI and the Internet Play Episode Pause Episode Mute/Unmute Episode Rewind 10 Seconds 1x Fast Forward 30 seconds 00:00 / 00:15:19 Subscribe Share Amazon Apple Podcasts CastBox Listen Notes Overcast Pandora Player.fm PocketCasts Podbean RSS Spotify TuneIn YouTube iHeartRadio RSS Feed Share Link Embed

You can Subscribe and Listen to the Podcast on Apple Podcasts, or wherever you listen to Podcasts.

And be sure to leave me a Rating and Review!

The real limits aren’t protocols

When people in the identity and Internet standards space talk about limits, we often point to protocols. Can the protocol scale? Will a new protocol successfully replace cookies? Can we use existing protocols to manage delegation across ecosystems?

These are important questions, but they are not the limiting factor. Protocols, after all, are words in documents and lines of code. They can be revised, extended, and reinvented. The hard limits come from the physical world.

Chips and fabs. Advanced semiconductors require fabrication plants that cost tens of billions of dollars and take years to build. Extreme ultraviolet lithography machines (say that five times, fast) are produced (as of 2023) by exactly one company in the Netherlands—ASML—and delivery schedules are measured in years. Minerals and materials. Every computer depends on a handful of rare inputs: lithium for batteries, cobalt for electrodes, rare earth elements for magnets, neon for chipmaking lasers, high-purity quartz for wafers. These are not evenly distributed across the globe. China dominates rare earth refining, while Ukraine has been a critical source of neon. And there is no substitute for water in semiconductor production. Power and cooling. Training a frontier AI model consumes gigawatt-hours of electricity. Running hyperscale data centers requires water for cooling that rivals the consumption of entire towns. When power grids are strained, there’s no protocol that can fix it. People. None of this runs itself. Chip designers, process engineers, cleanroom technicians, miners, metallurgists—these are highly specialized roles. Many countries are facing demographic changes that include aging workforces and immigration restrictions for the current tech giants and uneven education where the populations are booming.

You can’t standardize your way out of these shortages. You can only manage, redistribute, or adapt to them.

Geopolitics and demographics

The Internet was often described as “borderless,” but the hardware that makes it run is anything but. Supply chains for semiconductors, network equipment, and the minerals that feed them are deeply entangled with geopolitics and demographics.

No region has a fully independent pipeline:

The US leads in chip design but depends on the Indo-Pacific region for chip manufacturing. China dominates rare earth refining but relies on imports of high-end chipmaking tools it cannot yet build domestically. Europe has niche strengths in lithography and specialty equipment but lacks the scale for end-to-end independence. Countries like Japan, India, and Australia supply critical inputs—from silicon wafers to rare earth ores—but not the whole stack.

This interdependence is not an accident. Globalization optimized supply chains for efficiency, not resilience. Each region specialized in the step where it had a comparative advantage, creating a finely tuned but fragile web.

Demographics add another layer. Many of the most skilled engineers in chip design and manufacturing are reaching retirement age. The same is true for technical standards architects; they are an aging group. Training replacements takes years, not months. Immigration restrictions in key economies further shrink the talent pool. Even if we had the minerals and the fabs, we might not have the people to keep the pipelines running.

The illusion of global resilience

For decades, efficiency reigned supreme. Tech companies embraced just-in-time supply chains. Manufacturers outsourced to the cheapest reliable suppliers. Investors punished redundancy as waste.

That efficiency gave us cheap smartphones, affordable cloud services, and rapid AI innovation. But it also created a brittle system. When one link in the chain breaks, the effects cascade:

A tsunami in Japan or a drought in Taiwan can disrupt global chip supply. A geopolitical dispute can halt exports of critical minerals overnight. A labor strike at a port can ripple through shipping networks for months.

We saw this during the 2020–2023 global chip shortage. A pandemic-driven demand spike collided with supply chain shocks: a fire at a Japanese chip plant, drought in Taiwan, and war in Ukraine cutting off neon supplies. Automakers idled plants. Consumer electronics prices rose. Lead times stretched into years.

AI at scale only magnifies the problem. Training one large model requires thousands of specialized GPUs. If one upstream material is constrained—say, the gallium used in semiconductors—it doesn’t matter how advanced your algorithms are. The model doesn’t get trained.

Cross-border dependencies never vanish

This is where the conversation loops back to the idea of a “global Internet.” Even if the Internet fragments into national or regional spheres—the “splinternet” scenario—supply chains remain irreducibly cross-border.

You can build your own national identity system. You can wall off your data flows. But you cannot build advanced technology entirely within your own borders without enormous tradeoffs.

A U.S. data center may run on American-designed chips, but those chips likely contain rare earths refined in China. A Chinese smartphone may use domestically assembled components, but the photolithography machine that patterned its chips came from Europe. An EU-based AI startup may host its models on European servers, but the GPUs were packaged and tested in Southeast Asia.

Fragmentation at the protocol and governance level doesn’t erase these dependencies. It only adds new layers of complexity as governments try to manage who trades with whom, under what terms, and with what safeguards.

The myth of “digital sovereignty” often ignores the material foundations of technology. Sovereignty over protocols does not equal sovereignty over minerals, fabs, or skilled labor.

Opportunities in regional diversity

If infinite AI is impossible and total independence is unrealistic, what’s left? One answer is regional diversity.

Instead of assuming we can build one perfectly resilient global supply chain, we can design multiple overlapping regional ones. Each may not be fully independent, but together they reduce the risk of “one failure breaks all.”

Examples already in motion:

United States. The CHIPS and Science Act is pouring billions into domestic semiconductor manufacturing (though how long that act will be in place is in question). The U.S. is also investing in rare earth mining and processing though environmental and permitting challenges remain. European Union. The EU Raw Materials Alliance is working to secure critical mineral supply and recycling. European firms already lead in certain high-end equipment niches. Japan and South Korea. Both countries are investing in duplicating supply chain segments currently dominated by China, such as battery materials. India. This country has ambitious plans to build local chip fabs and become a global assembly hub. Australia and Canada. Positioned as suppliers of critical minerals, Australia and Canada are working to move beyond extraction to refining.

Regional chains come with tradeoffs: higher costs, slower rollout, and sometimes redundant investments. But they create buffers. If one region falters, others can pick up slack.

They also open the door to more design diversity. Different regions may approach problems in distinct ways, leading to innovation not just in technology but in governance, regulation, and labor practices.

Reframing the narrative

So let’s come back to that airplane conversation. The myth of infinite AI (or infinite cloud computing, for that matter) isn’t just bad science fiction. It’s a misunderstanding of how technology actually grows.

AI, like the Internet itself, is bounded by the real world. Protocols matter, but they are only the top layer. Beneath them are the chips, the minerals, the power, and the people. Those are the constraints that will shape the next decade.

Which leads us to the current irony in all of this: even as the Internet fragments along political and regulatory lines, the supply chains that support it remain irreducibly global. We can argue about governance models and sovereignty all we like and target tariffs at a whim, but a smartphone or a GPU is still a planetary collaboration.

The challenge, then, isn’t to pretend we can achieve total independence. It’s to design supply chains—local, regional, and global—that acknowledge these limits and build resilience into them.

Looking ahead

When I wrote about The End of the Global Internet, I wanted to show that fragmentation is not just possible, but already happening. But fragmentation doesn’t erase interdependence. It just makes it messier.

When I wrote about Who Pays When AI Agents Run Wild? I wanted to point out that scaling computation is not a free lunch. It comes with bills measured in electricity, water, and silicon.

This post ties both threads together: the real bottlenecks in technology are not the protocols we argue about in standards meetings. They are the supply chains that determine whether the chips, power, minerals, and people exist in the first place.

AI is a vivid example because its appetite is so enormous. But the lesson applies more broadly. The Internet is fracturing into spheres of influence, but those spheres will remain bound by the physical pipelines that crisscross borders.

So the next time someone suggests an infinite AI, or a fully sovereign domestic Internet, remember: computers aren’t infinite. Supply chains aren’t sovereign. The real question isn’t whether we can break free of those facts, it’s how we design systems that can thrive within them.

If you’d rather track the blog than the podcast, I have an option for you! Subscribe to get a notification when new blog posts go live. No spam, just announcements of new posts. [Subscribe here

Transcript

[00:00:29] Welcome back to The Digital Identity Digest. I’m Heather Flanagan, and today, we’re going to dig into one of those invisible but very real limits on our digital future — supply chains.

[00:00:42] Now, I know supply chains don’t sound nearly as exciting as AI agents or new Internet protocols. But stay with me — because without the physical stuff (chips, minerals, power, and people), all of those clever protocols and powerful algorithms don’t amount to much.

[00:01:00] This episode builds on two earlier posts:

Who Really Pays for AI? — exploring how AI comes with a bill in water, electricity, and silicon. The End of the Global Internet — examining how fragmentation is reshaping the network itself.

Both lead us here: the supply chain is one of the biggest constraints on how far both AI and the Internet can actually go.

[00:01:27] So, if you really want to understand the future of technology, you can’t just look at the code or the protocols.

[00:01:35] You have to look at the supply chains.

The Reality Check: Technology Needs Stuff

[00:01:38] Let’s start with a story. On a recent flight, my seatmate was reading a book about artificial intelligence. Go him.

[00:01:49] At one point, he leaned over and described an idea of an infinitely growing AI.

[00:01:56] I couldn’t help but laugh a little — because computers are not infinite.

[00:02:04] There just aren’t enough chips, fabs, minerals, power plants, or trained people on the planet to sustain infinite anything. It’s not imagination — it’s physics, chemistry, and labor.

[00:02:20] That exchange captured something I keep seeing in conversations about AI, identity, and the Internet. We treat protocols as if they’re the bottleneck. But ultimately, it’s the supply chains underneath that constrain everything.

Chips, Fabs, and the Fragility of Progress

[00:02:38] Let’s break that down — starting with chips and fabricators, also known as fabs.

[00:02:44] The most advanced semiconductors come from fabrication plants that cost tens of billions of dollars to build — and take years, even a decade, to come online.

[00:02:56] And the entire process hinges on one company — ASML in the Netherlands.

[00:03:03] They’re the only supplier of extreme ultraviolet lithography machines. Without those, you simply can’t make the latest generation of chips. The backlog? Measured in years.

[00:03:21] Then there’s the issue of minerals and materials:

Lithium for batteries Cobalt for electrodes Rare earth elements for magnets Neon for chipmaking lasers High-purity quartz for wafers

[00:03:44] These resources aren’t evenly distributed. China refines most rare earths. Ukraine supplies much of the world’s neon. And water — another critical input — is also unevenly available.

Power, People, and Production

[00:04:05] A frontier AI model doesn’t just use a lot of electricity — it uses gigawatt-hours of power.

[00:04:26] Running a hyperscale data center can consume as much water as a small city. And when power grids are strained, no clever standard can conjure new electrons out of thin air.

[00:04:26] Then there’s the people. None of this runs itself:

Chip designers Process engineers Clean room technicians Miners and metallurgists

[00:04:57] These are highly specialized roles — and many experts are nearing retirement. Replacing them takes years, not months. Immigration limits compound the challenge.

[00:05:05] So yes, protocols matter — but the real limits come from the physical world.

Geopolitics and the Global Supply Web

[00:05:16] The Internet may feel borderless, but the hardware that makes it work is not.

[00:05:26] Every link in the supply chain is tangled in geopolitics:

The U.S. leads in chip design but depends on Taiwan and South Korea for manufacturing. China dominates rare earth refining but still relies on imported chipmaking tools. Europe has niche strengths in lithography but lacks materials for full independence. Japan, India, and Australia provide key raw inputs but not the entire production stack.

[00:06:16] This global interdependence made systems efficient — but also fragile.

Demographics: The Aging Workforce

[00:06:21] There’s also a demographic angle. Skilled engineers and technicians are aging out.

[00:06:35] In about 15 years, we’ll see significant skill gaps. Even if minerals and fabs are available, we might not have the people to keep things running.

[00:06:58] The story isn’t just about where resources are — it’s about who can use them.

The Illusion of Resilience

[00:07:06] For decades, efficiency ruled. Tech companies built “just-in-time” supply chains, outsourcing to low-cost, reliable suppliers.

[00:07:21] That gave us cheap smartphones and rapid innovation — but also brittle systems.

[00:07:38] A few reminders of fragility:

2011: Tsunami in Japan disrupts semiconductor production. 2021: Drought in Taiwan forces fabs to truck in water. 2022: War in Ukraine cuts off neon supplies. 2020–2023: Global chip shortage reveals how fragile everything truly is.

[00:08:18] AI at scale only magnifies this fragility. Even one constrained resource, like gallium, can halt model training — regardless of how advanced the algorithms are.

The Splinternet Still Needs a Global Supply Chain

[00:08:48] Even as the Internet fragments into regional “Splinternets,” supply chains remain global.

[00:09:18] You can wall off your data, but you can’t build advanced tech entirely within one nation’s borders.

Examples include:

A U.S. data center using chips refined with Chinese minerals. A Chinese smartphone using European lithography tools. An EU startup running on GPUs packaged in Southeast Asia.

[00:09:46] Fragmentation adds complexity, not independence.

The Myth of Digital Sovereignty

[00:09:46] The idea of total “digital sovereignty” sounds empowering — but it’s misleading.

[00:10:07] You can control protocols, standards, and regulations.
But you can’t control:

Minerals you don’t have Fabricators you can’t build Workforces you can’t train Designing Resilient Regional Systems

[00:10:14] So, what’s the alternative? Regional diversity.

Instead of one global, fragile chain, we can build multiple overlapping regional systems:

U.S.: The CHIPS and Science Act investing in domestic semiconductor manufacturing. EU: The Raw Materials Alliance strengthening mineral supply and recycling. Japan & South Korea: Building redundancy in battery and material supply. India: Launching its “Semiconductor Mission.” Australia & Canada: Expanding refining capacity for critical minerals.

[00:11:38] Yes, these efforts are costlier and slower — but they build buffers. If one region falters, another can pick up the slack.

The Takeaway: Infinite AI is a Myth

[00:12:06] That airplane conversation sums it up. The myth of infinite AI isn’t just science fiction — it’s a misunderstanding of how technology works.

[00:12:17] AI, like the Internet, is bounded by the real world — by chips, minerals, power, and people.

[00:12:45] Even as the Internet fragments, its supply chains remain irreducibly global.

[00:13:02] The challenge isn’t escaping these limits — it’s designing systems that thrive within them.

Closing Thoughts

[00:13:27] The real bottleneck in technology isn’t protocols — it’s supply chains.

[00:13:48] AI is just the most visible example of how finite our digital ambitions are.

[00:14:13] So, the next time you hear someone talk about “infinite AI” or a “sovereign Internet,” remember:

Computers are not infinite. Supply chains cannot be sovereign.

[00:14:19] The real question isn’t how to escape those facts — it’s how to build systems that can thrive within them.

Outro

[00:14:19] Thanks for listening to The Digital Identity Digest.

If you enjoyed the episode:

Share it with a colleague or friend. Connect with me on LinkedIn @hlflanagan. Subscribe and leave a rating wherever you listen to podcasts.

[00:15:02] You can also find the full written post at sphericalcowconsulting.com.

Stay curious, stay engaged — and let’s keep the conversation going.

The post Why Tech Supply Chains, Not Protocols, Set the Limits on AI and the Internet appeared first on Spherical Cow Consulting.


Recognito Vision

The Complete Guide to KYC Verification Online and How It Protects Your Identity

You’ve probably seen that pop-up asking you to verify your identity when signing up for a new banking app or wallet. That’s KYC, short for Know Your Customer. It helps businesses confirm that users are real, not digital impostors trying to pull a fast one. In the old days, this meant long queues, forms, and...

You’ve probably seen that pop-up asking you to verify your identity when signing up for a new banking app or wallet. That’s KYC, short for Know Your Customer. It helps businesses confirm that users are real, not digital impostors trying to pull a fast one.

In the old days, this meant long queues, forms, and signatures. Today, KYC verification online makes that process digital, instant, and painless.

Here’s how the two compare.

Feature Traditional KYC Online KYC Verification Time Taken Days or weeks A few minutes Method Manual paperwork Automated verification Accuracy Prone to error AI-based precision Accessibility Branch visits required Anywhere, anytime Security Paper-based Encrypted and biometric

According to Deloitte’s “Revolutionising Due Diligence for the Digital Age”, digital verification and automation can drastically improve compliance efficiency and customer experience, both of which are central to modern financial services.

That’s why KYC verification online has become the backbone of secure onboarding for fintechs, banks, and even government platforms.

 

How KYC Verification Online Actually Works

When you perform a KYC check online, it feels quick and effortless, but behind that simple process, powerful AI is doing the hard work. It matches your selfie with your ID, reads your details using OCR, and cross-checks everything with trusted databases, all in seconds.

Here’s what’s really happening:

You upload your ID (passport, driver’s license, or national ID).

You take a quick selfie using your phone camera.

The system compares your selfie to the photo on your ID using advanced facial recognition.

OCR (Optical Character Recognition) extracts the text from your ID to verify your name, address, and date of birth.

Data is validated against government or regulatory databases.

You get approved often in under two minutes.

That’s KYC authentication in action: fast, secure, and contact-free.

According to the NIST Face Recognition Vendor Test (FRVT), today’s leading algorithms are over 20 times more accurate than those used just a decade ago. That leap in precision is one reason why eKYC verification is now trusted by global banks and fintech companies.

Why Businesses Are Switching to KYC Verification Online

No one enjoys filling out endless forms or waiting days for approvals. That’s why businesses everywhere are turning to KYC verify online systems; they make onboarding smoother for customers while cutting costs for organizations.

Some of the biggest reasons behind this shift include:

Faster onboarding times that enhance customer experience.

Greater accuracy from AI-powered checks.

Enhanced fraud detection through biometric validation.

Regulatory compliance with frameworks like GDPR.

Global accessibility for users to verify KYC online anytime, anywhere.

Research by Deloitte Insights notes that organizations automating due diligence and verification processes reduce manual costs while increasing compliance accuracy, a huge win for financial institutions managing high user volumes.

Simply put, online KYC check systems help companies onboard customers faster while minimizing human error and fraud.

Technology Behind Modern KYC Verification Solutions

Every smooth verification process is powered by some serious tech muscle.

Artificial Intelligence (AI) helps detect fraudulent IDs and spot manipulation patterns in photos. Machine learning continuously improves accuracy by learning from new data. Facial recognition verifies your selfie against your ID photo with pinpoint precision, tested under the NIST FRVT benchmark.

Meanwhile, Optical Character Recognition (OCR) pulls data from your documents instantly, and encryption technologies protect that data as it moves across systems.

For developers and organizations wanting to implement their own KYC verification solutions, Recognito’s face recognition SDK and ID document recognition SDK are reliable tools that simplify integration.

You can also explore Recognito’s GitHub repository to see how real-time AI verification systems evolve in practice.

 

How to Verify Your KYC Online Without the Hassle

If you haven’t tried KYC verification online yet, it’s simpler than you think. Just open the app, upload your ID, take a selfie, and let the system handle the rest.

Most platforms now allow you to check online KYC status in real time. You’ll see exactly when your verification moves from “in review” to “approved.”

Curious about how it all works behind the scenes? Try the ID Document Verification Playground. It’s an interactive way to see how modern KYC systems scan, process, and authenticate IDs no real data required.

According to Allied Market Research, the global eKYC verification market is expected to reach nearly $2.4 billion by 2030, growing at over 22% CAGR. That surge shows just how essential digital KYC has become to the future of online services.

The Future of KYC Authentication

The next generation of KYC authentication is going to feel almost invisible. Biometric technology and AI are merging to make verification instant; imagine unlocking your account just by looking at your camera.

In India, systems like UIDAI’s Aadhaar e-KYC have already transformed how millions of users open bank accounts and access government services. It’s fast, paperless, and secure.

Global research by PwC on Digital Identity predicts that the world is moving toward a unified digital identity model, one verified profile for all services, from banking to healthcare.

This is the future of KYC identity verification: a seamless, secure, and user-friendly process that builds trust without slowing you down.

 

Final Thoughts

In the end, KYC verification online is about more than compliance; it’s about confidence. It ensures that businesses and customers can interact safely in an increasingly digital world.

It eliminates paperwork, reduces fraud, and makes onboarding faster and smarter. That’s progress everyone can appreciate.

If you’re a business exploring modern KYC verification solutions, check out Recognito. Their AI-powered technology helps companies verify identities accurately, comply with regulations, and create frictionless user experiences.

 

Frequently Asked Questions

 

1. How does KYC verification online work?

You upload your ID, take a selfie, and the system checks both using AI. KYC verification online confirms your identity in just a few minutes.

 

2. Is eKYC verification safe to use?

Yes, eKYC verification is secure since it uses encryption and biometric checks. Your personal data stays protected throughout the process.

 

3. What do I need to verify my KYC online?

To verify KYC online, you only need a valid government ID and a selfie. The rest is handled automatically by the system.

 

4. Why are companies using online KYC checks now?

Businesses use online KYC check systems because they’re faster and help prevent fraud. It also makes onboarding easier for users.

 

5. What makes a good KYC verification solution?

A great KYC verification solution should be fast, accurate, and compliant with privacy laws. It should make KYC identity verification simple for both users and companies.

Monday, 13. October 2025

HYPR

The Salesforce Breach Is Every RevOps Leader’s Nightmare: How to Secure Connected Apps

The RevOps Tightrope: When "Just Connect It" Becomes a Breach Vector If you're in Revenue Operations, Marketing Ops, or Sales Ops, your core mandate is velocity. Every week, someone needs to integrate a new tool: "Can we connect Drift to Salesforce?" "Can we push this data into HubSpot?" "Can you just give marketing API access?" You approve the OAuth tokens, you connect the "trusted"
The RevOps Tightrope: When "Just Connect It" Becomes a Breach Vector

If you're in Revenue Operations, Marketing Ops, or Sales Ops, your core mandate is velocity. Every week, someone needs to integrate a new tool: "Can we connect Drift to Salesforce?" "Can we push this data into HubSpot?" "Can you just give marketing API access?" You approve the OAuth tokens, you connect the "trusted" apps, and you enable the business to move fast. You assume the security team has your back.

But the ShinyHunters extortion spree that surfaced this year, targeting Salesforce customer data, exposed the deadly vulnerability built into that convenience-first trust model. This wasn't just a "cyber event" for the security team; it was a devastating wake-up call for every operator who relies on that data. Suddenly, every connected app looks like a ticking time bomb, filled with sensitive PII, contact records, and pipeline data.

Anatomy of the Attack: Hacking Authorization, Not Authentication

The success of the ShinyHunters campaign wasn't about a software bug or a cracked password. It was about trusting the wrong thing. The attackers strategically bypassed traditional MFA by exploiting two key vectors: OAuth consent and API token reuse.

Path 1: The Fake "Data Loader" That Wasn't (OAuth Phishing)

The most insidious vector involved manipulating human behavior through advanced vishing (voice phishing).

Attackers impersonated internal IT support, creating urgency to trick an administrator. Under the pretext of fixing an urgent issue, the victim was directed to approve a malicious Connected App—often disguised as a legitimate tool like a Data Loader.

The result was the same as a physical breach: the employee, under false pretenses, granted the attacker’s malicious app a valid, persistent OAuth access token. This token is the backstage pass—it gave the attacker free rein to pull vast amounts of CRM data via legitimate APIs, quietly and without triggering MFA or login-based alerts.

Path 2: Token Theft in the Shadows (API Credential Reuse)

The parallel vector targeted tokens from already integrated third-party applications, such as Drift or Salesloft.

Attackers compromised these services to steal their existing OAuth tokens or API keys used for the Salesforce integration. These stolen tokens act like session cookies: they are valid, silent, and allow persistent access to Salesforce data without ever touching a login page. Crucially, once stolen, these tokens can be reused until revoked, representing an open back door into your most valuable data.

Both paths point to a single conclusion: your digital ecosystem is built on convenience-first trust, and in the hands of sophisticated attackers, trust is the ultimate exploitable vulnerability.

The Trust Problem: Securing Logins, Not Logic

For years, security focused on enforcing strong MFA and password rotation. But the ShinyHunters campaign proved that this focus is too narrow.

You can enforce the best MFA, rotate passwords monthly, and check all your compliance boxes. But if an attacker can:

Convince an employee to approve a fake OAuth app, or Steal a token that never expires from an integration

...then everything else is just window dressing.

The uncomfortable truth for RevOps is that attackers are not exploiting a zero-day; they are hacking how you work. The industry-wide shift now, led by NIST and CISA, is toward phishing-resistant authentication. Why? Because the weak spots exploited in this breach - reusable passwords and phishable MFA - are eliminated when you replace them with cryptographic, device-bound credentials.

Where HYPR Fits In: Making Identity Deterministic, Not Trust-Based

HYPR was built for moments like this—when the mantra "never trust, always verify" must transition from a slogan into an operational necessity. Our Identity Assurance platform delivers the deterministic certainty needed to stop both forms of token theft cold.

Here’s how HYPR's approach prevents these breach vectors:

Eliminating Shared Secrets: HYPR Authenticate uses FIDO2-certified passwordless authentication. There is no password or shared secret for attackers to steal, replay, or trick a user into approving. This automatically eliminates the phishable vector used in Path 1. Domain Binding Stops OAuth Phishing: FIDO Passkeys are cryptographically bound to the specific URL of the service. If an attacker tries to trick a user into authenticating on a malicious domain (OAuth phishing), the key will not match the registered domain, and the authentication will fail instantly and silently. Deterministic Identity Proofing for High-Risk Actions (HYPR Affirm): Granting new app privileges is a high-risk action. HYPR Affirm brings deterministic identity proofing—using live liveness checks, biometric verification, and document validation—before any credential or app authorization is granted. This stops social engineering attacks aimed at the help desk or an administrator because you ensure the person making the request is the rightful account owner. No Unchecked Trust (HYPR Adapt): Every high-risk action - whether it’s a new device enrollment, a token reset, or a highly-privileged connected app approval - can trigger identity re-verification. If your HYPR Adapt risk engine detects anomalous API activity (Path 2), it can dynamically challenge the user to re-authenticate with a phishing-resistant passkey, immediately revoking the session/token until certainty is established.

This platform isn't about simply locking things down; it's about building secure, efficient systems that can verify who is on the other end with cryptographic certainty.

Next Steps for RevOps: Championing the Identity Perimeter

The Salesforce breach was about trust at scale. As RevOps leaders, you need to protect not just the data, but how that data is accessed and shared.

Here is what you must prioritize now:

Revisit Your Integrations: Know which connected apps have offline access and broad permissions (e.g., refresh_token, full) to your Salesforce data - and ruthlessly trim the list to only essential tools. Automate Least Privilege: Implement a policy for temporary tokens and expiring scopes. Move away from permanent credentials where possible, forcing periodic re-consent. Champion Phishing-Resistant MFA: Make FIDO2 Passkeys the minimum baseline for every high-value user and administrator. Anything less is a calculated risk you can’t afford.

The uncomfortable truth is: Attackers did not utilize brute force - they strategically weaponized OAuth consent and token theft. The good news is that passwordless, phishing-resistant authentication would have stopped both paths cold.

Unlock the pipeline velocity you need with the deterministic security you can trust.

👉 Request a Demo of the HYPR Identity Assurance Platform Today.


SC Media - Identity and Access

Bad actors abuse IE mode in Edge browser to hack into devices

Teams must tightly control IE mode and educate the staff about social engineering to safeguard devices.

Teams must tightly control IE mode and educate the staff about social engineering to safeguard devices.


Holochain

Dev Pulse 152: Wind Tunnel Updates, Holo Edge Node Container

Dev Pulse 152
Wind Tunnel gets reports, automation, multiple conductors

All the hard work put into Wind Tunnel, our scale testing suite, is starting to become visible! We’re now collecting metrics from both the host OS and Holochain, in addition to the scenario metrics we’d already been collecting (where zome call time and arbitrary scenario-defined metrics could be measured). We’re also running scenarios on an automated schedule and generating reports from them. Our ultimate goals are to be able to:

monitor releases for performance improvements and regressions, identify bottlenecks for improvement, and turn report data into release-specific information you can use and act upon in your app development process.

Finally, Wind Tunnel is getting the ability to select a specific version of Holochain right from the test scenario, which will be useful for running tests on a network with a mix of different conductors. It also saves us some dev ops headaches, because the right version for a test can be downloaded automatically as needed.

Holochain 0.6: roughly two (ideal) weeks remaining

Our current estimates predict that Holochain 0.6’s first release will take about two team-weeks to complete. Some of the dev team is focused on Wind Tunnel and other tasks, so this may not mean two calendar weeks, but it’s getting closer. To recap what we’ve shared in past Dev Pulses, 0.6 will focus on:

Warrants — reporting validation failures to agent activity authorities, who collect and supply these warrants to anyone who asks for them. As soon as an agent sees and validates a warrant, they retain it and block the bad agent, even if they aren’t responsible for validating the agent’s data. If the warrant itself is invalid (that is, the warranted data is valid), the authority issuing the warrant will be blocked. Currently warrants are only sent in response to a get_agent_activity query; in the future, they’ll be sent in response to other DHT queries too. Blocking — the kitsune2 networking layer will allow communication with remote agents to be blocked, and the Holochain layer will use this to block agents after a warrant against them is discovered. Performance improvements — working with Unyt, we’ve discovered some performance issues with must_get_agent_activity and get_agent_activity which we’re working on improving.
Open-source Holo Edge Node

You have probably already seen the recent announcements from Holochain and Holo (or the livestream), but if not, here’s the news from the org: Holo is open-sourcing its always-on node software in an OCI-compliant container called Edge Node.

This is going to do a couple things for hApp developers:

make it easier to spin up always-on nodes to provide data availability and redundancy for your hApp networks, provide a base dockerfile for devs to add other services to — maybe an SMS, email, payment, or HTTP gateway for your hApp, and allow more hosts to set up nodes, because Docker is a familiar distribution format

I think this new release connects Holo back to its roots — the decentralised, open-source values that gave birth to it — and we hope that’ll mean more innovation in the software that powers the Holo network. HoloPort owners will need to be handy with the command line, but a recent survey found that almost four fifths of them already are.

So if you want to get involved, either to bootstrap your own infrastructure or support other hApp creators and users, here’s what you can do:

Download the latest HolOS ISO for HoloPorts, other hardware, VMs, and cloud instances. Download the Edge Node container for Docker, Kubernetes, etc. Get in touch with Rob from Holo on the Holo Forum, the Holo Edge Node Support Telegram, Calendly, or the DEV.HC Discord (you’ll need to self-select Access to: Projects role in the #select-a-role channel, then go to the #always-on-nodes channel). Join the regular online Holo Huddle calls for support (get access to these calls by getting in touch with Rob above). Soon, there’ll be a series of Holo Forge calls for people who want to focus on building the ecosystem (testing, modifying the Edge Node container, etc).
Next Dev Office Hours: 15 Oct 2025

Join us on the DEV.HC Discord at 16:00 UTC for the next Dev Office Hours call — bring your ideas, questions, projects, bugs, and hApp development challenges to the dev team, where we’ll do our best to respond to them. See you there!


SC Media - Identity and Access

Teen faces 7-year sentence over PowerSchool hack

Nineteen-year-old Massachusetts resident Matthew Lane faces a possible seven-year prison sentence after admitting to hacking the education technology firm PowerSchool and stealing the personal information of millions of students and teachers, according to The Record, a news site by cybersecurity firm Recorded Future.

Nineteen-year-old Massachusetts resident Matthew Lane faces a possible seven-year prison sentence after admitting to hacking the education technology firm PowerSchool and stealing the personal information of millions of students and teachers, according to The Record, a news site by cybersecurity firm Recorded Future.


Data breach impacts UK trade union

Prospect a UK trade union representing nearly 160,000 engineers, scientists, managers, and other specialists working for BT Group, Siemens, BAE Systems, and others has confirmed having data from its members stolen following a June cyberattack, The Register reports.

Prospect a UK trade union representing nearly 160,000 engineers, scientists, managers, and other specialists working for BT Group, Siemens, BAE Systems, and others has confirmed having data from its members stolen following a June cyberattack, The Register reports.


Over 1M KFC Venezuela customer records purportedly stolen

GBHackers News reports that KFC Venezuela was claimed to have been compromised in a cyberattack, with the threat actor peddling a 405 MB CSV file with data from over 1.067 customers.

GBHackers News reports that KFC Venezuela was claimed to have been compromised in a cyberattack, with the threat actor peddling a 405 MB CSV file with data from over 1.067 customers.


Qantas data stolen in Salesforce hack exposed

Major Australian airline Qantas had information pilfered from a June attack against its Salesforce database leaked by hacking collective Scattered Lapsus$ Hunters following its refusal to pay the demanded ransom, according to The Guardian.

Major Australian airline Qantas had information pilfered from a June attack against its Salesforce database leaked by hacking collective Scattered Lapsus$ Hunters following its refusal to pay the demanded ransom, according to The Guardian.


Dock

Introduction to Decentralized Identity [Video + Takeaways]

Decentralized identity is becoming the backbone of how organizations, governments, and individuals exchange trusted information. In this live workshop, Agne Caunt (Product Owner, Dock Labs) and Richard Esplin (Head of Product, Dock Labs) guided learners through the foundations of decentralized identity: how digital identity models have evolved, the Trust

Decentralized identity is becoming the backbone of how organizations, governments, and individuals exchange trusted information.

In this live workshop, Agne Caunt (Product Owner, Dock Labs) and Richard Esplin (Head of Product, Dock Labs) guided learners through the foundations of decentralized identity: how digital identity models have evolved, the Trust Triangle that powers verifiable data exchange, and the technologies behind it: from verifiable credentials to DIDs, wallets, and biometric-bound credentials.

Below are the core takeaways from the session.


Kin AI

Kinside Scoop 👀 #15

Accounts, memory, and more upcoming features

Hey folks 👋

Following the rapid-fire releases in the last few newsletters, we have a quieter one for you this edition.

Everyone’s busy working on some bigger features and editions to Kin, meaning not much has gone out in the last two weeks.

So instead, this’ll be a sneak peek into what’s coming really soon - with the usual super prompt at the end for you.

What (will be) new with Kin 🕑 Your Kin, expanded 🌱

The biggest change coming up is our rollout of Kin Accounts. Don’t worry: these accounts won’t store any of your conversation data - just some minimal basics that we’ll keep secure.

We’ll be introducing Kin Accounts to lay the groundwork for multi-device sync (which inches closer!), more integrations into Kin, and eventually Kin memberships.

More information on Kin Accounts, and what we mean by “minimal basics” will come out soon too, so you stay fully informed

More personal advisors and notifications 🧩

Off the back of the positive feedback for the advisor updates covered in the last edition, we’re continuing to expand their personalities and push notification abilities.

Very soon, you’ll notice that each advisor feels even more unique, more understanding of you, and more suited to their role - both in chat and in push notifications.

And in case you missed it, you have full control over the push notification frequency. If you want to hear from an advisor while outside Kin more, you can turn it up in each advisor’s edit tab from the home screen - and if you want to hear less from them, you can turn it down more.

Memory continues to grow 🧠

Memory appears in these updates almost every time - and that’s because we really are working on it almost every week.

The imminent update will continue to work toward our long-standing goal of making Kin the best personal AI at understand time in conversations - something we’ve explained in more depth in previous articles.

More on this when the next stage of the update rolls out!

Journaling, refined by you yet again 📓

Similarly, Journaling also makes another appearance as we continue to re-work it according to your feedback. Guided daily and weekly Journals will help you track your progress, more visible streak counts will help keep you involved, and a new prompting system will help entries feel more insightful. You’ll hear more about exactly what’s changing once we’ve released some of it.

Start a conversation 💬

I know this reminder is in every newsletter - but that’s because it’s integral to Kin.

Kin is built for you, with your ideas. So, your feedback is essential to helping us know whether we’re making things the way you like them.

The KIN team is always around at hello@mykin.ai for anything, from feature feedback to a bit of AI discussion (though support queries will be better helped over at support@mykin.ai).

To get more stuck in, the official Kin Discord is still the best place to interact with the Kin development team (as well as other users) about anything AI.

We have dedicated channels for Kin’s tech, networking users, sharing support tips, and for hanging out.

We also regularly run three casual calls every week - you’re welcome to join:

Monday Accountability Calls - 5pm GMT/BST
Share your plans and goals for the week, and learn tips about how Kin can help keep you on track.

Wednesday Hangout Calls - 5pm GMT/BST
No agenda, just good conversation and a chance to connect with other Kin users.

Friday Kin Q&A - 1pm GMT/BST
Drop in with any questions about Kin (the app or the company) and get live answers in real time.

Kin is yours, not ours. Help us build something you love!

Finally, you can also share your feedback in-app. Just screenshot to trigger the feedback form.

Our current reads 📚

Article: OpenAI admits to forcibly switching subscribers away from GTP 4 and 5 models in some situations
READ - techradar.com

Article: San Diego State University launch first AI responsibility degree in California
READ - San Diego State University

Article: Australia’s healthcare system adopting AI tools
READ - The Guardian

Article: California’s AI laws could balance innovation and regulation
READ - techcrunch.com

This edition’s super prompt 🤖

This week, your Kin will help you answer the question:

“How can I better prepare for change?”

If you have Kin installed and up to date, you can tap the link below (on mobile!) to explore how you think about pressure, and how you can keep cool under it.

As a reminder, you can do this on both iOS and Android.

Open prompt in Kin

We build Kin together 🤝

If you only ever take one thing away from these emails, it should be that you have as much say in Kin as we do (if not more).

So, please chat in our Discord, email us, or even just shake the app to get in contact with anything and everything you have to say about Kin.

With love,

The KIN Team


Elliptic

Follow the money, not the drugs: Why crypto makes drug investigations easier, not harder

Investigators who want to dismantle entire drug trafficking networks know it won't happen by catching a few dealers with narcotics in a car. High-level drug dealers rarely handle drugs directly; they insulate themselves from the physical product. What they do control is the financial infrastructure that sustains the entire operation.

Investigators who want to dismantle entire drug trafficking networks know it won't happen by catching a few dealers with narcotics in a car. High-level drug dealers rarely handle drugs directly; they insulate themselves from the physical product. What they do control is the financial infrastructure that sustains the entire operation.


Herond Browser

Guide to New Kids Movies in Theaters

Our comprehensive guide to new kids movies in theaters is here to help you plan the perfect outing The post Guide to New Kids Movies in Theaters appeared first on Herond Blog. The post Guide to New Kids Movies in Theaters appeared first on Herond Blog.

Are you looking for a fun family activity on the big screen? Our comprehensive guide to new kids movies in theaters is here to help you plan the perfect outing. We’ve rounded up all the latest releases and must-see films, complete with summaries and reasons to watch. Get ready to discover your next family favorite!

Why a Trip to the Movies is Great for Kids A chance for screen-free, focused family time

In a world full of distractions from phones and tablets, a Kids Movies in Theaters provides a unique opportunity for families to disconnect and enjoy a shared experience without interruptions.

An immersive experience with a huge screen and dynamic sound

The big screen, surround sound, and dark room create a magical atmosphere. This makes every moment more exciting and memorable than watching a movie at home.

A fun way to escape into a new world of adventure

From animated adventures to fantastical tales, kids can let their imaginations run wild and be transported to different worlds and stories.

Creates lasting memories for the whole family

A trip to the movies is more than just watching a film. It’s an event that creates a special memory you can look back on for years to come.

Now Playing: Top New Kids Movies in Theaters Top New Kids Movies in Theaters – The Bad Guys 2 Release Date: August 1, 2025 Quick Summary: Our now-reformed Bad Guys are struggling to adapt to their “Good Guy” lives when they are pulled out of retirement for one last, globe-trotting caper. This time, they’re forced to work alongside an all-female squad of criminals, “The Bad Girls.” Why It’s a Must-See: With its witty humor, clever plot, and dynamic animation, this sequel is a great pick for older kids who love action-packed comedies with valuable lessons about friendship and redemption. Top New Kids Movies in Theaters – Dora: Magic Mermaid Adventures Release Date: September 18, 2025 Quick Summary: This limited-time theatrical event features a collection of brand-new episodes. Join Dora and Boots as they turn into mermaids to make new underwater friends and go on an adventure. Why It’s a Must-See: This short, fun-filled aquatic adventure is perfect for younger children, featuring familiar characters and a positive message. Top New Kids Movies in Theaters – Gabby’s Dollhouse: The Movie Release Date: September 20, 2025 Quick Summary: The popular preschool hit makes its way to the big screen! Gabby and her grandmother’s road trip take an unexpected turn, leading Gabby on a live-action/animated adventure with catchy songs and a heartwarming story about reuniting with friends and her beloved dollhouse. Top New Kids Movies in Theaters – Toy Story (30th Anniversary Re-release) Release Date: September 12, 2025 Quick Summary: Celebrate three decades of friendship and adventure with the theatrical re-release of the original film that started it all. Join Woody, Buzz, and the rest of Andy’s toys on their unforgettable journey to escape the clutches of the menacing neighbor, Sid, and reunite with their owner. Why It’s a Must-See: A timeless classic. This is a perfect opportunity for parents to introduce the magic of Toy Story to a new generation on the big screen, or to relive the cherished moments of their own childhood. Top New Kids Movies in Theaters – Dude Perfect: The Hero Tour Release Date: September 26, 2025 Quick Summary: The sensational YouTube crew brings their sold-out live show to the big screen for a new cinematic experience. This film provides exclusive backstage access, action-packed battles, and classic Dude Perfect segments for families and superfans alike. Why It’s a Must-See: This is a one-of-a-kind event that allows fans to see The Dudes up close like never before, capturing the high-energy excitement and incredible trick shots of their live tour in an immersive format. Expert Tips for a Smooth Kids Movies in Theaters Choose the Right Showtimes

Suggest matinee showings for younger kids to align with nap schedules, and note any “sensory-friendly” screenings that might be available for a more comfortable experience.

Pack Smart

Advise parents to bring a light sweater, a small pillow, or their child’s favorite blanket for comfort during the film.

The Snacks Strategy

Mentions the importance of pre-planning snacks to save money and ensure a quick bathroom break is taken before the movie starts to avoid interruptions.

Set Expectations

Suggest talking to kids beforehand about theater etiquette, such as staying in their seats, keeping quiet during the film, and not kicking the seat in front of them.

Conclusion: Your Family Adventure Awaits

A trip to the movies is more than just a quick outing – it’s a chance to create shared experiences and lasting memories. From the awe of the big screen to the thrill of a new story, the magic of cinema offers a unique way for families to connect and have fun together. But for those looking to find movie showtimes or information online without the annoyance of pop-up ads and trackers, consider using Herond browser. This new-generation browser is specifically designed to block intrusive ads, ensuring a clean and uninterrupted search.

So, whether you’re introducing them to a timeless classic or discovering a brand-new adventure, use this guide to plan your next family movie night. Your next great story is waiting to be experienced on the big screen!

DOWNLOAD HEROND About Herond

Herond Browser is a Web browser that prioritizes users’ privacy by blocking ads and cookie trackers, while offering fast browsing speed and low bandwidth consumption. Herond Browser features two built-in key products:

Herond Shield: an adblock and privacy protection tool; Herond Wallet: a multi-chain, non-custodial social wallet.

Herond aims at becoming the ultimate Web 2.5 solution that sets the ground to further accelerate the growth of Web 3.0, heading towards the future of mass adoption.

Join our Community!

The post Guide to New Kids Movies in Theaters appeared first on Herond Blog.

The post Guide to New Kids Movies in Theaters appeared first on Herond Blog.


The Ultimate Guide to Choosing the Best Game Store Application for You

Finding the perfect game store application can transform your gaming experience, offering access to the latest titles, exclusive deals. The post The Ultimate Guide to Choosing the Best Game Store Application for You appeared first on Herond Blog. The post The Ultimate Guide to Choosing the Best Game Store Application for You appeared first on Herond Blog.

Finding the perfect game store application can transform your gaming experience, offering access to the latest titles, exclusive deals, and seamless cross-platform play. In 2025, platforms like Steam, Epic Games Store, and Nintendo eShop compete to deliver the best for gamers. This ultimate guide explores key factors – game selection, pricing, usability, and security. This will help you choose the ideal app. Dive in to find the best game store application for you!

Why Choosing the Right Game Store Application Matters

Selecting the right game store application can elevate your gaming experience by providing access to a vast library of titles, exclusive deals, and seamless cross-platform support. Apps like Steam or Epic Games Store offer diverse genres, from AAA blockbusters to indie gems, ensuring you find games that match your preferences. A well-chosen app enhances your ability to discover new releases and connect with gaming communities effortlessly.

Security, user-friendly navigation, and robust features are critical when picking a game store application. In 2025, top platforms integrate Web3 for NFT purchases, adding value through digital ownership. Choosing an app with reliable transactions and cloud saves ensures your progress is safe across devices, maximizing convenience and enjoyment for every gaming session.

Key Factors to Consider When Choosing a Game Store Application Game Selection and Exclusives Evaluation: When choosing a game store application, prioritize platforms like Steam, with its vast library of over 50,000 titles, or Epic Games Store, known for exclusives like Fortnite and Borderlands 3. Compare their offerings to match your gaming preferences, from indie gems to AAA blockbusters. Why It Matters: A diverse selection ensures access to your favorite genres – RPGs, shooters, or puzzles and the latest releases without delays, keeping you in the gaming loop. Benefit: Find tailored games that elevate your experience, whether you’re a casual player or a hardcore enthusiast. Pricing and Deals Evaluation: Compare pricing in game store applications—Steam’s seasonal sales offer up to 80% off, while Epic Games Store provides weekly free games. Subscriptions like Xbox Game Pass grant access to 100+ titles for a flat fee, ideal for budget-conscious gamers. Why It Matters: Smart pricing and frequent deals stretch your gaming budget, making premium titles or DLCs more accessible without breaking the bank. Benefit: Affordable purchases mean more games and less financial strain, enhancing your gaming value. User Interface and Usability Evaluation: Assess game store application interfaces for ease of use—PlayStation Store offers intuitive console navigation, while GOG’s DRM-free PC setup prioritizes simplicity and fast downloads. Check search functionality and library organization for smooth access to titles. Why It Matters: A user-friendly interface saves time, reduces frustration, and speeds up game discovery and installation, critical for seamless gaming sessions. Benefit: Streamlined navigation enhances your experience, letting you focus on playing rather than troubleshooting. Cross-Platform Support and Cloud Saves Evaluation: Look for game store applications with cross-platform support, like Microsoft Store’s Xbox-PC integration for titles like Halo Infinite, enabling crossplay and cross-progression. Cloud saves ensure your progress syncs across devices, from consoles to mobiles. Why It Matters: Seamless multi-device gaming lets you switch platforms without losing progress, ideal for gamers on the go or with multiple devices. Benefit: Flexibility to play anywhere enhances convenience and immersion in your favorite games. Security and Payment Options Evaluation: Ensure game store applications offer encrypted transactions and diverse payment methods, including crypto for Web3 purchases like in-game NFTs. Steam and Epic support PayPal and cards, while emerging platforms integrate blockchain for secure digital assets. Why It Matters: Robust security protects against fraud, and flexible payments, including crypto, align with modern gaming economies like Web3 marketplaces. Benefit: Safe transactions and varied options safeguard your funds while enabling cutting-edge purchases. Top 5 Game Store Applications in 2025 Steam Vast Library: Steam’s massive collection of over 50,000 titles spans genres from indie hits to AAA blockbusters, ensuring endless discovery for every gamer. Sales and Deals: Frequent Steam sales and seasonal events slash prices up to 90%, making premium games affordable and exciting to hunt. Community Features: Robust forums, reviews, and mod support foster vibrant player interactions, turning solo play into a social adventure. Epic Games Store Free Games: Epic’s weekly free game giveaways let you build your library without spending, with titles like Fortnite always ready to claim. Exclusives: Timed exclusives like Gears of War and Rocket League draw players in with unique content not found elsewhere. User-Friendly Interface: Clean design and easy navigation make finding deals and launching games a breeze on PC. Nintendo eShop Switch Titles: eShop’s curated library of Nintendo exclusives like Mario and Zelda offers portable, family-oriented adventures. Family-Friendly Content: Kid-safe ratings and parental controls make it ideal for shared gaming on the go. eShop Cards and Deals: Digital gift cards and flash sales provide easy, budget-friendly ways to expand your Switch collection. Microsoft Store/Xbox Game Pass Cross-Platform Play: Seamless Xbox-PC integration supports crossplay in titles like Halo Infinite, bridging consoles and desktops. Subscription Model: Game Pass unlocks 100+ games for a low monthly fee, including day-one releases for constant variety. Cloud Gaming: Xbox Cloud Play streams games to mobile or PC, perfect for on-the-go access without downloads How to Use Herond Browser to Enhance Your Game Store Experience

Herond Browser elevates your game store application experience with its secure, ad-free environment, perfect for exploring platforms like Steam, Epic Games Store, or Nintendo eShop. With tracker-blocking, your browsing stays private, protecting personal data while researching games, trailers, or Web3-integrated marketplaces for in-game NFTs, making your shopping seamless and safe.

Additionally, Herond Browser’s fast, multi-device syncing lets you browse game store applications on PC, mobile, or tablet without interruptions. Its Web3 capabilities, including Herond Wallet, enable secure crypto transactions for NFT purchases or in-game rewards on platforms like Epic. Whether checking reviews or pre-ordering 2025’s hottest titles, Herond Browser ensures a smooth, secure experience, letting you focus on gaming, not browsing hassles.

DOWNLOAD HEROND Conclusion

Choosing the best game store application in 2025 transforms your gaming with top titles, unbeatable deals, and seamless cross-platform play. From Steam’s vast library to Epic’s free games and Nintendo eShop’s family-friendly exclusives, the right app elevates your experience. Prioritize selection, pricing, usability, and security to match your needs. Download Herond Browser to explore game store applications securely, leveraging its ad-free, VPN-protected browsing and Web3 integration for NFT rewards. Start your gaming journey today!

About Herond

Herond Browser is a cutting-edge Web 3.0 browser designed to prioritize user privacy and security. By blocking intrusive ads, harmful trackers, and profiling cookies, Herond creates a safer and faster browsing experience while minimizing data consumption.

To enhance user control over their digital presence, Herond offers two essential tools:

Herond Shield: A robust adblocker and privacy protection suite. Herond Wallet: A secure, multi-chain, non-custodial social wallet.

As a pioneering Web 2.5 solution, Herond is paving the way for mass Web 3.0 adoption by providing a seamless transition for users while upholding the core principles of decentralization and user ownership.

Have any questions or suggestions? Contact us:

On Telegram https://t.me/herond_browser DM our official X @HerondBrowser Technical support topic on https://community.herond.org

The post The Ultimate Guide to Choosing the Best Game Store Application for You appeared first on Herond Blog.

The post The Ultimate Guide to Choosing the Best Game Store Application for You appeared first on Herond Blog.


Top 10 New Switch Games You Can’t Miss in 2025

Get ready for an epic gaming year with the top 10 new Switch games of 2025! From Pokémon Legends: Z-A to Metroid Prime 4: Beyond The post Top 10 New Switch Games You Can’t Miss in 2025 appeared first on Herond Blog. The post Top 10 New Switch Games You Can’t Miss in 2025 appeared first on Herond Blog.

Get ready for an epic gaming year with the top 10 new Switch games of 2025! From Pokémon Legends: Z-A to Metroid Prime 4: Beyond, Nintendo’s lineup delivers thrilling adventures, stunning visuals, and Switch 2-ready innovations. Whether you’re into RPGs, platformers, or cozy sims, these titles redefine portable gaming. Discover must-play games that bring fresh excitement to your Nintendo Switch in 2025 – dive in now!

Why 2025 Is a Banner Year for New Switch Games

Get ready, gamers: 2025 is shaping up to be a truly banner year for the Nintendo Switch library. Far from slowing down, the console is hitting a new stride, backed by an unprecedented flood of major first-party releases and crucial third-party ports that defy the platform’s age. This isn’t just about sheer volume; it’s about quality, with developers leveraging optimized technology to deliver incredible AAA experiences.

These high-quality games are specifically designed for the Switch’s core strength: gaming anywhere. Whether you’re looking for epic RPGs during your commute or seamless multiplayer adventures on the couch, 2025 confirms the Switch remains the indispensable console for flexible, high-quality play that fits your lifestyle.

The Top 10 New Switch Games You Can’t Miss in 2025 Game 1: Pokémon Legends: Z-A (October 2025)

Description: Open-world RPG in Lumiose City with new Pokémon and Mega Evolutions, blending real-time exploration and battles, optimized for Switch and Switch 2.

Why You Don’t Miss It?: Co-op exploration for teaming up with friends; Switch 2 boosts visuals and speed.

Game 2: Metroid Prime 4: Beyond (Summer 2025)

Description: First-person adventure featuring Samus Aran exploring uncharted planets with dynamic combat and puzzle-solving, optimized for Switch and Switch 2.

Why You Don’t Miss It?: Stunning 4K visuals on Switch 2 and immersive scanning mechanics enhance exploration.

Game 3: Donkey Kong Country Returns HD (November 2025)

Description: Remastered platformer with Donkey Kong and Diddy Kong, featuring co-op brawling and vibrant jungle levels, optimized for Switch and Switch 2.

Why You Don’t Miss It?: Nostalgic gameplay with crisp HD visuals and smoother controls on Switch 2.

Game 4: Super Mario Galaxy Bundle (Fall 2025)

Description: Remastered Wii classics featuring Mario’s cosmic adventures, with refined motion controls and vibrant 3D levels, optimized for Switch and Switch 2.

Why You Don’t Miss It?: Timeless 3D platforming with upgraded visuals appeals to all ages.

Game 5: Kirby Air Riders (November 2025)

Description: A vibrant racing adventure starring Kirby on warp stars, speeding through colorful worlds with dynamic tracks, optimized for Switch and Switch 2.

Why You Don’t Miss It?: Whimsical multiplayer races and unique power-ups deliver fun for all ages.

Game 6: Two Point Museum (October 2025)

Description: A quirky tycoon sim where you manage eccentric museum exhibits and thrilling expeditions, designed for Switch with charming visuals.

Why You Don’t Miss It?: Humorous management and endless replayability keep you hooked.

Game 7: Yakuza Kiwami & Kiwami 2 (November 2025)

Description: Remastered crime dramas with intense brawling and gripping stories, optimized for Switch’s portability and Switch 2’s enhanced visuals.

Why You Don’t Miss It?: Deep narratives and on-the-go play captivate fans

Game 8: Little Nightmares III (October 2025)

Description: A co-op horror puzzle adventure set in twisted, eerie worlds, built for Switch with haunting visuals and teamwork mechanics.

Why You Don’t Miss It?: Atmospheric scares and challenging puzzles thrill players.

Game 9: Dragon Quest I & II HD-2D (October 2025)

Description: Remade JRPG classics with stunning HD-2D visuals and turn-based combat, optimized for Switch and Switch 2.

Why You Don’t Miss It?: Timeless quests captivate RPG fans with modern flair.

Game 10: Tales of the Shire: A Lord of the Rings Game (2025)

Description: A cozy life sim in Hobbiton, featuring farming, crafting, and quests in a charming Middle-earth setting for Switch.

Why You Don’t Miss It?: Relaxing adventures offer serene escapism

How to Get Ready for These New Switch Games Pre-Order Early: Secure titles like Pokémon Legends: Z-A via Nintendo eShop to ensure day-one access and exclusive bonuses. Check Switch 2 Compatibility: Verify games support both original Switch and Switch 2 for optimal graphics and performance. Join Gaming Communities: Engage on platforms like Reddit or Discord for tips, updates, and multiplayer squads. Use Herond Browser: Explore trailers and pre-orders securely with ad-free Conclusion

The top 10 new Switch games of 2025, from Pokémon Legends: Z-A to Tales of the Shire, bring thrilling adventures, stunning visuals, and Switch 2 enhancements for every gamer. These titles redefine portable gaming with co-op, RPGs, and cozy sims. Discover must-play experiences that elevate your Nintendo Switch with innovative gameplay and cross-platform features. Dive into 2025’s unmissable Switch games and start playing today!

DOWNLOAD HEROND About Herond

Herond Browser is a cutting-edge Web 3.0 browser designed to prioritize user privacy and security. By blocking intrusive ads, harmful trackers, and profiling cookies, Herond creates a safer and faster browsing experience while minimizing data consumption.

To enhance user control over their digital presence, Herond offers two essential tools:

Herond Shield: A robust adblocker and privacy protection suite. Herond Wallet: A secure, multi-chain, non-custodial social wallet.

As a pioneering Web 2.5 solution, Herond is paving the way for mass Web 3.0 adoption by providing a seamless transition for users while upholding the core principles of decentralization and user ownership.

Have any questions or suggestions? Contact us:

On Telegram https://t.me/herond_browser DM our official X @HerondBrowser Technical support topic on https://community.herond.org

The post Top 10 New Switch Games You Can’t Miss in 2025 appeared first on Herond Blog.

The post Top 10 New Switch Games You Can’t Miss in 2025 appeared first on Herond Blog.


Top Crossplay Games 2025: Play with Friends Anywhere

It’s time to break down limits. Discover the perfect crossplay to play and win with your friends, anywhere! The post Top Crossplay Games 2025: Play with Friends Anywhere appeared first on Herond Blog. The post Top Crossplay Games 2025: Play with Friends Anywhere appeared first on Herond Blog.

Tired of platform walls stopping you from gaming with friends? Crossplay is the new standard, and 2025 is its peak year. This guide from Herond delivers the definitive list of the Top Crossplay Games 2025, rated for their quality and seamless connection. It’s time to break down limits. Discover the perfect titles to play and win with your friends, anywhere!

Introduction

We all know the frustration: getting ready to game with friends only to realize your PC can’t join their PlayStation lobby, or your Xbox buddy is locked out. That simple hardware difference has killed countless weekend plans and epic team-ups, leaving players divided by platform walls. However, that era of platform segregation is officially over. Crossplay is no longer a premium feature – it’s the definitive 2025 standard for any game that values its community. If a title wants to thrive, it must let you play with friends, period.

Herond is here to help you navigate this newly connected landscape. We’ve compiled the definitive list of the best crossplay games for 2025. This list cuts through noise and is meticulously evaluated based on quality, rock-solid connection stability, and community size. Forget the guesswork; these are the games ready for your squad, wherever they log in. It’s time to break down the limits and find the perfect titles where you and your friends can play and win together, anywhere!

Why Crossplay is Essential in 2025 Social Connectivity

Crossplay games revolutionize social gaming by uniting friends across devices like PS5, Xbox, PC, and mobile. No platform barriers mean you can jump into matches with buddies, regardless of their device.

Game Longevity

Crossplay games extend a title’s lifespan by expanding the player base across platforms. Larger, diverse communities keep matchmaking vibrant and servers active longer. Whether on console or PC, crossplay ensures your favorite games stay relevant.

Value for Gamers

Crossplay games save you money and hassle by eliminating the need to repurchase titles or manage multiple accounts to play with different friend groups. One game, one account, all platforms – maximum convenience.

The Top 10 Crossplay Games of 2025 Fortnite

Fortnite remains the king of crossplay in 2025, blending battle royale action with creative building and live events. Play with squads on PS5, Xbox, PC, Switch, or mobile, all synced via Epic accounts. Its massive updates and zero platform barriers make it ideal for casual drop-ins or epic tournaments.

Apex Legends

Apex Legends delivers fast-paced hero shooter thrills with full crossplay support across PS5, Xbox, PC, and Switch. Respawn’s legends and tactical abilities shine in squads, and 2025’s new seasons add fresh maps and weapons, ensuring endless replayability for competitive gamers.

Rocket League

Rocket League’s soccer-meets-cars chaos supports crossplay on PS5, Xbox, PC, Switch, and mobile. Epic’s acquisition keeps it free-to-play with ranked matches and custom arenas, making it a go-to for quick, high-octane sessions with friends on any device.

Minecraft

Minecraft’s endless creativity thrives with crossplay via Bedrock Edition on PS5, Xbox, PC, Switch, and mobile. Build worlds, survive adventures, or explore realms together – 2025’s updates enhance ray tracing and cross-platform realms for immersive, collaborative play.

Call of Duty

Warzone Warzone’s battle royale intensity features full crossplay on PS5, Xbox, PC, and mobile. Activision’s 2025 seasons introduce new maps and loadouts, letting you squad up across platforms for intense drops and victory royales without missing a beat.

Overwatch 2

Overwatch 2’s hero-based PvP shines with crossplay on PS5, Xbox, PC, and Switch. Blizzard’s evolving roster and team strategies keep matches dynamic, perfect for coordinating with friends regardless of console in 2025’s ranked climbs.

Sea of Thieves

Sea of Thieves offers pirate adventures with crossplay on PS5, Xbox, and PC. Rare’s open-world sailing, treasure hunts, and PvPvE encounters come alive in crews, with 2025 expansions adding new islands for shared seafaring escapades.

Monster Hunter Wilds

Monster Hunter Wilds roars into 2025 with crossplay on PS5, Xbox, PC, and Switch. Capcom’s co-op hunts against massive beasts demand teamwork across platforms, enhanced by seamless gear sharing and dynamic ecosystems.

Marvel Rivals

Marvel Rivals explodes as 2025’s hero shooter with crossplay on PS5, Xbox, PC, and mobile. NetEase’s Marvel roster delivers chaotic 6v6 battles, where cross-platform squads unleash combos like never before.

Diablo 4

Diablo 4’s dark fantasy loot grind supports crossplay on PS5, Xbox, PC, and Switch. Blizzard’s seasonal updates and hellish dungeons encourage group runs across devices, making 2025’s Vessel of Hatred expansion a cross-platform triumph.

Cross-Play vs. Cross-Progression: The Critical Difference Defining Cross-Play

Crossplay games enable seamless multiplayer across platforms like PS5, Xbox, PC, Switch, and mobile, uniting players regardless of device. This feature breaks down platform barriers, letting friends enjoy titles like Fortnite or Apex Legends together effortlessly.

Defining Cross-Progression (Cross-Save)

Cross-progression, or cross-save, allows players to use the same account and game data across different platforms, ensuring progress like levels, skins, or items transfers seamlessly. Games like Destiny 2 and Genshin Impact shine here, offering flexibility when switching from PC to mobile.

Top 3 Games with Best Cross-Progression

From our top 10 list, Destiny 2, Fortnite, and Genshin Impact lead in cross-progression for 2025. Destiny 2 syncs your Guardian’s gear across PS5, Xbox, and PC; Fortnite carries your skins and V-Bucks everywhere; and Genshin Impact ensures your characters transfer seamlessly.

Navigating Crossplay Challenges Input Disparity

Crossplay games often face input disparity between PC and console, with PC’s mouse precision outpacing controller inputs. Solutions like input filtering balance gameplay, as seen in titles like Apex Legends, ensuring fair matches across platforms.

Connection Stability

Lag and ping issues can disrupt crossplay games, especially in fast-paced titles like Call of Duty: Warzone. Stable internet and optimized servers are crucial for smooth multiplayer across PS5, Xbox, PC, and mobile.

Play crossplay games on Herond Browser

A secure, stable browser like Herond Browser is vital for optimal crossplay gaming performance. It protects against phishing and trackers while offering fast, ad-free access to gaming platforms and Web3 marketplaces.

Conclusion

The top crossplay games of 2025, like Fortnite, Apex Legends, and Minecraft, unite players across PS5, Xbox, PC, and mobile for seamless multiplayer fun. These titles offer endless entertainment with friends, no matter the platform. Discover and enjoy crossplay games securely with Herond Browser’s ad-free, enhanced by Web3 integration for in-game rewards. Start gaming anywhere, anytime in 2025!

DOWNLOAD HEROND About Herond

Herond Browser is a cutting-edge Web 3.0 browser designed to prioritize user privacy and security. By blocking intrusive ads, harmful trackers, and profiling cookies, Herond creates a safer and faster browsing experience while minimizing data consumption.

To enhance user control over their digital presence, Herond offers two essential tools:

Herond Shield: A robust adblocker and privacy protection suite. Herond Wallet: A secure, multi-chain, non-custodial social wallet.

As a pioneering Web 2.5 solution, Herond is paving the way for mass Web 3.0 adoption by providing a seamless transition for users while upholding the core principles of decentralization and user ownership.

Have any questions or suggestions? Contact us:

On Telegram https://t.me/herond_browser DM our official X @HerondBrowser Technical support topic on https://community.herond.org

The post Top Crossplay Games 2025: Play with Friends Anywhere appeared first on Herond Blog.

The post Top Crossplay Games 2025: Play with Friends Anywhere appeared first on Herond Blog.


Crypto Capital Venture Explained: Opportunities, Insights, and Market Trends

The digital asset landscape is evolving at warp speed, and behind every major innovation is a powerful financial engine: Crypto Capital Venture The post Crypto Capital Venture Explained: Opportunities, Insights, and Market Trends appeared first on Herond Blog. The post Crypto Capital Venture Explained: Opportunities, Insights, and Market Trends appeared first on Herond Blog.

The digital asset landscape is evolving at warp speed, and behind every major innovation is a powerful financial engine: Crypto Capital Venture (VC). This isn’t just about early-stage funding; it’s the strategic capital that is actively building and scaling the next generation of decentralized applications and blockchain infrastructure. Understanding the flow of this investment is crucial for anyone seeking an edge in the market. This guide is designed to demystify the ecosystem, offering a deep dive into the opportunities available to investors, providing crucial insights into how VC firms evaluate projects, and analyzing the top market trends that are currently shaping the financial future.

What Is Crypto Capital Venture?

Crypto Venture Capital is the strategic arm of investment focused on high-growth potential companies and protocols within the decentralized industry. It operates similarly to traditional VC but exclusively funds projects leveraging blockchain, decentralized finance (DeFi), NFTs, and Web 3.0 infrastructure.

Crypto VC firms function as more than just financiers; they are active partners in the ecosystem. They provide essential seed capital, strategic guidance, technical expertise, and crucial networking connections necessary to scale novel projects from a concept phase into a market-ready product.

Ultimately, Crypto VC is the primary engine driving innovation and adoption in the digital asset space. By identifying and funding the next generation of decentralized platforms, these investments directly shape market trends and accelerate the transition toward a more open, transparent, and user-owned internet.

Opportunities with Crypto Capital Venture 3.1. Recruiting and Talent Placement

Herond actively bridges the gap between top Web 3.0 talent and high-growth startups. Our platform ensures that companies secure the specialized expertise they need, while job seekers gain exclusive access to the most promising and impactful roles in the decentralized economy, accelerating careers across the industry.

3.2. Content and Market Insights

We empower investors with essential, real-time data. Through curated YouTube charts, news feeds, and specialized reports on altcoins, we deliver actionable market insights directly to our community. This content functions as a vital, free educational resource, allowing investors to stay informed and refine their strategies.

3.3. Staking and Investments

Herond provides clear avenues for maximizing digital asset returns. We facilitate participation in secure Cardano staking pools for generating passive income. Furthermore, we offer a realistic view of Venture Capital in the blockchain space, equipping users with the knowledge needed to make informed investment decisions that move beyond speculative trading.

Insights from Crypto Capital Venture Market Cycles and Altcoin Performance

Our latest analysis offers deep insights into Bitcoin’s cyclical behavior, examining historical patterns to anticipate future movements. Crucially, we detail how these macro cycles influence altcoin valuations, providing clarity on capital rotation and potential inflection points for high-growth digital assets across the ecosystem.

Expert Views on Early-Stage Talent

Securing exceptional talent is the single biggest predictor of success in Web 3.0. We gather expert perspectives on the skills required for early-stage ventures, focusing on the unique challenges of recruiting decentralized teams and the strategic importance of finding builders who can execute innovation under pressure.

2025 Predictions: The AI-Crypto Fusion

Looking ahead to 2025, our predictions center on the rapidly accelerating convergence of Artificial Intelligence and decentralized technology. This fusion is set to unlock transformative utility across DeFi, gaming, and infrastructure, creating powerful new market verticals and fundamentally redefining user interaction with crypto assets.

Crypto Capital Venture and 2025 Market Trends 5.1. Rising VC in Crypto

Venture Capital funding into crypto remains robust, evidenced by the $1.97 billion raised in Q2 2025 alone. This capital injection signals a significant shift, as investors increasingly prioritize later-stage funding rounds. This focus reflects a market maturing beyond initial concept phases to prioritize scalable projects with demonstrable traction.

5.2. Talent and Recruiting Boom

The demand for specialized talent is surging, particularly for experts skilled in blockchain and AI integration. To meet this critical need, our Crypto Capital Venture (CCV) services have successfully managed numerous global placements, effectively connecting high-growth startups with the technical leadership required to execute ambitious Web 3.0 roadmaps.

5.3. Staking and DeFi Growth

Decentralized Finance (DeFi) continues its upward trajectory, highlighted by the sustained expansion of major protocols like Cardano. Our CCV pools enable participants to capitalize directly on this growth, offering secure avenues for staking and passive yield generation while actively contributing to the stability and decentralization of the underlying network.

Conclusion

Crypto Venture Capital is fundamentally the fuel powering the Web 3.0 economy. As we’ve seen, understanding the flow of this capital—from the $1.97 billion invested in Q2 2025 to the strategic focus on later-stage projects and the rise of the AI-crypto fusion—is essential, not just for investors, but for anyone navigating this space. The opportunities are vast, but success hinges on having expert insights and a clear view of market cycles. By staying informed on talent trends and embracing the potential of DeFi and staking, you position yourself to capture maximum value. The future of decentralized finance is being built now, and informed capital is leading the way.

DOWNLOAD HEROND About Herond

Herond Browser is a Web browser that prioritizes users’ privacy by blocking ads and cookie trackers, while offering fast browsing speed and low bandwidth consumption. Herond Browser features two built-in key products:

Herond Shield: an adblock and privacy protection tool; Herond Wallet: a multi-chain, non-custodial social wallet.

Herond aims at becoming the ultimate Web 2.5 solution that sets the ground to further accelerate the growth of Web 3.0, heading towards the future of mass adoption.

Join our Community!

The post Crypto Capital Venture Explained: Opportunities, Insights, and Market Trends appeared first on Herond Blog.

The post Crypto Capital Venture Explained: Opportunities, Insights, and Market Trends appeared first on Herond Blog.

Sunday, 12. October 2025

Dock

Why The US Won’t Allow “Phone Home” Digital IDs

In our recent live podcast, Richard Esplin (Dock Labs) sat down with Andrew Hughes (VP of Global Standards, FaceTec) and Ryan Williams (Program Manager of Digital Credentialing, AAMVA) to unpack the new ISO standards for mobile driver’s licenses (mDLs). One topic dominated the discussion: server retrieval

In our recent live podcast, Richard Esplin (Dock Labs) sat down with Andrew Hughes (VP of Global Standards, FaceTec) and Ryan Williams (Program Manager of Digital Credentialing, AAMVA) to unpack the new ISO standards for mobile driver’s licenses (mDLs).

One topic dominated the discussion: server retrieval.

Thursday, 07. August 2025

Radiant Logic

Radiant Logic’s SCIM Support Recognized in 2025 Gartner® Hype Cycle™ for Digital Identity

Discover how Radiant Logic’s SCIMv2 support simplifies identity management, enabling seamless automation, governance, and Zero Trust alignment across hybrid environments. The post Radiant Logic’s SCIM Support Recognized in 2025 Gartner® Hype Cycle™ for Digital Identity appeared first on Radiant Logic.

California’s Countdown to Zero Trust—A Practical Path Through Radiant Logic

California’s AB 869 Zero-Trust mandate demands unified, real-time identity data, and Radiant Logic’s platform provides the foundation to ensure smarter security and seamless compliance. The post California’s Countdown to Zero Trust—A Practical Path Through Radiant Logic appeared first on Radiant Logic.

AI for Access Administration: From Promise to Practice

Streamline access reviews and boost compliance with Radiant Logic’s AIDA AI—an assistant that transforms cumbersome reviews into quick, confident decisions for modern identity governance. The post AI for Access Administration: From Promise to Practice appeared first on Radiant Logic.

Gartner Recognizes Radiant Logic as Leader in Identity Visibility and Intelligence Platforms

Explore why Gartner sees Identity Visibility and Intelligence Platforms as critical for reducing risk and accelerating digital transformation with real-time observability and unified identity data. The post Gartner Recognizes Radiant Logic as Leader in Identity Visibility and Intelligence Platforms appeared first on Radiant Logic.

Gartner® Recognizes Radiant Logic in the 2025 Hype Cycle™ for Zero Trust

Discover why unified, accurate identity data is now at the heart of Zero Trust mandates and how organizations can overcome real-world barriers to implementation. The post Gartner® Recognizes Radiant Logic in the 2025 Hype Cycle™ for Zero Trust appeared first on Radiant Logic.

Identity: The Lifeline of Modern Healthcare

Discover how transforming identity management from a bottleneck into a secure, unified foundation can accelerate care delivery and protect healthcare organizations from mounting cyber threats. The post Identity: The Lifeline of Modern Healthcare appeared first on Radiant Logic.

SC Media - Identity and Access

Ballistic Hot Dogs, Clayrat, Twonet, Lockbit, Resumes, Discord, Aaran Leyland and... - SWN #519


HYPR

It’s a Partnership, Not a Handoff: Doug McLaughlin on Navigating Enterprise Change

The journey from a signed contract to a fully deployed security solution is one of the most challenging in enterprise technology. For a mission-critical function like identity, the stakes are even higher. It requires more than just great technology; it demands a true partnership to drive change across massive, complex organizations.

The journey from a signed contract to a fully deployed security solution is one of the most challenging in enterprise technology. For a mission-critical function like identity, the stakes are even higher. It requires more than just great technology; it demands a true partnership to drive change across massive, complex organizations.

I sat down with HYPR’s SVP of Worldwide Sales, Doug McLaughlin, to discuss what it really takes to get from the initial sale to the finish line, and how HYPR works with customers to manage the complexities of procurement, organizational buy-in, and full-scale deployment for millions of users.

Let’s talk about the initial hurdles – procurement and legal. These processes can stall even the most enthusiastic projects. How do you get across that initial finish line?

Doug: By the time you get to procurement and legal, the business and security champions should be convinced of the solution's value. These teams aren't there to re-evaluate whether the solution is needed; they're there to vet who is providing it and under what terms. The biggest mistake you can make is treating them like a final sales gate.

Our approach is to be radically transparent and prepared. We have our security certifications, compliance documentation, and legal frameworks ready to go well in advance. We’ve already proven the business value and ROI to our champions, who then become our advocates in those internal procurement meetings. It’s about making their job as easy as possible. When you’ve built a strong, trust-based relationship across the organization, procurement becomes a process to manage efficiently, not an obstacle to overcome. The contract signature is less the "end" and more the "official beginning" of the real work.

You’ve navigated some of the largest passwordless deployments in history. Many people think the deal is done when the contract is signed. What’s the biggest misconception about that moment?

Doug: The biggest misconception is that the signature is the finish line. In reality, it’s the starting gun. For us, that contract isn’t an endpoint; it’s a formal commitment to a partnership. You've just earned the right to help the customer begin the real work of transformation.

In these large-scale projects, especially at global financial institutions or manufacturing giants, you’re not just installing software. You’re fundamentally changing a core business process that can touch every single employee, partner, and sometimes even their customers. If you view that as a simple handoff to a deployment team, you're setting yourself up for failure. The trust you built during the sales cycle is the foundation you need for the change management journey ahead.

When you’re dealing with a global corporation, you have IT, security, legal, procurement, and business units all with their own priorities. How do you start building the consensus needed for a successful rollout?

Doug: You have to build a coalition, and you do that by speaking the language of each stakeholder. I remember working with a major global bank. Their security team was our initial champion; they immediately saw how passkeys would eliminate phishing risk and secure their high-value transactions. But one of the key stakeholders was wary. Their primary concern was a potential surge in help desk calls during the transition, which would blow up their budget.

Instead of just talking about security with them, we shifted the conversation entirely and early. We presented the case study from another financial services deployment showing a 70-80% reduction in password-related help desk tickets within six months of rollout. We framed the project not as a security mandate, but as an operational efficiency initiative that would free up the team's time.

We connected the dots for them. Security got their risk reduction. IT saw a path to lower operational costs. The business leaders saw a faster, more productive login experience for their bankers. When each department saw its specific problem being solved, they became a unified force pushing the project forward. That's how you turn individual stakeholders into a powerful coalition.

That leads to the user. How do you get hundreds of thousands of employees at a global company to embrace a new way of signing in?

Doug: You can’t force change on people; you have to make them want it. A great example is a Fortune 500 manufacturing company we worked with. They had an incredibly diverse workforce. From corporate executives on laptops to factory floor workers using shared kiosks and tablets. Compounding this further, employees spanned the globe, from US, to China to LatAm and beyond. Let’s face it, a single, top-down email mandate was never going to work.

We partnered with them to create a phased rollout that respected these different user groups. For the factory floor, we focused on speed. The message was simple: "Clock in faster, start your shift faster." We trained the shift supervisors to be the local experts and put up simple, visual posters near the kiosks.

For the corporate employees, we focused on convenience and security, highlighting the ability to log in from anywhere without typing a password. We identified influential employees in different departments to be part of a pilot program. Within weeks, these "champions" were talking about how much easier their sign-in experience was. That word-of-mouth was more powerful than any corporate memo. The goal is to make the new way so demonstrably better that people are actively asking when it's their turn. That’s when adoption pulls itself forward.

Looking back at these massive, multi-year deployments, what defines a truly "successful" partnership for you?

Doug: Success isn’t the go-live announcement. It's six months later when the CISO tells you their help desk calls are down 70%. It's when an employee from a branch in Singapore sends unsolicited feedback about how much they love the new login experience. It’s when the customer’s security team stops seeing you as a vendor and starts calling you for advice on their entire identity strategy.

That's the real finish line. It's when the change has stuck, the value is being realized every day, and you’ve built a foundation of trust that you can continue to build on for years to come.

What's the biggest topic that keeps coming up in your customer conversations these days?

Doug: I'm having a lot of fun clarifying the difference between simply checking a document and actually verifying a person's identity. Many companies believe that if they scan a driver's license, they're secure. But I always ask, "Okay, that tells you the document is probably real, but how do you really know who's holding it?" That question changes everything. Between the rise of AI-generated fakes, or the simple reality that people lose their wallets, relying on a single document is incredibly fragile. The last thing you want is your top employee stranded and locked out of their accounts because their license is missing.

I move the conversation to a multi-factor approach. We check the document, yes, but then we use biometrics to bind it to the live person in front of the camera, and then we cross-reference that against another trusted signal, like the phone they already use to sign in. It gives you true assurance that the right person is there. More importantly, it provides multiple paths so your employees are never left helpless. It’s about building a resilient system that’s both more secure and more practical for your people.

Bonus question! What’s one piece of advice you’d give to someone just starting to manage these complex sales and deployment cycles?

Doug: Get obsessed with your customer's business, not your product. Understand what keeps their executives up at night, what their biggest operational headaches are, and what their long-term goals are. If you can authentically map your solution to solving those core problems, you stop being a salesperson and start being a strategic partner. Everything else follows from that.

Thanks for the insights, Doug. It’s clear that partnership is the key ingredient to success!


SC Media - Identity and Access

Seven ways to harden our MFA deployments

Sure, hackers can bypass MFA, but here’s how to make sure they don’t.

Sure, hackers can bypass MFA, but here’s how to make sure they don’t.


This week in identity

E63 - Are Identity Platforms Legacy? The Rise of Identity Information Flows

Keywords PAM, IGA, CyberArk, Palo Alto, identity security, AI, machine identity, cybersecurity, information flows, behavioral analysis Summary In this episode of the Analyst Brief Podcast, Simon Moffatt and David Mahdi discuss the significant changes in the cybersecurity landscape, particularly focusing on Privileged Access Management (PAM) and Identity Governance and Administration (IGA)

Keywords

PAM, IGA, CyberArk, Palo Alto, identity security, AI, machine identity, cybersecurity, information flows, behavioral analysis


Summary


In this episode of the Analyst Brief Podcast, Simon Moffatt and David Mahdi discuss the significant changes in the cybersecurity landscape, particularly focusing on Privileged Access Management (PAM) and Identity Governance and Administration (IGA). They explore the recent acquisition of CyberArk by Palo Alto, the evolution of identity security, and the convergence of various identity management solutions.

The conversation highlights the importance of information flows, and the need for a mindset shift in the industry to effectively address identity security challenges.


Takeaways


The cybersecurity landscape is rapidly changing due to AI. PAM and IGA are evolving but remain siloed. The acquisition of CyberArk by Palo Alto signifies a shift in identity security. Organizations struggle with integrating disparate identity technologies. Behavioral analysis is crucial for identifying security threats. AI will play a significant role in optimizing identity security. Defensive acquisitions are common in the cybersecurity industry. The future of identity security relies on understanding information flows.


Chapters


00:00 Welcome Back and Industry Changes

02:01 The Evolution of Privileged Access Management (PAM)

10:41 The Convergence of Cybersecurity and Identity

16:13 The Future of Identity Management Platforms

24:23 Understanding Information Flows in Cybersecurity

28:12 The Role of AI in Identity Management

33:42 Navigating Mergers and Acquisitions in Tech

39:50 The Future of Identity Security and AI Integration



SC Media - Identity and Access

Voting rights group argue Trump's voter data overhaul is illegal

CyberScoop reports that the Electronic Privacy Information Center, the League of Women Voters, and five individual plaintiffs filed a lawsuit in D.C. District Court, seeking to immediately stop the Trump administration from expanding the Systematic Alien Verification for Entitlements system into a massive voter and citizenship tracking system.

CyberScoop reports that the Electronic Privacy Information Center, the League of Women Voters, and five individual plaintiffs filed a lawsuit in D.C. District Court, seeking to immediately stop the Trump administration from expanding the Systematic Alien Verification for Entitlements system into a massive voter and citizenship tracking system.


Tokeny Solutions

Are markets ready for tokenised stocks’ global impact?

The post Are markets ready for tokenised stocks’ global impact? appeared first on Tokeny.
September 2025 Are markets ready for tokenised stocks’ global impact?

Nasdaq has filed with the SEC to tokenise every listed stock by 2026. If approved, this would be the first time tokenised securities trade on a major U.S. exchange, a milestone that could transform global capital markets. Under the proposal, investors will be able to choose whether to settle their trades in traditional digital form or in tokenised blockchain form.

As, more and more firms are tokenising stocks. The implications are potentially huge:

24/7 trading of tokenised equities Instant settlement Programmable ownership Full shareholder rights, identical to traditional shares

This is a large overhaul of market infrastructure. Sounds great, but the reality is much more complex.

How to tokenise stocks?

Tokenised stocks today can be structured in several ways, including:

Indirect tokenisation: The issuer raises money via the issuance of a financial instrument different from the stocks, typically a debt instrument (e.g. bond/note), and buys the underlying stocks with the raised funds. The tokens may either be the financial instrument itself or represent a claim on that financial instrument. The token does not grant investors direct ownership of the underlying stock. However, it is simple to launch. Direct tokenisation: Stocks are tokenised directly at the stock company level, preserving voting, dividends, and reporting rights. Although this method tends to be more difficult to implement due to legal and infrastructure requirements.

Both structures have their benefits and drawbacks. The real issue, however, is how the tokens are managed post-issuance.

Permissionless vs permissioned tokens

While choosing a structure for tokenised stocks is important, the true success of tokenisation depends on whether the tokens are controlled or free to move, because this determines compliance, investor protection, and ultimately whether the market can scale safely.

Permissionless: Tokens can move freely on-chain after issuance. Token holders gain economic exposure, but not shareholder rights. Secondary market trading is not controlled, creating compliance risks. The legitimate owner of the security is not always clear. Permissioned: Compliance and eligibility are enforced at every stage, embedding rules directly into the token. Crucially, permissioned tokens also guarantee investor safety by making ownership legally visible in the issuer’s register. For issuers, this model also fulfils their legal obligation to know who their investors are at all times. Transfers to non-eligible wallets are blocked, maintaining regulatory safety while preserving trust.

While permissionless tokens may be quicker to launch, they carry significant legal risks, weaken investor trust, and fragment growth. By contrast, permissioned tokens should be considered as the only sustainable approach to tokenising stocks, because they combine compliance, investor protection, and long-term scalability.

The right way forward – compliance at the token level

Nasdaq’s SEC filing shows the path to do this right. Tokenised stocks will only succeed if eligibility and compliance are enforced in both issuance and secondary trading.

That’s where open-source standards like ERC-3643 come in:

Automated compliance baked in: Rules are enforced automatically at the protocol level, not manually after the fact Eligibility checks: Only approved investors can hold the asset, enabling ownership tracking efficiently Controlled transfers: Tokens cannot be sent to non-eligible investors, even in the secondary market Auditability: Every transaction can be monitored in real time, ensuring trust with regulators

This is how tokenised stocks can operate safely at scale, with compliance embedded directly into the digital infrastructure, no matter if it’s through direct or indirect tokenisation. This provides safety at scale, unlocked liquidity, efficiency, and regulatory alignment.

Why this matters now?

Investor demand for tokenised assets is surging. Global banks are exploring issuance, Coinbase has sought approval, and now Nasdaq is moving ahead under the SEC’s umbrella. Tokenisation will be at the core of financial markets.

But shortcuts built on permissionless, freely transferable tokens will only invite regulatory backlash, slowing innovation and preventing the market from scaling.

The future of tokenised shares will be built on:

Carrying full shareholder rights and guaranteeing ownership Automatic, enforced compliance on every trade Integrating directly into existing market infrastructure

That is what true tokenisation means, not synthetic exposure, but embedding the rules of finance into the share itself.

We believe this is the turning point. Nasdaq’s move validates what we’ve been building toward: a global financial system where tokenisation unlocks liquidity, efficiency, and access, not at the expense of compliance, but because of it.

The race is on. The winners won’t be those who move fastest, but those who build markets that are trusted, compliant, and scalable from day one.

Tokeny Spotlight

Annual team building

We head to Valencia for our annual offsite team building. A fantastic time filled with great memories.

Read More

Token2049

Our CEO and Head of Product for Apex Digital Assets, and CBO, head to Singapore for Token2049

Read More

New eBook

Global payments reimagined. Download to learn what’s driving the rapid rise of digital currencies.

Read More

RWA tokenisation report

We are proud to have contributed to the newly released RWA Report published by Venturebloxx.

Read More

SALT Wyoming

Our CCO and Global Head of Digital Assets at Apex Group, Daniel Coheur, discusses Blockchain Onramps at SALT.

Read More

We test SilentData’s privacy

Their technology explores how programmable privacy allows for secure and compliant RWA tokenisation.

Read More Tokeny Events

Token2049 Singapore
October 1st-2nd, 2025 | 🇸🇬 Singapore

Register Now

Digital Assets Week London
October 8th-10th, 2025 | 🇬🇧 United Kingdom

Register Now

ALFI London Conference
October 15th, 2025 | 🇬🇧 United Kingdom

Register Now

RWA Singapore Summit
October 2nd, 2025 | 🇸🇬 Singapore

Register Now

Hedgeweek Funds of the Future US 2025
October 9th, 2025 | 🇺🇸 United States of America

Register Now ERC3643 Association Recap

ERC-3643 is recognized in Animoca Brands Research’s latest report on tokenised real-world assets (RWAs).

The report highlights ERC-3643 as a positive step for permissioned token standards, built to solve the exact compliance and interoperability challenges holding the market back.

Read the story here

Subscribe Newsletter

A monthly newsletter designed to give you an overview of the key developments across the asset tokenization industry.

Previous Newsletter  Oct10 Are markets ready for tokenised stocks’ global impact? September 2025 Are markets ready for tokenised stocks’ global impact? Nasdaq has filed with the SEC to tokenise every listed stock by 2026. If approved,… Sep1 SkyBridge Tokenises $300m Hedge Funds with Tokeny and Apex Group August 2025 SkyBridge Tokenises $300m Hedge Funds with Tokeny and Apex Group Last month, together with Apex Group, we introduced Apex Digital 3.0, the first… Aug1 Apex Digital 3.0 is Live – The Future of Finance Starts Now July 2025 Apex Digital 3.0 is Live – The Future of Finance Starts Now To truly scale tokenisation, we need a global force at the… Jul1 Real Estate Tokenization Takes Off in Dubai June 2025 Real Estate Tokenization Takes Off in Dubai Dubai’s real estate market is breaking records. According to data shared by Property Finder, Dubai recorded…

The post Are markets ready for tokenised stocks’ global impact? appeared first on Tokeny.


auth0

Is Your Business Ready for AI Agents? The Ultimate AI Security Checklist for Customer Identity

Assess your business's AI Agent readiness. Use this checklist to master the unique AI security challenges autonomous agents pose to customer identity and data access.
Assess your business's AI Agent readiness. Use this checklist to master the unique AI security challenges autonomous agents pose to customer identity and data access.

Thursday, 09. October 2025

Spruce Systems

Why Digital Identity Frameworks Should Be Public Infrastructure

Digital identity is essential infrastructure, and it deserves the same level of public investment, oversight, and trust as other core systems like roads or utilities.

Most people think of digital identity as a mobile driver’s license or app on their phone. But identity isn’t just a credential, it’s infrastructure. Like roads, broadband, or electricity, digital identity frameworks must be built, governed, and funded as public goods.

Today, the lack of a unified identity system fuels fraud, inefficiency, and distrust.  In 2023, the U.S. recorded 3,205 data breaches affecting 353 million people, and the Federal Trade Commission reported $12.5 billion in fraud losses, much of it rooted in identity theft and benefit scams.

These aren’t isolated incidents but symptoms of fragmentation: every agency and organization maintaining its own version of identity, duplicating effort, increasing breach risk, and eroding public trust.

We argue that identity should serve as public infrastructure: a government-backed framework that lets residents prove who they are securely and privately, across contexts, without unnecessary data collection or centralization. Rather than a single product or app, this framework can represent a durable set of technical and statutory controls built to foster long-term trust, protect privacy, and ensure interoperability and individual control.

From Projects to Public Infrastructure

Governments often launch identity initiatives as short-term projects: a credential pilot, a custom-built app, or a single-agency deployment. While these efforts may deliver immediate results, they rarely provide the interoperability, security, or adoption needed for a sustainable identity ecosystem. Treating digital identity as infrastructure avoids these pitfalls by establishing common rails that multiple programs, agencies, and providers can build upon.

A better approach is to adopt a framework model, where digital identity isn’t defined by a single product or format but by adherence to a shared set of technical and policy requirements. These requirements, such as selective disclosure, minimal data retention, and individual control, can apply across many credential types, from driver’s licenses and professional certifications to benefit eligibility and guardianship documentation.

This enables credentials to be iterated and expanded on thoughtfully: credentials can be introduced one at a time, upgraded as standards evolve, and tailored to specific use cases while maintaining consistency in protections and interoperability.

Enforcing Privacy Through Law and Code

Foundational privacy principles such as consent, data minimization, and unlinkability must be enforced by technology, not just policy documents. Digital identity systems should make privacy the default posture, using features (depending on the type of credential) such as:

Selective disclosure (such as proving “over 21” without showing a birthdate) Hardware-based device binding Cryptographically verifiable digital credentials with offline presentation Avoid architectures that risk exposing user metadata during verification.

By embedding security, privacy, and interoperability directly into the architecture, identity systems move beyond compliance and toward real-world protection for residents. These are not optional features, they are statutory expectations brought to life through secure protocols.

Open Standards, Broad Interoperability

Public infrastructure should allow for vendor choice and competitive markets that foster innovation. That’s why modern identity systems should be built on open, freely implementable standards, such as ISO/IEC 18013-5/7, OpenID for Verifiable Presentations (OID4VP), W3C Verifiable Credentials, and IETF SD-JWTs.

These standards allow credentials to be portable across wallet providers and verifiable in both public and private sector contexts, from airports and financial institutions to universities and healthcare. Multi-format issuance ensures credentials are accepted in the widest range of transactions, without compromising on core privacy requirements.

A clear certification framework covering wallets, issuers, and verifiers can ensure compliance with these standards through independent testing, while maintaining flexibility for providers to innovate. Transparent certification also builds trust and ensures accountability at every layer of the ecosystem.

Governance Leads, Industry Builds

Treating digital identity as infrastructure doesn’t mean the public sector has to (or even should) build everything. It means the public sector must set the rules, defining minimum standards, overseeing compliance, and ensuring vendor neutrality.

Wallet providers, credential issuers, and verifiers can all operate within a certified framework if they meet established criteria for security, privacy, interoperability, and user control. Governments can maintain legal authority and oversight while encouraging healthy private-sector competition and innovation.

This governance-first approach creates a marketplace that respects rights, lowers risk, and is solvent. Agencies retain procurement flexibility, while residents benefit from tools that align with their expectations for usability and safety.

Why This Matters

Digital identity is the entry point to essential services: healthcare, education, housing, employment, and more. If it’s designed poorly, it can become fragmented, invasive, or exclusionary. But if it’s designed as infrastructure with strong governance and enforceable protections, it becomes a foundation for inclusion, trust, and public value.

Well-governed digital identity infrastructure enables systems that are:

Interoperable across jurisdictions and sectors Private by design, not retrofitted later Transparent, with open standards and auditability Resilient, avoiding lock-in and enabling long-term evolution

Most importantly, it is trustworthy for residents, not just functional.

A Foundation for the Future

Public infrastructure requires alignment between law, technology, and market design. With identity, that means enforcing privacy in code, using open standards to drive adoption, and establishing certification programs that ensure accountability through independent validation without stifling innovation.

This is more than a modernization effort. It’s a transformation that ensures digital identity systems can grow, adapt, and serve the public for decades to come.

Ready to Build Trustworthy Digital ID Infrastructure?

SpruceID partners with governments to design and implement privacy-preserving digital identity systems that scale. Contact us to explore how we can help you build standards-aligned, future-ready identity infrastructure grounded in law, enforced by code, and trusted by residents.

Contact Us

About SpruceID: SpruceID is building a future where users control their identity and data across all digital interactions.


SC Media - Identity and Access

SonicWall confirms all Cloud Backup Service users were compromised

A deeper analysis found that all the firewall configurations were compromised, not just 5% of users as first reported.

A deeper analysis found that all the firewall configurations were compromised, not just 5% of users as first reported.


AWS environments under threat from Crimson Collective

Amazon Web Services cloud environments have been subjected to attacks by the Crimson Collective hacking operation as part of a data extortion campaign, reports BleepingComputer.

Amazon Web Services cloud environments have been subjected to attacks by the Crimson Collective hacking operation as part of a data extortion campaign, reports BleepingComputer.


Microsoft Teams exploitation in cyberattacks ramp up

Cybernews reports that Microsoft Teams has been increasingly leveraged by cybercriminals and state-backed threat actors to facilitate illicit cyber activity.

Cybernews reports that Microsoft Teams has been increasingly leveraged by cybercriminals and state-backed threat actors to facilitate illicit cyber activity.


Active exploitation of WordPress theme bug underway

BleepingComputer reports that over 13,800 attack attempts aimed at a critical authentication bypass vulnerability in the Service Finder WordPress theme, tracked as CVE-2025-5947, have been launched since the beginning of August.

BleepingComputer reports that over 13,800 attack attempts aimed at a critical authentication bypass vulnerability in the Service Finder WordPress theme, tracked as CVE-2025-5947, have been launched since the beginning of August.


Extensive browser targeting conducted by novel Shuyal Stealer malware

Newly emergent Shuyal Stealer malware could pilfer login credentials from 19 different web browsers, including Google Chrome, Microsoft Edge, Opera and Opera GX, Epic, Waterfox, Vivaldi, and Yandex, GBHackers News reports.

Newly emergent Shuyal Stealer malware could pilfer login credentials from 19 different web browsers, including Google Chrome, Microsoft Edge, Opera and Opera GX, Epic, Waterfox, Vivaldi, and Yandex, GBHackers News reports.


Discord refutes claimed impact of third-party breach

Discord has repudiated threat actors' assertions of having pilfered 2.1 million government IDs from the breach of its third-party customer service provider, stating that only about 70,000 users had their government ID photos compromised, as it emphasized its refusal to pay the demanded ransom, BleepingComputer reports.

Discord has repudiated threat actors' assertions of having pilfered 2.1 million government IDs from the breach of its third-party customer service provider, stating that only about 70,000 users had their government ID photos compromised, as it emphasized its refusal to pay the demanded ransom, BleepingComputer reports.


San Francisco's Cal Club purportedly hacked by Qilin ransomware

Cybernews reports that the California Golf Club of San Francisco, an elite golf club catering to Silicon Valley executives and other high-profile clients, had 10 GB of member data allegedly stolen by the Qilin ransomware group.

Cybernews reports that the California Golf Club of San Francisco, an elite golf club catering to Silicon Valley executives and other high-profile clients, had 10 GB of member data allegedly stolen by the Qilin ransomware group.


Quebec children's data exposed by unapproved schools app

Thousands of children attending schools and daycare centers across Quebec had their data exposed as a result of vulnerabilities in the widely used student pickup time-coordinating app HopHop, which was not approved by the Quebec Ministry of Education, reports Cybernews.

Thousands of children attending schools and daycare centers across Quebec had their data exposed as a result of vulnerabilities in the widely used student pickup time-coordinating app HopHop, which was not approved by the Quebec Ministry of Education, reports Cybernews.


California law permits browser data sharing opt outs

Legislation strengthening the California Consumer Privacy Act of 2018 by requiring web browsers to provide a simple, universal opt-out tool for consumers who do not want their data sold to third parties has been signed into law by Gov. Gavin Newsom, reports The Record, a news site by cybersecurity firm Recorded Future.

Legislation strengthening the California Consumer Privacy Act of 2018 by requiring web browsers to provide a simple, universal opt-out tool for consumers who do not want their data sold to third parties has been signed into law by Gov. Gavin Newsom, reports The Record, a news site by cybersecurity firm Recorded Future.


Report finds sharp rise in digital fraud costs

Digital fraud has drained 7.7% of annual revenue on average among companies worldwide, with losses estimated to reach $534 billion over the past 12 months, Infosecurity Magazine reports.

Digital fraud has drained 7.7% of annual revenue on average among companies worldwide, with losses estimated to reach $534 billion over the past 12 months, Infosecurity Magazine reports.


VTEX database exposing customer info remains unsecured

VTEX a global e-commerce platform for over 3,500 online stores, including those of Nestle, Coca-Cola, Sony, Walmart, Mazda, and Samsung has inadvertently leaked the data of six million shoppers, according to Cybernews.

VTEX a global e-commerce platform for over 3,500 online stores, including those of Nestle, Coca-Cola, Sony, Walmart, Mazda, and Samsung has inadvertently leaked the data of six million shoppers, according to Cybernews.


Credential stuffing intrusions hit DraftKings customers

Major online sports betting platform DraftKings has confirmed that fewer than 30 of its customers had their accounts compromised in a string of credential stuffing attacks, reports BleepingComputer.

Major online sports betting platform DraftKings has confirmed that fewer than 30 of its customers had their accounts compromised in a string of credential stuffing attacks, reports BleepingComputer.


Indicio

Your authentication dilemma: DIY or off-the-shelf decentralized identity?

The post Your authentication dilemma: DIY or off-the-shelf decentralized identity? appeared first on Indicio.
With the European Union mandating digital wallets by the end of 2026, and Verifiable Credentials offering new, powerful, and cost-effective ways to solve identity fraud and simplify operations, you may be thinking it’s time to embrace decentralized identity and build your own Verifiable Credential system. You’ve got a developer team, they understand security — so it couldn’t be that difficult, right?

By Helen Garneau

It’s tempting to do things yourself. But there’s a reason a professional painter will almost certainly do a better and quicker job at painting your house than you will. And, when you price how much time it would take you, there’s a good chance a professional will probably end up costing you less too.

The same logic applies to building decentralized identity systems with Verifiable Credentials.

If you have a talented team of engineers, it’s easy to think, “we’ve got this.” They understand security, they can code, issuing and verifying a few credentials sounds simple enough.

But once you start digging into credential formats, protocols, interoperability, global standards, regulations, and governance, what seems like a quick project for a few developers quickly becomes a long, complex, and costly effort to build and maintain a secure, standards-compliant system.

How fast “We got this” turns into “Why did we do this?”

Decentralized identity makes data portable and cryptographically verifiable without the need for certificate authorities or centralized data management. Its vehicle is the Verifiable Credential, a way of sealing any kind of information in a digital container so that it cannot be altered and you can be certain of its origin.

If you trust the origin of the credential — say a passport office or a bank — you can trust that the information placed in the credential has not been altered. Verifiable Credentials are held in digital wallet apps and can be shared by the consent of the holder, whether a person or an organization, in privacy-preserving ways.

Verifiable Credentials are most commonly used to create instantly authenticatable versions of trusted documents, such as passports, driver’s licenses, but they can be created and held by devices for secure data sharing, or robots and AI agents, for authentication and permissioned data access.

The point of all this is that it transforms authentication, fraud prevention, privacy, security, and operational efficiency. You are able to remove usernames and passwords, centralized storage and multi-factor authentication and combine authentication and fraud prevention in a seamless, instant process.

A decentralized ecosystem consists of three parts: an issuer that creates and digitally signs the credential, a holder who keeps it in a digital wallet and presents it for authentication and access to resources, and a verifier or relying party that needs to authenticate the information presented for some purpose.

When building an ecosystem for a use case — say systems account access — here’s what you need to consider: There are, presently, three major credential formats, each with differing communications protocols. They’ve got to interoperate with each other and across different digital wallets according to whatever standards you want to align with. Which are you going to pick?

Then, you need to get them into people’s wallets. Which wallet? An existing one or do you need an SDK?

If you want to verify credentials, you should be able to verify thousands — perhaps tens of thousands — simultaneously. How do you do this when mobile devices don’t have fixed IP addresses? How are you going to establish offline verification? And how are you going to establish governance so that participants know who is a trusted issuer of a credential?

This is just a basic implementation — a foundation to build the kind of solutions the market wants. Are you also prepared to then develop integrated payments, integrated biometrics, digital travel credentials, document validation, and identity and delegated authority for AI agents and robots? You better be, because that’s where the market is now at.

There’s a reason Indicio was the first (and still the only) company to launch a complete, off-the-shelf solution for implementing Verifiable Credentials in both the Amazon and Google Cloud Marketplaces: We built a team composed of pioneers and leaders in decentralized identity, engineers and developers deeply engaged with the open source codebases and communities that have shaped this technology. They live and breathe this stuff every day. And even so, it still took years to build an interoperable, multi-credential, multi-protocol, system that can scale to country-level deployments.

If your team isn’t already familiar with the open-source codebases and the evolving international specifications and standards, how are they going to deliver in a realistic time frame at an acceptable cost?

The probability that your team is going to do all that we did in six months is… low.

The likelihood that they will end up blowing through a lot of your budget attempting to do this is… high.

Interoperability — everyone expects it

No one is going to buy a proprietary, siloed system. Decentralized identity is an architecture for data sharing and integrating markets into functioning ecosystems; if your solution can’t do this, can’t interoperate or scale, it’s missing out on key features that drive business growth. Sure, you may want to start by securing your SSO with a Verifiable Credential, but why limit the power of verification?

For example, one of the key failures of the mobile driver’s license (m/DL) in the U.S. is that so many implementations failed to make verification open to other parties. Think of all the ways an m/DL could be used to prove age or identity. A digital identity that’s locked into a narrow use case and proprietary verification is a wasted opportunity not least because verification can be monetized (Indicio’s m/DL is easily verifiable anywhere).

To make a system work with the rest of the world, it has to speak the relevant languages. That means following multiple standards and protocols that define how credentials are created, stored, and exchanged and, depending on what your needs are, for whatever specific credential workflow you want to deploy, keeping up with some or all of the following:

W3C Verifiable Credential Data Model (VCDM) — defines how credentials are structured and signed.

ISO/IEC 18013-5 and ICAO DTC — govern mobile driver’s licenses (mDL) and Digital Travel Credentials, ensuring global interoperability across borders and transport systems.

DIDComm and DID methods — specify how secure, peer-to-peer communication and decentralized identifiers work.

OpenID for Verifiable Credentials (OID4VC and OID4VP) — bridges decentralized identity with mainstream authentication systems like OAuth and OpenID Connect.

Each of these comes with its own working groups, test suites, and compliance updates. Building your own system means keeping pace with all of them and making sure your implementation doesn’t break every time a standard changes.

With off-the-shelf, you implement in days

Indicio Proven® eliminates the DIY risk. You have a way to start implementing a POC in days, pilot in weeks, launch in months. We’ve spent years doing the heavy lifting so you don’t have to. It’s the mature, field-tested Verifiable Credential infrastructure that governments, airports, and financial institutions already use.

Instead of building from scratch, you have everything you need to start building a solution, a product, or a service so your team is free to focus on things that make you money.

Indicio Proven can already handle country-level deployments and multi-credential workflows. It has been DPIA’d for GDPR. It comes with document validation and biometric authentication, a white-label digital wallet if you need one, a mobile SDK to add Verifiable Credentials to your apps. We’ve already mastered:

Multiple credential formats (AnonCreds, SD-JWT VC, JSON-LD, mdoc/mDL) DIDComm and OID4VC/OID4VP communications protocols Digital Travel Credentials aligned with ICAO DTC-1 and DTC-2 specifications. Decentralized ecosystem governance Hosting on premise, in the cloud or as a SaaS product. A global, enterprise-grade blockchain-based distributed ledger for anchoring credentials Certified training in every aspect of decentralized identity Support packages Continuous updates

In one package, you get everything you need to build, deploy, and stay current with evolving standards, so your team doesn’t have to chase every update.

Deploy with confidence

There’s no shame in DIY, but for Verifiable Credentials, the smarter move is to build on top of something that already works. Indicio does the heavy lifting so you can focus on what matters: using trusted digital identity to deliver value to your users. A Verifiable Credential system should give you trust, not technical debt.

In short: don’t reinvent the tech. Build with what’s already proven.

Want to do it right the first time? Let’s talk.

The post Your authentication dilemma: DIY or off-the-shelf decentralized identity? appeared first on Indicio.


Dock

What We Learned Showing Digital IDs for Local Government

In a recent client call, we were asked whether our platform could help a local government issue digital IDs.  To answer that, Richard Esplin (Head of Product) put together a live demo. Instead of complex architectures or long timelines, he showed how a city could issue a&

In a recent client call, we were asked whether our platform could help a local government issue digital IDs. 

To answer that, Richard Esplin (Head of Product) put together a live demo.

Instead of complex architectures or long timelines, he showed how a city could issue a digital residency credential and use it instantly across departments. From getting a library card to scheduling trash pickup.

The front end for the proof-of-concept was spun up in an afternoon with an AI code generator. 

Behind the scenes, we handled verifiable credential issuance, verification, selective disclosure, revocation, and ecosystem governance, proving that governments can move from paper processes to reusable, privacy-preserving digital IDs in days, not months.


From ID uploads to VPN downloads: The UK’s digital rebellion

The UK's Online Safety Act triggered a staggering 1,800% surge in VPN signups within days of implementation. The UK’s Online Safety Act was introduced to make the internet “safer,” especially for children. It forces websites and platforms to implement strict age verification measures

The UK's Online Safety Act triggered a staggering 1,800% surge in VPN signups within days of implementation.

The UK’s Online Safety Act was introduced to make the internet “safer,” especially for children. It forces websites and platforms to implement strict age verification measures for adult and “harmful” content, often requiring users to upload government IDs, credit cards, or even biometric scans.

While the goal is protection, the method feels intrusive. 

Suddenly, every UK citizen is being asked to share sensitive identity data with third-party verification companies just to access certain sites.

The public response was immediate. 

Within days of implementation, the UK saw a staggering 1,800% surge in VPN signups. 

ProtonVPN jumped to the #1 app in the UK App Store. NordVPN reported a 1,000% surge. In fact, four of the top five free iOS apps in the UK were VPNs. 

Millions of people literally paid to preserve their privacy rather than comply.

This backlash reveals a fundamental flaw in how age verification was implemented.

People are rejecting what they perceive to be privacy-invasive ID uploads. They don’t want to hand over passports, driver’s licenses, or facial scans just to browse.

Can we blame them?

The problem isn’t age verification itself. The problem is the method, which pushes people to circumvent the rules with VPNs or even fake data.

But here’s the thing: we already have better options.

Government-issued digital IDs already exist. Zero-knowledge proofs let you prove you’re 18+ without revealing who you are. Verifiable credentials combine reliability (government-backed trust) with privacy by design.

With this model, the website never sees your personal data. 

The check is still secure, government-backed, and reliable, without creating surveillance or new honeypots of sensitive data.

The VPN surge is proof that people value their digital privacy so much that they’ll pay for it.

If governments want compliance and safety, they need to meet people where they are: with solutions that respect privacy as much as protection.

The UK’s privacy backlash demonstrates exactly why verifiable ID credentials are the way forward. 

They can resolve public resistance while maintaining both effective age checks and digital rights.


Why Derived Credentials Are the Future of Digital ID

In our recent live podcast, Richard Esplin (Dock Labs) spoke with Andrew Hughes (VP of Global Standards, FaceTec) and Ryan Williams (Program Manager of Digital Credentialing, AAMVA) about the rollout of mobile driver’s licenses (mDLs) and what comes next. One idea stood out: derived credentials. mDLs

In our recent live podcast, Richard Esplin (Dock Labs) spoke with Andrew Hughes (VP of Global Standards, FaceTec) and Ryan Williams (Program Manager of Digital Credentialing, AAMVA) about the rollout of mobile driver’s licenses (mDLs) and what comes next.

One idea stood out: derived credentials.

mDLs are powerful because they bring government-issued identity into a digital format. 

But in practice, most verifiers don’t need everything on your driver’s license. 

A student bookstore doesn’t need your address, it only needs to know that you’re enrolled.

That’s where derived credentials come in. 

They allow you to take verified data from a root credential like an mDL and create purpose-specific credentials:

A student ID for campus services. An employee badge for workplace access. A travel pass or loyalty credential.

Andrew put it simply: if you don’t need to use the original credential with everything loaded into it, don’t. 

Ryan added that the real benefit is eliminating unnecessary personal data entirely, only passing on what’s relevant for the transaction.

Derived credentials also make it possible to combine data from multiple credentials into one, enabling new use cases. 

For example, a travel credential could draw on both a government-issued ID and a loyalty program credential, giving the verifier exactly what they need in a single, streamlined interaction.

This approach flips the model of identity sharing. 

Instead of over-exposing sensitive details, derived credentials enable “less is more” identity verification: stronger assurance for the verifier, greater privacy for the user.

Looking ahead, Andrew revealed that the ISO 18013 Edition 2 will introduce support for revocation and zero-knowledge proofs, enhancements that will make derived credentials even more practical and privacy-preserving.

Bottom line: mDLs are an important foundation, but the everyday future of digital ID lies in derived credentials.


SC Media - Identity and Access

UK apprehends teens involved in preschool ransomware attack

The Register reports that two 17-year-olds were arrested by London's Metropolitan Police on suspicion of computer misuse and blackmail after a ransomware attack on a London-based preschool chain.

The Register reports that two 17-year-olds were arrested by London's Metropolitan Police on suspicion of computer misuse and blackmail after a ransomware attack on a London-based preschool chain.


auth0

Auth0 Token Vault: Secure Token Exchange for AI Agents

Learn how Auth0 Token Vault uses OAuth 2.0 Token Exchange to provide secure, delegated access, letting AI agents act on a user's behalf without handling refresh tokens.
Learn how Auth0 Token Vault uses OAuth 2.0 Token Exchange to provide secure, delegated access, letting AI agents act on a user's behalf without handling refresh tokens.

Elliptic

Elliptic’s Typologies Report: Identifying AI-enabled scams and frauds

Innovations in artificial intelligence (AI) today are accelerating at lightning speed, impacting an ever-widening range of industries and sectors including tech, finance, medicine - with focus on leveraging AI tools to drive efficiencies, enhance decision-making, and improve customer experience. 

Innovations in artificial intelligence (AI) today are accelerating at lightning speed, impacting an ever-widening range of industries and sectors including tech, finance, medicine - with focus on leveraging AI tools to drive efficiencies, enhance decision-making, and improve customer experience. 


Thales Group

Thales and StandardAero’s StableLight™ Autopilot chosen by leading helicopter operator Heli Austria

Thales and StandardAero’s StableLight™ Autopilot chosen by leading helicopter operator Heli Austria prezly Thu, 10/09/2025 - 11:00 Civil Aviation Austria Share options Facebook
Thales and StandardAero’s StableLight™ Autopilot chosen by leading helicopter operator Heli Austria prezly Thu, 10/09/2025 - 11:00 Civil Aviation Austria

Share options

Facebook X Whatsapp Linkedin Email URL copied to clipboard 09 Oct 2025 Heli Austria selects the StableLight 4-Axis Autopilot from for its single-engine H125 helicopter Next-gen safety & performance: cutting pilot workload and boosting mission capability Proven FAA-certified system now entering EASA validation for European operators

Thales and StandardAero are pleased to announce the StableLight 4-Axis Autopilot system has been selected by Heli Austria, a leading European helicopter operator. The system is currently being installed on one of Heli Austria’s H125 helicopters at their facility in Sankt Johann im Pongau, Salzburg, Austria.

Based on Thales’s Compact Autopilot System, the StableLight 4-Axis Autopilot system combines several robust features into a lightweight system ideally suited for light category rotorcraft. ​ The system transforms the flight control experience of the helicopter with its stability augmentation. Adding stabilized climb flight attitude recovery, auto hover, and a wide range of other sophisticated features, significantly decreases pilot workload. This enhances mission capability and can help to reduce risks in critical flight phases and adverse conditions such as Inadvertent entry into Instrument Meteorological Conditions (IIMC). StableLight has a Supplemental Type Certificate (STC) from the US Federal Aviation Administration (FAA).

“Operational and pilot safety are very important to Heli Austria. ​ We have been eagerly awaiting the opportunity to be the European launch customer of this proven product. The added safety features and reliability is a welcomed advantage to our pilots.” Roy Knaus, CEO, Heli Austria.
“At Thales, integrating cutting-edge technologies to deliver safety and trust is fundamental to who we are. By uniting Thales’s advanced expertise with StandardAero’s deep industry knowledge, we harness a powerful combination to provide Heli Austria’s pilots with the autopilot solution they have eagerly awaited.” Florent Chauvancy, Vice President Flight Avionics Activities, Thales.
“We are thrilled to be working with Heli Austria, a renowned operator in the European market. The adoption of our StableLight autopilot system demonstrates their commitment to safety and innovation. Once certified by EASA, European H125 operators will be able to reach a new level of safety and efficiency of helicopter operations with the StableLight system.” ​ Andrew Park, General Manager, StandardAero.

About Thales

Thales (Euronext Paris: HO) is a global leader in advanced technologies for the Defence, Aerospace, and Cyber & Digital sectors. Its portfolio of innovative products and services addresses several major challenges: sovereignty, security, sustainability and inclusion.The Group invests more than €4 billion per year in Research & Development in key areas, particularly for critical environments, such as Artificial Intelligence, cybersecurity, quantum and cloud technologies. Thales has more than 83,000 employees in 68 countries. In 2024, the Group generated sales of €20.6 billion.

About StandardAero

StandardAero is a leading independent pure-play provider of aerospace engine aftermarket services for fixed- and rotary-wing aircraft, serving the commercial, military and business aviation end markets. StandardAero provides a comprehensive suite of critical, value-added aftermarket solutions, including engine maintenance, repair and overhaul, engine component repair, on-wing and field service support, asset management and engineering solutions. StandardAero is an NYSE listed company, under the symbol SARO. For more information about StandardAero, go to www.standardaero.com.

View PDF market_segment : Civil Aviation ; countries : Europe > Austria https://thales-group.prezly.com/thales-and-standardaeros-stablelight-autopilot-chosen-by-leading-helicopter-operator-heli-austria thales-and-standardaeros-stablelighttm-autopilot-chosen-leading-helicopter-operator-heli-austria On Thales and StandardAero’s StableLight™ Autopilot chosen by leading helicopter operator Heli Austria

Ocean Protocol

Ocean Protocol Foundation withdraws from the Artificial Superintelligence Alliance

$OCEAN can be de-pegged and re-listed on exchanges Singapore, 9 October 2025 Effective immediately, Ocean Protocol Foundation has withdrawn its designated directors and resigned as a member from the Superintelligence Alliance (Singapore) Ltd, aka the “ASI Alliance”. The ASI Alliance was founded on voluntary association and collaboration to promote decentralized AI through a token merge
$OCEAN can be de-pegged and re-listed on exchanges

Singapore, 9 October 2025

Effective immediately, Ocean Protocol Foundation has withdrawn its designated directors and resigned as a member from the Superintelligence Alliance (Singapore) Ltd, aka the “ASI Alliance”. The ASI Alliance was founded on voluntary association and collaboration to promote decentralized AI through a token merger.

Ocean has worked closely with the other members of the Alliance to seek technology integration, joint podcasts and run community events such as the Superintelligence Summit and ETHGlobal NYC hackathon in the past year.

Moving forward, funding for future Ocean development efforts is fully secured. A portion of profits from spin-outs of Ocean derived-technologies will be used to buyback and burn $OCEAN, offering a permanent and continual supply reduction of the $OCEAN supply.

Since 7/2024, 81% of the $OCEAN token supply has been converted into $FET, yet there are still 37,334 $OCEAN token holders representing 270 million $OCEAN, that have not yet converted to $FET on the existing $OCEAN token contract (0x967da … b9F48).

As independent economic actors, former $OCEAN holders can fully decide to continue to hold $FET or not.

At the time of this announcement, the token bridge, fully managed and controlled by Fetch.ai, remains open for $OCEAN holders to convert to $FET at the rate of 0.433226 $FET/$OCEAN.

Any exchange that has de-listed $OCEAN may assess whether they would like to re-list the $OCEAN token. Acquirors can currently exchange for $OCEAN on Coinbase, Kraken, UpBit, Binance US, Uniswap and SushiSwap.

Community questions to be sent to https://t.me/OceanProtocol_Community.

Press questions can be sent to inquiries@oceanprotocol.com.

Ocean Protocol Foundation withdraws from the Artificial Superintelligence Alliance was originally published in Ocean Protocol on Medium, where people are continuing the conversation by highlighting and responding to this story.


DF158 Completes and DF159 Launches

Predictoor DF158 rewards available. DF159 runs October 9th — October 16th, 2025 1. Overview Data Farming (DF) is an incentives program initiated by ASI Alliance member, Ocean Protocol. In DF, you can earn OCEAN rewards by making predictions via ASI Predictoor. Data Farming Round 158 (DF158) has completed. DF159 is live today, October 9th. It concludes on October 16th. For this DF round, P
Predictoor DF158 rewards available. DF159 runs October 9th — October 16th, 2025 1. Overview

Data Farming (DF) is an incentives program initiated by ASI Alliance member, Ocean Protocol. In DF, you can earn OCEAN rewards by making predictions via ASI Predictoor.

Data Farming Round 158 (DF158) has completed.

DF159 is live today, October 9th. It concludes on October 16th. For this DF round, Predictoor DF has 3,750 OCEAN rewards and 20,000 ROSE rewards.

2. DF structure

The reward structure for DF159 is comprised solely of Predictoor DF rewards.

Predictoor DF: Actively predict crypto prices by submitting a price prediction and staking OCEAN to slash competitors and earn.

3. How to Earn Rewards, and Claim Them

Predictoor DF: To earn: submit accurate predictions via Predictoor Bots and stake OCEAN to slash incorrect Predictoors. To claim OCEAN rewards: run the Predictoor $OCEAN payout script, linked from Predictoor DF user guide in Ocean docs. To claim ROSE rewards: see instructions in Predictoor DF user guide in Ocean docs.

4. Specific Parameters for DF159

Budget. Predictoor DF: 3.75K OCEAN + 20K ROSE

Networks. Predictoor DF applies to activity on Oasis Sapphire. Here is more information about Ocean deployments to networks.

Predictoor DF rewards are calculated as follows:

First, DF Buyer agent purchases Predictoor feeds using OCEAN throughout the week to evenly distribute these rewards. Then, ROSE is distributed at the end of the week to active Predictoors that have been claiming their rewards.

Expect further evolution in DF: adding new streams and budget adjustments among streams.

Updates are always announced at the beginning of a round, if not sooner.

About Ocean, DF and ASI Predictoor

Ocean Protocol was founded to level the playing field for AI and data. Ocean tools enable people to privately & securely publish, exchange, and consume data. Follow Ocean on Twitter or TG, and chat in Discord. Ocean is part of the Artificial Superintelligence Alliance.

In Predictoor, people run AI-powered prediction bots or trading bots on crypto price feeds to earn $. Follow Predictoor on Twitter.

DF158 Completes and DF159 Launches was originally published in Ocean Protocol on Medium, where people are continuing the conversation by highlighting and responding to this story.


FastID

How to Tame Varnish Memory Usage Safely

How Fastly turned a shelved Varnish idea into 25% fewer memory writes and real system-wide gains.
How Fastly turned a shelved Varnish idea into 25% fewer memory writes and real system-wide gains.

Wednesday, 08. October 2025

Elliptic

Building a 10-billion wallet crypto-intelligence platform: Elliptic's journey with Amazon

Published by Joey Capper (Directory of Engineering at Elliptic) in partnership with AWS.

Published by Joey Capper (Directory of Engineering at Elliptic) in partnership with AWS.


SC Media - Identity and Access

Why deep user deletion is just as critical as your identity layer

Comprehensive user data deletion is the new security frontier — critical for trust, AI, and compliance.

Comprehensive user data deletion is the new security frontier — critical for trust, AI, and compliance.


liminal (was OWI)

Building Trust in Agentic Commerce Demo Day

The post Building Trust in Agentic Commerce Demo Day appeared first on Liminal.co.

Building Trust in Agentic Commerce

Would you let an AI agent spend your company’s quarterly budget, no questions asked? Most leaders I talk to aren’t there yet. Our research shows that only 8% of organizations are using AI agents in the long term, and the gap isn’t due to a lack of awareness. It’s trust. If agentic AI is going […] The post Building Trust in Agentic Commerce appeared first on Liminal.co.

Would you let an AI agent spend your company’s quarterly budget, no questions asked? Most leaders I talk to aren’t there yet. Our research shows that only 8% of organizations are using AI agents in the long term, and the gap isn’t due to a lack of awareness. It’s trust.

If agentic AI is going to matter in e-commerce, we need guardrails that make it safe, compliant, and worth the operational risk. That is where authentication, authorization, and verification come in. Think identity, boundaries, and proof. Until teams can check those boxes with confidence, adoption will stall.

What is an AI agent, and why does it matter in e-commerce

At its simplest, an AI agent is software that can act on instructions without waiting for every step of human input. Instead of a static chatbot or recommendation engine, an agent can take context, make a decision, and carry out an action.

In e-commerce, that could mean:

Verifying a buyer’s identity before an agent executes a purchase on their behalf Allowing an agent to issue refunds up to a set limit, but requiring human approval beyond that threshold Confirming that an AI-driven order or promotion matches both customer intent and compliance rules before it goes live

The upside is clear: faster processes, lower manual overhead, and customer experiences that feel effortless. But the risk is just as clear. If an agent acts under the wrong identity, oversteps its boundaries, or produces outcomes that don’t match user intent, the impact is immediately evident in increased fraud losses, compliance failures, or customer churn.

That’s why the industry is focusing on three pillars: authentication, authorization, and verification. Without them, agentic commerce cannot scale.

The adoption gap

Analysts project autonomous agents will grow to $70B+ by 2030. Buyers want speed, automation, and scale, but customers are not fully on board. In fact, only 24% of consumers say they are comfortable letting AI complete a purchase on their own.

That consumer hesitation is the critical signal. Ship agentic commerce without shipping trust, and you don’t just risk adoption, you risk chargebacks, brand erosion, and an internal rollback before your pilot even scales.

What’s broken today

Three realities keep coming up in my conversations with product, fraud, and risk leaders:

Attack surface expansion. Synthetic identity and deepfakes raise the baseline risk. 71% of organizations say they lack the AI/ML depth to defend against these tactics. Confidence is slipping. Trust in fully autonomous agents dropped from 43% to 27% in one year, even among tech-forward orgs. Hype hurts. A meaningful share of agent projects will get scrapped by 2027 because teams cannot tie them to real value or reliable controls.

The regulatory lens makes this sharper. Under the new EU AI Act, autonomous systems are often treated as high-risk, requiring transparency, human oversight, and auditability. In the U.S., proposals like the Algorithmic Accountability Act and state laws such as the Colorado AI Act point in the same direction—demanding explainability, bias testing, and risk assessments. For buyers, that means security measures are not only best practice but a growing compliance requirement.

When I see this pattern, I look for the missing scaffolding. It is almost always the same three blanks: who is the agent, what can it do, and did it do the right thing.

The guardrails that matter

If you are evaluating solutions, anchor on these three categories. This is the difference between a flashy demo and something you can put in production.

Authentication

Prove the agent’s identity before you let it act. That means credentials for agents, not just users. It means attestation, issuance, rotation, and revocation. It means non-repudiation, so you can tie a transaction to a specific agent and key.

 What to look for:

strong, verifiable agent identities and credentials support for attestation, key management, rotation, and kill switches logs that let you prove who initiated what, and when
Authorization

Set boundaries that are understood by both machines and auditors. Map policies to budgets, scopes, merchants, SKUs, and risk thresholds. Keep it explainable so a human can reason about the blast radius.

What to look for:

policy engines that accommodate granular scopes and spend limits runtime constraints, approvals, and step-up controls simulation and sandboxes to test policies before they go live
Verification

Trust but verify. Confirm that outcomes align to user intent, compliance, and business rules. You need evidence that holds up in a post-incident review.

Verification isn’t just operational hygiene. Under privacy rules like GDPR Article 22, individuals have a right to safeguards when automated systems make decisions about them. That means the ability to explain, evidence, and roll back agent actions is not optional.

What to look for:

transparent audit trails and readable explanations outcome verification against explicit user directives real-time anomaly detection and rollback paths

If a vendor cannot demonstrate these three pillars working together, you are buying a future incident.

Real-world examples today

Real deployments are still early, but they show what’s possible when trust is built in.

ChatGPT Instant Checkout marks one of the first large-scale examples of agentic commerce in production. Powered by the open-source Agentic Commerce Protocol, co-developed with Stripe, it enables users in the U.S. to buy directly from Etsy sellers in chat, with Shopify merchants like Glossier, SKIMS, and Vuori coming next. The article affirms each purchase is authenticated, authorized, and verified through secure payment tokens and explicit user confirmation—demonstrating how agentic AI can act safely within clear trust boundaries. Konvo AI automates ~65% of customer queries for European retailers and converts ~8% of those into purchases, using agents that can both interact with customers and resolve logistics issues. Visa Intelligent Commerce for Agents is building APIs that let AI agents make purchases using tokenized credentials and strong authentication — showing how payment-grade security can extend to autonomous actions. Amazon Bedrock AgentCore Identity provides identity, access control, and credential vaulting for AI agents, giving enterprises the tools to authenticate and authorize agent actions at scale Agent Commerce Kit (ACK-ID) demonstrates how one agent can verify the identity and ownership of another before sensitive interactions, laying the groundwork for peer-to-peer trust in agentic commerce.

These aren’t fully autonomous across all commerce workflows, but they demonstrate that agentic AI can deliver value when authentication, authorization, and verification are in place.

What good looks like in practice

Buyers ask for a checklist. I prefer evaluation cues you can test in a live environment:

Accuracy and drift. Does the system maintain performance as the catalog, promotions, and fraud patterns shift? Latency and UX. Do the controls keep decisions fast enough for checkout and service flows? Integration reality. Can this plug into your identity, payments, and risk stack without six months of glue code? Explainability. When an agent takes an action, can a product manager and a compliance lead both understand why? Recourse. If something goes wrong, what can you unwind, how quickly can you roll it back, and what evidence exists to explain the decision to auditors, customers, or regulators?

The strongest teams will treat agent actions like high-risk API calls. Every action is authenticated, every scope is authorized, and every outcome is verified. The tooling makes that visible.

Why this matters right now

It is tempting to wait. The reality is that agentic workflows are already creeping into back-office operations, customer onboarding, support, and payments. Early movers who get trust right will bank the upside: lower manual effort, faster cycle time, and a margin story that survives scrutiny.

The inverse is also true. Ship without safeguards, and you’ll spend the next quarter explaining rollback plans and chargeback spikes. Customers won’t give you the benefit of the doubt. Neither will your CFO.

A buyer’s short list

If you are mapping pilots for Q4 and Q1 2026, here’s a simple way to keep the process grounded:

define the jobs to be done write the rules first simulate and stage measure what matters keep humans in the loop regulatory readiness. Confirm vendors can meet requirements for explainability, audit logs, and human oversight under privacy rules. The road ahead

Agentic commerce is not a future bet. It is a present decision about trust. The winners will separate signal from noise, invest in authentication, authorization, and verification, and scale only when those pillars are real.

At Liminal, we track the vendors and patterns shaping this shift. If you want a deeper dive into how teams are solving these challenges today, we’re bringing together nine providers for a live look at the authentication, authorization, and verification layers behind agentic AI. No pitches, just real solutions built to scale safely.

📅 Join us at Liminal Demo Day: Agentic AI in E-Commerce on October 22 at 9:30 AM ET.

My take: The winners won’t be the first to launch AI agents. They’ll be the first to prove their agents can be trusted at scale.

The post Building Trust in Agentic Commerce appeared first on Liminal.co.


auth0

Refresh Token Security: Detecting Hijacking and Misuse with Auth0

Learn how to improve refresh token security. Explore how to implement advanced token misuse and hijacking detection rules using the Auth0 Detection Catalog.
Learn how to improve refresh token security. Explore how to implement advanced token misuse and hijacking detection rules using the Auth0 Detection Catalog.

FastID

In AI We Trust? Increasing AI Adoption in AppSec Despite Limited Oversight

AI adoption in AppSec is soaring, yet oversight lags. Explore the paradox of trust vs. risk, false positives, and the future of AI in application security.
AI adoption in AppSec is soaring, yet oversight lags. Explore the paradox of trust vs. risk, false positives, and the future of AI in application security.

Tuesday, 07. October 2025

Anonym

6 Ways Insurers Can Differentiate Identity Theft Insurance  

Identity theft is one of the fastest-growing financial crimes worldwide, and consumers are more aware of the risks than ever before. But in an increasingly competitive market, offering “basic” identity theft insurance is no longer enough. To stand out, insurers need to think beyond the minimum by focusing on product innovation, customer experience, and trust.  […] The post 6 Ways Insurers C

Identity theft is one of the fastest-growing financial crimes worldwide, and consumers are more aware of the risks than ever before. But in an increasingly competitive market, offering “basic” identity theft insurance is no longer enough. To stand out, insurers need to think beyond the minimum by focusing on product innovation, customer experience, and trust. 

Below, we explore six powerful ways insurers can differentiate their identity theft insurance offerings.  

1. Innovate with product features & coverage  

Most identity theft insurance policies cover financial losses and restoration costs, but few go beyond reactive measures to prevent identity theft from occurring. To gain a competitive edge, insurers can expand coverage to offer proactive identity protection solutions, such as:  

Alternative phone numbers and emails to keep customer communications private and reduce phishing risks.  A password manager to help policyholders secure accounts and prevent credential-based account takeovers.  VPN for private browsing to protect sensitive activity on public Wi-Fi and stop data interception.   Virtual cards that protect payment details and shield credit card numbers from fraudsters.  Real-time breach alerts so customers can take immediate action when their data is compromised.  Personal data removal tools to wipe sensitive information from people-search sites and reduce exposure.  A privacy-first browser with ad and tracker blocking to prevent data harvesting and malicious tracking. 

By proactively covering these risks and offering early detection, insurers not only reduce claims costs but also create meaningful value for customers. 

2. Provide strong restoration & case management 

Customers are often overwhelmed and unsure what to do next when their identity is stolen. Insurers can become their most trusted ally by offering: 

A dedicated case manager who works with them from incident to resolution.  A restoration kit with step-by-step instructions, pre-filled forms, and key contacts.  24/7 access to a helpline for guidance and reassurance. 

A study from the University of Edinburgh shows that case management can reduce the cost burden of an incident by up to 90%. It also boosts customer satisfaction and loyalty, which is a critical differentiator in a market where switching providers is easy. 

3. Build proactive prevention & education programs  

Most consumers only think about identity protection after an incident occurs. Insurers can flip this dynamic by helping customers stay ahead of threats. 

Ideas include:  

Regular scam alerts and phishing education campaigns.   Tools for identity monitoring, breach notifications, and credit report access.   Dashboards that visualize a customer’s digital exposure, allowing them to see their risk level.   Ongoing educational content such as webinars, how-to guides, and FAQs. 

Short, targeted online fraud education lowers the risk of falling for scams by roughly 42–44% immediately after training. This finding is based on a study that used a 3-minute video or short text intervention with 2,000 U.S. adults. 

4. Offer flexible pricing & bundling options

Flexibility is key to reaching a broader customer base. Instead of a one-size-fits-all product, insurers can:  

Offer tiered plans (basic, mid, premium) with incremental features.  Bundle identity theft insurance with homeowners, renters, etc.  Provide family plans that protect multiple household members.   

This strategy serves both budget-conscious and premium segments. 

5. Double down on customer experience 

Trust is one of the most important factors consumers consider when buying identity theft insurance. Insurers can build confidence by:   

Using clear, jargon-free language in policy documents.    Responding quickly and resolving cases smoothly.    Displaying trust signals, such as third-party audits, security certifications, and privacy commitments.    Publishing reviews, testimonials, and case studies that show real results. 

A better experience leads to higher Net Promoter Scores (NPS), lower churn rates, and a long-term competitive advantage.   

6. Leverage partnerships

Working with technology partners can enhance insurers’ offerings without straining internal resources. Here are some examples of what partners can do:   

Custom-branded dashboards and mobile apps that seamlessly integrate into your existing customer experience, keeping your brand front and center.    Privacy status at a glance, indicating to customers whether their information has been found in data breaches.   Management of alternative phone numbers and emails, allowing customers to create, update, or retire these directly in the portal. 

By offering these features through a white-labeled experience, insurers provide customers with daily, visible value while partners, like Anonyome Labs, handles the privacy technology behind the scenes. 

Outside of white-label opportunities, strategic partnerships and endorsements also strengthen offerings. Collaborations with credit bureaus, cybersecurity firms, and privacy organizations expand capabilities and build credibility. 

Powering the next generation of identity theft insurance  

The future of identity theft insurance is proactive, not reactive. Insurers who move beyond basic reimbursement to offer daily-use privacy and security tools will lead the industry in trust, engagement, and profitability. Anonyome Labs makes this shift seamless with a fully white-labeled Digital Identity Protection suite that includes alternative phone numbers and emails, password managers, VPNs, virtual cards, breach alerts, and tools for removing personal data. 

By offering these proactive protections, you provide customers with peace of mind, prevent costly fraud incidents before they occur, and unlock new revenue opportunities through subscription-based services. 

By partnering with Anonyome Labs, you can transform identity theft insurance into a daily value driver, positioning your company as a market leader in proactive protection. 

Learn more by getting a demo of our Digital Identity Protection suite today! 

The post 6 Ways Insurers Can Differentiate Identity Theft Insurance   appeared first on Anonyome Labs.


Spruce Systems

Foundations of Decentralized Identity

This article is the first installment of our series: The Future of Digital Identity in America.
What is Decentralized Identity?

Most of us never think about identity online. We type in a username, reuse a password, or click “Log in with Google” without a second thought. Identity, in the digital world, has been designed for convenience. But behind that convenience lies a hidden cost: surveillance, lock-in, and a system where we don’t really own the data that defines us.

Digital identity today is built for convenience, not for people.

Decentralized identity is a way of proving who you are without relying on a single company or government database to hold all the power. Instead of logging in with Google or handing over a photocopy of your driver’s license, you receive digital verifiable credentials, digital versions of IDs, diplomas, or licenses, directly from trusted issuers like DMVs, universities, or employers. You store these credentials securely in your own digital wallet and decide when, where, and how to share them. Each credential is cryptographically signed, so a verifier can instantly confirm its authenticity without needing to contact the issuer. The result is an identity model that’s portable, privacy-preserving, and designed to give control back to the individual rather than intermediaries.

Decentralized identity means you own and control your credentials, like IDs or diplomas, stored in your wallet, not in someone else’s database.

In this series, we’ll explore why decentralized identity matters, how policymakers are responding, and the technology making it possible. But before diving into policy debates or technical standards, it’s worth starting with the foundations: why identity matters at all, and what it means to build a freer digital world around it.

From Borrowed Logins to Borrowed Autonomy

The internet we know today was built on borrowed identity. Early online gaming systems issued usernames, turning every move into a logged action inside a closed sandbox. Social media platforms went further, normalizing surveillance as the price of connection and building entire economies on behavioral data. Even in industries like healthcare or financial services, “identity” was usually just whatever proprietary account a platform would let you open, and then keep hostage.

Each step offered convenience, but at the cost of autonomy. Accounts could be suspended. Data could be resold. Trust was intermediated by companies whose incentives rarely aligned with their users. The result was an internet where identity was an asset to be monetized, not a right to be owned.

On today’s internet, identity is something you rent, not something you own.

Decentralized identity represents a chance to reverse that arc. Instead of treating identity as something you rent, it becomes something you carry. Instead of asking permission from platforms, platforms must ask permission from you.

Why Identity Is a Pillar of Free Societies

This isn’t just a technical argument - it’s a philosophical and economic one. Identity is at the center of how societies function.

Economists have long warned of the dangers of concentrated power. Adam Smith argued that monopolies distort markets. Milton Friedman cautioned against regulatory capture. Friedrich Hayek showed that dispersed knowledge, not central planning, leads to better decisions. Ronald Coase explained how lowering transaction costs opens new forms of cooperation.

Philosophers, too, placed identity at the heart of freedom. John Locke’s principle of self-ownership and John Stuart Mill’s defense of liberty both emphasize that individuals must control what they disclose, limited only by the harm it might cause others.

Decentralized identity operationalizes these ideas for the digital era. By distributing trust, it reduces dependency on monopolistic platforms. By lowering the cost of verification, it unlocks new forms of commerce. By centering autonomy, it ensures liberty is preserved even as interactions move online.

The Costs of Getting It Wrong

American consumers and institutions are losing more money than ever to fraud and cybercrime. In 2024 alone, the FBI’s Internet Crime Complaint Center (IC3) reported that scammers stole a record $16.6 billion, a stark 33% increase from the previous year. Meanwhile, the FTC reports that consumers lost over $12.5 billion to fraud in 2024, a 25% rise compared to 2023.

On the organizational side, data breach costs are soaring. IBM’s 2025 Cost of a Data Breach Report shows that the average cost of a breach in the U.S. has reached a record $10.22 million, driven by higher remediation expenses, regulatory penalties, and deepening complexity of attacks  .

Identity theft has become one of the fastest-growing crimes worldwide. Fake accounts drain social programs. Fraudulent applications weigh down financial institutions. Businesses lose customers, governments lose trust, and people lose confidence that digital systems are designed with their interests in mind.

The Role of AI: Threat and Catalyst

As artificial intelligence tools advance, they’re empowering fraudsters with tools that make identity scams faster, more automated, and more believable. According to a Federal Reserve–affiliated analysis, synthetic identity fraud, where criminals stitch together real and fake information to fabricate identities, reached a staggering $35 billion in losses in 2023. These figures highlight the increasing risk posed by deepfakes and AI-generated personas in undermining financial systems and consumer trust.

And at the frontline of consumer protection, the Financial Crimes Enforcement Network (FinCEN) has warned that criminals are increasingly using generative AI to create deepfake videos, synthetic documents, and realistic audio to bypass identity checks, evade fraud detection systems, and exploit financial institutions at scale.

AI doesn’t just make fraud easier—it makes strong identity more urgent.

As a result, AI looms over every digital identity conversation. On one side, it makes fraud easier: synthetic faces, forged documents, and bots capable of impersonating humans at scale. On the other, it makes strong identity more urgent and more possible.

Digital Credentials: The Building Blocks of Trust

That’s why the solution isn’t more passwords, scans, or one-off fixes - it’s a new foundation built on verifiable digital credentials. These are cryptographically signed attestations of fact - your age, your license status, your professional certification - that can be presented and verified digitally.

Unlike static PDFs or scans, digital credentials are tamper-proof. They can’t be forged or altered without detection. They’re also user-controlled: you decide when, where, and how to share them. They also support selective disclosure: you can prove you’re over 21 without sharing your exact birthdate, or prove your address is in a certain state without exposing the full line of your home address.

Verifiable digital credentials are tamper-proof, portable, and under the user’s control—an identity model built for trust.

Decentralized identity acts like an “immune system” for AI. By binding credentials to real people and organizations, it distinguishes between synthetic actors and verified entities. It also makes possible a future where AI agents can act on your behalf - booking travel, filling out forms, negotiating contracts - while remaining revocable and accountable to you.

Built on open standards, digital credentials are globally interoperable. Whether issued by a state DMV, a university, or an employer, they can be combined in a wallet and presented across contexts. For the first time, people can carry their identity across borders and sectors without relying on a single gatekeeper.

From Pilots to Infrastructure

Decentralized identity isn’t just theory - it’s already being deployed.

In California, the DMV Wallet has issued more than two million mobile driver’s licenses in under 18 months, alongside blockchain-backed vehicle titles for over 30 million cars. Utah has created a statewide framework for verifiable credentials, with privacy-first principles written directly into law. SB 260 prohibits forced phone handovers, bans tracking and profiling, and mandates that physical IDs remain an option . At the federal level, the U.S. Department of Homeland Security is piloting verifiable digital credentials for immigration, while NIST’s NCCoE has convened banks, state agencies, and technology providers, including SpruceID, to define standards . Over 250 TSA checkpoints already accept mobile IDs from seventeen states, and adoption is expected to double by 2026 .

These examples show that decentralized identity is moving from pilot projects to infrastructure, just as HTTPS went from niche to invisible plumbing for the web.

Why It Matters Now

We are at a crossroads. On one side, centralized systems continue to create single points of failure - massive databases waiting to be breached, platforms incentivized to surveil, and users with no say in the process. On the other, decentralized identity offers resilience, interoperability, and empowerment.

For governments, it reduces fraud and strengthens democratic resilience. For businesses, it lowers compliance costs and builds trust. For individuals, it restores autonomy and privacy.

This isn’t just a new login model. It’s the foundation for digital trust in the 21st century - the bedrock upon which free societies and vibrant economies can thrive.

This article is part of SpruceID’s series on the future of digital identity in America.

Subscribe to be notified when we publish the next installment.

Subscribe Email sent! Check your inbox to complete your signup.

No spam. Unsubscribe anytime.


SC Media - Identity and Access

Misconfiguration inadvertently leaks Rainwalk Pet Insurance customer, pet data

South Carolina-based Rainwalk Pet Insurance had 158 GB of data belonging to customers and their pets leaked by an unsecured database, according to HackRead.

South Carolina-based Rainwalk Pet Insurance had 158 GB of data belonging to customers and their pets leaked by an unsecured database, according to HackRead.


Kido nursery hackers claim Minnesota hospital attack

Newly emergent Radiant ransomware gang, which was behind the compromise of the global nursery chain Kido, has admitted to having targeted an unnamed Minnesota hospital, The Register reports.

Newly emergent Radiant ransomware gang, which was behind the compromise of the global nursery chain Kido, has admitted to having targeted an unnamed Minnesota hospital, The Register reports.


Over 171K hit by Doctors Imaging Group hack

SecurityWeek reports that Florida-based radiology practice Doctors Imaging Group had information from more than 171,000 individuals stolen following a November data breach.

SecurityWeek reports that Florida-based radiology practice Doctors Imaging Group had information from more than 171,000 individuals stolen following a November data breach.


France opens probe into Apple's Siri data practices

French prosecutors have launched an investigation into Apple over alleged privacy violations tied to its voice assistant Siri, following a complaint by the human rights group Ligue des droits de l'Homme, according to Politico Europe.

French prosecutors have launched an investigation into Apple over alleged privacy violations tied to its voice assistant Siri, following a complaint by the human rights group Ligue des droits de l'Homme, according to Politico Europe.


LISNR

The New Transit Security Mandate

How Hardware-Agnostic Authentication Solves Fraud and Revenue Leakage The public transit sector is undergoing a significant digital transformation, consolidating operations under the vision of Mobility-as-a-Service (MaaS). This shift promises passenger convenience through integrated mobile ticketing and Account-Based Ticketing (ABT) systems, but it simultaneously introduces a critical vulnerabilit
How Hardware-Agnostic Authentication Solves Fraud and Revenue Leakage

The public transit sector is undergoing a significant digital transformation, consolidating operations under the vision of Mobility-as-a-Service (MaaS). This shift promises passenger convenience through integrated mobile ticketing and Account-Based Ticketing (ABT) systems, but it simultaneously introduces a critical vulnerability: the rising threat of mobile fraud and revenue leakage.

For transit operators, the stakes are substantial. Revenue losses from fare evasion and ticket forgery, ranging from simple misuse of paper tickets to sophisticated man-in-the-middle attacks, can significantly impact the sustainability of MaaS and the ability to reinvest in services.

Traditional authentication methods are proving insufficient for the complexity of modern, multimodal transit:

NFC: Require significant, capital-intensive infrastructure replacement, which creates a high barrier to entry and slows deployment. QR Codes: Are prone to fraud, can be easily duplicated, and suffer from friction, slowing down passenger throughput at peak hours. BLE: Relies on robust cellular connectivity, which is often unavailable in critical transit environments, such as underground tunnels or moving vehicles.

The strategic imperative for any transit authority or MaaS provider is to adopt a hardware-agnostic, software-defined proximity verification solution that is secure, fast, and works reliably regardless of network availability.

The Strategic Imperative: Securing the Transaction at the Point of Presence

The sophistication of mobile fraud is escalating, posing a threat to the integrity of digital payment systems. Fraudsters exploit vulnerabilities, such as deferred payment authorization, to use compromised credentials repeatedly.

The solution requires a layer of security that instantly validates both the physical proximity and digital identity of the passenger. LISNR, as a worldwide leader in proximity verification, delivers this capability by transforming everyday audio components into secure transactional endpoints.

Technical Solution: Proximity Authentication with Radius® and ToneLock

LISNR’s technology provides a secure, reliable, and cost-effective foundation for next-generation transit ticketing and ticket validation. This is achieved through the Radius® SDK, which facilitates the ultrasonic data-over-sound communication and the proprietary ToneLock security protocol.

Proximity Validation with Radius

The Radius SDK is integrated directly into the transit agency’s mobile application and installed as a lightweight software component onto existing transit hardware equipped with a speaker or microphone (e.g., fare gates, information screens, on-bus systems).

Offline Capability: The MaaS application uses ultrasonic audio with user ticket data embedded within for fast data exchange. Crucially, the tone generation and verification process can occur entirely offline, ensuring that ticketing and payment validation remain functional and sub-second fast, even in areas with zero network coverage. Hardware Agnostic Deployment: Since Radius only requires a standard speaker and microphone, it eliminates the high cost and complexity of deploying proprietary NFC hardware, allowing for rapid and scalable deployment across an entire fleet or network. Security for Fraud Prevention

To combat the growing threat of mobile fraud, LISNR enables ecosystem leaders to deploy multiple advanced measures directly into the ultrasonic transaction:

ToneLock Security: Every Radius transaction can be protected by ToneLock, a proprietary tone security protocol. Only the intended receiver, with the correct, pre-shared key, can demodulate and authenticate the tone. AES256 Encryption: LISNR also offers the ability for developers to add the security protocol trusted by governments worldwide, AES256 Encryption, to all emitted tones. By folding this feature into mobility ecosystems, transit providers can ensure a secure and scalable solution for their ticketing infrastructure. 

 

The Top Business Values of Ultrasonic Proximity in Transit

For forward-thinking transit agencies and MaaS providers, adopting LISNR’s technology offers tangible operational and financial advantages:

Reduced Capital and Operational Expenditure Business Value: Eliminates the need for expensive, proprietary NFC reader hardware replacement and maintenance. Impact on ROI: Lowered infrastructure cost and faster time-to-market for new ticketing solutions. Enhanced Security and Revenue Protection Business Value: ToneLock and Encryption provide an advanced and off-network security layer for ticket and payment authentication. Impact on ROI: Significant reduction in fare evasion, fraud, and revenue leakage, directly increasing financial stability. Superior Passenger Throughput and Experience Business Value: Sub-second authentication regardless of connectivity or weather conditions. Impact on ROI: Increased rider throughput and satisfaction, encouraging greater adoption of digital ticketing and MaaS. Future-Proof and Scalable Platform Business Value: Provides a flexible, software-defined foundation that easily integrates with new Account-Based Ticketing (ABT) and payment models. Impact on ROI: Ensures longevity of infrastructure and adaptability to future urban mobility standards.

By integrating the Radius SDK into their existing platform, transit operators secure their revenue, eliminate infrastructure debt, and deliver the seamless, high-security experience modern passengers demand. 

Are you interested in how Radius can provide an additional stream while onboard (i.e. proximity marketing)? Are you using a loyalty system to capture and reward your most loyal riders? Want to learn more about how Radius works in your ecosystem? Fill out the contact form below to get in contact with an ultrasonic expert.

The post The New Transit Security Mandate appeared first on LISNR.


Elliptic

North Korea's crypto hackers have stolen over $2 billion in 2025

Elliptic analysis reveals that North Korea-linked hackers have already stolen over $2 billion in cryptoassets in 2025, the largest annual total on record, with three months still to go. 

Elliptic analysis reveals that North Korea-linked hackers have already stolen over $2 billion in cryptoassets in 2025, the largest annual total on record, with three months still to go. 


Thales Group

Thales Alenia Space inaugurates state-of-the-art Space Smart Factory

Thales Alenia Space inaugurates state-of-the-art Space Smart Factory tas Tue, 10/07/2025 - 12:51 Space Share options Facebook X
Thales Alenia Space inaugurates state-of-the-art Space Smart Factory tas Tue, 10/07/2025 - 12:51 Space

Share options

Facebook X Whatsapp Linkedin Email URL copied to clipboard 07 Oct 2025

One of Europe’s smartest, digital and reconfigurable manufacturing facilities, located in Rome, Italy

• This achievement was made possible by significant funding from the Italian Space Agency through PNRR (Italy’s recovery and resilience plan) funds, as well as substantial investments from Thales and Leonardo.

• Paradigm shift in the construction of space systems thanks to highly modular and configurable cleanrooms.

• Increased production capacity for satellites across various classes and applications, including large constellations.

• Intensive use of digital technologies, and Industry 4.0, including robotics, offering digital continuity between systems, from engineering activities up to production.

• First satellites to be tested and integrated in the new-generation cleanrooms: the second-generation Galileo constellation satellites, new Copernicus missions, including ROSE-L and CIMR, as well as the Sicral 3 satellite.

• Joint Lab is the facility’s strategic hub: an innovative collaborative space bringing together SMEs in the supply chain and fostering dialogue with universities and research centers.

 

Rome, October 7, 2025 – Thales Alenia Space, a joint venture between Thales (67%) and Leonardo (33%), has today inaugurated its Space Smart Factory in Rome with a ceremony attended by Italian President Sergio Mattarella. The factory — one of Europe’s largest intelligent, digital, reconfigurable manufacturing facilities — is located at the Tecnopolo Tiburtino high-tech innovation hub in Rome.

President of the Italian Republic, Sergio Mattarella, and Minister for Enterprises and Made in Italy, Adolfo Urso,  were welcomed by Ambassador Stefano Pontecorvo, Chairman of Leonardo; Roberto Cingolani, CEO and General Manager of Leonardo, and Teodoro Valente, President of the Italian Space Agency (ASI). The delegation also included Philippe Keryer, SEVP Strategy, Research and Technology for Thales, Massimo Claudio Comparini, Managing Director of Leonardo’s Space Division and Chairman of the Thales Alenia Space Supervisory Board, Hervé Derrey, President and CEO of Thales Alenia Space, and Giampiero Di Paolo, Deputy CEO of Thales Alenia Space and CEO of Thales Alenia Space Italia.

The Space Smart Factory is the concrete result of an investment of over €100 million, partly financed through PNRR funds managed by the Italian Space Agency and by substantial investments from Thales and Leonardo.

The new production hub, scheduled to begin operations by year’s end with work on the Sicral 3 satellite for the Italian Defense Ministry, is based at Rome’s Tecnopolo Tiburtino — a center of technological excellence bringing together 150 companies, mostly SMEs, closely integrated with the city and its industrial landscape.

© Thales Alenia Space/ M.Iacobucci

From left to right: Hervé Derrey, President and CEO of Thales Alenia Space, Ambassador Stefano Pontecorvo, Chairman of Leonardo, Sergio Mattarella, President of the Italian Republic, Adolfo Urso, Minister for Enterprises and Made in Italy, Roberto Cingolani, CEO and General Manager of Leonardo, Giampiero Di Paolo, Deputy CEO of Thales Alenia Space and CEO of Thales Alenia Space Italia, Teodoro Valente, President of the Italian Space Agency (ASI), Massimo Claudio Comparini, Managing Director of Leonardo’s Space Division and Chairman of the Thales Alenia Space Supervisory Board, and Philippe Keryer, SEVP Strategy, Research and Technology for Thales.

 

“Today, Italy soars even higher. With the inauguration of this new Space Smart Factory, we are taking another strategic step to strengthen the national space supply chain and consolidate Italy’s leadership by enhancing our capacity to design and integrate next-generation satellites,” said Adolfo Urso, Minister for Enterprises and Made in Italy. “This project also stands as a concrete example of effective collaboration between the public and private sectors and of the virtuous use of PNRR funds. Italy knows how to invest with strategic vision in key sectors, generating growth and qualified employment. We are at the forefront of strengthening our technological sovereignty and projecting our industrial system into the future,” said Adolfo Urso, Minister for Enterprises and Made in Italy.

“The inauguration of this state-of-the-art facility crowns years of intense efforts by Italian Space Agency and completes the network of facilities operating throughout the country for the assembly, integration and testing of satellite” said Teodoro Valente, President of the Italian Space Agency. “The Space Factory program also represents a virtuous example of public-private collaboration for the benefit of the entire national ecosystem, having effectively used the resources of the PNRR to permanently endow the country with a strategic asset. Thanks to the functionality and production capacity of this plant, Italy stands as a reference point for the realization of large satellite infrastructures in the field of Earth Observation, Telecommunications and Navigation.”

“I’m especially proud to inaugurate this new state-of-the-art facility, designed to rank among the world’s most advanced for space system production,” said Hervé Derrey, President and CEO of Thales Alenia Space. “Leveraging the latest technologies, the Space Smart Factory will enhance Thales Alenia Space’s production capacity and its global competitiveness as a leading player in Europe’s space industry. In that sense, our company will even more support European and national sovereign programs as well as the continent’s major space ambitions, including in large constellations.”

“The new space factory, an investment that looks to the future and is the result of the vision of the Italian Space Agency, institutions and the company, is a benchmark for production paradigms of the European space industry,” declared Massimo Claudio Comparini, Managing Director of Leonardo’s Space Division and Chairman of the Thales Alenia Space Supervisory Board. It is a smart factory that can be reconfigured to produce all types of satellites and constellations using the principle of serialization of activities. The site is capable of producing over 100 satellites a year in the class up to 300 kilograms in an environment integrated with the most advanced digital, robotic and interconnection technologies with the ecosystem of suppliers and partners, a fundamental asset for the growth of the space economy. This is a further stimulus for the growth of space activities in Italy and Europe.”

“Today, with deep pride and in the presence of Italy’s highest institutional authority, we inaugurated our Space Smart Factory — a modern and fully digital facility and a true technological jewel,” said Giampiero Di Paolo, Deputy CEO and CEO of Thales Alenia Space Italia. “At our Satellite Integration Center in Rome — operating at full capacity — our teams have been building some of the world’s most prestigious Earth observation, telecommunications and navigation satellites, establishing the facility as a global benchmark in satellite manufacturing. Building on this legacy, the new Space Smart Factory will serve as an additional production hub able to meet the growing demand for future constellations, while reducing time-to-market and marking a real paradigm shift in space asset manufacturing. This new infrastructure will also be open to the entire supply chain, including small and medium-sized enterprises, which will be able to access it as a service — a winning formula that will strengthen our country’s role in the space economy.”

 

About the Space Smart Factory

The Space Smart Factory will employ flexible automation and digital systems to deliver high production capacity for next-generation space systems, with a strong focus on micro and small satellites, future constellations and Thales Alenia Space’s full portfolio of modular platforms for commercial and institutional programs. It will also support the rapid refurbishment of innovative, modular, high-performance platforms for future constellations, including the European Space Agency’s ERS constellation, the Italian Space Agency’s telecommunications constellation and Leonardo’s constellation for new Earth observation services.

The Factory will use advanced digital and robotic/cobotic technologies to build satellites across multiple classes and applications. Designed to optimize capacity and reduce costs, it can manufacture more than 100 satellites per year — around two per week — with the capacity to further scale production in line with market demand. Furthermore, being part of Italy’s network of interconnected space factories, it will amplify synergies and capacities. Through its open approach to the entire supply chain and close work with academia, it will drive the development of new products and professional skills.

With modular cleanrooms and advanced digital technologies, the Space Smart Factory can be reconfigured to meet production needs, supporting the integration and testing of a wide range of satellites — from Earth observation, navigation and space telecommunications to automated and reusable vehicles and in-orbit servicing demonstrators. As a true digital hub, the center will apply cutting-edge tools and methods across every stage of satellite design, assembly, integration and testing. These include numerical modeling and digital twin technologies, virtual and augmented reality, integrated simulators connected to the supply chain and advanced automation solutions such as robots and cobots. Another advantage of the facility relies on its ability to address large constellations up to several hundred satellites.

All assembly and integration areas are now complete. This new facility will boost the Rome site’s production capacity, with plans to recruit additional highly qualified employees. Once fully operational, the Space Smart Factory will begin testing and integrating its first satellites in the new-generation cleanrooms: the Sicral 3 defense satellite, second-generation Galileo constellation satellites and new Copernicus program satellites, including ROSE-L and CIMR.

A strategic cornerstone of the facility is the Space Joint Lab — an innovative, fully flexible collaborative space strongly backed by ASI through PNRR funds. It is designed to train new professionals in space disciplines and foster the development of innovative ideas and products in partnership with SMEs, startups, suppliers, industry partners and research centers.

This new entity also brings together top expertise in aerospace and industrial disciplines from academic institutions such as Politecnico di Milano and the University of Rome “La Sapienza,” along with the global know-how of Accenture, a leader in digital and process innovation for the aerospace sector.

The entire project is guided by sustainable architecture principles, with a strong focus on energy efficiency and extensive use of renewable energy enabled by digital technologies. The building is LEED certified and equipped with rainwater recovery systems and solar panels supplying around 10% of its energy needs. It also has an installed power capacity of 4.5 MW, supported by a redundant system to guarantee 24/7 operational continuity.

The facility was designed by eos s.r.l., which also supervised the project, and built by CBRE | Hitrac, a global leader in critical infrastructure technologies and lifecycle services for advanced technology systems. Leonardo Global Solutions oversaw the entire real estate operation — from land acquisition and procurement management to the launch of construction.

© Thales Alenia Space

 

Notes

Eos, headquartered in Milan and Rome, is an integrated engineering services company built on teamwork. Its matrix organization supports a multidisciplinary approach, combining expertise in architecture, structural engineering, safety and civil plant systems. www.eosweb.it

CBRE | Hitrac is a global leader in technologies for critical infrastructure and services covering the entire lifecycle of advanced technological systems. www.hitrac-engineering.com

Leonardo Global Solutions (LGS), a service provider for Leonardo, operates with the primary objective of creating value for the entire Leonardo Group. It supports business activities in Italy and abroad with economic efficiency and process standardization, aiming at technological innovation and promoting the wellbeing of people, aligned with common sustainability goals. https://leonardoglobalsolutions.com/it/home

 

About Thales Alenia Space

Drawing on over 40 years of experience and a unique combination of skills, expertise and cultures, Thales Alenia Space delivers cost-effective solutions for telecommunications, navigation, Earth observation, environmental monitoring, exploration, science and orbital infrastructures. Governments and private industry alike count on Thales Alenia Space to design satellite-based systems that provide anytime, anywhere connections and positioning, monitor our planet, enhance management of its resources and explore our Solar System and beyond. Thales Alenia Space sees space as a new horizon, helping build a better, more sustainable life on Earth. A joint venture between Thales (67%) and Leonardo (33%), Thales Alenia Space also teams up with Telespazio to form the Space Alliance, which offers a complete range of solutions including services. Thales Alenia Space posted consolidated revenues of €2.23 billion in 2024 and has more than 8,100 employees in 7 countries with 14 sites in Europe. www.thalesaleniaspace.com

View PDF market_segment : Space thales-alenia-space-inaugurates-state-art-space-smart-factory On

Spherical Cow Consulting

The End of the Global Internet

Many people reading this post grew up believing and expecting in a single, borderless Internet: a vast network of networks that let us talk, share, and build without arbitrary walls. I like that model, probably because I am a globalist, but I don't think that's where the world is heading. The post The End of the Global Internet appeared first on Spherical Cow Consulting.

“The Internet is too big to fail, but it may be becoming too big to hold together as one.”

Many of the people reading this post grew up believing and expecting in a single, borderless Internet: a vast network of networks that let us talk, share, learn, and build without arbitrary walls. I like that model, probably because I am a globalist, but I don’t think that’s where the world is heading. In recent years, laws, norms, infrastructure, and power pulling in different directions, driving us increasingly towards a fragmented Internet. This is a reality that is shaping how we connect, what tools we use, and who controls what.

In this post, I talk about what fragmentation is, how it is happening, why it matters, and what cracks in the system may also open up room for new kinds of opportunity. It’s a longer post than usual; there’s a lot to think about here.

A Digital Identity Digest The End of the Global Internet Play Episode Pause Episode Mute/Unmute Episode Rewind 10 Seconds 1x Fast Forward 30 seconds 00:00 / 00:16:34 Subscribe Share Amazon Apple Podcasts CastBox Listen Notes Overcast Pandora Player.fm PocketCasts Podbean RSS Spotify TuneIn YouTube iHeartRadio RSS Feed Share Link Embed

You can Subscribe and Listen to the Podcast on Apple Podcasts, or wherever you listen to Podcasts.

And be sure to leave me a Rating and Review!

What is “fragmentation”?

Fragmentation isn’t a single event with a single definition; it’s a multi-dimentional process. Research has identified at least three overlapping types:

Technical fragmentation: differences in protocols, infrastructure, censorship, filtering; sometimes entire national “gateways” or shutdowns. Regulatory / governmental fragmentation: national laws around data flows, privacy, platform regulation, online safety, and content moderation diverge sharply. Commercial fragmentation: companies facing divergent rules in different markets (privacy, liability, content) so they adapt differently; global products become “local versions.”

A primer from the United Nations Institute for Disarmament Research (UNIDIR) published in 2023 lays this out in detail. The authors of that paper argue that Internet fragmentation is increasingly something that influences cybersecurity, trade, national security, and civil liberties. Another study published not that long ago in SciencesPo suggests that fragmentation is shifting from inward-looking national control toward being used as a tool of power projection; i.e. countries not only fence their own access, but use fragmented rules or control of infrastructure to impose influence beyond their borders.

Evidence: How fragmentation is happening

Sounds all conspiracy theory, doesn’t it? Here are some concrete examples and trends.

Divergent regulatory frameworks The European Union, China, and the U.S. are increasingly adopting very different regulatory models for digital platforms, data privacy, and online content. The “prudent regulation” approach in the EU (which tends toward pre-emptive checks, heavy regulation) contrasts with the more laissez-faire (or “permissionless”) philosophy in parts of the U.S. or other jurisdictions. I really like how that’s covered in the Fondation Robert Schuman’s paper, “Digital legislation: convergence or divergence of models? A comparative look at the European Union, China and the United States.“ Countries around the world have passed or are passing online safety laws, content moderation mandates, or rules that give governments broad powers over what gets seen, what stays hidden, and what content is restricted. Check out the paper published in the Tech Policy Press, “Amid Flurry of Online Safety Laws, the Global Online Safety Regulators Network is Growing” for a lot more on that topic. Regulatory divergence not only in content, but in infrastructure: for example laws about mandatory data localization, national gateways, network sovereignty. These increase the cost and complexity for cross-border services. Few organizations know more about that than the Internet Society, which has an explainer entirely dedicated to Internet fragmentation.

While this divergence creates friction for global platforms, it also produces positive spillovers. The ‘Brussels Effect’ has pushed companies to adopt GDPR-level privacy protections worldwide rather than maintain separate compliance regimes, raising the baseline of consumer trust in digital services. At the same time, the OECD’s latest Economic Outlook stresses that avoiding excessive fragmentation will require countries to cooperate in making trade policy more transparent and predictable, while also diversifying supply chains and aligning regulatory standards on key production inputs.

Taken together, these trends suggest that even in a fragmented environment, stronger rules in one region can ripple outward, whether by shaping global business practices or by encouraging cooperation to build resilience. Of course, this can work both positively and negatively, but let’s focus on the positive for the moment. “Model the change you want to see in the world” is a really good philosophy.

Technical / infrastructural separation National shutdowns or partial shutdowns are still used by governments during conflict, elections, or periods of dissent. Internet Society’s explainer catalogues many examples, but even better is their Pulse table that shows where there have been Internet shutdowns in various countries since 2018. Some countries are building or mandating their own national DNS, national gateways, or other chokepoints—either to control content, enforce digital sovereignty, or “protect” their citizens. These create friction with global addressing, with trust, with how routing and redundancy work. More information on that is, again, in that Internet Society fragmentation explainer.

That said, fragmentation at the infrastructure level can also accelerate experimentation with alternatives. In regions that experience shutdowns or censorship, communities have adopted mesh networks and peer-to-peer tools as resilient stopgaps. Research from the Internet Society’s Open Standards Everywhere project, no longer a standalone project but still offering interesting observations, shows that these architectures, once fringe, are being refined for broader deployment, pushing the Internet to become more fault-tolerant.

Commercial & trade-driven fragmentation Platforms serving global audiences must adapt to local laws (e.g., privacy laws, content moderation laws) so they build variants. The result is that features, policies, even user experience diverge by country. I’m not even going to try to link to a single source for that. It’s kind of obvious. Also, restrictive trade policies (export controls, sanctions) affect what hardware/software can move across borders. Fragmentation in what devices can be used, which cloud services, etc., often comes from supply-chain / trade policy rather than purely from regulation. The UNIDIR primer notes how fragmentation when applied to cybersecurity or export controls ripples through global supply.

Yet duplication of supply chains can also help build redundancy. The CSIS reports on semiconductor supply chains notes (see this one as an example) that efforts to diversify chip fabrication beyond Taiwan and Korea, while expensive, reduce systemic risks. Similarly, McKinsey’s “Redefining Success: A New Playbook for African Fintech Leaders” highlights how African fintechs are thriving by tailoring products to fragmented regulatory and infrastructural environments, turning local constraints into opportunities for growth in areas like cross-border payments, SME lending, and embedded finance. There’s a lot to study there in terms of what opportunity might look like.

I’d also like to point to the opportunities described in the AMRO article “Stronger Together: The Rising Relevance of Regional Economic Cooperation” which describes how ASEAN+3 member states are using frameworks like the Regional Comprehensive Economic Partnership (RCEP), Economic Partnership Agreements, and institutions such as the Chiang Mai Initiative to deepen trade, investment, financial ties, and regulatory cooperation. These are not just formal treaties but mechanisms for cross-border resilience, helping supply chains, capital flows, and finance networks absorb external shocks. This blog post is already crazy long, so I won’t continue, but there is definitely more to explore with how to meet this type of fragmentation with a more positive mindset.

Why does it matter?

Why should we care that the Internet is fragmenting? If there are all sorts of opportunities, do we even have to worry at all? Well, yes. As much as I’m looking for the opportunities to balance the breakages, we still have to keep in mind a variety of consequences, some immediate, some longer-term.

Loss of universality & increased friction

The Internet’s power comes from reach and interoperability: you could send an email or view a website in Boston and someone in Nairobi could see it without special treatment. But as more rules, filters, and walls are inserted, that becomes harder. Services may be blocked, slowed, or restricted. Different regulatory compliance regimes will force more localization of infrastructure and data. Users may need to use different tools depending on where they are. Work that used to scale globally becomes more expensive.

However, constraints often fuel creativity. The World Bank has documented how Africa’s fintech ecosystem thrived under patchy infrastructure, leapfrogging legacy systems with mobile-first solutions. India’s Aadhaar program is another case where local requirements drove innovation that now informs digital identity debates globally. Fragmentation can, paradoxically, widen the palette of local solutions while reducing the palette of global solutions.

Security, surveillance, and trust challenges

Fragmentation creates new attack surfaces and risk vectors. For example:

If traffic must go through national gateways, those are chokepoints for surveillance, censorship, or abuse. If companies cannot use global infrastructure (CDNs, DNS, encryption tools) freely, fragmentation may force weaker substitutes or non-uniform security practices. Divergent laws about encryption or liability may reduce trust in cross-border services or require large overheads. The UNIDIR primer emphasizes these concerns. Economic costs and innovation drag Fragmentation means duplicate infrastructure: separate data centres, duplicated content moderation teams, local legal teams. That’s inefficient. Products and platforms may need multiple variants, reducing scale economies. Cross-border collaboration, which has been a source of innovation (in open source, research, startups) becomes more legally, technically, culturally constrained. Unequal access and power imbalances Countries or regions with weaker regulatory capacity, limited infrastructure, or less technical expertise may be less able to negotiate or enforce their interests. They could be “locked out” of parts of the Internet, or forced to use inferior services. Big tech companies based in powerful jurisdictions may be able to shape global norms (via export, legal reach, or market power) in ways that reflect their values, often without much input from places with less power. This may further amplify inequalities. What counters or moderating factors exist?

Fragmentation is not unilateral nor total. There are forces, capacities, and policies that push in the opposite direction, or at least slow things down.

Standardization bodies / global protocols. The Internet Engineering Task Force (IETF), the W3C, ICANN, etc., continue to undergird a lot of the technical plumbing (DNS, HTTP, TCP/IP, SSL/TLS, etc.). These are not trivial to replace, though it seems like some regional standards organizations are trying. Commercial incentives for compatibility. Many platforms serving global markets prefer to maintain a common codebase, or to comply with the most restrictive regulation so it applies everywhere (bringing us back to the Brussels Effect). If a regulation (e.g., privacy law) in one place is strong, firms may just adopt it globally rather than maintain separate versions. User demand and expectation. Users expect services to “just work” across borders—social media, video conferencing, cloud tools. If fragmentation hurts usability, there is political/popular pushback. Cross-border political/institutional cooperation. Trade agreements, multi-stakeholder governance efforts, and international bodies sometimes negotiate common frameworks or minimum standards (e.g., data flow provisions, privacy protections, cybersecurity norms).

These moderating factors mean that fragmentation is not an all-or-nothing state; it will be uneven, partial, and contested.

What we (you, we, society) can do to navigate & shape the outcome

Fragmentation is already happening; how we respond matters. Here are some ways to think about shaping the future so that it is not simply divided, but more resilient and fair.

Advocate for interoperable baselines. Even as parts diverge, there can be minimum standards—on encryption, addressing, data portability, etc.—that maintain some baseline interoperability. This ensures users don’t fall off the map just because their country has different laws. Design for variation. Product and service designers need to think early about how their tools will work under different regulatory, infrastructural, and socio-political regimes. That means thinking about offline/online tradeoffs, degraded connectivity, local content, privacy expectations, etc. Invest in local capability. Regions with weaker infrastructure, less regulatory capacity, or less technical workforce should invest (or have investment from partners) in building up their tech ecosystems, including data centers, networking, local content, and developer education. This mitigates risk of being passive recipients rather than active shapers. Cross-bloc cooperation & treaties. Trade agreements or regional alliances for digital policies could harmonize rules where possible (e.g., privacy, data flows, cybersecurity), reduce compliance burden, and keep doors open across regions. New infrastructural experiments. Thinking creatively: mesh networks, decentralized Internet architecture, peer-to-peer content distribution, alternative routing, redundancy in undersea cables etc. In context of fragmentation, some of these may move from research curiosities to vital infrastructure. Policy awareness & public engagement. People often take the openness of the Internet for granted. Public debates, awareness of policy changes (online safety, surveillance, digital sovereignty) matter. A more informed citizenry can push for policies that preserve openness and resist overly restrictive fragmentation. Anchor in human rights and global goals. Fragmentation debates can’t just be about pipes and protocols. They must also reflect the fundamentals of an ethical society: protecting human rights, ensuring equitable access, and aligning with global commitments like the United Nations Sustainable Development Goals (SDGs) and the Global Digital Compact. These frameworks remind us that digital infrastructure isn’t an end in itself. It’s a means to advance dignity, inclusion, and sustainable development. Even as the Internet fragments, grounding decisions in these principles can help keep diverse systems interoperable not just technically, but socially. Recalibration

The “global Internet” is fragmenting, if it ever really existed at all. That’s a statement I’m not comfortable with but which I’m also not going to approach as the ultimate technical tragedy. Fragmentation brings friction, risks, and challenges, sure. It threatens universality, raises security concerns, and could amplify inequalities. But it also forces us to imagine new architectures, new modes of cooperation, new ways to build more resilient and locally grounded technologies. It means innovation might look different: less about global scale, more about boundary-crossing craftsmanship, local resilience, hybrid systems.

In the end, fragmentation isn’t simply an ending. It may be a recalibration. The question is: will we let it just fragment into chaos, or guide it into a future where multiple, overlapping digital worlds still connect, where people everywhere are participants and not just objects of regulation?

Question for you, the reader: If the Internet becomes more of a patchwork than a tapestry, what kind of bridges do you think are essential? What minimum interoperability, trust, and rights should be preserved across borders?

If you’d rather track the blog than the podcast, I have an option for you! Subscribe to get a notification when new blog posts go live. No spam, just announcements of new posts. [Subscribe here

Transcript

Hi everyone, and welcome back to the Digital Identity Digest. Today’s episode is called The End of the Global Internet.

This episode is longer than usual because there’s a lot to unpack. The global Internet, as we once imagined it, is changing rapidly. While it isn’t collapsing overnight, it is fragmenting. That fragmentation brings real risks — but also some surprising opportunities.

Throughout this month, I’ll be publishing slightly longer episodes, alongside detailed blog posts with links to research and source material. I encourage you to check those out as well.

What Fragmentation Really Means

[00:01:15] Many of us grew up hoping for a single, borderless Internet: a vast network of networks without arbitrary firewalls. I’ve always loved that model, perhaps because I’m a globalist at heart. But that’s not where we’re heading.

In recent years, laws, cultures, infrastructure, and politics have pulled the Internet in different directions. The result? An increasingly fragmented landscape.

Researchers describe three key dimensions of fragmentation:

Technical fragmentation – national firewalls, alternative DNS systems, and content filtering that alter the “plumbing” of the Internet. Regulatory fragmentation – divergent laws on privacy, content, and data, such as the GDPR compared with lighter-touch U.S. approaches. Commercial fragmentation – companies restricting services by geography, whether for compliance, cost, or strategy.

Together, these layers create friction in what once felt like a seamless system.

Evidence of Fragmentation in Practice

[00:04:18] Let’s look at how fragmentation is showing up.

Regulatory divergence – The EU, China, and the U.S. are moving in very different directions. The EU emphasizes heavy regulation and precaution. The U.S. takes a lighter (but shifting) approach. China uses regulation to centralize control. Interestingly, strict laws often set global baselines. The Brussels Effect demonstrates how GDPR effectively raised global privacy standards, since it’s easier for companies to comply everywhere. Technical fragmentation – Governments are experimenting with independent DNS systems, national gateways, and even Internet shutdowns during protests or elections. On the flip side, this has fueled mesh networks and decentralized DNS, once fringe ideas that now serve as resilience tools. Commercial fragmentation – Supply chains and trade policy drive uneven access to hardware and cloud services. For example: Semiconductor fabs are being built outside Taiwan and Korea. New data centers are emerging in Africa and Latin America. African fintech thrives precisely because local firms adapt to fragmented conditions.

McKinsey projects African fintech revenues will grow nearly 10% per year through 2028, showing how local innovation can thrive in fragmented markets.

Why Fragmentation Matters

[00:06:45] Fragmentation has profound consequences.

Universality weakens – The original power of the Internet was its global reach. Fragmentation erodes that universality. Security and trust challenges – Choke points and divergent encryption weaken cross-border trust. Economic costs – Companies must duplicate infrastructure and compliance, slowing innovation. Inequality deepens – Weaker regions risk being left behind, forced to adopt systems imposed by stronger players. Moderating Factors

[00:08:30] Fragmentation isn’t absolute. Several forces hold the Internet together:

Standards bodies like IETF and W3C keep core protocols aligned. Companies often adopt the strictest regimes globally, simplifying compliance. Users expect services to work everywhere — and complain when they don’t. Regional cooperation (e.g., EU, ASEAN, African Union) helps maintain partial cohesion.

These factors form the connective tissue that prevents a total collapse.

Possible Future Scenarios

[00:09:45] Looking ahead, I see four plausible scenarios:

Soft fragmentation Internet stays global, but friction rises. Platforms launch regional versions, compliance costs increase. Opportunity: stronger local ecosystems and regional innovation. Regulatory blocks Countries form digital provinces with internal harmony but divergence elsewhere. Opportunity: specialization (EU in privacy tech, Africa in mobile-first innovation, Asia in super apps). Technical fragmentation Shutdowns, divergent standards, and outages become common. Opportunity: mainstream adoption of decentralized and peer-to-peer networks. Pure isolationism Countries build proprietary platforms, national ID systems, and local chip fabs. Opportunity: preservation of local values, region-specific innovation. What Can We Do?

[00:12:28] In the face of fragmentation, individuals, companies, and policymakers can take action:

Advocate for interoperable baselines (encryption, addressing, data portability). Design for variation so systems degrade gracefully under different regimes. Invest in local capacity — infrastructure, skills, developer ecosystems. Encourage regional cooperation through treaties and data agreements. Experiment with alternative architectures like mesh networks and decentralized identity. Anchor change in human rights — align with UN SDGs, protect freedoms, and center people, not just states or corporations. Closing Thoughts

[00:15:50] The global Internet as we knew it may be ending — but that isn’t necessarily a tragedy.

Yes, fragmentation creates friction, risks, and inequality. But it also sparks resilience, innovation, and adaptation. In Africa, fintech thrives under fragmented conditions. In Europe, strong privacy laws raise global standards. In Asia, regional trade frameworks offer cooperation despite divergence.

The real question isn’t whether fragmentation is coming — it’s already here. The question is:

What kind of fragmented Internet do we want to build? Which bridges are worth preserving? Which minimum standards — technical, ethical, social — should always cross borders?

These questions shape not only the Internet’s future, but our own.

[00:18:45] Thank you for listening to the Digital Identity Digest. If you found this episode useful, please subscribe to the blog or podcast, share it with others, and connect with me on LinkedIn @hlflanagan.

Stay curious, stay engaged, and let’s keep these conversations going.

The post The End of the Global Internet appeared first on Spherical Cow Consulting.


Ontology

How Smart Accounts and Account Abstraction Fit Together

Since the dawn of Ethereum, interacting with blockchains has meant using Externally Owned Accounts (EOAs) - simple wallets controlled by a private key. While functional, EOAs expose serious limitations: lose your key, and you lose your funds. Want features like spending limits, session keys, or social recovery? You’re left with clunky, layered workarounds. Enter Account Abstraction (AA) and Smart

Since the dawn of Ethereum, interacting with blockchains has meant using Externally Owned Accounts (EOAs) - simple wallets controlled by a private key. While functional, EOAs expose serious limitations: lose your key, and you lose your funds. Want features like spending limits, session keys, or social recovery? You’re left with clunky, layered workarounds.

Enter Account Abstraction (AA) and Smart Accounts. Together, these innovations are transforming how users engage with Web3 by merging the flexibility of smart contracts with the usability of traditional wallets. Instead of thinking about wallets as rigid containers of keys, we can now imagine them as programmable, customizable gateways into the blockchain world.

This article explores how Smart Accounts and Account Abstraction fit together, referencing key Ethereum proposals EIP-4337, EIP-3074, and EIP-7702 and why this combination is essential for building the next wave of user-friendly, secure, and innovative blockchain applications.

What is Account Abstraction?

Account Abstraction is the idea of treating all blockchain accounts as programmable entities. Instead of separating EOAs (controlled by private keys) and contract accounts (controlled by code), AA allows accounts themselves to act like smart contracts.

Key benefits of AA include:

Gas abstraction: Pay transaction fees in tokens other than ETH.
Programmable security: Add multi sig, time locks, or social recovery. Batched transactions: Execute multiple actions in one click.
Session keys: Grant temporary permissions for games or dApps. Upgradability: Evolve wallet logic without replacing accounts.

With AA, wallets evolve from being passive key holders into active smart entities capable of executing logic on behalf of their users.

What are Smart Accounts?

If Account Abstraction is the theory, Smart Accounts are the practice. A Smart Account is simply a blockchain account that operates under the AA model.

Instead of relying on a single private key, a Smart Account:

Runs customizable logic like a smart contract. Supports flexible authentication methods (biometrics, passkeys, hardware modules). Allows advanced features such as automatic payments, subscription models, or delegated access. Provides recoverability through trusted guardians or social recovery mechanisms.

In short, Smart Accounts are the user-facing manifestation of Account Abstraction. They bring abstract design principles into tangible experiences, making Web3 more accessible for everyday users.

How They Fit Together

Think of Account Abstraction as the architectural blueprint and Smart Accounts as the actual buildings.

AA defines the rules: It sets the framework for programmable accounts. Proposals like EIP-4337 specify how transactions are validated and bundled without relying solely on EOAs.

2. Smart Accounts implement the

rules:

They apply those AA rules to create practical wallets. Through smart contracts, they support features like gasless transactions, account recovery, and key rotation.

Together, AA and Smart Accounts replace the outdated key-wallet model with a flexible, modular system where user experience comes first.

The Role of Key EIPs

Ethereum’s progress toward AA and Smart Accounts has been guided by several proposals:

EIP-4337 (2021):
Introduced the concept of a “UserOperation” and “bundlers.” This allows smart accounts to function without requiring changes at the consensus layer. It is the backbone of today’s AA-compatible wallets. EIP-3074:
Enables EOAs to delegate control to contracts temporarily, bridging the gap between old wallets and smart accounts. EIP-7702 (2024):
Builds on 3074 but provides a safer and more streamlined way for EOAs to transition into smart accounts. This is critical for onboarding existing users without forcing them to abandon their current wallets.

Together, these proposals ensure that Smart Accounts are not just theoretical they’re backward-compatible, forward-looking, and ready for mainstream adoption.

Why This Matters for Users

For users, the combination of AA and Smart Accounts translates into real-world improvements:

Safety: Lose your key? No problem recover your wallet using guardians or multi-sig setups. Simplicity: Pay fees with stablecoins, batch multiple dApp actions into one transaction, or play a blockchain game without constant wallet prompts. Flexibility: Switch security models as your needs change (e.g., from a simple wallet as a beginner to a multi sig or hardware protected wallet as your assets grow). Innovation: Developers can build richer applications subscription based dApps, automated DeFi strategies, or Web3-native identity systems.

This shifts the user experience from fear of making mistakes to freedom to explore.

A Fresh Perspective: Smart Accounts as Digital Personas

One way to think creatively about Smart Accounts is to view them not just as wallets, but as digital personas.

Just as you might have different identities in real life personal, professional, or gaming Smart Accounts allow you to manage multiple digital personas:

A DeFi persona with automated trading strategies. A gaming persona with session keys and gasless interactions. A professional persona tied to your DAO contributions.

Each persona can run its own logic while remaining linked to your overall identity. This flexibility makes Web3 personalized and intuitive, much like the evolution from simple feature phones to today’s smartphones.

Practical Takeaways for the Community

Developers: Start experimenting with Smart Account SDKs built on EIP-4337. Building dApps with native AA support will set you apart in the next wave of adoption. Users: Explore AA wallets like Safe, ZeroDev, or Soul Wallet. Get familiar with recovery options and gas abstraction to see the difference firsthand. Communities: Advocate for dApps that integrate Smart Accounts, since these models reduce onboarding friction for newcomers.

By engaging now, the community can shape how AA and Smart Accounts evolve, ensuring they remain inclusive, secure, and user first.

Conclusion

Smart Accounts and Account Abstraction are not isolated innovations they are two halves of the same revolution. Account Abstraction lays the foundation, while Smart Accounts bring it to life. Together, they unlock a Web3 experience that is safer, simpler, and infinitely more flexible than today’s wallet paradigm.

Just as the smartphone redefined what we expect from communication devices, Smart Accounts will redefine what we expect from blockchain wallets. They are not just tools to hold assets they are programmable, adaptable, and deeply human centric gateways into the decentralized world.

The future of Web3 isn’t just about protocols or assets it’s about empowering people with smarter, safer, and more intuitive digital identities. And that future begins with Smart Accounts powered by Account Abstraction.

How Smart Accounts and Account Abstraction Fit Together was originally published in OntologyNetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


Thales Group

Thales launches Europe’s first certified smartcard ready for the Quantum Age

Thales launches Europe’s first certified smartcard ready for the Quantum Age prezly Tue, 10/07/2025 - 07:00 Public Security Civil identity Share options Facebook
Thales launches Europe’s first certified smartcard ready for the Quantum Age prezly Tue, 10/07/2025 - 07:00 Public Security Civil identity

Share options

Facebook X Whatsapp Linkedin Email URL copied to clipboard 07 Oct 2025 Thales’ solution is the first quantum-resistant smartcard in Europe to receive high-level security certification, underscoring its commitment to staying ahead of emerging cyber risks in the quantum era. The certified product integrates innovative cyber mechanism into a smartcard format - ideal for applications that demand strong future-proof identity protection, such as electronic ID cards, health cards, and driving licenses. It is ready for real-world deployment, providing governments and institutions with a secure foundation for next-generation identity solutions.

As quantum computing evolves, many of today’s cryptographic methods will no longer be secure, since quantum computers will be able to solve complex mathematical problems much faster than classical computers. A recent Gartner® report* says “by 2029, advances in quantum computing will make conventional asymmetric cryptography unsafe to use”, Thales has spent years investing in post-quantum cryptography to ensure critical systems stay safe in the future.

By becoming the first company to receive high-level Common Criteria1 certification for a quantum-resistant smartcard, Thales will help government services protect sensitive data - such as those on ID cards, health cards, and driver’s licenses; and ensure that citizens’ identities are secure against emerging quantum threats.

The innovative smartcard (‘MultiApp 5.2 Premium PQC’), developed by Thales and certified by the French Cybersecurity Agency (Agence nationale de la sécurité des systèmes d’information – ANSSI), uses advanced digital signature designed to resist attacks, even from powerful quantum machines. It’s the first of its kind to be certified at such a high security level (EAL 6+2) under the Common Criteria framework. The certified product also features new Digital Signature Algorithms3 standardised by the American NIST - National Institute of Standards and Technology. These specific signature algorithms are powerful cryptographic tools used to verify that data or a digital message really comes from the right sender and has not been altered.

From an end-user perspective, nothing changes: citizens will continue to use their cards as usual. What’s revolutionary is what’s inside. The card uses a new generation cryptographic signature designed to withstand the immense computing power of tomorrow’s quantum computers. This ensures that sensitive personal data remains protected not just today, but well into the future.

This first certification for a solution incorporating post-quantum cryptography reflects ANSSI’s commitment to supporting innovation, while upholding the highest cybersecurity standards. The joint work of Thales, CEA-Leti IT Security Evaluation Facility, and ANSSI is a strong signal that Europe is ready to lead the way in post-quantum security, enabling organisations and governments to deploy solutions that anticipate future risks, rather than waiting for quantum computers to become mainstream." Franck Sadmi, Head of National Certification Center, French Cybersecurity Agency (ANSSI).
This certification is a landmark moment not only for Thales but for the entire digital security ecosystem. It shows that future-proof cybersecurity is no longer a concept, it's a reality. By achieving the highest level of security for a quantum-resistant smartcard, Thales is paving the way for trust in tomorrow’s civil identities. We’re proud to lead this crucial transformation." Nathalie Gosset, VP Identity & Biometric Solutions at Thales.

More reading:

thalesgroup.com/en/news-centre/insights/public-security/national-security/introducing-eucc-new-certificate-boost

thalesgroup.com/en/news-centre/press-releases/european-consortium-launches-pqc4emrtd-project-enhance-security

1 Common Criteria : an international standard confirming the product meets strict security requirements.

2 The Evaluation Assurance Level (EAL) is an international scale used to measure the robustness of IT security. It ranges from EAL1 (basic tested) up to EAL7 (the highest, formally verified level). An EAL6+ certification means the product has been tested and proven to provide very high security against sophisticated attacks, suitable for critical applications like government, finance, and defense.

3 FIPS 204 is a new U.S. government standard that defines a digital signature algorithm designed to remain secure even in the age of quantum computers. It is a foundation for digital integrity of things like secure transactions, ID documents, software updates, or electronic contracts. FIPS standards are published and approved by NIST (the U.S. National Institute of Standards and Technology) and are widely recommended and adopted across industries worldwide, especially in sectors like government, defense, finance, and digital technology.

* Gartner®, Postquantum Cryptography: The Time to Prepare Is Now!, Mark Horvath et al., 1 July 2024

The Gartner content described herein (the “Gartner Content”) represents research opinion or viewpoints published, as part of a syndicated subscription service, by Gartner, Inc. ("Gartner"), and is not a representation of fact. Gartner Content speaks as of its original publication date (and not as of the date of this PR), and the opinions expressed in the Gartner Content are subject to change without notice.

GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.

About Thales

Thales (Euronext Paris: HO) is a global leader in advanced technologies for the Defence, Aerospace, and Cyber & Digital sectors. Its portfolio of innovative products and services addresses several major challenges: sovereignty, security, sustainability and inclusion.

The Group invests more than €4 billion per year in Research & Development in key areas, particularly for critical environments, such as Artificial Intelligence, cybersecurity, quantum and cloud technologies.

Thales has more than 83,000 employees in 68 countries. In 2024, the Group generated sales of €20.6 billion.

View PDF market_segment : Public Security > Civil identity https://thales-group.prezly.com/thales-launches-europes-first-certified-smartcard-ready-for-the-quantum-age thales-launches-europes-first-certified-smartcard-ready-quantum-age On Thales launches Europe’s first certified smartcard ready for the Quantum Age

auth0

Demystifying JOSE, the JWT Family: JWS, JWE, JWA, and JWK Explained

Break down the differences and relationships between JOSE, JWT, JWS, JWE, JWA, and JWK with clear explanations and examples.
Break down the differences and relationships between JOSE, JWT, JWS, JWE, JWA, and JWK with clear explanations and examples.

FastID

Design for Chaos: Fastly’s Principles of Fault Isolation and Graceful Degradation

Learn how Fastly builds a resilient CDN through fault isolation & graceful degradation. Discover our principles for minimizing disruption & ensuring continuous service.
Learn how Fastly builds a resilient CDN through fault isolation & graceful degradation. Discover our principles for minimizing disruption & ensuring continuous service.

Monday, 06. October 2025

Herond Browser

Herond Browser: September 2025 Report

This report details how we paired this impactful effort with vital platform upgrades to sustain momentum through September. The post Herond Browser: September 2025 Report appeared first on Herond Blog. The post Herond Browser: September 2025 Report appeared first on Herond Blog.

September fueled Herond’s robust growth with product innovation and key partnerships. We’re thrilled to highlight the successful Herond x BingX campaign, amplifying Web 3.0 reach and engagement. This report details how we paired this impactful effort with vital platform upgrades to sustain momentum through September.

Product Updates: Login & Onboarding Improvements

We’re excited to announce two major updates designed to make your experience with Herond more seamless than ever.

Profile sync fixed: We’ve resolved synchronization issues across devices, ensuring your bookmarks, history, and settings update seamlessly in real-time. No more mismatched data – enjoy a consistent experience wherever you browse.

YouTube ads on iOS blocked: iOS users rejoice! Herond Shield now effectively blocks YouTube ads, delivering uninterrupted viewing without pop-ups or interruptions. Stream your favorites ad-free for a smoother, faster experience.

TikTok desktop playback restored: Desktop TikTok playback is back and better! We’ve fixed compatibility glitches, restoring full video support and smooth scrolling. Dive into your feed effortlessly on any screen.

Herond ID UI & icons improved: Desktop TikTok playback is back and better! We’ve fixed compatibility glitches, restoring full video support and smooth scrolling. Dive into your feed effortlessly on any screen.

Partnership

We’re excited to join forces with MetaDev, the leading Web3 authentication infrastructure. Together, we’re making Web3 browsing feel as seamless as Web2 – bringing decentralized applications closer to everyone.

Community and Events Herond x BingX Cashback Campaign

We’re thrilled to share the success of the Herond x BingX collaboration through this report. The event brings rewards, engagement, and exclusive benefits to our community. Here’s what we achieved together:

The Herond x BingX collaboration has received strong engagement from the community, with a total reward pool of up to 7,700 USDT. Our announcement post attracted nearly 2,000 views and interactions, reflecting high interest from users. To further boost excitement, we launched a Facebook minigame featuring exclusive BingX merchandise as prizes, drawing almost 50 likes and participants. In addition, 10 users joined the Premium Cashback program from Herond and BingX, highlighting the growing trust and adoption of our joint initiatives.

Tear the Bag, Win the Gift

Herond launched the “Xé Túi Trúng Quà” campaign, giving participants the chance to win the special Mid-Autumn gift box “Lạc Quy Minh Nguyệt”. Through the report, the event attracted 40 participants, gained over 100 interactions, and reached more than 1.6K users, marking a successful engagement activity for the community.

Upcoming event

Herond Quest: The Browser Battle

This is the first-ever board game set in Herond’s fantasy Internet world. After its showcases at BIGF (Thailand) and TOBE (Taiwan), the game is gearing up for appearances at Pax Melbourne and Essen (Germany). With pre-orders opening in October and a global launch planned for late October to early November, Herond Quest has already secured 100+ pre-orders from board game stores around the world.

As in this report, September was a month of strong growth and exciting milestones for Herond. From community engagement campaigns and rewarding collaborations to global showcases and product improvements, we continue to build momentum toward our vision of a secure, user-centric Web3 future. As we step into October, we’re ready to scale even further – bringing more innovation, stronger partnerships, and an even better experience for our users worldwide.

DOWNLOAD HEROND About Herond Browser

Herond Browser is a cutting-edge Web 3.0 browser designed to prioritize user privacy and security. By blocking intrusive ads, harmful trackers, and profiling cookies, Herond creates a safer and faster browsing experience while minimizing data consumption.

To enhance user control over their digital presence, Herond offers two essential tools:

Herond Shield: A robust adblocker and privacy protection suite. Herond Wallet: A secure, multi-chain, non-custodial social wallet.

As a pioneering Web 2.5 solution, Herond is paving the way for mass Web 3.0 adoption by providing a seamless transition for users while upholding the core principles of decentralization and user ownership.

Have any questions or suggestions? Contact us:

On Telegram https://t.me/herond_browser DM our official X @HerondBrowser Technical support topic on https://community.herond.org

The post Herond Browser: September 2025 Report appeared first on Herond Blog.

The post Herond Browser: September 2025 Report appeared first on Herond Blog.


Thales Group

ESA’s fourth Deep Space Antenna unveiled in New Norcia, Western Australia

ESA’s fourth Deep Space Antenna unveiled in New Norcia, Western Australia tas Mon, 10/06/2025 - 08:37 Space Share options Facebook X
ESA’s fourth Deep Space Antenna unveiled in New Norcia, Western Australia tas Mon, 10/06/2025 - 08:37 Space

Share options

Facebook X Whatsapp Linkedin Email URL copied to clipboard 06 Oct 2025

New Norcia, Australia, October 6, 2025 – The European Deep Space Antenna Alliance (E-DSA²) formed by Thales Alenia Space, Schwartz Hautmont and mtex antenna technology, celebrated the inauguration of the European Space Agency’s NNO-3 deep space antenna masterpiece for the New Norcia ground station near Perth, Australia, on October 4. NNO-3 is part of ESA’s ESTRACK global network of ground stations.

This new-generation 35-meter antenna will enable ESA to increase its communication capabilities in X, K and Ka frequency bands. It will expand its antennas network made for tracking and collecting scientific data from ESA spacecraft in the solar system, including missions such as the ExoMars Trace Gas Orbiter, currently orbiting around the Red Planed or Euclid which will cover one third of the sky studying dark matter and energy, to name a few. These jewels of high technology will be joined by upcoming missions such as Plato, designed to detect and observe exoplanets, whose launch is scheduled for next year.

© Thales Alenia Space

Days ago, NNO-3 successfully received its first signal coming from the Euclid spacecraft. The deep-space antenna challenge is to pick up very faint signals and then boost them considerably for transmission from and to objects in deep space, to enable reception of science data and uploading of commands to space probes.

Thales Alenia Space, a joint venture between Thales (67 %) and Leonardo (33 %), is the consortium partner in charge of the antenna’s overall performance. The company was also responsible for the antenna systems engineering, the overall system and equipment (radio frequency, power, cooling, etc.). Schwartz-Hautmont was responsible for the antenna mechanical structure engineering, manufacturing and installation. mtex antenna technology was in charge of the antenna mechanical design, procurement, installation and testing.

© Thales Alenia Space

“I would like to thank the European Space Agency for placing its trust in our consortium to carry out the manufacturing of the second Deep Space Antenna in New Norcia, now the fourth in ESA’s network,” said Thales Alenia Space CEO, Hervé Derrey. “This first major success for the E-DSA² consortium will surely pave the way for other opportunities on the institutional market and beyond.”

“This project, which started as a challenge to improve the performance of existing antennas, has extracted the best of each E-DSA² consortium member. We are happy to deliver this state-of-the-art antenna and are grateful to the ESA for having trusted us,” said Antonio Aldecoa, Schwartz Hautmont’s CEO.

 

About the E-DSA² consortium
The European Alliance for Deep Space Antennas (E-DSA²) is formed by Thales Alenia Space, Schwartz-Hautmont and mtex antenna technology.

The E-DSA² consortium also relies on the proven products and renowned expertise of Callisto France, a mid-size firm in Villefranche de Lauragais, for the cryogenically cooled LNAs, and on Rheinmetall Italy for the HPAs.

See here for more details about the ESTRACK antenna network. Access EstrackNOW to follow ground station activity in real-time.

 

About Thales Alenia Space

Drawing on over 40 years of experience and a unique combination of skills, expertise and cultures, Thales Alenia Space delivers cost-effective solutions for telecommunications, navigation, Earth observation, environmental monitoring, exploration, science and orbital infrastructures. Governments and private industry alike count on Thales Alenia Space to design satellite-based systems that provide anytime, anywhere connections and positioning, monitor our planet, enhance management of its resources and explore our Solar System and beyond. Thales Alenia Space sees space as a new horizon, helping build a better, more sustainable life on Earth. A joint venture between Thales (67%) and Leonardo (33%), Thales Alenia Space also teams up with Telespazio to form the Space Alliance, which offers a complete range of solutions including services. Thales Alenia Space posted consolidated revenues of €2.23 billion in 2024 and has more than 8,100 employees in 7 countries with 14 sites in Europe. www.thalesaleniaspace.com

View PDF market_segment : Space esas-fourth-deep-space-antenna-unveiled-new-norcia-western-australia On

Herond Browser

Going Undercover Online: A Friendly Guide to Incognito Mode

Want to browse the web without leaving a trace? Herond Browser's Incognito Mode lets you do just that. The post Going Undercover Online: A Friendly Guide to Incognito Mode appeared first on Herond Blog. The post Going Undercover Online: A Friendly Guide to Incognito Mode appeared first on Herond Blog.

Want to browse the web without leaving a trace? Herond Browser’s Incognito Mode lets you do just that. But what exactly does it do, and how can it protect your privacy? Let’s find out.

What is Incognito Mode?

Incognito Mode is a privacy feature in Herond Browser that allows you to browse the internet without saving certain information about your browsing session. When you browse incognito, Herond Browser doesn’t save:

Browsing history: The websites you visit won’t be recorded in your browser’s history. Cookies and site data: Websites often store small files called cookies on your computer to remember your preferences and activity. It prevents most of these cookies from being saved. Information entered in forms: Usernames, passwords, addresses, and other information you type into online forms won’t be saved. How Does Incognito Mode Help Secure Your Data?

This enhances your online privacy in several ways:

Protection on shared devices: If you share a computer with family or use a public computer, Incognito Mode prevents others from seeing your browsing activity. This is especially useful for sensitive tasks like online banking or shopping. Preventing personalized ads: By limiting the storage of cookies, Incognito Mode can reduce the number of targeted ads you see based on your browsing history. Circumventing paywalls (sometimes): Some websites use cookies to track the number of articles or content you’ve viewed and may block access after a certain limit. Incognito Mode can sometimes help you bypass these restrictions. How to Use Incognito Mode in Herond Browser Open Herond Browser. Tap the three dots (More menu) found in the top right corner. Select “New incognito window”.

A new window with a darker theme (or another visual indicator, such as an eye mask) will open, indicating that you’re now browsing in Incognito Mode. Remember that your regular browser window will remain open.

Important Things to Remember

While Incognito Mode offers enhanced privacy, it’s essential to understand its limitations:

It doesn’t make you completely anonymous: Your internet service provider (ISP), employer (if you’re using a work network), and the websites you visit can still track your activity. Downloads and bookmarks are still saved: Files you download and bookmarks you create while in Incognito Mode will be saved on your device. It doesn’t protect against malware or phishing: You still need to be cautious about the websites you visit and the files you download, since they might contain malwares. Stay Secured with Herond Browser

Incognito Mode in Herond Browser is a valuable tool for anyone who wants to maintain a higher level of online privacy. It’s easy to use and offers several benefits, from protecting your browsing history on shared devices to limiting personalized ads. Combined with Herond Shield, our powerful ad blocker and protection utility, you can be sure to browse the web freely, however you want.

DOWNLOAD HEROND About Herond

Herond Browser is a Web browser that prioritizes users’ privacy by blocking ads and cookie trackers, while offering fast browsing speed and low bandwidth consumption. Herond Browser features two built-in key products:

Herond Shield: an adblock and privacy protection tool; Herond Wallet: a multi-chain, non-custodial social wallet.

Herond aims at becoming the ultimate Web 2.5 solution that sets the ground to further accelerate the growth of Web 3.0, heading towards the future of mass adoption.

Join our Community!

The post Going Undercover Online: A Friendly Guide to Incognito Mode appeared first on Herond Blog.

The post Going Undercover Online: A Friendly Guide to Incognito Mode appeared first on Herond Blog.

Saturday, 04. October 2025

Herond Browser

F1 Best Drivers All Time – Who Will be The Winner At Singapore Grands Prix?

As the engines ignite once more, one question remains: among the F1 best drivers all time, who will rise to victory under Singapore's night sky? The post F1 Best Drivers All Time – Who Will be The Winner At Singapore Grands Prix? appeared first on Herond Blog. The post F1 Best Drivers All Time – Who Will be The Winner At Singapore Grands Prix? appeared first on Herond Blog.

Under the glowing lights of Marina Bay, the Singapore Grand Prix tests the limits of speed, skill, and endurance. From legends like Ayrton Senna and Michael Schumacher to modern greats Lewis Hamilton and Max Verstappen, each has left an indelible mark on F1 history. As the engines ignite once more, one question remains: among the F1 best drivers all time, who will rise to victory under Singapore’s night sky?

The Legacy of F1 Best Drivers All Time

F1 Best Drivers All Time – Michael Schumacher – The Perfectionist

A name synonymous with dominance, Michael Schumacher redefined what it meant to be a Formula 1 driver. His relentless pursuit of perfection, paired with his technical brilliance, turned Ferrari into an unstoppable force in the early 2000s. Schumacher’s precision on track, mental strength, and work ethic set the gold standard for future generations-a true architect of F1 excellence.

F1 Best Drivers All Time – Lewis Hamilton – The Record-Breaking Champion

With an unmatched combination of speed, strategy, and consistency, Lewis Hamilton has rewritten the F1 record books. From multiple world titles to a record number of pole positions, Hamilton’s legacy is one of resilience and evolution. Beyond his driving, he has also become a global icon – pushing for diversity, sustainability, and purpose beyond the race track.

F1 Best Drivers All Time – Ayrton Senna – The Master of Street Circuits

Few drivers have captured the heart of the sport, like Ayrton Senna. Known for his fearless driving and deep spiritual connection to racing, Senna was unmatched on street circuits, particularly in Monaco, where his skill bordered on poetry. His charisma, passion, and tragic passing turned him into a timeless legend-the embodiment of pure racing spirit.

F1 Best Drivers All Time – Max Verstappen – The New Generation’s Powerhouse

At just the start of his career, Max Verstappen has already proven himself as a generational talent. With raw speed, bold maneuvers, and an unshakable drive to win, Verstappen represents the fierce new era of Formula 1. His dominance in recent seasons signals a future shaped by intensity, innovation, and the relentless hunger of youth.

Why the Singapore Grand Prix Is So Unique

The Marina Bay Circuit – A Race Under the City Lights

The Singapore Grand Prix stands apart as Formula 1’s original night race, set against the dazzling skyline of Marina Bay. The illuminated streets, sharp corners, and narrow racing lines create an atmosphere like no other-a blend of spectacle and intensity that pushes both man and machine to their limits. Racing under the floodlights brings cinematic quality to the competition, making every lap a visual masterpiece.

A True Test of Focus, Endurance, and Strategy

The heat and humidity of Singapore make this one of the most grueling races on the F1 calendar. Drivers endure cockpit temperatures that can soar above 60°C, demanding exceptional stamina and mental clarity. Every turn and braking zone requires precision, while pit strategy and tire management become crucial to survival. The Marina Bay Circuit doesn’t just reward speed – it celebrates resilience, discipline, and tactical brilliance.

Unforgettable Moments and Iconic Victories

Since its debut in 2008, the Singapore Grand Prix has delivered an unforgettable drama – from spectacular crashes to breathtaking overtakes under the lights. Legends like Fernando Alonso, Sebastian Vettel, and Lewis Hamilton have all etched their names into the race’s history with defining performances. Each year, the circuit writes a new story of triumph and tension, making it a crown jewel of the Formula 1 season.

Where to watch Singapore Grand Prix 2025?

Here are five platforms where you can watch the 2025 Singapore Grand Prix – and on Herond, you’ll get an ad-free, immersive experience you’ll remember:

F1 TV Pro / Premium – the official streaming service for all F1 sessions, with onboard cams, team radios, and full replays. Formula 1® – The Official F1® Website+1

ESPN – covers the race in the U.S., includes streaming via the ESPN app. ESPN.com+1

Sky Sports F1 / Sky Go – live coverage in the UK, with streaming via Sky Go for subscribers. Sky Sports+1

beIN SPORTS CONNECT – official broadcaster for Formula 1 in Southeast Asia; streams all Singapore GP sessions. beinsports.com

Herond – watch the Singapore Grand Prix with ads blocked, for a seamless viewing experience.

Prediction: Who Could Win Singapore Grand Prix 2025?

Driver Performance & Current Form As the 2025 Formula 1 season intensifies, driver performance remains the defining factor on Singapore’s challenging street circuit. Max Verstappen continues to demonstrate unmatched consistency and precision under pressure, while Lewis Hamilton shows flashes of his legendary form, determined to reclaim dominance. With Lando Norris and Charles Leclerc closing in, every lap around Marina Bay promises a battle of skill, focus, and endurance.

Qualifying History & Car Strength The Singapore Grand Prix is often won on Saturday. Qualifying performance is critical on this tight, unforgiving track where overtakes are rare. Teams like Red Bull and Ferrari have historically thrived here, thanks to their balance between power and downforce. However, with McLaren and Mercedes showing improved setups this season, the grid could see unexpected twists that redefine Sunday’s strategy.

Expert Prediction & Legacy Based on current momentum, Max Verstappen enters as the favorite – his control, composure, and racecraft continue to set him apart. Yet, the Marina Bay circuit has a history of humbling even the best. Could this be the year a new name rises to challenge Red Bull’s reign? Or will Verstappen carve his place deeper into F1’s legacy and join Singapore’s hall of fame among the sport’s greatest?

Conclusion

From Schumacher’s precision to Senna’s brilliance, Hamilton’s dominance, and Verstappen’s fearless rise, Formula 1 has always been defined by those who push beyond limits. The Singapore Grand Prix is more than just another race – it’s a stage where legends are tested under the heat, lights, and pressure of Marina Bay.

As engines roar and strategy meet endurance, one question lingers in every fan’s mind: who will conquer the night and etch their name into F1 history? Whether a veteran reclaims glory or a new champion emerges, one thing is certain-the pursuit of greatness never stops in Formula 1.

DOWNLOAD HEROND About Herond

Herond Browser is a Web browser that prioritizes users’ privacy by blocking ads and cookie trackers, while offering fast browsing speed and low bandwidth consumption. Herond Browser features two built-in key products:

Herond Shield: an adblock and privacy protection tool; Herond Wallet: a multi-chain, non-custodial social wallet.

Herond aims at becoming the ultimate Web 2.5 solution that sets the ground to further accelerate the growth of Web 3.0, heading towards the future of mass adoption.

Join our Community!

The post F1 Best Drivers All Time – Who Will be The Winner At Singapore Grands Prix? appeared first on Herond Blog.

The post F1 Best Drivers All Time – Who Will be The Winner At Singapore Grands Prix? appeared first on Herond Blog.

Friday, 03. October 2025

Ockam

The Three Circles of SaaS Growth

Why Product, Marketing, and Sales Must Work as One Continue reading on Medium »

Why Product, Marketing, and Sales Must Work as One

Continue reading on Medium »


1Kosmos BlockID

Customer Identity Verification: Overview & How to Do It Right

Key Lessons Customer identity verification is critical for fraud prevention, compliance, and building trust in digital business. Businesses can use layered methods (document verification, biometrics, MFA, and risk scoring) to ensure security without sacrificing user experience. The biggest challenges include synthetic identity fraud, cross-border verification, and balancing compliance with custome
Key Lessons

Customer identity verification is critical for fraud prevention, compliance, and building trust in digital business.

Businesses can use layered methods (document verification, biometrics, MFA, and risk scoring) to ensure security without sacrificing user experience.

The biggest challenges include synthetic identity fraud, cross-border verification, and balancing compliance with customer convenience.

Adopting best practices like multi-layered verification, advanced AI, and risk-based frameworks ensures security while streamlining onboarding.

What Is Customer Identity Verification?

Customer identity verification confirms that customers are who they claim to be, using digital tools and data checks. It involves validating personal details and credentials against official records, documents, or biometric identifiers.

The purpose is simple: stop fraudsters at the gate while giving legitimate customers a seamless, trusted onboarding experience. Verification is no longer optional in a world where synthetic identities can be spun up with a stolen Social Security number and a fake address.
Modern verification systems use artificial intelligence, machine learning, and biometrics to increase accuracy and speed dramatically. Instead of forcing customers to wait days while documents are manually reviewed, businesses can now verify identities in minutes—or even seconds—with confidence levels above 99%.

What Are The Different Types Of Customer Identity Verification?

The main types are document-based, biometric, knowledge-based, database verification, and multi-factor authentication (MFA).

Document-based verification checks the authenticity of passports, driver’s licenses, and other government IDs. Modern systems analyze holograms, fonts, and machine-readable zones (MRZs) to detect forgery attempts. Biometric verification leverages fingerprints, facial recognition, or iris scans. When paired with liveness detection, biometrics are far harder to spoof than traditional credentials. Knowledge-based authentication (KBA) relies on security questions, but with social media oversharing and widespread data breaches, attackers can easily guess or steal these answers. This method is rapidly losing relevance. Database verification cross-checks a customer’s details against government, financial, and sanctions databases to validate legitimacy. MFA strengthens defenses by requiring two or more identity factors: something you know (password), something you have (token), and something you are (biometric).

Each method has strengths and weaknesses, but the most secure strategies don’t pick one; they combine them into a layered, adaptive verification framework.

How Does Customer Identity Verification Work?

Verification breaks down into four stages: data collection, document assessment, identity validation, and risk assessment.

Everything starts with data collection, where customers provide personal details, government-issued IDs, biometrics, and contact information. Once collected, the data moves to document assessment, where AI tools check submitted IDs for authenticity and signs of tampering. This step catches expired, altered, or synthetic documents before they go any further. Next is identity validation, where the information gets cross-referenced against trusted government and financial databases. Biometrics are compared to ID photos, while watchlist screenings flag individuals who could pose regulatory or fraud risks. Last comes risk assessment that generates a trust score based on behavioral anomalies, device intelligence, geolocation data, and known fraud indicators.

What once stretched across days now happens in seconds, allowing organizations to seamlessly onboard good customers while quietly blocking bad actors.

What Are The Challenges To Customer Identity Verification?

Challenges include synthetic fraud, cross-border complexity, balancing user experience with security, advanced attack vectors, and compliance.

Synthetic identity fraud is the fastest-growing financial crime, estimated to reach $23 billion annually by 2030. Attackers stitch together real and fake data to create new “people” that slip past legacy checks. Cross-border verification struggles with inconsistent ID standards, languages, and regulatory frameworks. A passport in Germany won’t have the same features as a driver’s license in Mexico. User experience vs. security is a constant balancing act. Too much friction leads to legitimate users abandoning onboarding, while too little leads to attackers walking right in. Advanced attacks like deepfakes, AI-generated voice phishing, and synthetic biometrics make fraud detection harder than ever. Compliance obligations vary dramatically across sectors. With the General Data Protection Regulation (GDPR) in Europe, the Anti-Money Laundering (AML) rules for banks, and the Health Insurance Portability and Accountability Act (HIPAA) for healthcare, standards and regulations will run the gamut. Businesses must navigate a minefield of global standards.

The reality is that fraudsters innovate faster than regulators. That means businesses need adaptive, technology-driven defenses that evolve continuously.

What Are The Best Practices To Customer Identity Verification?

The best practices boil down to multi-layered checks, AI-driven analysis, risk-based frameworks, data security, and compliance alignment.

Multi-layered verification: Mix documents, biometrics, and databases for solid defense in depth. Advanced AI: Use machine learning models to catch spoofing, deepfakes, and behavioral red flags in real time. Risk-based approaches: Match verification intensity to transaction risk, including tougher checks for wire transfers, lighter touch for low-value stuff. Data protection: Encrypt sensitive data, store it securely, and run regular audits to stay compliant. Or, with blockchain solutions like 1Kosmos, skip centralized data storage entirely and eliminate that major attack vector. Regulatory alignment: Keep up with changing KYC/AML requirements and privacy laws around the world.

Get these right, and you’ll block fraud while making onboarding so quick and smooth that customers actually choose businesses with stronger verification over the competition.

Why Is Customer Identity Verification Important To Businesses?

It prevents fraud, ensures compliance, builds trust, and drives operational efficiency. By verifying users before granting access, businesses can stop account takeovers, impersonation scams, and synthetic identities. But the benefits go beyond just security. Regulatory compliance, from KYC and AML requirements in financial services to HIPAA rules in healthcare, makes verification a must-have for operations.

In an environment where breaches dominate headlines, demonstrating rigorous verification builds confidence with partners and customers alike.

How Should My Business Verify Customer Identities Step By Step?

Businesses should follow a structured six-step implementation framework.

Assess requirements: Figure out your fraud risks, compliance mandates, and customer demographics. Choose methods: Based on your specific risk profile, you can select verification tools such as customer document verification or biometrics. Implement technology: Set up APIs, document scanning, and biometric integrations that scale without messing up your existing systems. Design journeys: Create user-friendly flows that reduce friction without compromising security. Train staff: Make sure employees can escalate suspicious cases, conduct manual reviews, and help customers when needed. Monitor and optimize: Continuously tweak based on fraud detection outcomes, customer drop-off rates, and regulatory changes.

Following this framework ensures verification is both secure and customer-centric.

What Are The Common Customer Identity Verification Methods?

Standard methods include document scanning, facial recognition, fingerprint scans, SMS OTPs, database checks, and MFA.

Some legacy methods are fading. KBA and SMS one-time passcodes, for example, are easily compromised. Attackers can scrape answers from social media or intercept text messages.

By contrast, modern approaches like AI-powered biometrics and blockchain-backed credentials are gaining traction. They’re faster, harder to spoof, and more transparent for users. Forward-looking businesses are already adopting reusable digital identity wallets, allowing customers to authenticate seamlessly across multiple services without re-verifying.

Trust 1Kosmos Verify for Identity Verification

Passwords and outdated MFA create friction for customers, leaving the door open to fraud, account takeovers, and synthetic identities. These obsolete methods slow onboarding, frustrate legitimate users, and fail to deliver the trust today’s digital economy demands.

1Kosmos Customer solves this by replacing weak credentials with a mighty, privacy-first digital identity wallet backed by deterministic identity proofing and public-private key cryptography. In just one quick, customizable registration, legitimate customers are verified with 99%+ accuracy and given secure, frictionless access to services, while fraudsters are stopped at the first attempt. From instant KYC compliance to zero-knowledge proofs that protect sensitive data, the result is a seamless authentication experience that customers love and businesses can rely on.

Ready to eliminate fraud, streamline onboarding, and delight your customers? Discover how 1Kosmos Customer can transform your digital identity strategy today.

The post Customer Identity Verification: Overview & How to Do It Right appeared first on 1Kosmos.


Ocean Protocol

DF157 Completes and DF158 Launches

Predictoor DF157 rewards available. DF158 runs October 2nd — October 9th, 2025 1. Overview Data Farming (DF) is an incentives program initiated by ASI Alliance member, Ocean Protocol. In DF, you can earn OCEAN rewards by making predictions via ASI Predictoor. Data Farming Round 157 (DF157) has completed. DF158 is live, October 2nd. It concludes on October 9th. For this DF round, Predictoo
Predictoor DF157 rewards available. DF158 runs October 2nd — October 9th, 2025 1. Overview

Data Farming (DF) is an incentives program initiated by ASI Alliance member, Ocean Protocol. In DF, you can earn OCEAN rewards by making predictions via ASI Predictoor.

Data Farming Round 157 (DF157) has completed.

DF158 is live, October 2nd. It concludes on October 9th. For this DF round, Predictoor DF has 3,750 OCEAN rewards and 20,000 ROSE rewards.

2. DF structure

The reward structure for DF158 is comprised solely of Predictoor DF rewards.

Predictoor DF: Actively predict crypto prices by submitting a price prediction and staking OCEAN to slash competitors and earn.

3. How to Earn Rewards, and Claim Them

Predictoor DF: To earn: submit accurate predictions via Predictoor Bots and stake OCEAN to slash incorrect Predictoors. To claim OCEAN rewards: run the Predictoor $OCEAN payout script, linked from Predictoor DF user guide in Ocean docs. To claim ROSE rewards: see instructions in Predictoor DF user guide in Ocean docs.

4. Specific Parameters for DF158

Budget. Predictoor DF: 3.75K OCEAN + 20K ROSE

Networks. Predictoor DF applies to activity on Oasis Sapphire. Here is more information about Ocean deployments to networks.

Predictoor DF rewards are calculated as follows:

First, DF Buyer agent purchases Predictoor feeds using OCEAN throughout the week to evenly distribute these rewards. Then, ROSE is distributed at the end of the week to active Predictoors that have been claiming their rewards.

Expect further evolution in DF: adding new streams and budget adjustments among streams.

Updates are always announced at the beginning of a round, if not sooner.

About Ocean, DF and ASI Predictoor

Ocean Protocol was founded to level the playing field for AI and data. Ocean tools enable people to privately & securely publish, exchange, and consume data. Follow Ocean on Twitter or TG, and chat in Discord. Ocean is part of the Artificial Superintelligence Alliance.

In Predictoor, people run AI-powered prediction bots or trading bots on crypto price feeds to earn $. Follow Predictoor on Twitter.

DF157 Completes and DF158 Launches was originally published in Ocean Protocol on Medium, where people are continuing the conversation by highlighting and responding to this story.


Recognito Vision

AI Face Recognition Explained with Benefits and Challenges

Artificial Intelligence is no longer science fiction. From unlocking your phone to passing through airport security, AI face recognition has become part of daily life. It is powerful, practical, and sometimes a little controversial. But how does it actually work, and where is it headed? Let’s break it down in simple terms.   What is...

Artificial Intelligence is no longer science fiction. From unlocking your phone to passing through airport security, AI face recognition has become part of daily life. It is powerful, practical, and sometimes a little controversial. But how does it actually work, and where is it headed? Let’s break it down in simple terms.

 

What is AI Face Recognition

At its core, AI and face recognition is a technology that identifies or verifies a person using their facial features. Think of it as a digital detective. It looks at your face the same way you look at a fingerprint, comparing unique details like the distance between your eyes or the curve of your jaw.

This isn’t just about matching a selfie to your phone. The technology is also applied in banking apps, airports, healthcare, and even retail stores. It is driven by facial AI models trained on massive datasets, allowing systems to quickly learn the differences and similarities between millions of faces.

 

How AI Face Recognition Works

The process might sound complex, but let’s simplify it. The system works in three big steps:

Face Detection AI
The camera identifies that a human face is present. It locates key landmarks such as eyes, nose, and mouth.

Face Encoding
The software converts the face into a unique numerical code. This code is like a fingerprint for your face.

Face Match AI
The system compares this code with stored data to verify identity or find a match.

Step Action Real-Life Example Detection Identifies a face Phone camera sees your face Encoding Converts to unique code Creates a “faceprint” Matching Compares with database Unlocks your device

These steps are powered by artificial intelligence face recognition algorithms that become more accurate over time.

 

Accuracy and Global Benchmarks

Not all systems are created equal. Some are lightning fast with near-perfect accuracy, while others struggle in low light or with diverse facial features. The NIST Face Recognition Vendor Test (FRVT) has become the gold standard for measuring how well different systems perform.

Visit NIST FRVT for performance data.

Explore detailed evaluation results on FRVT 1:1 tests.

These benchmarks give businesses and governments confidence before deploying large-scale projects.

 

Everyday Uses of Facial AI

You may not notice it, but facial AI is everywhere. Here are some real-world applications:

Smartphones: Unlocking devices without passwords.

Airports: Quicker boarding with automated gates.

Healthcare: Patient verification for secure records.

E-commerce: AI face search for trying products virtually.

Banking: Identity checks for fraud prevention.

Fun fact: Some retailers even use AI facial systems to analyze customer demographics and improve shopping experiences.

Privacy Concerns and Regulations

With great power comes great responsibility. While the technology is convenient, it also raises concerns about surveillance and misuse. Governments are stepping in with data protection laws like the GDPR to ensure individuals have control over their biometric data.

Companies using AI face recognition must follow strict compliance rules such as:

Informing users how their data will be used.

Allowing opt-outs where possible.

Storing encrypted biometric data securely.

Failure to follow these rules can lead to massive fines and public backlash.

 

Challenges Facing Face Detection AI

Even with rapid progress, the technology isn’t flawless. Common challenges include:

Bias in datasets: Some systems perform better on certain skin tones.

Spoofing attempts: Photos or videos tricking the system.

Environmental issues: Poor lighting or extreme angles can reduce accuracy.

To tackle spoofing, researchers are exploring liveness detection techniques, making sure the system knows the difference between a real human face and a photo.

The Future of AI and Face Recognition

Looking ahead, experts believe ai and face recognition will only get smarter. Here are a few trends shaping the future:

Edge computing: Processing done on local devices for speed and privacy.

Cross-industry adoption: From gaming to education, new uses are emerging.

Open-source innovation: Platforms like Recognito GitHub encourage collaboration and transparency.

As systems improve, the balance between convenience and privacy will continue to dominate the conversation.

 

Final Thoughts

AI face recognition is changing the way the world verifies identity. It simplifies daily tasks, strengthens security, and opens doors to new possibilities. Yet, it also comes with challenges like privacy risks and the need for unbiased data. With organizations such as NIST setting global benchmarks and strict regulations like GDPR shaping policy, the future looks promising but carefully monitored.

And as innovation keeps moving forward, one name that continues to contribute in this space is Recognito.

 

Frequently Asked Questions

 

1. What is AI face recognition used for

AI face recognition is used for unlocking smartphones, airport security checks, banking identity verification, and even retail experiences like virtual try-ons.

2. How accurate is face detection AI

Accuracy depends on the system. Some advanced tools tested by NIST FRVT report accuracy rates above 99 percent, especially in controlled environments.

3. Can AI face search find someone online

AI face search can match faces within specific databases or platforms, but it cannot scan the entire internet. Accuracy depends on the size and quality of the database.

4. Is AI facial recognition safe to use

Yes, when regulated properly. Systems that follow privacy rules like GDPR and use encryption keep user data protected.

5. What is the difference between face match AI and face detection AI

Face detection AI only spots if a face is present. Face match AI goes further by verifying if the detected face matches an existing one in the database.


uquodo

How AI is Enhancing Sanctions Screening and Adverse Media Monitoring

The post How AI is Enhancing Sanctions Screening and Adverse Media Monitoring appeared first on uqudo.

Thales Group

Production Ramp-Up : Thales's Ground Fire Radar now in continuous series production for the new SAMP/T NG system

Production Ramp-Up : Thales's Ground Fire Radar now in continuous series production for the new SAMP/T NG system prezly Fri, 10/03/2025 - 08:30 Defence France Share options Facebook
Production Ramp-Up : Thales's Ground Fire Radar now in continuous series production for the new SAMP/T NG system prezly Fri, 10/03/2025 - 08:30 Defence France

Share options

Facebook X Whatsapp Linkedin Email URL copied to clipboard 03 Oct 2025 Thales’s Ground Fire air surveillance and air defence radar has been in full series production since the start of 2025, further to successful conclusion of factory acceptance tests (FAT) in the presence of representatives from the French Armament General Directorate (DGA). Intended for the French version of the new franco-italian SAMP/T NG system - the European Medium- and Long-range air defence-based ground system, the Ground Fire is a real game changer with a surveillance range of 400 km and 360° azimuth coverage, and a full 90° elevation coverage. Eight Ground Fire air defence radars will be delivered to French armed forces from 2026 , demonstrating Thales’ capacity to support France and Europe in their airspace protection and sovereignty needs through reliable production. Thales tripled its production of surveillance and air defence radars in 2024 and continues to grow in order to be ready to meet the challenges of protecting the skies.

Ground Fire (c)Thales

These factory acceptance test is the culmination of a long series of tests conducted at Thales' Limours site (Paris region), aimed at ensuring the highest level of performance for the new standalone radar.

Based on fully digital multiple beamforming Active Electronically Scanned Array (AESA) technology in S-band, the Ground Fire radar delivers high performance in the detection, tracking, and classification of numerous targets, even in challenging environments such as mountainous regions and densely crowded airspaces. It offers a unique one-second refresh rate, with a surveillance range of 400 km, 360° azimuth coverage, and a full 90° elevation coverage, capable of detecting drones as well as ballistic missiles, while maintaining the mobility of a tactical radar. The Ground Fire’s 360° full elevation performance detection meets forces’ needs to stay alert on all fronts with a full recognised air picture.

The open architecture of the system facilitates its integration and interoperability with other European systems, enhancing Europe's air defence capabilities. It ensures strategic autonomy and rapid availability. Its design allows for high mobility with reduced encamp / decamp times and compact dimensions, equivalent to an ISO container for transport.

The Ground Fire radar will serve the SAMP/T NG, replacing the Arabel radar in the SAMP/T system already in service to secure the airspace in various European countries. The Ground Fire maximises the performance of the next-generation ASTER 30 missiles, positioning France among the leaders in medium- and long-range air and missile defence.

This programme is supervised by Organisation for Joint Armament Co-operation (OCCAR) for the French Armed Forces Ministry and the DGA. The prime contractor is Eurosam for the overall system, with Thales providing several components, including the fire control unit based on the Ground Fire radar.

“The Ground Fire, designed and produced in Europe, will contribute to a robust European air defence system. ​ We have implemented all the necessary processes to accelerate industrial production, tripling radar production in our factory in Limours from 2022 to 2024 and increasing the robustness of our supply chain and partner eco-system, to ensure swift on-time delivery to contribute to air surveillance and air defence of European nations.,” declared Eric HUBER , Vice-President, Surface Radars at Thales.

About Thales

Thales (Euronext Paris: HO) is a global leader in advanced technologies for the Defence, Aerospace, and Cyber & Digital sectors. Its portfolio of innovative products and services addresses several major challenges: sovereignty, security, sustainability and inclusion.

The Group invests more than €4 billion per year in Research & Development in key areas, particularly for critical environments, such as Artificial Intelligence, cybersecurity, quantum and cloud technologies. Thales has more than 83,000 employees in 68 countries. In 2024, the Group generated sales of €20.6 billion.

View PDF market_segment : Defence ; countries : Europe > France https://thales-group.prezly.com/production-ramp-up--thaless-ground-fire-radar-now-in-continuous-series-production-for-the-new-sampt-ng-system production-ramp-thaless-ground-fire-radar-now-continuous-series-production-new-samp/t-ng-system On Production Ramp-Up : Thales's Ground Fire Radar now in continuous series production for the new SAMP/T NG system

Thursday, 02. October 2025

Holochain

Finding Our Edge: A Strategic Update

Blog

I want to share the Holochain Foundation’s evolving strategic approach to our subsidiary organizations, Holo, and Unyt.

Strategic work always involves paying attention to the match between your efforts, and where the world is ready to receive those efforts. Since our inception there has always been a small group of supporters who have understood the potential and need for the kind of deep p2p infrastructure that we are building, which allows for all kinds of un-intermediated direct interactions and transactions of all types. But at this moment in time we are seeing a new convergence.

As Holochain is maturing significantly, the main-stream world is also maturing into understanding the need for p2p networks and processes. As my colleague Madelynn Martiniere says: “we are meeting the moment and the moment is meeting us.”

And there’s a key domain in which this is happening: the domain of value transfer.  

The Unyt Opportunity

As you know, the foundation created a subsidiary, Unyt, to focus on building HoloFuel, the accounting system for Holo to use for its Hosting platform. But it turns out that the tooling Unyt built has a far broader application than we had initially realized. This is part of the convergence, and also a huge opportunity.

Unyt’s tooling turns out to be what people are calling “payment-rails”: generalized tooling for value tracking, and because it’s built on Holochain, it’s already fully p2p.  This is part of the convergence. There is a huge opportunity for this technology to bring the deep qualitative value that p2p provides: increased transparency, agency, reduced cost, & privacy. And also in huge volumes: when talking about digital payments and transactions you count in the trillions. 

The implications are huge, and they need and deserve the focus of the Foundation and our resources so we can fully develop the opportunity ahead of us.

Interactions with Integrity: Powered by Holochain

Our original mission was to provide the underlying cryptographic fabric to make decentralized computing both easy and real - and ultimately, at a scale that could have a global impact.

That mission remains intact. The evolution we’re sharing today is not only directly connected to our original strategy, and a logical extension of it, but are ones that we believe will - over time - substantially increase the scale of and opportunities for anyone and everyone within the Holochain ecosystem.

When we introduced the idea of Holochain and Holo to the world in December of 2017, our goal was to provide a technology infrastructure that allowed people to own their own data, control their identities, choose how they connect themselves and their applications to the online world, and intrinsic to all of the above, interact and transact directly with each other as producers and consumers of value.

The foundation of the Holochain ecosystem has thus always required establishing a payment system where every transaction is an interaction with integrity: value is supported by productive capacity, validated on local chains (vs. global ledgers) by a unit of accounting - in our case, HoloFuel - and value and supply is grounded by a real-world service with practical value. 

The Holochain Foundation entity charged with developing and delivering the technology infrastructure for this payment system is Unyt Accounting. 

For almost a year now, the team at Unyt has been quietly working hard to develop the payment rails software that will permit users to build and deploy unique currencies (including HoloFuel), allow those currencies to circulate and interact, and ensure the integrity of every transaction. As it turns out, we got more than we bargained for, in the best possible way.

Meaning: in Unyt, we have software that not only enables HoloFuel, but we can see a brilliant way to link into both the blockchain and crypto world, and also the non-crypto world. As Holochain matures, with the application of Unyt technology, we see a major opportunity in the peer-to-peer payments space, and a chance to lead the non-financial transaction space. 

These are, objectively, huge markets, as Unyt products and tools are not only aimed squarely at solving real-world crypto accounting and payment challenges, but will combine to create the infrastructure needed to launch HoloFuel, and additionally address multiple real-world use cases for anyone interested in high-integrity, decentralized, digital interactions.

Given Unyt’s progress, we arrived at a point where it became clear to everyone on our leadership team that it was time to make an important strategic decision about where to best devote our focus, time, and resources. 

Strategic Decisions and Our Path Forward

Here’s where we landed:

When we reorganized Holo Ltd. last year, it was because we wanted to spur growth, and felt having a focus on a commercial application could expand the number of end users. But, it also put us into competition with some of the largest and best-capitalized tech companies on the planet. 

We haven’t gotten enough traction yet for this to be our sole strategy. As part of our ongoing evaluation over the last months, the Holo dev team pursued an exploration of a very different approach - both technical and structural - to deploying Holochain always-on nodes.

Holo is calling it Edge Node, an open-source, OCI-compliant container image that can be run on any device, physical or virtual, to serve as an always-on-node for any hApp .

Today, Edge Node is available on GitHub for technically savvy folks to use. You can run the Docker container image or opt to install via the ISO onto HoloPorts or any other hardware

What’s different about this experiment is that it appeals to a much wider audience - those familiar with running docker containers, rather than the smaller audience who know Nix. And we’re releasing it now, as open-source, and actively seeking immediate feedback from the community on how this might evolve and contribute to Holo’s goals.

Second, it is equally clear we need to accelerate the timeline for Unyt. Unyt’s software underpins the accounting infrastructure necessary to create and launch HoloFuel, and subsequently allow owners of HOT to swap into it. More broadly, the multiple types of connectivity Unyt can foster have enormous potential to influence the size, growth, and overall value of Holochain - it is the substrate of peer-to-peer local currencies, and the foundation for future DePIN alliances. 

This acceleration is already under way - in fact, Unyt has released its first community currency app, Circulo, which is meant for real-world use but also acts as proof-of-concept for the broader Unyt ecosystem.

Third, and finally, the Holochain Foundation will continue to focus on the stability and resilience of the Holochain codebase, prioritize key technical features required for the currency swap execution, and remain at the center of all our entities to ensure cohesion and coordination.

Leadership Transition

As part of the next stage of Holo’s evolution, I want to share an important leadership update.

Mary Camacho, who has served as Executive Director of Holo since 2018, will be stepping down from that role, and I will be stepping in. Mary will continue to support Holo during this transition, particularly in guiding financial and strategic planning. We are deeply grateful for her years of leadership, steady guidance, and dedication to Holo’s vision.

At the same time, we also thank Alastair Ong, who has served as a Director of Holo, for his contributions on the board. We wish him the very best in his next endeavors.

These transitions mark a natural shift in leadership that allows Holo to move forward with renewed focus, alongside ongoing collaboration with Unyt and the wider Holochain ecosystem.

Looking Ahead

From the outset, we knew we were undertaking an extraordinary challenge. In conceiving of and developing Holochain, we set out to compete with some of the largest, best-resourced, and most powerful companies in the world. No part of what we have done, or intend to do, has been easy. 

In many ways Holochain has always been a future-looking technology that users had difficulty fully appreciating and adopting at scale. Now, the world seems to have caught up to us, and is interested in implementing peer-to-peer networks and processes away from centralized structures. 

When we formed Unyt to build the software infrastructure to permit the creation and accounting for HoloFuel, we also caught up to the world: A Major Opportunity Emerges(the volume of digital payments and transactions last year alone are measurable in the trillions).

We’ve spent a long time working to deliver on our commitments to our community, and there is much still to do.

As challenging as it is not to have crossed the finish line yet, it’s exciting to see it appearing on the horizon. We continue to experiment with how to best expand the potential for Holo hosting. And with Unyt, what we’re proposing to do here - if we are successful - is significantly grow the scale, potential, optionality, and value of every aspect of the Holochain ecosystem. 

For those interested, please take the time to watch our most recent livestream, where we talk about this evolution and the opportunities it represents for all of us. 

We have a lot to look forward to, and we look forward to continuing to work closely with our most valuable, and reliable, resource: you, the members of the Holochain community.


Ockam

We’re Starting CWN Collective

A Newsletter for Builders, Marketers, and Thinkers Over the past year, I kept running into the same problem. Whenever I tried to learn something about Tech, Marketing, or Product Building, I found myself ten different sources with AI’ish content. One article would skim the surface, another would drown me in jargon, and yet another would feel more like a sales pitch than real insig
A Newsletter for Builders, Marketers, and Thinkers

Over the past year, I kept running into the same problem.

Whenever I tried to learn something about Tech, Marketing, or Product Building, I found myself ten different sources with AI’ish content. One article would skim the surface, another would drown me in jargon, and yet another would feel more like a sales pitch than real insight.

I realised I wasn’t alone. Many people in our community felt the same — the content was out there, but it was fragmented with little value and inconsistent.

That is when the idea of CWN Collective (ClubWritter New Collective) took shape.

Why This Newsletter Exists

CWN Collective is not just another newsletter. It is meant to be a focused space for anyone who cares about three things:

Tech — the tools and trends that are changing the way we live and work Marketing — We will cover everything from Positioning to distribution Product Building — the lessons, stories, and failures that go into making something useful

Now, a fair question is

why even start a newsletter when AI exists?

Today, you can ask ChatGPT or any AI tool and get an instant answer. But what AI cannot replace is curation, context, and consistency.

A newsletter gives you something AI does not — a trusted voice that filters the noise, human analytical ability, and presents it in a way that fits a community’s shared interests. Instead of generic post every week, you get a thoughtful package delivered to you, built with care and perspective.

The goal is not to compete with AI but to add the human layer — to combine insights, lived experiences, and patterns that AI alone cannot fully capture.

The aim of CWN Collective is simple: to give you clarity every week — insights you can actually use, in a language that makes sense.

Why We Start with 10

Every community has its own symbols. For us, the number 10 carries meaning. It is about discipline, rhythm, and setting a foundation.

So instead of simply sending one email and calling it a launch, we are beginning with a 10-day special series.

Starting tomorrow, you will receive a newsletter every single day for 10 days. Think of it as an intensive — a way to get into the flow together.

After these 10 days, CWN Collective will settle into its long-term format: one newsletter every week, 4 editions a month.

What You Will Take Away

If you subscribe, here is what you can expect to gain:

A way to stay updated on Tech without chasing 20 different sources Marketing strategies broken down into practical steps, not theory Real stories of product building — both successes and mistakes — that can inform your own work

It is not about reading for the sake of it. It is about getting value that you can carry into your own projects, startups, or careers.

Built With the Community

I don’t want CWN Collective to be a solo effort. I want it to grow with voices from within the community.

If you enjoy writing and have something to share on Tech, Marketing, or Product Building, I would love for you to contribute. You can reach me at pr.clubwritter@gmail.com.

We are also open to sponsorships from people and brands that align with what we are building. We are not chasing revenue, it is for partnering with those who want to support value-driven content.

Join Us From Day One

Tomorrow is the beginning. The first issue will land in inboxes, and from there, the 10-day launch series will unfold.

If you haven’t subscribed yet, this is the moment. Being part of CWN Collective from the start means you will see it grow, shape its voice, and maybe even contribute to it yourself.

This is not just a newsletter. It is an experiment in building something consistent and meaningful — for all of us who are passionate about Tech, Marketing, and Product Building.

Subscribe today and be part of CWN Collective from day one.

📬Upgrade Your Inbox with Exclusive Content!


Elliptic

How blockchain technology can supercharge your investigative case

Crypto assets can seem intimidating to investigators encountering it for the first time in one of their cases. The perception that crypto provides criminals with anonymity and protection from law enforcement has led to assumptions that these cases require specialized technical expertise and skills that differ significantly from traditional financial investigations.

Crypto assets can seem intimidating to investigators encountering it for the first time in one of their cases. The perception that crypto provides criminals with anonymity and protection from law enforcement has led to assumptions that these cases require specialized technical expertise and skills that differ significantly from traditional financial investigations.


Thales Group

Thales Alenia Space and ESA sign contract for SAGA mission to demonstrate Europe’s first Quantum Key Distribution governmental service

Thales Alenia Space and ESA sign contract for SAGA mission to demonstrate Europe’s first Quantum Key Distribution governmental service tas Thu, 10/02/2025 - 15:40 Space Share options Facebook
Thales Alenia Space and ESA sign contract for SAGA mission to demonstrate Europe’s first Quantum Key Distribution governmental service tas Thu, 10/02/2025 - 15:40 Space

Share options

Facebook X Whatsapp Linkedin Email URL copied to clipboard 01 Oct 2025

 

Thales Alenia Space will develop Europe’s first space-based system for generating secure cryptographic keys to protect the European Union’s future communications. ESA’s SAGA project aims to deploy quantum technologies in space to ensure resilient communications in order to face emerging quantum threats. Leveraging its expertise and recent advancement on Quantum space-based projects, Thales Alenia Space will contribute to Europe’s technological sovereignty in secure connectivity, supporting the deployment of the European Quantum Communications Infrastructure (EuroQCI).

 

Brussels, October 1, 2025 – Thales Alenia Space, a joint venture between Thales (67%) and Leonardo (33%), has signed a contract with the European Space Agency (ESA) concerning SAGA (Secure And cryptoGrAphic) mission. The contract covers the system definition and preliminary design of a fully European end-to-end Quantum Key Distribution (QKD) system for governmental use.

ESA’s SAGA Mission, first introduced during the 2019 edition of ESA’s Ministerial Council Conference and the refined in 2022, has been developed in close collaboration with the European Commission as the space-based element of the EuroQCI initiative. Progress on the EuroQCI implementation continues, with the European Commission’s upcoming Union Secure Connectivity program regulation to oversee its operational rollout.

The project is supported by multiple space agencies, including the Italian Space Agency (ASI), the German Aerospace Center (DLR), the Austrian Space Agency (ASA), the Spanish Space Agency (AEE), the Netherlands Space Office (NSO), the French space agency (CNES), as well as the Swiss Space Agency (SSO). Additional agencies are expected to join as the mission advances, expanding its objectives. The mission is funded under ESA’s Advanced Research in Telecommunications Systems (ARTES), part of the Directorate of Connectivity and Secure Communications.

SAGA © ESA

“With SAGA, our aim is to ambitiously advance satellite communications, furthering Europe’s digital sovereignty, cybersecurity and industrial competitiveness in the quantum era. We are delighted to strengthen our partnership with Thales Alenia Space, which puts our Member States at the forefront of the race for truly secure connectivity,” said Laurent Jaffart, Director of ESA’s Connectivity and Secure Communications.

“I am very pleased that Thales Alenia Space will contribute to strengthening Europe’s technological independence by advancing optical and quantum technologies,” said Thales Alenia Space CEO, Hervé Derrey. “By leveraging its longstanding expertise in secure space communications and cutting-edge quantum technologies, Thales Alenia Space is proud to collaborate with ESA and multiple European space agencies for a secure and resilient connectivity infrastructure that will benefit governments and citizens alike, paving the way for the future of commercial optical communications both in Europe and worldwide.”

© ESA

The contract signature took place during the 2025 Quantum Europe Conference, which brought together policymakers, industry leaders, national authorities, and experts from civil society to discuss ways to enhance Europe’s already vibrant quantum technology ecosystem and cement its position as a global leader in quantum innovation and excellence.

 

Thales Alenia Space’s role in SAGA project

Thales Alenia Space, with its extensive experience in secure space communications and expertise in quantum and optical telecommunications systems, has been coordinating the previous phases of the SAGA Mission since 2020, starting with SAGA Phase A and continuing to the present day.

SAGA mission aims to demonstrate a Quantum Key Distribution (QKD) service that will enable secure QKD provision via a Space Segment consisting of a single Low Earth Orbit (LEO) QKD satellite; an Access Segment made up of four SpaceQCI Access Nodes strategically distributed across Europe; and a Control Segment responsible for system operation and its integration with the terrestrial EuroQCI infrastructure.

SAGA plays a pivotal role within the overall EuroQCI development roadmap, targeting the readiness of SpaceQCI, preparing ESA and its industrial partners for EuroQCI developments under the EU Secure Connectivity regulation, and laying the groundwork for the future certification of SpaceQCI.

Thales Alenia Space in Italy leads a highly skilled consortium that includes leading industries, SMEs, universities, and research centers, bringing together Europe’s top competencies in the design and development of satellite systems, QKD technologies, and security solutions. Thales Alenia Space in France is in charge of SAGA Access Segment, including SpaceQCI Access Nodes and their specific subsystems, while Thales Alenia Space in Switzerland is responsible for the design, development and qualification of the Optical Space Terminal.

 

Paving the way to quantum space-based communications projects

Since 2018, Thales Alenia Space has been pursuing an ambitious roadmap, establishing itself a key player in the quantum communications field. The company is leveraging its expertise in satellite telecommunication systems, optical terminals and over 25+ years of quantum technology experience within Thales to develop a fully integrated approach spanning both the space and ground segments of quantum communications systems.

The challenge for quantum communications is to prepare the Quantum Information Networks that will connect quantum computers and quantum sensors to endow them with increased performance, resilience, accessibility. In parallel, new ways to secure communications will be available.

Space takes this ambition one step further: satellites allow quantum signals to travel over vast distances, overcoming the limits of fiber-optic networks and making global-scale quantum communication possible.

In addition to SAGA, Thales Alenia Space is in charge of several groundbreaking projects including:

QKD-GEO, the world’s first quantum key distribution system from geostationary orbit. This initiative will allow secure intercontinental communications and help shape Europe’s role in the future quantum internet. QINSAT, a mission developed to demonstrate space-based quantum information networks. TeQuants, developing satellite technologies for quantum communication links.

The company is also taking part to EuroQCI and its many projects (FranceQCI, Quantum Italy Deployment, Nostradamus, Petrus, etc..,), contributing to Europe’s future quantum communication infrastructure, including its space segment.
 

About Thales Alenia Space

Drawing on over 40 years of experience and a unique combination of skills, expertise and cultures, Thales Alenia Space delivers cost-effective solutions for telecommunications, navigation, Earth observation, environmental monitoring, exploration, science and orbital infrastructures. Governments and private industry alike count on Thales Alenia Space to design satellite-based systems that provide anytime, anywhere connections and positioning, monitor our planet, enhance management of its resources and explore our Solar System and beyond. Thales Alenia Space sees space as a new horizon, helping build a better, more sustainable life on Earth. A joint venture between Thales (67%) and Leonardo (33%), Thales Alenia Space also teams up with Telespazio to form the Space Alliance, which offers a complete range of solutions including services. Thales Alenia Space posted consolidated revenues of €2.23 billion in 2024 and has more than 8,100 employees in 7 countries with 14 sites in Europe. www.thalesaleniaspace.com

View PDF market_segment : Space thales-alenia-space-and-esa-sign-contract-saga-mission-demonstrate-europes-first-quantum-key On

Thales consolidates its status as a world leader in anti-submarine warfare with its 100th CAPTAS sonar order

Thales consolidates its status as a world leader in anti-submarine warfare with its 100th CAPTAS sonar order prezly Thu, 10/02/2025 - 08:00 Defence France Share options Facebook
Thales consolidates its status as a world leader in anti-submarine warfare with its 100th CAPTAS sonar order prezly Thu, 10/02/2025 - 08:00 Defence France

Share options

Facebook X Whatsapp Linkedin Email URL copied to clipboard 02 Oct 2025 Thales celebrates the order of its 100th CAPTAS variable immersion towed sonar system, a significant milestone in naval defence. Thales consolidates its status as a world leader in anti-submarine warfare (ASW) solutions. The CAPTAS range equips a wide spectrum of ships: from platforms under 1000 tons to frigate and destroyer-type vessels, 17 different platforms are equipped with Thales variable immersion sonar. The result of more than 30 years of continuous innovation, and originally developed in close partnership with the British, French and Italian navies, the CAPTAS system is now being tested at sea by 17 navies around the world.

CAPTAS 4 © Thales

Thales celebrates today the order of its 100th CAPTAS (Combined Active-Passive Towed Array Sonar) sonar system, marking a symbolic step in the history of anti-submarine warfare (ASW), illustrating the renewed confidence of navies in Thales technologies around the world.

The CAPTAS sonar, developed by Thales, is a reference in towed variable immersion (VDS) solution, with unrivalled performance in underwater detection, even in the most demanding acoustic environments. This capability allows navies to detect threats with sufficient advance notice in order to maintain tactical advantage under the seas.

The CAPTAS system is an essential standard for navies wishing to remain up to the most advanced naval forces. It offers full-spectrum ASW capability, long-range 360° detection, and seamless integration on any type of surface vessel, regardless of platform constraints.

Reference solution for NATO navies, the CAPTAS system embodies flexibility and joint cooperation. Thanks to artificial intelligence, Thales strengthens the collaboration between forces, and the multi-sensor evaluation of the global underwater situation.

Thales is also committed to continuous improvement focused on sailors with numerous exchanges of experience and the integration of operational feedback. This model allows the system to remain at the forefront of innovation, while ensuring an exceptional level of maturity and reliability.

"As a result of long-standing cooperation with more than 50 navies worldwide, our deep understanding of their needs makes the CAPTAS system an essential choice for current and future anti-submarine missions." said Sébastien Guérémy, Vice-President in charge of underwater warfare activities at Thales.

About Thales

Thales (Euronext Paris: HO) is a global leader in advanced technologies for the Defence, Aerospace, and Cyber & Digital sectors. Its portfolio of innovative products and services addresses several major challenges: sovereignty, security, sustainability and inclusion.

The Group invests more than €4 billion per year in Research & Development in key areas, particularly for critical environments, such as Artificial Intelligence, cybersecurity, quantum and cloud technologies. Thales has more than 83,000 employees in 68 countries. In 2024, the Group generated sales of €20.6 billion.

View PDF market_segment : Defence ; countries : Europe > France https://thales-group.prezly.com/thales-consolidates-its-status-as-a-world-leader-in-anti-submarine-warfare-by-delivering-its-100th-captas-sonar thales-consolidates-its-status-world-leader-anti-submarine-warfare-its-100th-captas-sonar-order On Thales consolidates its status as a world leader in anti-submarine warfare with its 100th CAPTAS sonar order

auth0

Identity That Helps You Sell: Introducing Auth0 for B2B Enhancements

Auth0 for B2B Enhancements accelerates onboarding and streamlines identity management with self-service onboarding workflows, Group Provisioning with SCIM, Universal Logout, and more.
Auth0 for B2B Enhancements accelerates onboarding and streamlines identity management with self-service onboarding workflows, Group Provisioning with SCIM, Universal Logout, and more.

Wednesday, 01. October 2025

liminal (was OWI)

Third-Party Fraud: The Hidden Threat to Business Continuity

Last week marked our sixth Demo Day, this one focused on Fighting Third-Party Fraud. Ten vendors stepped up to show how their solutions tackle account takeover (ATO), business email compromise (BEC), and synthetic identity fraud. Each had 15 minutes to prove their case, followed by a live Q&A with an audience of fraud, risk, and […] The post Third-Party Fraud: The Hidden Threat to Business C

Last week marked our sixth Demo Day, this one focused on Fighting Third-Party Fraud. Ten vendors stepped up to show how their solutions tackle account takeover (ATO), business email compromise (BEC), and synthetic identity fraud. Each had 15 minutes to prove their case, followed by a live Q&A with an audience of fraud, risk, and security leaders.

Across the sessions, a consistent theme emerged: the biggest shift in the fraud prevention market isn’t in the tactics fraudsters use, but how enterprises are buying solutions. Detection is expected; what matters now is whether a tool can keep the business running without stalling growth or turning away good customers. Buyers want assurance that fraud prevention supports stability by keeping customers moving, revenue intact, and trust unbroken when fraud inevitably spikes.

What is third-party fraud?

For readers outside the space, third-party fraud happens when criminals exploit someone else’s identity to gain access. Unlike first-party fraud, where the individual misrepresents themselves, third-party fraud relies on stolen or fabricated credentials to impersonate a trusted user.

Classic examples include:

Account takeover (ATO): hijacking legitimate accounts, often through phishing or stolen credentials Business email compromise (BEC): impersonating executives or vendors to redirect payments Synthetic identity fraud: blending real and fake data to create convincing personas

In 2024, consumers reported losing $12.5 billion to fraud, a 25% jump year-over-year and the highest on record. Account takeover attacks alone rose nearly 67% in the past two years as fraudsters leaned on phishing, social engineering, and increasingly AI-driven methods.

As Miguel Navarro, Head of Applied Emerging Technologies at KeyBank, put it: “Think about deepfakes like carbon monoxide — you may think you can detect it, but honestly, it’s untraceable without tools.” That risk is no longer theoretical; it’s already showing up in contact centers and HR pipelines.

Walking the friction tightrope

Every fraud solution has to walk a tightrope: protect the business without slowing customers down. In this Demo Day, that balance was explored in the Q&A, with audience questions focusing on onboarding delays, false positives, and manual review trade-offs. What happens when onboarding drags? How are false positives handled? Where do manual reviews fit?

Miguel also added:“…a tool might be a thousand times more effective, but if it’s too complex for teams to adopt, it’s effectively useless.”

Providers responded with different approaches. Several leaned on behavioral and device-based analytics to make authentication seamless, layering signals like keystroke patterns and device intelligence so genuine users pass in the background. Others showed risk-based orchestration, combining machine learning models and workflows so only high-risk activity triggers extra checks.

Protecting customers from themselves

One theme that stood out was how solutions are evolving to address social engineering. As Mzu Rusi, VP of Product Development at Entersekt, explained: “It’s not enough to protect customers from outsiders — sometimes we have to protect them from themselves when they’re being socially engineered to approve fraud.”

That means fraud platforms are no longer judged only on blocking malicious logins. They’re also expected to intervene in context, analyzing signals like whether the user is on a call while approving a transfer, or whether a new recipient account shows signs of mule activity.

Human touch as a deterrent

Technology was the backbone of every demo, but Proof emphasized how human interaction remains a powerful fraud defense. Lauren Furey, Principal Product Manager, shared how stepping up to a live identity verification can shut down takeover attempts while preserving trust: “The deterrence of getting a fraudster in front of a human with these tools is enormous. Strong proofing doesn’t have to feel heavy, and customers leave reassured rather than abandoned.”

This balance — minimal friction for real customers, targeted intervention for fraudsters — ran through the day.

From fraud loss to balance sheet risk

Fraud was reframed as a balance sheet problem, not just a technology one. As Sunil Madhu, CEO & Founder of Instnt, put it: “Fraud is inevitable. Fraud loss is not. For the first time, businesses can transfer that risk off their balance sheet through fraud loss insurance.”

That comment landed because it spoke to CFO and board-level concerns. Fraud is no longer just an operational hit; it’s a financial exposure that can be shifted, managed, and priced. But shifting fraud into financial terms doesn’t reduce the pressure on prevention teams — it only raises the bar for the technology that keeps fraud within acceptable limits.

How detection is evolving

On stage, several demos highlighted identity and device scoring as the new baseline, layering biometrics, transaction history, and tokenization to judge risk in milliseconds. Others pushed detection even earlier in the journey, using pre-submit screening to catch bad actors before they hit submit.

Machine learning also played a central role in the demos. Several providers showed how adaptive models can cut down false positives while continuously improving through feedback loops. Phil Gordon, Head of Solution Consulting at Callsign, described it as creating a kind of “digital DNA”: “Every customer develops a digital DNA — how they type, swipe, or move through a session. That lets us tell genuine users apart from bots, malware, or account takeover attempts in milliseconds.”

That theme carried into the fight against synthetic identities. Alex Tonello, SVP Global Partnerships at Trustfull, explained how fraudsters engineer personas to slip through traditional checks: “Synthetic fraudsters build identities with new emails, new phone numbers, no history. By checking hundreds of open-source signals at scale, we see right through that façade.”

Others extended the conversation to fraud at the network level. Artem Popov, Solutions Engineer at Sumsub, noted: “Fraudsters reuse documents, devices, and identities across hundreds of attempts. By linking those together, you expose entire networks — not just single bad actors.”

The boardroom shift

Fraud used to be a line item in operations, managed quietly by fraud prevention teams and written off as the cost of doing business. That’s no longer the case. The scale of losses, reputational damage, and operational disruption means fraud has moved up the agenda and onto boardrooms.

Executives now face a harder challenge: choosing tools that don’t just stop fraud, but that protect business continuity. They want proof that investments in prevention will keep revenue flowing when attacks spike, not just reduce fraud losses on a spreadsheet. Boards are asking whether controls are strong enough to protect customer trust, whether onboarding processes can scale without breaking, and whether the business can keep moving if a wave of account takeovers hits overnight.

They are right to pay attention. Fraud and continuity now rank among the top five enterprise risks. Technology shifts like Apple and Google restricting access to device data are making established defenses less reliable, reframing fraud not only as a security issue but as a continuity problem.

Watch the Recording

Did you miss our Third-Party Fraud Demo Day? You can still catch the full replay of vendor demos and expert insights:
Watch the Third-Party Fraud Demo Day recording here

Key Takeaways Liminal’s sixth Demo Day spotlighted 10 vendors tackling third-party fraud. Global fraud losses are nearing $1 trillion annually, with ATO alone costing banks $6,000–$13,000 per incident. Audience Q&A revealed that the hardest problems are manual reviews, onboarding delays, and false positives. Leading vendors balance speed, scale, and user experience, reducing both fraud losses and abandonment. Fraud prevention has shifted from a back-office function to a board-level resilience strategy.

The post Third-Party Fraud: The Hidden Threat to Business Continuity appeared first on Liminal.co.


HYPR

Announcing the HYPR Help Desk Application: Turn Your Biggest Risk into Your Strongest Defense

The call comes in at 4:55 PM on a Friday. It’s the CFO, and she’s frantic. She’s locked out of her account, needs to approve payroll, and her flight is boarding in ten minutes. She can’t remember the name of her first pet, and the code sent to her phone isn’t working. The pressure is immense. What does your help desk agent do? Do they bypass security to help the executive, or do they ho

The call comes in at 4:55 PM on a Friday. It’s the CFO, and she’s frantic. She’s locked out of her account, needs to approve payroll, and her flight is boarding in ten minutes. She can’t remember the name of her first pet, and the code sent to her phone isn’t working. The pressure is immense. What does your help desk agent do? Do they bypass security to help the executive, or do they hold the line, potentially disrupting a critical business function?

This isn’t a hypothetical scenario; it's a daily, high-stakes gamble for support teams everywhere. And it’s a gamble that attackers are counting on. They know your help desk is staffed by humans who are measured on their ability to resolve problems quickly. They exploit this pressure, turning your most helpful employees into unwitting accomplices in major security breaches. It's time to stop gambling.

Why Is Your Help Desk a Prime Target for Social Engineering?

The modern IT help desk is the enterprise's nerve center. It’s also its most vulnerable entry point. According to industry research, over 40% of all help desk tickets are for password resets and account lockouts (Gartner), each costing up to $70 to resolve (Forrester). This makes the help desk an incredibly attractive and cost-effective target for attackers.

Why? Because social engineers don't hack systems; they hack people. They thrive in environments where security relies on outdated, easily compromised data points:

Knowledge-Based Questions (KBA): The name of your first pet or the street you grew up on isn't a secret. It's public information, easily found on social media or purchased for pennies on the dark web. SMS & Email OTPs: Once considered secure, one-time passcodes are now routinely intercepted via SIM swapping attacks and sophisticated phishing campaigns. Employee ID Numbers & Manager Names: This information is often exposed in data breaches and is useless for proving real-time identity.

Relying on this phishable data forces your agents to become human lie detectors, a role they were never trained for and a battle they are destined to lose. The result is a massive, unmitigated risk of help desk-driven account takeover.

Shifting from Guesswork to Certainty with HYPR's Help Desk App

Today, we're fundamentally changing this dynamic. To secure the help desk, you must move beyond verifying what someone knows and instead verify who someone is. That's why we're proud to introduce the HYPR Affirm Help Desk Application.

This purpose-built application empowers agents by integrating phishing-resistant, multi-factor identity verification directly into their workflow. Instead of asking agents to make high-pressure judgment calls, we give them the tools to verify identity with NIST IAL 2 assurance fast. This transforms your help desk from a primary target into a powerful line of defense against fraud.

How Can You Unify Identity Verification for Every Help Desk Scenario?

The core of the solution is the HYPR Affirm Help Desk App, a command center for agents that integrates seamlessly with your existing support portals (like ServiceNow or Zendesk) and ticketing systems. This provides multiple, flexible paths to resolution, ensuring security and speed no matter how an interaction begins.

Initiate Verification from Anywhere: Self-Service: Empower users to resolve their own issues by launching a secure verification flow directly from your company's support portal. Agent-Assisted: For live calls or chats, an agent can use the HYPR Help Desk App to instantly send a secure, one-time verification link via email or SMS. User-Initiated (with PIN): A user can start the verification process on their own and receive a unique PIN. They provide this PIN to a support agent, who uses it to look up the verified session, ensuring a fast and secure handoff without sharing any PII. Verify with Biometric Certainty:
The user is guided to scan their government-issued photo ID with their device's camera, followed by a quick, certified liveness-detecting selfie. This isn't just a photo match; the liveness check actively prevents spoofing and deepfake attacks, proving with certainty that the legitimate user is physically present and in control of their ID. Resolve with an Immutable Audit Trail:
Once verification is complete, the result is instantly reflected in the agent's Help Desk App. The agent can now confidently proceed with the sensitive task – whether it's a password reset, MFA device recovery, or access escalation. Every step is logged, creating a tamper-proof, auditable record that satisfies the strictest compliance and governance requirements. HYPR vs. Legacy Methods: A New Reality for Help Desk Security

The gap between traditional methods and modern identity assurance is staggering. One relies on luck, the other on proof.

End the Gamble: Stop Account Takeover at the Help Desk

Your organization can't afford to keep rolling the dice. Every interaction at your help desk is a potential entry point for a catastrophic breach. The pressure on your agents is immense, the methods they've been given are broken, and the attackers are relentless.

But there is a different path. A path where certainty replaces guesswork. Where your support team is empowered, not exposed. Where your help desk transforms from a cost center and a risk vector into a secure, efficient enabler of the business. By removing the impossible burden of being human lie detectors, you free your agents to do what they do best: help people. Securely. 

Ready to secure your biggest point of contact? Schedule your personalized HYPR Affirm demo today.

Frequently Asked Questions about HYPR Affirm’s Help Desk App (FAQ)

Q. What is NIST IAL 2 and why is it important for help desk verification?
A: NIST Identity Assurance Level 2 (IAL 2) is a standard from the U.S. National Institute of Standards and Technology. It requires high-confidence identity proofing, including the verification of a government-issued photo ID. For help desk scenarios, meeting this standard ensures you are protected against sophisticated attacks, including deepfakes and social engineering, and is crucial for preventing fraud.

Q. How long does the verification process actually take for the user?
A: The entire user-facing process, from receiving the link to scanning an ID and taking a selfie, is designed for speed and simplicity. A typical full verification is completed in under 2 minutes, and the process is completely configurable.

Q. What happens if a user doesn't have their physical ID available?
A: HYPR Affirm's policy engine is fully configurable. While ID-based verification is the most secure method, organizations can define alternative escalation paths and workflows to securely handle exceptions based on their specific risk tolerance and needs.

Q. Is this solution just for large enterprises?
A: HYPR Affirm for Help Desk is for any organization that needs to eliminate the significant risk of account takeover fraud originating from support interactions. It scales from mid-sized companies to the world's largest enterprises, securing sensitive tasks like password resets, MFA recovery, and access escalations.


Elliptic

Elliptic’s Typologies Report: Innovating to fight financial crime in an age of rapid change

Since October 2018, Elliptic’s annual Typologies Report has served as an essential resource providing compliance professionals, law enforcement investigators, and regulators with detailed, actionable insights about financial crime in cryptoassets - serving as a trusted “how-to” guide for combatting illicit activity on the blockchain. 

Since October 2018, Elliptic’s annual Typologies Report has served as an essential resource providing compliance professionals, law enforcement investigators, and regulators with detailed, actionable insights about financial crime in cryptoassets - serving as a trusted “how-to” guide for combatting illicit activity on the blockchain. 


Thales Group

Smart Multi SIM brings digital eSIM experience to the Philippine mass market with Thales

Smart Multi SIM brings digital eSIM experience to the Philippine mass market with Thales prezly Wed, 10/01/2025 - 11:18 Enterprise Philippines Mobile communications Share options Facebook
Smart Multi SIM brings digital eSIM experience to the Philippine mass market with Thales prezly Wed, 10/01/2025 - 11:18 Enterprise Philippines Mobile communications

Share options

Facebook X Whatsapp Linkedin Email URL copied to clipboard 01 Oct 2025

Smart Communications, the wireless arm of PLDT, has partnered with global technology leader Thales, to launch the Smart Prepaid and TNT Multi SIM solution — a pioneering innovation that provides eSIM functionality to non-eSIM capable handsets.

Smart was first to offer prepaid eSIM in the Philippines, bringing the digital eSIM technology to the market with eSIM-compatible phones. With the Smart Prepaid and TNT Multi SIMs, Smart continues to extend digital inclusion to the Filipino mass market where most users do not have eSIM-compatible phones. This marks a first-of-its-kind deployment in the Philippines, reinforcing Smart’s position as a pioneer in delivering digital customer experience and demonstrating Thales’ leading expertise in providing eSIM functionalities to any mobile devices.

The Multi SIM works like any other SIM card and comes with its own mobile number, allowing the users to connect instantly to Smart network upon activation. The Smart Multi SIM experience is simple and seamless: users insert the Multi SIM card into their non-eSIM Android phone (Android 9 and later), download the Smart Multi SIM app from the Google Play Store, and start adding eSIM profiles, be it any local or international eSIMs, empowering the users with flexibility and convenience.

Smart is proud to be the first in the country to enable a digital eSIM experience for the broader market of non-eSIM smartphones. This is a leap forward in convenience and connectivity for our customers, particularly overseas workers, travelers, and users with multi-line needs,” said Lloyd Manaloto, Smart Communications’ First Vice President for Corporate Marketing & Strategy.
This launch deepens our long-standing collaboration with Smart. By enabling eSIM services on non-eSIM phones, we are democratizing access to flexible mobile connectivity. With this innovation, subscribers will enjoy eSIM exploration without having an eSIM-capable handset, they just need a new powerful SIM – The Smart Multi SIM,” said Jon CAHILIG, Head of Sales for Mobile Connectivity Solutions for Asia, Thales.

Available in Smart stores, Smart Online Store, and Smart’s official stores on Ecommerce platforms from August 2025, subscribers can choose between Smart Prepaid Multi SIM or TNT eSIM-dot. Download the Smart Multi SIM App from Google Play Store to check your device compatibility and buy a Multi SIM to enjoy the digital eSIM experience on your non-eSIM phones.

About Thales

Thales (Euronext Paris: HO) is a global leader in advanced technologies for the Defence, Aerospace, and Cyber & Digital sectors. Its portfolio of innovative products and services addresses several major challenges: sovereignty, security, sustainability and inclusion.

The Group invests more than €4 billion per year in Research & Development in key areas, particularly for critical environments, such as Artificial Intelligence, cybersecurity, quantum and cloud technologies. Thales has more than 83,000 employees in 68 countries. In 2024, the Group generated sales of €20.6 billion.

View PDF market_segment : Enterprise > Mobile communications | Consumer electronics ; countries : Asia-Pacific > Philippines https://thales-group.prezly.com/smart-multi-sim-brings-digital-esim-experience-to-the-philippine-mass-market-with-thales smart-multi-sim-brings-digital-esim-experience-philippine-mass-market-thales On Smart Multi SIM brings digital eSIM experience to the Philippine mass market with Thales

Dark Matter Labs

Many-to-Many: The Messy, Meta-Process of Prototyping on Ourselves

Welcome back to our ongoing reflections on the Many-to-Many project. In our last three posts, we’ve taken you through the journey of building our digital platform — from initial concepts and wrestling with complexity to creating our first tangible outputs like the Field Guide and Website. We’ve shared how the project’s tools have emerged from a living, iterative process. Today, we’re taking a ste

Welcome back to our ongoing reflections on the Many-to-Many project. In our last three posts, we’ve taken you through the journey of building our digital platform — from initial concepts and wrestling with complexity to creating our first tangible outputs like the Field Guide and Website. We’ve shared how the project’s tools have emerged from a living, iterative process.

Today, we’re taking a step back to look at the foundational methodology behind this entire initiative. How do you go about creating new models for collaboration when no blueprint exists? Our approach has been a “proof of possibility” — a live experiment where we, along with our ecosystem of partners, served as the primary test subjects.

In this post, the initiative’s co-stewards, Michelle and Annette, discuss the profound challenges and unique learnings that come from trying to build the plane while flying it.

How the Proof of Possibility fits within a wider context of predecessor work, and flows into other initiatives and partial testing in live contexts

Michelle: We wanted to reflect on the “proof of possibility” we ran, where we essentially decided to live prototype on ourselves with a small group of partners in a Learning Network. While it sounds simple, we learned it’s incredibly complex. You’re making decisions and sense-making within a specific prototype, but you’re also constantly trying to translate those learnings into something more generalised and applicable for others. In many ways, it’s a cool, experimental way of working, but it was also a bit of a nightmare.

The prototype, test, learn loop that we started to develop in the Proof of Possibility

Annette: It was very meta. In this proof of possibility, one of the things we were testing was a learning infrastructure for the ecosystem itself. So you’re testing learning within the experiment, while also prototyping the experiment, and then you have to step back and ask: what did we learn from this specific context versus what is context-agnostic and applicable elsewhere? Then there’s another layer: what did we learn about the wider external landscape and its readiness for this work? And finally, what did we learn about the process of learning about all of that? There’s this feeling of learning about learning about learning.

It’s representative of the fractal nature of this work. For instance, we were a core team working on our own governance while simultaneously orchestrating and supporting the ecosystem’s governance. The ecosystem itself was then focused on building capabilities of the system for many-to-many governance. It was navigating so many layers. On one hand, this has immense value because you’re looking at one question from multiple angles at once. On the other hand, it has been incredibly cognitively challenging.

Michelle: It’s that old adage of trying to build the plane whilst flying it — except there are no blueprints for the plane. I think the complexity we bumped into is probably present for anyone trying to do this kind of work, because everyone has to work at fractals all the time. So I was thinking, what are some things we bumped into, and how did we overcome them? The first breakthrough that comes to my mind was when we started to explicitly ask, “Are we talking about this specific prototype right now, or are we talking about the generalised model?” Just having that clear distinction, a shared vocabulary that the whole learning network could use, was a huge moment of alignment for us. It gave people a way to see we were working on at least two layers at the same time.

The draft “Layers of the Project” which was created during the project as a visual representation and description of the different spaces we were trying to hold and build all at once. We note that the thinking has evolved and this image has been superseded, but share it here as a point in time image.

Annette: Yes and we found that the difference in thinking required for each of those layers was huge. Thinking through the specifics of what we did in one context versus pulling out principles applicable across all/any contexts was such a massive gear shift. Turning a specific example — “here’s something we tried” — into a generalised tool — “here’s something useful for others” — was probably a five-fold increase in workload, if not more. The amount of planning and thinking required was significantly different.

Michelle: What else comes up for you from this experience of prototyping on ourselves?

If nothing comes to mind, I can jump in. For me it was the dynamic of being the initiators. We were the ones who convened the group and set the mission. In these complex collaborations, the initiator tends to hold a lot of relational capital, power, and responsibility. This was exacerbated because we were managing all these different layers of learning. It centralised the knowledge and the relational dynamics back to us. If one of us was missing from a budget conversation, for example, it was difficult for others to proceed. For me, the bigger point is that to do good demonstration work, it has to be experimental and emergent. But that doesn’t come for free; it has downsides. This re-centralisation was one of them, and it was a lot for us to hold.

Annette: That makes me wonder if a certain degree of that centralisation is inevitable in organising for these kind of ‘proof of possibilities’. When something is this complex and emergent, you can only distribute so much, so early. To meet the real-time needs of the collaboration, you need an agile core team. This is where it gets interesting — we were operating in the thin space between a sandbox environment and a live context. It had to be a genuine live context for people to want to participate, but it was also a sandbox for testing the general model. You have to meet the timelines of the live context; you can’t just pause for six months to work out team dynamics, or the collaboration collapses. So you almost need a team providing strong leadership to hold both realities at once.

Michelle: So, would you do it the same way again?

Annette: I think if we did it again, the things we’ve learned would make it smoother. We’d be more explicit from the start about which layer we’re discussing. We’d have a better sense of how to capture live learning and translate it into a model as we go. When we started, most of our attention was on hosting the live context, and a lot of the synthesis happened afterwards. Having done it once, I’d be more conscious of doing that synthesis in real-time — though the cognitive lift to switch between those modes is still immense.

Michelle: I agree, I would do it again with those additions. The other thing is that when we started, we didn’t even really have the process that we wanted to go through. Now we do. We’ve learned more about what works. Starting fresh, we would have a decent sketch of a process to begin with. Not perfect, and you still have to wing it, but it’s a good start. I’d be interested to do it again and see what happens.

This meta-reflective process — learning about learning while doing — has been a central part of the Many-to-Many initiative creating a ‘Proof of Possibility’ as a way to learn about what’s possible at a system level. While navigating these fractal layers is cognitively demanding, it’s what allows for true emergence, distinguishing this deep, systemic work from simple chaos. It is a messy, challenging, and ultimately fruitful way to discover what’s possible.

In the Many-to-Many website [coming soon] you will find some resources based on what we did in the Proof of Possibility (Experimenter’s Logs and example methods and artefacts like the Contract) and some based on what might be applicable across contexts (a Field Guide, some tools and an overview of System Blockers we’ve encountered) along with case studies and top tips from other contexts in the learning network.

Thanks for following our journey. You can find our previous posts [here], [here] and [here] and stay updated by joining the Beyond the Rules newsletter [here].

Visual concept by Arianna Smaron & Anahat Kaur.

Many-to-Many: The Messy, Meta-Process of Prototyping on Ourselves was originally published in Dark Matter Laboratories on Medium, where people are continuing the conversation by highlighting and responding to this story.


Indicio

Decentralized identity: The superpower every 2026 budget needs

The post Decentralized identity: The superpower every 2026 budget needs appeared first on Indicio.
Verifiable Credentials are the foundation for faster, safer, and more cost-effective digital strategy. In this new report from Indicio we look at  examples of successful deployments, the benefits to business, and explain the risks of waiting too long to adopt this technology. We also explain how to eliminate the cost and uncertainty of developing from scratch, laying out a blueprint for making adoption simple.

By Helen Garneau

Every 2026 budget decision will come down to a simple question: does this investment deliver measurable value. Leaders are expected to cut costs, reduce risk, and still deliver growth. In that environment, the way you handle digital identity can no longer be an afterthought—it has to be a priority.

This is especially true as identity fraud accelerates across all fronts, driven by generative AI brute force attacks, deepfakes, and social media scams. Legacy technology isn’t just failing to keep up, it’s the root cause of these problems.

That is why we wrote  Decentralized Identity: The Superpower Every 2026 Budget Needs. It explains why Verifiable Credentials are  a transformational new technology that combines authentication and fraud prevention in one, simple, and cost effective solution that you can easily inject into your systems and operations.

Can you inoculate your IAM processes against deepfakes?

Yes you can — by incorporating authenticated biometrics into Verifiable Credentials. We explain how organizations are already doing just that to cut fraud and costs, and how you can too, by showing a practical path for adoption.

Now is the time to act. As 2026 budgets are finalized, the organizations that plan for Verifiable Credentials today will be the ones that are positioned to lead their markets. Get an in-depth knowledge and actionable insights that you can turn into immediate savings.

Download the report and see how Indicio Proven can help you reduce costs, protect against fraud, and accelerate growth in 2026.

The post Decentralized identity: The superpower every 2026 budget needs appeared first on Indicio.


ComplyCube

The CryptoCubed Newsletter: September Edition

In this month’s edition, we cover Australia’s $16.5 million warning to unlicensed crypto firms, KuCoin’s legal battle with Canada’s FINTRAC, the married duo who scammed over 145 crypto investors, Poland’s new crypto bill, and more! The post The CryptoCubed Newsletter: September Edition first appeared on ComplyCube.

In this month’s edition, we cover Australia’s $16.5 million warning to unlicensed crypto firms, KuCoin’s legal battle with Canada’s FINTRAC, the married duo who scammed over 145 crypto investors, Poland’s new crypto bill, and more!

The post The CryptoCubed Newsletter: September Edition first appeared on ComplyCube.


auth0

Secure a .NET RAG System with Auth0 FGA

This in-depth guide shows you how to secure your AI chatbot built with .NET Blazor using the RAG pattern, ensuring users can only access information from documents they have permission to view.
This in-depth guide shows you how to secure your AI chatbot built with .NET Blazor using the RAG pattern, ensuring users can only access information from documents they have permission to view.

BlueSky

Bluesky's Patent Non-Aggression Pledge

Bluesky develops open protocols. We're taking a short and simple patent non-aggression pledge to ensure that everybody feels confident building on them.

Bluesky develops open protocols, and we want everybody to feel confident building on them. We have released our software SDKs and reference implementations under Open Source licenses, but those licenses don’t cover everything. To provide additional assurance around patent rights, we are making a non-aggression pledge.

This commitment builds on our recent announcement that we’re taking parts of AT to the IETF in an effort to establish long-term governance for the protocol.

Specifically, we are adopting the short and simple Protocol Labs Patent Non-Aggression Pledge:

Bluesky Social will not enforce any of the patents on any software invention Bluesky Social owns now or in the future, except against a party who files, threatens, or voluntarily participates in a claim for patent infringement against (i) Bluesky Social or (ii) any third party based on that party's use or distribution of technologies created by Bluesky Social.

This pledge is intended to be a legally binding statement. However, we may still enter into license agreements under individually negotiated terms for those who wish to use Bluesky Social technology but cannot or do not wish to rely on this pledge alone.

We are grateful to Protocol Labs for the research and legal review they undertook when developing this pledge text, as part of their permissive intellectual property strategy.


FastID

Fastly's Seven Years of Recognition as a Gartner® Peer Insights™ Customers’ Choice

Fastly was named a 2025 Gartner® Peer Insights™ Customers’ Choice for Cloud WAAP, marking seven consecutive years of recognition driven by customer trust and reviews.
Fastly was named a 2025 Gartner® Peer Insights™ Customers’ Choice for Cloud WAAP, marking seven consecutive years of recognition driven by customer trust and reviews.

Tuesday, 30. September 2025

Thales Group

Thales announces the distribution of an interim dividend

Thales announces the distribution of an interim dividend prezly Tue, 09/30/2025 - 17:00 Investor relations Group Share options Facebook X
Thales announces the distribution of an interim dividend prezly Tue, 09/30/2025 - 17:00 Investor relations Group

Share options

Facebook X Whatsapp Linkedin Email URL copied to clipboard 30 Sept 2025

The Board of Directors of Thales (Euronext Paris: HO), meeting on 30 September 2025 under the chairmanship of Patrice Caine, decided to distribute an interim ordinary cash dividend of €0.95 per share for the current 2025 financial year.

The ex-dividend date will be 2 December 2025 and the interim dividend will be paid on 4 December 2025.

About Thales

Thales (Euronext Paris: HO) is a global leader in advanced technologies for the Defence, Aerospace, and Cyber & Digital sectors. Its portfolio of innovative products and services addresses several major challenges: sovereignty, security, sustainability and inclusion.

The Group invests more than €4 billion per year in Research & Development in key areas, particularly for critical environments, such as Artificial Intelligence, cybersecurity, quantum and cloud technologies.

Thales has more than 83,000 employees in 68 countries. In 2024, the Group generated sales of €20.6 billion.

View PDF corporate : Investor relations + Group https://thales-group.prezly.com/thales-announces-the-distribution-of-an-interim-dividend-bdm558 thales-announces-distribution-interim-dividend On Thales announces the distribution of an interim dividend

Mythics

Mythics' Strategic Acquisitions Amplify Cloud-Powered, AI-Driven Transformation at Oracle AI World

The post Mythics' Strategic Acquisitions Amplify Cloud-Powered, AI-Driven Transformation at Oracle AI World appeared first on Mythics.

Spherical Cow Consulting

Delegation and Consent: Who Actually Benefits?

When not distracted by AI (which, you have to admit, is very distracting) I’ve been thinking a lot about delegation in digital identity. We have the tools that allow administrators or individuals grant specific permissions to applications and service.  In theory, it’s a clean model. The post Delegation and Consent: Who Actually Benefits? appeared first on Spherical Cow Consulting.

“When not distracted by AI (which, you have to admit, is very distracting), I’ve been thinking a lot about delegation in digital identity. We have the tools that allow administrators or individuals to grant specific permissions to applications and services.” 

In theory, it’s a clean model: you delegate only what’s necessary to the right party, for the right time. Consent screens, checkboxes, and admin approvals are supposed to embody that intent.

That said, the incentive structures around delegation don’t actually encourage restraint. They encourage permission grabs and reward broader access, not narrower. And when that happens, what was supposed to be a trust-building mechanism—delegation with informed consent—turns into a trust-eroding practice.

A Digital Identity Digest Delegation and Consent: Who Actually Benefits? Play Episode Pause Episode Mute/Unmute Episode Rewind 10 Seconds 1x Fast Forward 30 seconds 00:00 / 00:11:54 Subscribe Share Amazon Apple Podcasts CastBox Listen Notes Overcast Pandora Player.fm PocketCasts Podbean RSS Spotify TuneIn YouTube iHeartRadio RSS Feed Share Link Embed

You can Subscribe and Listen to the Podcast on Apple Podcasts, or wherever you listen to Podcasts.

And be sure to leave me a Rating and Review!

Delegation’s design intent versus product incentives

Delegation protocols like OAuth were designed to solve a simple problem: how can an application act on your behalf without you handing over your password? Instead of giving a third-party app your full login, OAuth lets you grant that app a limited token, scoped to specific actions, like “read my calendar” or “post to my timeline.” In enterprise settings, administrators can approve apps at scale, effectively saying, “this tool can access certain company data on behalf of all our employees.”

The intent is least privilege: give just enough access to accomplish the task, nothing more. Tokens should be narrowly scoped, time-bound, and transparent.

But the product incentives push in the opposite direction. If you’re a developer or growth team, every extra permission opens new doors: richer analytics, better personalization, and potentially more revenue. Why ask for the bare minimum when you can ask for a lot more, especially if you can get away with it?

And so the pattern of permission creep emerges. There is an interesting study of Android apps, for example, shows that popular apps tend to add more permissions over time, not fewer. The reason isn’t technical necessity; it’s incentive alignment. More access means more opportunities, even if it slowly undermines the trust that delegation was supposed to build.

This is scope inflation: when “read metadata from one folder” somehow balloons into “read and write all files in your entire cloud drive.” From a delegation perspective, it looks absurd. From an incentive perspective, it looks entirely rational.

Consent as a manufactured outcome

Let’s talk about “consent.” It’s the shiny wrapper that’s supposed to make delegation safe. The idea is simple: a user sees what’s being requested, makes an informed choice, and either agrees or doesn’t. That’s the theory. In practice, consent is manufactured.

Consent screens are optimized like landing pages. The language is written to minimize friction. The buttons are designed to maximize acceptance. Companies treat “consent rates” the same way they treat sign-up conversions or click-through rates: a metric to push upward.

And the tactics aren’t subtle:

Dark patterns in consent UIs. Regulators in the EU have formally called out manipulative design in cookie banners and social media interfaces; tricks like highlighting the “accept” button in bright colors while burying “reject” in a subtle link. That’s not neutral presentation. That’s steering. Consent-or-pay models. The latest battleground is whether “pay or accept tracking” constitutes valid consent. European regulators have said that if refusal carries a cost, then consent may not be “freely given.” Yet many sites lean into exactly this model: you can either hand over your data or hand over your credit card. Consent fatigue. When users see banners, pop-ups, and consent prompts multiple times a day, they stop reading. They click whatever gets them through fastest. At that point, it’s no longer informed consent, it’s consent theater.

Delegation without trust is already fragile. Delegation wrapped in manufactured consent is worse: it’s a contract of adhesion where one party has all the power and the other clicks “accept” because they have no real choice.

If you’d like to dive into the consent debate further, I HIGHLY recommend you follow Eve Maler’s The Venn Factory. She has a great blog series on consent (example here) and an even greater whitepaper (for a fee but totally worth it).

Enterprise delegation and the admin consent problem

It’s tempting to think this is just a consumer problem involving cookie banners and mobile apps. But enterprise delegation has its own set of perverse incentives.

Take Microsoft 365 and Entra ID as an example (though let’s be clear that this is absolutely a common scenario). Enterprises can allow third-party apps to request access to user or organizational data through OAuth. To reduce noise, Microsoft lets administrators “consent on behalf of the organization.” Sounds efficient, right? Fewer pop-ups, fewer interruptions for the workforce, saving time (and time = money, right?).

But that efficiency comes at a cost. Attackers exploit this very model through “consent phishing”: tricking a user or admin into approving a malicious app that requests broad API scopes. Once granted, those permissions are durable and hard to detect. Microsoft now publishes guidance on identifying and remediating risky OAuth apps precisely because the model’s incentives tilt toward convenience over caution.

For administrators, the path of least resistance is to click “Approve for the organization” once and move on. That makes life incrementally easier for everybody: administrators, their users, and the attackers.

Enforcement as a belated correction

If the incentives reward broad access, who actually keeps things in check? Increasingly, it’s regulators and courts.

In the U.S., the Federal Trade Commission has penalized companies like Disney and Mobilewalla for collecting data under misleading labels or without meaningful consent. The penalties aren’t just financial; they force changes in how products are designed and how defaults are set. In Europe, the IAB’s Transparency and Consent Framework—the standard that underpins much of adtech—has faced repeated rulings (see examples here and here) that its consent strings are personal data, that aspects of the framework violate GDPR, and that “consent at scale” is not a free pass. Legal battles continue, but I think the message being sent is pretty obvious: broad, opaque consent mechanisms don’t hold up under scrutiny. Regulators have also zeroed in on “consent-or-pay” and dark pattern interfaces, explicitly saying that these undermine the principle of freely given consent.

What’s happening is essentially a regulatory realignment of incentives. If the market rewards permission grabs, fines, and rulings change the cost-benefit equation. In some markets, but not all, the cheapest path is shifting to grabbing less data, not more.

Why this erodes trust

From the individual’s point of view, none of this is subtle. They notice when an app requests more permissions than it should. They notice when every website they visit demands cookie consent in confusing ways (it is SO ANNOYING). They notice when their IT department approves a sketchy app and they’re the ones who end up phished.

The result is trust erosion. Individuals stop believing that “consent” means choice and assume that every request for access is a data grab in disguise. They are probably not wrong.

And once trust is gone, it’s not easily rebuilt. Every new protocol, every new delegation model, has to fight against that backdrop of suspicion.

What good looks like

If delegation and consent are to survive as trust-building mechanisms, they have to look different from how they look today. Here are a few ways to realign the incentives:

Purpose-bound scopes. Tokens should be tied to specific actions, not broad categories. “Read file metadata for this folder” is a very different ask than “Read all your files.” Time-boxed tokens. Access should expire quickly unless explicitly renewed. Long-lived tokens are an incentive to attackers and a liability for providers. Refusal symmetry. The “reject” button should be as prominent and easy to click as the “accept” button. Anything less is manipulation. Transparent change logs. Apps should publish what scopes they request and why, with a clear history of when those scopes changed. If permissions creep is inevitable, at least make it visible. Admin consent boards. In enterprises, app approval should involve more than a single overworked admin. Formal review processes—similar to change advisory boards—can slow down risky delegation without grinding everything to a halt. Trust reports. Companies could publish regular “trust reports” that show how delegation and consent are actually being managed. Which apps request what? How often are tokens revoked? How many requests are denied? Turning these into KPIs re-aligns incentives toward trust, not just conversion. Who actually benefits?

So, back to the original question: who actually benefits from delegation and consent as practiced today?

Companies benefit from broader access because it feeds product features, analytics, and monetization. Attackers benefit when that broad access is abused, because consent tokens and admin approvals often outlive user awareness. Regulators benefit politically when they enforce, because they’re seen as protecting consumer rights. Users? Users benefit in theory, but in practice, they’re the least likely to see real advantage. Their consent is optimized against, their delegation scopes are inflated, and their trust is constantly eroded.

Delegation and consent were supposed to empower users. Right now, they mostly empower everyone else.

The path forward

Delegation is too valuable to discard; it is definitely having its moment given the complexities of doing it correctly. Consent is too foundational to abandon; the alternative of not asking at all is at least as bad as asking too much. But both need to be reclaimed from the incentive structures that have warped them.

That means treating trust as the KPI, not just consent click-through rates. It means designing delegation flows that prioritize least privilege, not maximum access. It means regulators continuing to push back against manipulative practices, and companies recognizing that the long game is trust, not just data.

If the only people who benefit from delegation and consent are companies and attackers, then the rest of us have been sold a story. And the longer that story holds, the harder it will be to convince users that their “yes” actually means something. If your bosses are having a hard time understanding that, feel free to print out this post and slide it under their office door. They might think a bit more deeply about their decisions going forward.

If you’d rather track the blog than the podcast, I have an option for you! Subscribe to get a notification when new blog posts go live. No spam, just announcements of new posts. [Subscribe here

Transcript

[00:00:30] Welcome back to A Digital Identity Digest. Today’s episode is called Delegation and Who Actually Benefits?

[00:00:37] This piece builds on earlier conversations and writing about delegation and digital identity.

[00:00:44] Today, we’ll explore how incentive structures push companies to grab broader permissions than they really need—and how that erodes trust.

The Clean Model of Delegation

[00:00:53] When not distracted by all the AI news—which you have to admit is very distracting—I’ve been thinking a lot about delegation and digital identity.

We have tools that allow administrators or individuals to grant specific permissions to applications and services. In theory, this is a very clean model:

Delegate only what’s necessary To the right party For the right time

[00:01:18] Consent screens, checkboxes, and admin approvals are all supposed to embody this principle.

[00:01:24] Unfortunately, incentives don’t encourage restraint. They encourage permission grabs. That reward system favors broader access, not narrower. What should be a trust-building mechanism often turns into a trust-eroding practice.

OAuth and the Design of Least Privilege

[00:01:40] Delegation protocols like OAuth were created to solve a practical problem:

[00:01:47] How can an application act on your behalf without requiring your password?

Instead of handing over login credentials, OAuth allows granting a limited token. Ideally, that token is:

Scoped to a specific action (e.g., read my calendar) Time-bound Transparent

[00:02:17] In enterprise settings, administrators can approve apps at scale. That way, employees aren’t asked to answer the same questions repeatedly.

[00:02:28] But here’s the issue: incentives push in the opposite direction.

[00:02:32] Service builders want broader access because:

More permissions unlock richer analytics Data enables personalization Extra information can be monetized

[00:02:42] Growth teams treat every consent screen as a conversion funnel to optimize. Why ask for less when asking for more is easier?

[00:02:59] The result is permission creep. Studies of Android apps show that popular apps add permissions over time—not fewer.

Consent in Theory vs. Consent in Practice

[00:03:34] On paper, consent is the safeguard. Users see what’s requested and make an informed choice.

[00:03:48] In practice, consent is manufactured. Consent screens are optimized like landing pages.

Language minimizes friction Buttons maximize acceptance Consent rates are tracked as key metrics

[00:04:00] Dark patterns dominate: cookie banners where “Accept All” is bright and obvious, while “Reject” hides as a faint gray link.

[00:04:15] Regulators in Europe have called this out as manipulative.

[00:04:20] Then there are “consent or pay” models: accept tracking or pay for access. Regulators argue this undermines freely given consent.

[00:04:33] And, of course, there’s consent fatigue. Repeated banners train users to click without thinking. What’s left isn’t informed consent—it’s consent theater.

[00:04:46] Delegation without trust is fragile. Delegation wrapped in manufactured consent is worse.

Enterprise Risks and Consent Phishing

[00:05:01] This isn’t just a consumer problem. Enterprise environments like Microsoft 365 and Entra ID carry their own risks.

[00:05:13] Enterprises can let third-party apps request organizational data. To reduce friction, admins can consent on behalf of the entire company.

[00:05:22] Efficient, yes. Dangerous, absolutely.

[00:05:24] Attackers exploit this through consent phishing—tricking admins into approving malicious apps with broad permissions. Once granted, this access is durable and hard to detect.

[00:05:39] Microsoft even publishes playbooks to spot risky OAuth apps, acknowledging the problem.

[00:05:44] But incentives still tilt toward convenience. For overworked admins, approving once feels easier than vetting thoroughly.

Regulatory Realignment of Incentives

[00:06:03] If incentives reward broad access, who reins it in? Increasingly, regulators.

[00:06:11] In the U.S., the Federal Trade Commission has penalized companies for misleading consent practices.

Disney and Mobilewalla paid fines Companies were required to change product design, not just pay penalties

[00:06:26] In Europe, the IAB’s Transparency and Consent Framework has been ruled non-compliant with GDPR. Courts held that consent at scale does not equal valid consent.

[00:06:46] Regulators are also challenging “consent or pay” models, stating they undermine freely given consent.

[00:06:59] This is a regulatory re-alignment of incentives. If the market rewards permission grabs, fines and rulings push companies in the opposite direction—toward less data collection.

The User’s Perspective and Erosion of Trust

[00:07:14] From the user’s point of view, the problem is visible:

Apps request more permissions than needed Cookie banners are confusing IT teams approve apps that later lead to phishing

[00:07:46] The result is erosion of trust. Users stop believing that:

Consent equals choice Delegation equals least privilege

[00:07:56] Once trust is lost, it’s hard to rebuild. Every new product must fight against this backdrop of suspicion.

How Do We Fix This?

[00:07:58] So how can delegation and consent become real trust-building mechanisms instead of hollow rituals?

[00:08:04] Here’s a list:

Purpose-bound scopes: tokens tied to specific actions, not broad categories Time-boxed tokens: access that expires quickly unless renewed Refusal symmetry: reject buttons as visible and easy as accept buttons Transparent change logs: apps publishing history of permission requests Admin consent boards: enterprise review panels instead of one pressured approver Trust reports: companies disclosing how often requests are denied, access revoked, and policies enforced

[00:09:05] Each of these shifts incentives toward making trust the key performance indicator.

Who Actually Benefits?

[00:09:16] Returning to the original question: who benefits from delegation and consent today?

Companies: more permissions, more data, more revenue Regulators: political capital when stepping in Attackers: durable, broad tokens for persistence People: benefit mostly in theory, but often remain the least protected

[00:09:57] Delegation and consent were meant to empower users. Today, they mostly empower everyone else.

[00:10:04] But both are too important to discard. They must be reclaimed from warped incentives.

[00:10:18] That means:

Treating trust as the KPI Designing delegation for least privilege, not maximum access Regulators continuing to push back against manipulation

[00:10:30] Because if only companies and attackers benefit, we’ve lost the plot.

Closing Thoughts

[00:10:44] If you want to dive deeper, explore the work of Eve Maler at the Venn Factory. Her white paper on consent is a fantastic resource worth reading.

[00:11:06] Thanks again for joining A Digital Identity Digest.

[00:11:17] If this episode made things clearer—or at least more interesting—share it with a friend or colleague. Connect with me on LinkedIn @hlflanagan.

And don’t forget to subscribe and leave a review on Apple Podcasts or wherever you listen. The written post is always available at sphericalcowconsulting.com.

Stay curious, stay engaged, and let’s keep these conversations going.

The post Delegation and Consent: Who Actually Benefits? appeared first on Spherical Cow Consulting.


FastID

Make Sense of Chaos with Fastly API Discovery

Discover, monitor, and secure your APIs with Fastly API Discovery. Get instant visibility, cut the noise, and keep your APIs secure and compliant.
Discover, monitor, and secure your APIs with Fastly API Discovery. Get instant visibility, cut the noise, and keep your APIs secure and compliant.

Monday, 29. September 2025

liminal (was OWI)

Identity Market & Policy Trends 2026: Intelligence for a Changing Landscape

Intelligence for a Changing Landscape The post Identity Market & Policy Trends 2026: Intelligence for a Changing Landscape appeared first on Liminal.co.

Intelligence for a Changing Landscape

The post Identity Market & Policy Trends 2026: Intelligence for a Changing Landscape appeared first on Liminal.co.


Ontology

The Role of EOAs in Long-Term Web3 Identity

Hand someone a ledger full of cold storage and they’ll sleep fine at night. Hand them the same ledger and tell them it’s their daily identity and they’ll start sweating. That’s the dividing line between Externally Owned Accounts (EOAs) and the future of Web3 identity. 👉 [7 Proven Ways Smart Wallets Transform Web3 Identity Forever] EOAs are the oldest and most widely used model for blockchai

Hand someone a ledger full of cold storage and they’ll sleep fine at night. Hand them the same ledger and tell them it’s their daily identity and they’ll start sweating. That’s the dividing line between Externally Owned Accounts (EOAs) and the future of Web3 identity.

👉 [7 Proven Ways Smart Wallets Transform Web3 Identity Forever]

EOAs are the oldest and most widely used model for blockchain accounts. They were introduced in Ethereum’s earliest days, designed around a single principle: one private key controls one account. That design is elegant in its simplicity and still unmatched when it comes to long-term security.

But as Web3 evolves into a world of portable, reputation-based, and privacy-first identity, it’s worth asking: where do EOAs fit in?

What Are EOAs in Web3?

An EOA is the most basic account type in Ethereum and many other blockchains. Unlike smart contracts, EOAs have no internal code or logic. They exist to send and receive assets, secured entirely by a private key.

If you control the key, you control the account. Lose the key, and the account is gone forever. There is no backup, no recovery, and no reset button.

That rigidity is why EOAs are perfect for what they were built for: vaults.

EOAs as Vaults in Web3 Identity

When it comes to cold storage and long-term custody, EOAs are unmatched. Pair one with a hardware wallet and you have one of the most secure setups in all of crypto.

Staking: EOAs work perfectly for locking up assets in staking positions. Governance tokens: If you plan to hold voting power for years, an EOA keeps it safe. NFT collections: For high-value NFTs meant for long-term ownership, EOAs are the best option. Institutional custody: Funds and DAOs often rely on EOAs for their simplicity and auditability.

The lack of flexibility is what makes them secure. No extra logic means fewer attack vectors. No recovery flows means fewer trust assumptions. Just a private key, a wallet, and assets locked away until you decide to move them.

Why EOAs Struggle as Daily Web3 Identity

The problem comes when EOAs are forced into a role they weren’t designed for: identity.

Daily Web3 identity requires accounts that are:

Recoverable if a key is lost or a device breaks Readable with human-friendly identifiers instead of 42-character hex strings Portable across chains, dApps, and platforms Flexible enough to hold credentials, permissions, and reputation

EOAs can’t do any of this. They’re silent vaults. They don’t carry context or history. They can’t evolve as your needs change. And they put every bit of risk onto one fragile key.

This is where smart wallets and Account Abstraction take over.

EOAs vs Smart Wallets: Dividing the Labor

It’s easy to frame EOAs and smart wallets as competitors, but that’s the wrong way to look at it. They’re complements. Each plays a specific role in the Web3 stack.

EOAs are vaults: best for long-term asset storage, cold custody, and high-value holdings. Smart wallets are identity: built for daily use, recovery, credentials, cross-chain logic, and compliance.

Instead of replacing EOAs, smart wallets expand Web3 identity beyond them. The vaults still exist, but identity moves into programmable, human-friendly infrastructure.

Why EOAs Still Matter for the Future of Web3

Even as smart wallets gain adoption, EOAs will remain essential for three reasons:

Security: The simplicity of EOAs makes them the most secure baseline for storage. Reliability: They are battle-tested and widely supported across every major blockchain. Foundation: Many smart wallets ultimately anchor to EOAs under the hood, ensuring that the vault layer remains intact.

In other words, EOAs aren’t going away. They are the bedrock of Web3. But they can’t carry the entire weight of identity.

The Balance Ahead

The future of Web3 identity is not either-or. It’s both.

Use EOAs for vaults: keep long-term assets locked down in their simplest, most secure form. Use smart wallets for identity: manage recovery, credentials, and interactions across chains and applications.

Together they cover the full spectrum of what Web3 demands: immovable security on one end, human usability on the other.

Try It Yourself: EOAs with ONT ID in ONTO Wallet

EOAs are the backbone of long-term Web3 security. With ONT ID, you can anchor an EOA to your decentralized identity and keep assets safe while still unlocking future-ready features like staking and verifiable credentials.

Download ONTO Wallet to:

Manage EOAs for secure asset storage Stake directly from your vaults Connect your EOA to ONT ID for portable identity Explore verifiable credentials while keeping full self custody

Whether you’re holding tokens, securing NFTs, or preparing for the next phase of Web3 identity, ONTO Wallet gives you the flexibility of smart features with the permanence of EOAs.

Learn More: How Smart Wallets Complete the Picture

EOAs may be the vaults of Web3, but they’re only half the story. To see how Account Abstraction and smart wallets transform identity into something portable, recoverable, and privacy-first, read the full breakdown:

👉 [7 Proven Ways Smart Wallets Transform Web3 Identity Forever]

The Role of EOAs in Long-Term Web3 Identity was originally published in OntologyNetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


FastID

From Climate Week NYC to Fastly’s 100% Renewable Commitment

Fastly commits to 100% renewable electricity coverage across its global network and offices, advancing a sustainable internet and supporting customers' climate goals.
Fastly commits to 100% renewable electricity coverage across its global network and offices, advancing a sustainable internet and supporting customers' climate goals.

Friday, 26. September 2025

Anonym

Your Complete Guide to Online Privacy in 2025: Who is Taking Your Personal Info and How to Stop Them

Every time you buy something, open an account, search the internet, interact on social media, and use smart devices, public WiFi, and AI, you leave a trail of personal information or “personal data” that is being collected, shared, used, and abused. Suddenly you’re getting spam calls, phishing emails, smishing texts, and data breach alerts, all […] The post Your Complete Guide to Online Privacy

Every time you buy something, open an account, search the internet, interact on social media, and use smart devices, public WiFi, and AI, you leave a trail of personal information or “personal data” that is being collected, shared, used, and abused. Suddenly you’re getting spam calls, phishing emails, smishing texts, and data breach alerts, all while someone is booking flights to Ibiza with your credit card and taking out mortgages in your name!   

In 2025, our digital footprints are vast and vulnerable— and online privacy is an urgent issue.

This guide covers everything you need to know about online privacy:

What are personal data and your digital footprint? Who’s collecting your personal information and why? What happens when your information gets into the wrong hands? What is data privacy? Are there data privacy laws? What you can do to protect yourself

What are personal data and your digital footprint?

Your digital footprint is all the information about you that exists on the internet because of your online activity. It’s sometimes called your digital exhaust because, just as engine exhaust is residue from using a car, digital exhaust is residue from using the internet. 

Your data is collected from:

Websites (cookies, tracking pixels, session recording) Mobile apps (permissions, background data sharing) Social media (likes, shares, behaviour analysis in social graphs and interest graphs) Smart devices Artificial intelligence (AI) tools Public WiFi and location tracking

Your digital footprint contains what’s called your personal data. Data is information, and  personal data (or personal information or (to get technical) personally identifiable information) is officially defined as any data that can be used to distinguish or trace an individual’s identity and any other information that is linked or linkable to an individual, such as medical, educational, financial, and employment information. 

Examples of PII are:

your full name, maiden name, mother‘s maiden name, and alias your date of birth, place of birth, race, religion, weight, activities, geographical indicators employment information, medical information, education information, financial information personal ID numbers such as your SSN and passport and driver license numbers your addresses your telephone numbers IP or MAC address personal characteristics, including photographic images, x-rays, fingerprints, or other biometric image your vehicle registration number or title number

Who’s collecting your personal information and why?

Our digital world is now so reliant on user data it’s described as surveillance capitalism and the data economy. Loads of players have their fingers in this “personal data pie”, including:

Big tech

Tech companies like Alphabet (Google), Meta, Amazon, Apple, Microsoft are giving you “free” access to their platforms and products in return for your personal information, time, and attention. Have you heard the saying, “If you’re not paying for the product, you ARE the product?”

Part of your digital footprint is also what’s known as your social graph and your interest graph. A social graph is a digital map of who you know—your relationships within a social network including your friends, family, coworkers, etc., while an interest graph maps what you like—it connects you to other people based on shared interests, hobbies and topics, rather than personal relationships.

Big tech uses all this personal data to:

Sell ads to third-party advertisers that serve you personalized ads (those scarily coincidental ads that pop up within seconds of your search for a product) Control the content you see, including news feeds and social media posts Set higher prices (you search for something high risk like “motor racing” and suddenly your insurance premium goes up) Influence your political decisions (read up on Cambridge Analytica for a famous example). 

And here’s another thing: most users never consent to their information being used in these ways. Most privacy policies are long, vague, and unreadable, and user consent is complex. What’s more, many apps use dark patterns—design tricks that pressure users to share more information and buy more products than they want to.

Data brokers

Data brokers, which are about 4000 legitimate but unregulated organizations worldwide, are gathering and collating your lucrative data to sell profiles to advertisers, insurers, and political groups. These profiles can include:

your age marital status where you live your email address employer how much money you make how many children you have where you shop what you buy your medical conditions and health issues who you vote for and support

Data brokers usually sell user information to brands in list form. Your email address on a list of people with a particular medical condition such as diabetes would be worth about $79 and on a list of a particular class of traveller about $251. And that’s another thing: A lot of your personal data online isn’t stuff you’d want to share around. While data brokers say the data is anonymized, it’s scarily simple to re-identify so-called “anonymous” data. In fact, some researchers say anonymous data is a lie, and that unless all aspects of de-identifying data are done right, it is incredibly easy to re-identify the subjects.

Governments

Worldwide, governments use citizens’ personal data for surveillance under the guise of national security, public safety, and crime prevention. For example, Proton recently reported that Google, Apple and Meta have handed over data on 3.1 million accounts to the US authorities over the last decade (regardless of which political party was in the White House), providing information such as emails, files, messages, and other highly personal information.

“In the past, the government relied on massive, complex and legally questionable surveillance apparatus run by organizations like the NSA. But thanks to the advent of surveillance capitalism, this is no longer necessary,” said Raphael Auphan, Proton’s chief operating officer.

“All that’s required for the government to find out just about everything it could ever need is a request message to big tech in California. And as long as big tech refuses to implement widespread end-to-end encryption, these massive, private data reserves will remain open to abuse,” Auphan added.

Hackers and scammers

Criminals exploit stolen data in many different ways, which brings us to the next point …

What happens when your personal information gets into the wrong hands?

We’ve covered what brands and governments do with your personal information. Bad actors can also do a lot of damage with your data:

Identity theft: Using your stolen information to impersonate you for financial gain or to commit crimes Financial fraud: Accessing your bank accounts, credit card information, or other financial accounts to make unauthorized transactions Phishing: Sending fraudulent emails or messages pretending to be from legitimate organizations to trick you into revealing more information or clicking on malicious links Social engineering: Manipulating you into divulging confidential information, often by posing as someone you trust or using your stolen information to build credibility Account takeover: Gaining unauthorized access to your online accounts (email, social media, etc.) using your stolen usernames and passwords Tax fraud: Using stolen personal information to file fraudulent tax returns and claim refunds Medical identity theft: Using your stolen information to get medical services and prescriptions, or to fraudulently file insurance claims Employment fraud: Using your stolen information to illegally gain employment or benefits Blackmail or extortion: Threatening to expose your sensitive information unless you pay a ransom Creating fake identities: Using your stolen information to create new identities for various fraudulent purposes.

Data breaches are the new normal

One way bad actors get your information is through data breaches. A data breach is a security event where highly sensitive, confidential or protected information is accessed or disclosed without permission or is lost.

We’ve almost come to expect massive, damaging data breaches. The year 2024 had the most data breaches on record, and 2025 has already seen the largest data breach of all time: the leaking of more than 16 billion usernames and passwords to user accounts with Apple, Facebook, Google, other social media accounts, and government services.

AI is making data privacy worse

AI is connecting just about everything in our lives, from our vehicles to eyewear, and we’re using it in all sorts of everyday ways. But AI presents privacy risks not only in what we share but also in how AI can analyze, infer, and act on that information without our permission (think: deep fakes, for example).

Academics have already identified at least 12 privacy risks from AI, and safe and ethical AI governance is a priority.

What is online privacy?

You might say, “I have nothing to hide”, “Privacy tools are only for criminals” or “Social media is harmless fun,” but against this backdrop of risks and damage, you can see the urgent need to protect your online privacy (or data privacy). This is about your rights to control your personal information and how it’s used.

Data privacy matters because it protects our fundamental right to privacy and means we can:

Limit others’ control over us to know about us and to cause us harm Better manage our professional and personal reputations  Put in place boundaries and encourage respect Maintain trust in relationships and interactions with others Protect our right to free speech and thought Pursue second chances for regaining our privacy Feel empowered that we’re in control of our life.  Are there data privacy laws?

Data privacy laws are designed to give users more control over their personal data by regulating how organizations can collect, store, and use that information.

As at 2024, 137 countries have national data privacy laws, which means 70% of nations worldwide, 6.3 billion people, or 79.3% of the world’s population is covered by some form of national data privacy law.

Despite many attempts, the United States is one of the only major global economies without a strong national privacy law similar to the European Union’s GDPR—the gold standard for consumer data privacy protections and with regulatory impact around the world. Instead, the US has a patchwork of state-based privacy laws. A dedicated working group was recently formed to try again on a US federal privacy law, so watch this space.

What you can do to protect your personal information and online privacy

Regardless of the laws, you can do a lot to protect yourself. First, you need to cover some basics:

Use strong, unique passwords for each of your online accounts. Store them securely in a password manager. Enable two-factor authentication (2FA). Don’t share sensitive details on public platforms or unsecured websites. Keep your software and devices updated. Be cautious of phishing emails and smishing texts, links, and attachments. Know what to do in the event of a data breach. Switch to a private browser that stops ads and tracking. Use end-to-end encrypted messaging and calling, wherever possible. Regularly review your privacy settings on platforms like Facebook, X, Instagram, and LinkedIn to limit data collection. Limit app permissions to stop third-party services from accessing your data. Regularly audit your online activity to remove old or inactive connections, unfollow accounts, and mute topics you’re not interested in. Unsubscribe from unnecessary services. Clear browsing history and cookies regularly

If that seems a lot, we have good news: MySudo all-in-one privacy app deals with many of those actions in one simple app—and the other apps in the MySudo family take you even further.

MySudo

MySudo all-in-one privacy app is built around the Sudo, a secure digital profile with email, phone, and virtual cards to use instead of your own. Anywhere you usually give your personal details, you simply give your Sudo details instead. Sudos let you live your life online without spam, scams, and constant surveillance.

What’s in a Sudo? 1 email address – for end-to-end encrypted emails between app users, and standard email with everyone else 1 handle* – for end-to-end encrypted messages and video, voice and group calls between app users 1 private browser – for searching the internet without ads and tracking 1 phone number (optional)* – for end-to-end encrypted messaging and video, voice and group calls between app users, and standard connections with everyone else; customizable and mutable 1 virtual card (optional)* – for protecting your personal info and your money, like a proxy for your credit or debit card or bank account

*Phone numbers and virtual cards are only available on a paid plan. Phone numbers are available for US, CA and UK only. Virtual cards are for US only. Handles are for end-to-end encrypted comms between app users.

You can have up to 9 separate Sudos in the app. With your Sudos, you can:

Protect your information. Basically, with MySudo, you decide who gets your personal information, and everyone else gets your Sudo information. 

Instead of using your own email, phone number, and credit card all over the internet, use the alternative contact details from your Sudo. So, you would use your Sudo email and phone number to open and log into accounts and contact people; use the private browser to search online without ads and tracking; and use your Sudo virtual card to pay for purchases without exposing your own credit or debit card. Virtual cards are linked to your own credit card or debit card but don’t reveal those details during transactions.

In this way, you … Break your data trail. When you compartmentalize your life into different Sudos, you silo your information and make it impossible for anyone to track you across sites and apps to sell or steal your personal information. And if one Sudo’s details get caught in a data breach or is heavily spammed, you can either ignore it, mute it, or delete it and start again.

Uses for Sudos are limited only by your imagination. Sign up for deals and discounts, book rental cars and hotel rooms, order food or sell your stuff – all without giving away your personal information. Be creative with your Sudos: Setting up a dedicated Sudo to stay safe while volunteering is a popular choice, for example.

You might like:
How MySudo lets you control who sees your personal info online and in real life
From Yelp to Lyft: 6 ways to “do life” without using your personal details
4 steps to setting up MySudo to meet your real life privacy needs Use the end-to-end encrypted messaging and calling within each Sudo to keep your conversations private. Your Sudo phone number works like a standard number but also gives you secure connections to other MySudo users, making MySudo a great private messaging app.

You can also use your Sudo handle (instead of a phone number) for end-to-end encrypted communications between other MySudo users, too (invite your friends to the app!). Read: How to get 9 “second phone numbers” on one device. Use the end-to-end encrypted email between MySudo users for secure communications. MySudo email is a popular secure email service with full send and receive support. It’s entirely separate from your personal email account and intentionally protects your personal email from spam and email-based scams.

Read: 4 ways MySudo email is better than masked email. Use the private browser within each Sudo in MySudo to search the internet free of ads and trackers. Use the virtual card within each Sudo in MySudo to hide your transaction history from your bank and others that they sell your data to. (Yes, they do!).

Discover more about how MySudo lets you control who sees your personal information online and in real life. Also check out how MySudo keeps you safe on social media even in a data breach.

Once you’ve got MySudo on your side, do these 3 things:

Reclaim your information from companies that store and might sell it with RECLAIM personal data removal tool. See who has your information, discover whether it’s been caught in a data breach, and then either ask the company to delete it or substitute it for your Sudo information using MySudo. RECLAIM is part of the MySudo app family.
Encrypt your internet connection and hide your IP address with MySudo VPN, the only VPN on the market that’s actually private. MySudo VPN is the perfect companion for MySudo privacy app since they’re engineered to work seamlessly together. 
Be first in line to use the new MySudo password manager to securely store, autofill, and organize every log-in, password, and more. Coming soon!

Why should I trust MySudo?

MySudo does things differently from other apps:

We won’t ask for your email or phone number to create an account. You don’t need a registration login or password to use MySudo. Access is protected by a key that never leaves your device. We’ll only ask for personal information for virtual cards, and UK phone numbers, when a one-time identity verification is required.

By securing your own information, you take back control of your life, money, safety, and reputation. There’s never been a better time.

Get started today:

Download MySudo
Download RECLAIM
Download MySudo VPN

You might also like:

What constitutes personally identifiable information or PII? 14 real-life examples of personal data you definitely want to keep private What is digital exhaust and why does it matter? Californians, this is why you still need MySudo despite the new “Delete Act” This is why MySudo is essential, even 10 years after Snowden What is a data breach? What should I do if I’ve been caught in a data breach?

The post Your Complete Guide to Online Privacy in 2025: Who is Taking Your Personal Info and How to Stop Them appeared first on Anonyome Labs.


Recognito Vision

Face Recognition Software Explained in Simple Words

Imagine walking into an airport and breezing through security just because a camera recognized your face. That’s not science fiction anymore. This is the power of face recognition software, a technology that maps your unique facial features and matches them against stored data. From unlocking smartphones to catching criminals, this software is shaping our everyday...

Imagine walking into an airport and breezing through security just because a camera recognized your face. That’s not science fiction anymore. This is the power of face recognition software, a technology that maps your unique facial features and matches them against stored data.

From unlocking smartphones to catching criminals, this software is shaping our everyday lives. But along with convenience come questions about accuracy, privacy, and trust. Let’s break it down in simple words so you know what’s happening behind the lens.

 

What is Face Recognition Software

Face recognition software is a type of biometric technology that identifies or verifies a person by analyzing facial features. Think of it as a digital fingerprint, but for your face.

The process usually starts with face matching software, which compares a captured image to existing images in a database. This allows systems to confirm if two faces belong to the same individual.

For everyday people, the most relatable example is your smartphone. Every time you unlock it by looking at the screen, the phone uses a form of this software to confirm your identity.

 

How Face Recognition Software Works Behind the Scenes

At first glance, it feels magical. But under the hood, face recognition is powered by math, algorithms, and a whole lot of data crunching.

 

1. Data Capture and Photo Face Detection Software

It starts when a camera captures your face. The photo face detection software identifies the position of your eyes, nose, mouth, and chin. These landmarks form the foundation of your facial “map.”

2. Feature Extraction with Algorithms

Next, the software measures distances between facial features, like the space between your eyes or the curve of your jawline. These measurements are converted into numerical data known as a faceprint.

3. Matching Process with Databases

Finally, the system compares this faceprint against a database of known faces. If there’s a match within the confidence threshold, the system identifies the individual.

Best Face Recognition Software Applications in Real Life

This technology is not limited to spy movies. It’s deeply integrated into industries we interact with daily.

Here are the most common applications:

Smartphones and gadgets – Unlocking phones, securing payments, and managing app access.

Airports and border control – Faster identity checks, reducing wait times for travelers.

Healthcare – Identifying patients and protecting medical records.

Banking – Preventing fraud with stronger security measures.

Retail – Recognizing VIP customers or preventing theft.

Law enforcement – Finding missing persons or identifying suspects in crowds.

A growing use is facial recognition software for photos, where apps automatically tag friends or group images. Social media platforms rely heavily on this feature, which has made photo management much easier for users worldwide.

Comparing the Top Facial Recognition Software Options

With so many tools available, how do you know which one stands out? Independent evaluations, like the NIST Face Recognition Vendor Test, provide objective data on performance. You can also check the FRVT 1:1 performance reports for in-depth benchmarking.

Here’s a simplified comparison table of criteria that matter most:

Criteria Why It Matters What to Look For Accuracy Correctly identifying or verifying faces High true positive rate Speed How quickly results are delivered Real-time or near real-time Scalability Handling millions of faces Cloud or distributed systems Compliance Following laws like GDPR Transparent privacy policies Cost Fits your business budget Flexible pricing models

This breakdown helps businesses pick the top facial recognition software for their specific needs.

 

Privacy and Legal Concerns with Face Recognition

Now comes the elephant in the room. As powerful as this technology is, it raises eyebrows when it comes to personal freedom.

Data storage – Where are your facial scans stored, and for how long?

Consent – Are you being recognized without agreeing to it?

Misuse – Could governments or companies abuse this technology for surveillance?

In Europe, these questions tie directly into GDPR compliance. The rules emphasize transparency, data minimization, and user rights. If an organization mishandles face data, the penalties can be steep.

A 2021 study found that 56 percent of people worry about misuse of facial recognition by authorities. This shows that while the tech is impressive, trust remains fragile.

 

Open Source Face Recognition Options for Developers

Not all solutions are locked behind expensive paywalls. Developers and small businesses often turn to face recognition opensource tools. These options allow for flexibility, customization, and cost savings.

Advantages of open-source tools include:

Free or low-cost access to powerful libraries.

Large communities that support development.

Ability to customize for unique projects.

Faster innovation through collaboration.

One notable resource is the Recognito Vision GitHub, where developers can explore codebases, contribute, and experiment with new applications.

 

Future Trends in Face Recognition Technology

The pace of innovation isn’t slowing down. Researchers are refining algorithms to improve speed and reduce bias.

Future trends to watch:

Ethical AI – Systems that reduce bias across race and gender.

Edge computing – Processing data on devices instead of servers for faster results.

Integration with IoT – Smart cities that use recognition for traffic, safety, and efficiency.

Privacy-first models – More tools will adopt privacy-by-design frameworks.

Experts predict that within the next decade, face recognition will be as common as passwords are today, though hopefully far more secure.

 

Conclusion

Face recognition software is no longer futuristic tech, it’s a reality shaping security, convenience, and even social interactions. From photo face detection software to face matching software, its reach is growing rapidly. Yet, the real challenge is balancing innovation with privacy. Companies that master this balance will win trust in the long run.

And speaking of innovation, Recognito is one brand pushing these boundaries with responsible and practical applications.

 

Frequently Asked Questions

 

What is the difference between face detection and face recognition?

Face detection finds and locates a face in an image, while recognition goes a step further by identifying or verifying who that person is.

Is face recognition software always accurate?

No, accuracy depends on the algorithms, quality of data, and lighting conditions. According to NIST tests, top systems can reach over 99 percent accuracy in controlled settings.

Can face recognition software work with old photos?

Yes, many systems can analyze older images. However, accuracy may decrease if the photo quality is low or the person has aged significantly.

Is open source face recognition safe to use?

Yes, but it depends on how it’s implemented. Open-source tools are flexible, but developers must ensure strong security practices when handling sensitive data.

How does face recognition affect privacy rights?

It raises major concerns about surveillance and consent. Laws like GDPR in Europe require companies to handle facial data transparently and responsibly.


auth0

From Building to Scaling: How to Choose the Right Auth0 Plan

Ready to scale your app? Learn how to choose between Auth0's Self-Service and Enterprise plans, based on your team's need for speed, autonomy, and predictable pricing.
Ready to scale your app? Learn how to choose between Auth0's Self-Service and Enterprise plans, based on your team's need for speed, autonomy, and predictable pricing.

Thursday, 25. September 2025

Extrimian

How Extrimian Drives Digital Trust in Healthcare

Why are identity and data critical in healthcare? Healthcare —both public and private— faces a structural challenge: managing massive volumes of sensitive data from patients, professionals, and institutions while ensuring accuracy, security, and transparency. So, how Extrimian Drives Digital Trust in Healthcare? Today’s systems are fragmented. Patient admissions, authorizations, professional valid
Why are identity and data critical in healthcare?

Healthcare —both public and private— faces a structural challenge: managing massive volumes of sensitive data from patients, professionals, and institutions while ensuring accuracy, security, and transparency. So, how Extrimian Drives Digital Trust in Healthcare?

Today’s systems are fragmented. Patient admissions, authorizations, professional validations, or organ transplant waiting lists still rely on manual processes or disconnected databases. The consequences are severe:

Excessive bureaucracy → long delays for authorizations, transplants, or referrals.

Hidden costs → thousands of hours in manual administrative work.

Fraud risks → falsified medical degrees or manipulated patient records.

Social distrust → patients unsure if they are on the correct waiting list; doctors lacking visibility into processes.

In a sector where every minute can make the difference between life and death, the question becomes urgent: How can healthcare systems modernize identity and data management without sacrificing security or trust?

What does Extrimian propose to solve these challenges?

Extrimian provides an ecosystem of Verifiable Credentials (VCs) and digital identity tools enabling hospitals, clinics, insurers, and public agencies to:

Issue and validate credentials in seconds, instead of manual processes taking days.

Guarantee advanced security, with tamper-proof, instantly verifiable records.

Ensure compliance with international standards (W3C, DIF, GDPR, HIPAA).

Optimize costs and resources, cutting bureaucracy and human errors.

Improve patient and professional experience, simplifying access and workflows.

All built on principles of privacy by design, interoperability, and open standards.

How does self-sovereign identity (SSI) apply to healthcare?

Self-Sovereign Identity (SSI) places individuals at the center of control over their personal data.

For patients: medical history, diagnoses, or lab results can be issued as portable, verifiable credentials.

For medical professionals: degrees, licenses, and certifications are turned into tamper-proof VCs that any hospital can instantly verify.

For institutions: each credential is validated without intermediaries and easily integrated into existing hospital systems.

SSI does not replace health systems; it strengthens them with a new layer of trust.

Case Study: How Extrimian helped INCUCAI improve Argentina’s transplant system

The Instituto Nacional Central Único Coordinador de Ablación e Implante (INCUCAI) faced a long-standing challenge: managing the national emergency transplant waiting list.

The problem

Slow processes in organ allocation.

Limited transparency in prioritization.

Patients and families receiving little real-time information.

The Extrimian implementation

Extrimian introduced verifiable credentials to build traceability and trust into the national list:

Every update in the list is issued as a verifiable credential.

Patients and doctors can instantly verify position and status.

All changes are validated securely, without risks of tampering.

The results

Significant time reduction in allocation and updates.

Full transparency for patients, professionals, and regulators.

Improved patient experience through clear communication.

Strengthened trust in one of the most sensitive areas of healthcare.

This pioneering use case demonstrated how Extrimian’s technology can save lives by enhancing transparency and efficiency in public healthcare.

More about this case studie: Extrimian & INCUCAI

What other use cases does Extrimian enable in healthcare? 1. Medical professional identity verification

Problem: manual validation of degrees and licenses.
Solution: verifiable credentials that confirm authenticity instantly, eliminating fraud risks.

2. Verifiable medical records

Problem: fragmented medical histories between hospitals, insurers, and regions.
Solution: interoperable VCs that patients can carry and present anywhere, securely and instantly.

3. Smart access to healthcare services

Secure login for hospital web portals.

QR- and VC-based access control for labs, operating rooms, and medical events.

Automated attendance for in-person and virtual consultations.

4. Patient benefit networks

VCs as digital passes for transportation or pharmacy discounts.

Integration with insurance, pharmacies, and wellness services.

5. Academic and professional certifications

Credentials for courses, residencies, and specializations issued as VCs.

Streamlined hiring and international mobility for healthcare professionals.

What tangible benefits do healthcare institutions gain?

Institutional prestige: issuing VCs with the institution’s brand boosts trust and modernity.

Advanced security: tamper-proof credentials reduce fraud.

Operational efficiency: automated processes cut costs and errors.

Enhanced patient experience: simpler, faster, user-centric interactions.

Strategic partnerships: connection with fintech, insurance, and other key sectors.

Global compliance: alignment with W3C and DIF standards ensures global acceptance.

How is Extrimian implemented in healthcare institutions? Step 1: Personalized demo

Showcasing practical use cases like patient admission or credential verification.

Step 2: Modular implementation

Start with one specific case (e.g., issuing medical certificates) and scale up to a full ecosystem.

Step 3: Continuous support

Training workshops and Extrimian Academy.

Ongoing technical support.

ROI measurement with clear impact metrics.

What is the ROI of verifiable credentials in healthcare?

Administrative savings: up to 60% time reduction in credential verification.

Fraud reduction: fewer legal risks and malpractice cases.

Efficiency gains: processes that once took days now take seconds.

Intangible value: reinforced patient trust and institutional reputation.

For a hospital serving 10,000 patients annually, the potential savings amount to hundreds of thousands of dollars, alongside a substantial boost in credibility.

Conclusion: towards a more trusted, efficient, and human healthcare system

Healthcare needs trust, agility, and security. With Extrimian, identity verification and data management stop being a problem and become a competitive advantage.

The INCUCAI case proves it is possible to reduce delays, increase transparency, and improve patient and professional experiences. And this is just the beginning: from private hospitals to national public networks, verifiable credentials can raise the standard of trust in healthcare worldwide.

👉 Want to explore how these benefits could work in your institution?
Schedule a personalized demo with the Extrimian team today.

The post How Extrimian Drives Digital Trust in Healthcare first appeared on Extrimian.


Holochain

How Does Desirable Social Coherence Evolve?

Blog
Reflections from the DWeb Seminar

In August I had the privilege of participating in the DWeb Seminar 2025, an intimate gathering designed to “map the current DWeb technological landscape, learn from each other, and define the challenges ahead”.  For those unfamiliar with the event, Wendy Hanamura’s excellent recap captures the spirit and outcomes beautifully. As part of the event we were invited to offer a 15 minute “input talk” to the other participants.   I chose to share a fundamental question that has driven Holochain from its inception – and explore how this question shapes not just our technology, but our entire approach to building decentralized systems.

The Core Question: How Does Desirable Social Coherence Evolve?

Everything we do at Holochain (and the projects that I've been nurturing through Lightningrod Labs, like Moss and Acorn) stems from this central inquiry. But what do I mean by “desirable social coherence” and why does it matter? 

You can think of social coherence as a group’s long-term stability. Like most things this property exists along a gradient: some social bodies have more coherence than others, which depends on their capacity to respond and adapt to environmental changes as a result of the patterns, practices and organizing principles that they operate by.  But therein lies the rub.  Some of  these patterns provide lots of coherence, but they may not be desirable or pleasant for the individuals taking part in them!  It’s no fun for almost everybody involved in an authoritarian regime, but it does have a real degree of stability.   My fundamental belief, however,  is that not only is it possible to evolve these patterns and processes in directions that participants will find pleasant and desirable, but that doing so actually yields the most long term stability because they will by that fact not contribute to destabilizing it.

The Challenge: Current digital systems scale through centralization and intermediation of critical social functions. Unfortunately, this creates undesirable forms of social coherence – power imbalances that enable both intentional and unintentional abuse. When a few entities control the platforms where billions interact, we may get coherence, but it's often extractive rather than generative. Furthermore our current systems are difficult to evolve because of their very centralization and the interests that want to keep them that way to maintain power.

The Opportunity: Decentralized technology can create substrates for evolvable social coherence – essentially, DNA for social organisms. Instead of rigid, centralized structures, we can build infrastructure that enables new forms of social fabric to emerge and multiple scales, yielding increasing collective intelligence

A key insight here is that there is no single “correct” form of social coherence. What works is contextual, diverse across time, space, and scale. What we need is infrastructure that enables continuous evolution and discovery – balancing stability with emergence. 

How This Shapes Our Work at Holochain

This framework isn’t abstract philosophy - it directly informs every architectural decision we make. When building technology to support evolvable social coherence, several principles become essential:

Engagement Spaces as Building Blocks

Human social fabric is built out of layers of interacting and layered “engagement spaces” – essentially social contracts with defined rules. We need infrastructure that makes it easy to create, use, and compose these spaces. The current web may have “solved for” decentralization of publishing - anyone can create a website or blog without permission. But the places where people actually interact and engage with each other (social media platforms, forums, collaborative tools, even finance and accounting tools) remain under intermediary controlled web-servers. Our approach requires protocols where neither the data nor the rules of the group interaction are held by intermediaries. 

Agency AND Accountability, Mutually Interwoven

Individuals need genuine agency through their technology - the ability to participate in multiple spaces, move between them, and take their data with them. But this autonomy must be paired with accountability within the contexts where they participate. This tension between empowerment and responsibility is productive, not problematic.

Uncapturable/Unenclosable Carriers: The infrastructure itself must be immune to capture - meaning no single entity can gain enough control to dictate rules, extract value, or shut down the system. We’ve seen far too many examples of infrastructure capture” governments shutting down internet services during protests, platform owners changing terms to benefit their shareholders, or cloud providers being pressured to deplatform users. Even when specific engagement spaces have their own defined rules, the underlying “carrier” of those interactions must remain decentralized. This enables autonomous group formation without intermediation - groups can organize however they choose without worrying that their technological foundation can be pulled out from under them.  

Local State, Global Visibility: Rather than forcing artificial global consensus (like blockchains do), we recognize that state is inherently local but can achieve consistent global visibility if nodes share data.  Operating this way eliminates unnecessary coordination bottlenecks while maintaining system coherence. 

Architectural and Design Consequences

The principles stated above have very concrete design and implementation consequences.  For those technically familiar with Holochain you already know how they show up in the design, but here I list some of the key aspects along with pointers to documentation that describe each consequence in more detail.

Start with a capacity to define & create a known “engagement space”.  The “rules of a game”.  This consists of the hash of a set of data-types & relations and deterministic validation rules for creation of that data. In Holochain we call this the DNA Allow agents to be the authoritative source of all data, i.e. agents “make plays” according to the rules of the DNA.  Ensure that when this data is shared, it has intrinsic data integrity, i.e. it’s a cryptographically signed append-only ledger for that source (in Holochain we call this the Source Chain), and ensure that it is identifiable as being part of an engagement space by having the first entry in the chain being an agent’s signing of the space’s hash.  This is also “I consent to play this game”. Share data to an eventually consistent Graphing Distributed Hash Table (DHT), in which other agents validate that all shared data follows the rules of the game. Ensure that agents who don’t follow the rules can be blocked/ignored.  This prevents capture. Allow for “bridge” calls between engagement spaces at the agentic locus (i.e. not at the group level) for composability of spaces.  This ensures composibility, autonomy, and accountability

There are of course more details in the design, but these are some of the key ones that fall out of the principles.

Resonance at the DWeb Seminar

What struck me most about the seminar was how much of our framework resonated with challenges other participants were grappling with, even when they approached them from different angles.  I would even say that the Seminar itself was fundamentally an example of this thinking.  It was a carefully designed set of patterns and processes  for a literal engagement space (this time physical instead of digital) whose purpose was to increase the social coherence of players in the p2p domain.  These patterns not only included the processes of the input-talks, the unconference sessions, and commitment to production of a collaborative write-up, but also the relational parts of cooking together and sharing non-work time together.  All of this together created desirable social coherence.   And it’s this pattern that we are all trying to create powerful affordances for in the digital world.

Some further examples: During the unconference sessions, conversations kept circling back to fundamental questions about coordination, autonomy, and accountability. 

When we discussed "UI Patterns for Peer-to-peer," I saw it as asking: how do we make decentralized engagement spaces feel natural and empowering to users? When we debated collaborative data model requirements, I saw it as exploring: how do we maintain coherence across distributed participants without sacrificing agency?

When Rae McKelvey shared her focus on "purpose-built apps" that solve real social problems to me that aligned perfectly with the engagement space concept—recognizing that different contexts require different rules and structures. 

At the technical level David Thompson's work on object capabilities and Duke Dorje’s work on recryption and identity both live into the same autonomy-with-accountability tension we see as central to social coherence.  The ever-present discussions about how best to implement CRDTs (Conflict-free Replicated Data Types, of which Holochain’s DHT is an example) revealed the shared underlying assumption: that meaningful coordination really is possible without central control, that local autonomy and global coherence can coexist, and most profoundly that the infrastructure we build shapes the social possibilities it enables.

But if everything resonated so well, what’s the big deal?

Why This Matters for the Decentralized Ecosystem

Probably the most common complaint I’ve heard over the years from folks who see the astounding potential of decentralized infrastructure goes something like this:  “There are so many different p2p solutions, and teams that seem to be working in isolation, why can’t you just agree on a single solution and work together?”  On the surface, this sounds like a reasonable complaint, but the lens of coherence helps understand why “working together” is actually such a hard problem to solve.  

Recalling from the start of this article: what creates coherence are the patterns, practices and organizing principles of a group.  Just because groups have the same goals and want the same outcomes, does not mean that they start their patterns, processes and organizing principles are similar and compatible.  In fact, almost always, they aren’t.  But this relates to why the DWeb Seminar was so important.  It successfully operated according to a higher order organization principle that created an engagement space precisely for the purpose of getting at what patterns, practices and organizing principles folks in the broad DWeb community were operating by, and making them visible and .  

So to me this was an example of exactly the underlying principles that we’ve been embedding in Holochain’s architecture from the start.

So, while the decentralized web movement often focuses on technical capabilities – faster consensus, better cryptography, more efficient protocols, we are now seeing the community beginning to seriously see these as means, not ends. The higher level question remains: what kinds of social possibilities can these technologies enable? 

This approach enables us to build towards greater “commons enabling infrastructure” - technology that strengthens shared resources and collective capacity rather than extracting value. The creation of digital, unenclosable fabric of engagement spaces is central to this goal. Instead of platforms that capture value from user interactions, we can build infrastructure that enables communities to create and govern their own spaces, according to their own values. 

When the decentralized ecosystem embraces this approach, many new possibilities emerge:

Interoperability with Purpose: We can more easily build bridges between systems that share compatible social intentions. A climate action network could seamlessly share data and coordinate with a local food co-op using a different protocol, supporting community resilience initiatives that address both environmental and food security challenges, while using mutual-credit currencies backed by the productive capacity of the local farms supplying the co-op. Governance that Evolves: We can build infrastructure that enables continuous governance innovation rather than trying to solve governance once and for all. A neighborhood mutual aid group could start with simple coordination tools, then gradually evolve more sophisticated decision-making processes as their needs change, without having to migrate to entirely new platforms. Network Effects that Serve Users: We can create composable ecosystems where network effects benefit participants rather than extracting from them. As more people join a decentralized social network, the benefits – better content discovery, richer discussions, stronger community bonds - flow to the participants themselves rather than to a platform owner’s advertising revenue.  The Path Forward

The grand challenge of decentralized software is ensuring it actually delivers on evolvable social coherence. This means building infrastructure that serves the flourishing of people and planet rather than extracting from it. 

At Holochain, we’re committed to this path, not just in our technology choices, but in how we organize ourselves, engage with our community, and collaborate with other projects. The conversations at the DWeb Seminar reinforced that we’re not alone in this commitment. 

The adjacent possibility that Wendy described in her recap isn’t just about new technical capabilities – it’s about new forms of social organization that those capabilities make possible. That’s both a tremendous responsibility and an extraordinary opportunity for all who choose to walk to this path. 


Veracity trust Network

Are AI Agents a threat to all industries or just another digital tool?

AI Agents are a growing influence on how we do business online and it pays to be aware of how they work – and the potential risks they expose. Also known as Agentic AI, they are defined as autonomous systems that perceive, make decisions, and take action to achieve specific goals within an environment. The post Are AI Agents a threat to all industries or just another digital tool? appeared f

AI Agents are a growing influence on how we do business online and it pays to be aware of how they work – and the potential risks they expose.

Also known as Agentic AI, they are defined as autonomous systems that perceive, make decisions, and take action to achieve specific goals within an environment.

The post Are AI Agents a threat to all industries or just another digital tool? appeared first on Veracity Trust Network.


Ocean Protocol

DF156 Completes and DF157 Launches

Predictoor DF156 rewards available. DF157 runs September 25th — October 2nd, 2025 1. Overview Data Farming (DF) is an incentives program initiated by ASI Alliance member, Ocean Protocol. In DF, you can earn OCEAN rewards by making predictions via ASI Predictoor. Data Farming Round 156 (DF156) has completed. DF157 is live today, September 25th. It concludes on October 2nd. For this DF roun
Predictoor DF156 rewards available. DF157 runs September 25th — October 2nd, 2025 1. Overview

Data Farming (DF) is an incentives program initiated by ASI Alliance member, Ocean Protocol. In DF, you can earn OCEAN rewards by making predictions via ASI Predictoor.

Data Farming Round 156 (DF156) has completed.

DF157 is live today, September 25th. It concludes on October 2nd. For this DF round, Predictoor DF has 3,750 OCEAN rewards and 20,000 ROSE rewards.

2. DF structure

The reward structure for DF157 is comprised solely of Predictoor DF rewards.

Predictoor DF: Actively predict crypto prices by submitting a price prediction and staking OCEAN to slash competitors and earn.

3. How to Earn Rewards, and Claim Them

Predictoor DF: To earn: submit accurate predictions via Predictoor Bots and stake OCEAN to slash incorrect Predictoors. To claim OCEAN rewards: run the Predictoor $OCEAN payout script, linked from Predictoor DF user guide in Ocean docs. To claim ROSE rewards: see instructions in Predictoor DF user guide in Ocean docs.

4. Specific Parameters for DF157

Budget. Predictoor DF: 3.75K OCEAN + 20K ROSE

Networks. Predictoor DF applies to activity on Oasis Sapphire. Here is more information about Ocean deployments to networks.

Predictoor DF rewards are calculated as follows:

First, DF Buyer agent purchases Predictoor feeds using OCEAN throughout the week to evenly distribute these rewards. Then, ROSE is distributed at the end of the week to active Predictoors that have been claiming their rewards.

Expect further evolution in DF: adding new streams and budget adjustments among streams.

Updates are always announced at the beginning of a round, if not sooner.

About Ocean, DF and ASI Predictoor

Ocean Protocol was founded to level the playing field for AI and data. Ocean tools enable people to privately & securely publish, exchange, and consume data. Follow Ocean on Twitter or TG, and chat in Discord. Ocean is part of the Artificial Superintelligence Alliance.

In Predictoor, people run AI-powered prediction bots or trading bots on crypto price feeds to earn $. Follow Predictoor on Twitter.

DF156 Completes and DF157 Launches was originally published in Ocean Protocol on Medium, where people are continuing the conversation by highlighting and responding to this story.


auth0

Announcing Auth0 for AI Agents: Powering the Future of AI, Securely

Worried about trusting AI agents with critical data? Auth0 for AI Agents is a complete auth solution that gives companies the confidence to adopt AI securely.
Worried about trusting AI agents with critical data? Auth0 for AI Agents is a complete auth solution that gives companies the confidence to adopt AI securely.

FastID

4 Tips for Developers for Using Fastly’s Sustainability Dashboard

Track the real-world emissions of your Fastly workloads. This blog shares practical tips on using the Sustainability dashboard for greener, faster code.
Track the real-world emissions of your Fastly workloads. This blog shares practical tips on using the Sustainability dashboard for greener, faster code.

Wednesday, 24. September 2025

liminal (was OWI)

The Silent Killer in Third-Party Risk: Why Behavioral Red Flags Matter More Than Checklists

The hidden risks behind vendor relationships It starts innocently enough. A supplier begins missing deadlines. A long-trusted partner suddenly resists contract changes. Payments arrive late, documentation lags, and small deviations creep into everyday interactions. These aren’t just operational hiccups—they’re behavioral red flags. For years, third-party risk management (TPRM) relied on static com
The hidden risks behind vendor relationships

It starts innocently enough. A supplier begins missing deadlines. A long-trusted partner suddenly resists contract changes. Payments arrive late, documentation lags, and small deviations creep into everyday interactions. These aren’t just operational hiccups—they’re behavioral red flags.

For years, third-party risk management (TPRM) relied on static compliance checklists: audits, certifications, and one-off questionnaires. But today’s risk environment has outpaced that model. Subtle engagement shifts often signal vendor instability—or even fraud—well before a failed audit or regulatory breach brings it to light.The stakes are growing. A single vendor misstep can trigger multimillion-dollar losses, regulatory scrutiny, and reputational fallout. In 2025, the risk that matters most isn’t what the audit catches—it’s what it misses.

What Is Third-Party Risk Management?

Third-party risk management (TPRM) is the discipline of identifying, assessing, and mitigating risks that arise from vendors, suppliers, and business partners. It goes beyond contract compliance to cover financial, cybersecurity, operational, and reputational exposures.

Why compliance checklists fall short

Traditional compliance frameworks provide assurance, but they’re backward-looking. By the time an issue surfaces in an audit, the damage may already be done.

Complex risks are growing: According to Liminal’s Market & Buyer’s Guide for TPRM, 33% of organizations cite complexity of risks as the top barrier to effectiveness—outranking resources or legacy systems. Budgets are shifting: The same research shows that two years ago, 77% of businesses devoted 10% or less of their budgets to TPRM. Today, 84% say funding is sufficient—a 42% improvement. Maturity remains low: Despite rising investment, only 9% of organizations have achieved “advanced” TPRM maturity, underscoring how far the market still has to go.

Static compliance isn’t enough when risk signals emerge daily in behavior, process, and relationships.

The market is moving fast

The risk isn’t just theoretical—the market for third-party risk management is expanding quickly. Liminal’s research shows that while sentiment on budget sufficiency has improved by 42% in two years, only 9% of organizations have achieved advanced maturity.

It’s a sign that boards and executives see TPRM as too important to ignore—but most are still playing catch-up. As Gartner notes, organizations that fail to modernize vendor risk programs face increasing exposure across cybersecurity, compliance, and operational resilience.

Market & Buyer’s Guide for Third-Party Risk Management 2025, p.19 From checklists to behavioral red flags

Behavioral red flags—missed SLAs, contract resistance, data delivery delays, unusual communication shifts—are leading indicators of risk. Unlike static compliance, they reveal real-time vulnerabilities and allow earlier intervention. Behavioral risk monitoring is the practice of tracking deviations in how vendors operate and interact that can signal early signs of instability or misconduct.

The most effective programs are:

Embedding continuous monitoring rather than point-in-time reviews. Integrating behavioral insights into enterprise-wide dashboards. Automating alerts when engagement patterns deviate from norms.

This shift mirrors risk management trends across Data Access Control and AI Data Governance—executives no longer want box-checking. They want predictive visibility into the risks that can derail operations, undermine vendor resilience, and erode supplier trust.

Market & Buyer’s Guide for Third-Party Risk Management 2025, p.18 What executives are demanding now

For boards and CISOs, vendor risk has become strategic infrastructure: as vital to credibility as financial reporting or data security. The new priorities are clear:

Continuous monitoring: Liminal’s Regulatory TPRM Link Index shows that 63% of buyers rank this as their top priority. Automation at scale: 42% cite automation of TPRM activities as their top optimization goal. Data quality: Cybersecurity TPRM buyers emphasize accuracy (89%) and monitoring (85%) as table stakes, guided by emerging frameworks such as NIST’s Cybersecurity Framework. Cross-functional orchestration: Operational buyers demand interoperability across compliance, procurement, and security.

These shifts signal the end of siloed vendor risk teams. The winners will be those who connect behavioral risk detection into broader enterprise resilience strategies.

The executive reality check

Boards no longer accept “checklist compliance” as proof of safety. Regulators and investors expect real-time assurance. Yet with only 9% of organizations achieving advanced TPRM maturity, most enterprises remain exposed.

The Wall Street Journal recently reported on how supply chain disruptions and vendor failures are forcing boards to elevate TPRM to a core resilience strategy—not just a compliance function. It’s a signal that the market is moving fast, and expectations are rising. Regulatory frameworks are evolving in parallel. The SEC now requires detailed cyber disclosures, the EU GDPR continues to impose significant fines, and NIST provides baseline guidance for organizations modernizing their risk programs.

By acting on behavioral red flags, enterprises strengthen resilience and trust. Ignoring them leaves blind spots that regulators and investors won’t overlook.

Turning behavioral insight into advantage

Behavioral risk monitoring isn’t just a compliance upgrade. It’s a competitive advantage. By weaving continuous monitoring and behavioral insights into third-party risk management, executives can:

Protect against operational and financial losses. Demonstrate resilience to regulators. Build stronger trust signals with investors, customers, and suppliers.

👉 Dive deeper in the Market & Buyer’s Guide for Third-Party Risk Management and explore the Cybersecurity, Operational, and Regulatory Link Indexes to see how leading enterprises are raising the bar.

👉 Watch our Webinar on TPRM Strategy & Stronger Risk Management to hear how leaders are operationalizing these shifts in real time.

The post The Silent Killer in Third-Party Risk: Why Behavioral Red Flags Matter More Than Checklists appeared first on Liminal.co.


Indicio

How decentralized identity delivers next generation authentication and fraud prevention

The post How decentralized identity delivers next generation authentication and fraud prevention appeared first on Indicio.
Decentralized identity and Verifiable Credentials remove the vulnerabilities driving generative-AI, social engineering, and synthetic identity fraud at a significantly lower cost than legacy or alternative solutions. How? The technology allows you to just bypass these problems. With Indicio Proven, you get authentication and fraud prevention in a single, affordable, globally interoperable platform.

By Trevor Butterworth

The new report by Liminal — The Convergence of Authentication and Fraud Prevention — makes for stark reading.

Fraud losses in the U.S. alone are projected to double in just three years to $63.9 billion, with account takeover fraud accounting for half. Seventy-one percent of respondents to their survey of 200 buyers in retail, ecommerce, financial services and tech believe current methods of authentication may be insufficient to thwart generative-AI social engineering attacks. And almost two-thirds worry that additional security layers will add unacceptable friction to customer and user experience.

One could say the problem is that the technology powering fraud is more powerful than the technology powering authentication and fraud prevention. And the latter’s weakness is compounded by authentication and fraud prevention being two separate processes, often managed by multiple different vendors.

The solution is more of everything — more layers of defense, multi-level signals analysis, more authentication factors, and good AI to battle the bad AI. All of which translates into more complexity, friction, and cost. No surprise, Liminal also reports increasing budgets for authentication, account takeover protection, and social engineering scam prevention, and it projects these budgets will continue increasing year-on-year.

Meanwhile, customers and consumers — many of whom are digital natives — expect seamless, frictionless interaction and not painful multifactor authentication. As a result, organizations face brutal tradeoffs: cater to digital behavior and increase risk, or decrease risk but make customers pay in friction and risk losing them.

Fix the fundamental problem

There’s a reason the technology powering fraud has the upper hand: The legacy systems organizations rely on — username/password,  stored biometrics, centralized databases filled with personal data — are all vulnerabilities easily exploited by brute-force AI attacks, synthetic identity fraud, and deepfakes.

Remove these vulnerabilities and you remove these problems. That’s what decentralized identity does. It removes the need for usernames, passwords, and the centralized storage of personal data needed to manage identity and access.

That’s what Indicio’s customers are doing — sweeping away the digital structures and processes that are the cause of all these problems.

We replace this with Verifiable Credentials. They’re a simple way for each party in a digital interaction — customers, organizations, employees, devices, virtual assistants — to authenticate the other in a way that can’t be phished, hacked, or faked; and we do this authentication before any data is shared.

Verifiable Credentials reduce fraud by enabling digital credentials to be bound to individuals in a way that is cryptographically tamper-proof, and which can incorporate biometrics that have been authenticated. This closes off attack vectors like phishing, synthetic identities, and — with an authenticated biometric in a Verifiable Credential — deepfakes.

A person with an authenticated biometric in a Verifiable Credential has a portable digital proof of themselves that can be instantly corroborated against a liveness check.

A decentralized identity architecture changes everything. It integrates authentication and fraud prevention, creates unified digital identities, and enables data to be fully portable, trusted and acted on immediately — without friction to businesses or customers.

Just as important, it’s significantly less expensive than legacy or alternative solutions; it can be layered into existing systems, meaning that it’s a solution that, depending on the scope, can be implemented in days or weeks.

Don’t take our word, see what our customers are doing

Indicio and its customers — enterprises, financial services,  governments — have had enough of the same old same old. We and they are using Verifiable Credentials to cross borders, onboard customers, and authenticate account access — all seamlessly with the highest level of digital identity assurance.

It might be hard to believe that a solution could be that simple — that you can just remove the core vulnerabilities fueling the surge in identity-related fraud and not have to rip and replace your entire authentication infrastructure.

Contact us to see a demo — and discover how Indicio Proven is being used as a single authentication and fraud prevention system to create seamless and trusted digital interaction.

The post How decentralized identity delivers next generation authentication and fraud prevention appeared first on Indicio.


FastID

Fastly’s Pillars of Resilience: Building a More Robust Internet

Discover Fastly's Pillars of Resilience: unwavering availability, minimized latency, and disruption resistance for a robust internet experience with our global network.
Discover Fastly's Pillars of Resilience: unwavering availability, minimized latency, and disruption resistance for a robust internet experience with our global network.

Tuesday, 23. September 2025

IDnow

Why banks need modular KYC solutions to future-proof compliance: Insights from Finologee’s Carlo Maragliano.

We sat down with Carlo Maragliano from digital platform Finologee to explore how financial institutions are getting ready for the evolving regulatory landscape and how they use technology to accelerate their go-to-market while staying audit-ready and resilient.  As new regulations such as eIDAS 2.0, AMLR and DORA reshape the compliance landscape across Europe, financial institutions […]
We sat down with Carlo Maragliano from digital platform Finologee to explore how financial institutions are getting ready for the evolving regulatory landscape and how they use technology to accelerate their go-to-market while staying audit-ready and resilient. 

As new regulations such as eIDAS 2.0, AMLR and DORA reshape the compliance landscape across Europe, financial institutions are under pressure to future-proof their onboarding and KYC processes.

Luxembourg-based Finologee, a leading digital platform operator for the financial industry, is helping banks and payment institutions meet regulatory challenges through its KYC Manager, an orchestration layer that combines flexibility with embedded regulatory readiness. By integrating IDnow’s automated identity verification technology, Finologee enables its clients to accelerate go-to-market, simplify compliance and tailor onboarding journeys across regions. With Carlo Maragliano, Head of Delivery and Customer Success at Finologee, we discussed how technology, automation and orchestration are transforming digital identity at scale.

Navigating the evolving regulatory landscape Regulations such as eIDAS 2.0, AMLD6 and DORA are coming into force soon. How are the changes brought about by these regulations influencing you and your banking clients’ KYC and digital onboarding priorities?

Heightened regulatory complexity is pushing banks to adopt more modular and future-proof KYC solutions. These upcoming regulations are significantly reshaping compliance priorities for financial institutions. For example, eIDAS 2.0 introduces Qualified Electronic Identity (QeID), which makes interoperability and eID support essential. AMLD6 expands criminal liability and due diligence obligations, which increases the need for granular audit trails and automated, risk-based workflows. And with DORA, operational resilience becomes a key focus, requiring stronger vendor oversight, digital continuity and secure third-party integrations. Finologee’s orchestration layer, combined with IDnow’s embedded identity verification, equips institutions to meet these regulatory shifts without having to re-engineer their core systems. 

IDnow’s Automated Identity Verification 

IDnow provides a fully automated identity verification solution that integrates seamlessly with Finologee’s KYC Manager. It supports document authentication from more than 215 international issuing authorities, uses AI-driven checks and biometric liveness detection and helps banks and other regulated industries to reduce onboarding times while ensuring full regulatory compliance. This technology enables companies to verify the identities of their users seamlessly and securely.

Ensuring adaptability in a dynamic regulatory environment How do you ensure that your solutions remain adaptable as regulations and customer expectations continue to evolve?

We’ve built everything on an API-first modular architecture that enables quick adaptation to regulatory shifts. On top of that, Finologee continuously engages with clients to align roadmap priorities with industry changes. The platform is also fully customisable and configurable, so institutions can tailor onboarding flows, verification steps and compliance logic to specific regulatory requirements, customer segments and regional markets without extensive development effort.

Did you know? Over 55% of consumers are more likely to apply for services if the onboarding process is entirely digital, including online identity verification.

The role of automation in scaling operations What role does automation play in helping banks scale their operations without sacrificing security or compliance?

Automation is really important for all businesses. It reduces dependency on manual reviews, thus lowering both cost and error rates. Automated decisioning also helps apply consistent compliance logic. With real-time workflows, customers can be onboarded faster without sacrificing auditability, while compliance teams gain transparency and control through dashboards and exception handling flows. 

What challenges do financial institutions face when trying to scale their compliance and onboarding processes across multiple markets and how does KYC Manager help overcome these hurdles?

Scaling across markets brings several hurdles. Institutions face varying regulatory requirements across countries, different acceptable ID document types and verification standards, and operational silos that slow down onboarding harmonisation. With KYC Manager, we address these challenges through a centralised orchestration layer with localised compliance modules, document coverage across 157 countries enabled by IDnow and a flexible flow builder that allows journeys to be adapted by region or customer type.

Did you know? Banks that increased end-to-end KYC-process automation by 20% saw a triple benefit effect : increased quality-assurance scores by 13%; improved customer experience by reducing the number of customer outreaches per case by 18% and enhanced productivity by increasing the number of cases processed per month by 48%. In what ways does the integration between Finologee’s KYC Manager and IDnow’s automated identity verification technology enable faster go-to-market for banks and other financial institutions? Can you share a concrete example?

Because identity verification is pre-integrated, deployment timelines are shortened considerably. This means clients such as banks or other financial institutions can launch new services or expand to new markets faster thanks to embedded regulatory readiness.  

A concrete example: the IDnow verification flow is especially useful when identifying ultimate beneficial owners (UBOs) and persons with significant control (PSCs), so people who ultimately own or control their company and are legally required to identify during onboarding. If the person responsible for their dossier doesn’t have their IDs, they can trigger an SMS to the phone number of the UBO or PSC to complete the verification directly. 

Scaling across markets and customization How do you support financial institutions in customizing onboarding journeys for different regions or customer segments?

The Finologee KYC platform enables journey segmentation by geography, product line or a risk profile. For instance, workflow logic can automatically route high-risk users to manual review or enhanced due diligence paths.

Looking ahead, what trends do you anticipate will most impact the way banks approach digital identity and compliance at scale?

We see AI and biometrics becoming standard components of fraud prevention. There will also be greater emphasis on accessibility, inclusivity and cross-device onboarding. And more broadly, banks and other financial institutions will be looking to reduce fragmentation through orchestration platforms.

On a personal level, what excites you most about working at the intersection of technology, compliance and financial services? Is there a particular moment or project that made you feel especially proud of the impact you’re making?

For me, it’s seeing how all the pieces come together in practice. One moment that really stood out was supporting a client launch in Luxembourg under tight regulatory deadlines they needed to comply with. It was a great example of how the platform can unlock speed, compliance, and user experience all at once – we successfully implemented KYC Manager within just three months, enabling a fully digital account opening process with no paper or printing requirements. On average, our clients see the submission process reduced to under 10 minutes and conversion rates doubled compared to traditional KYC remediation processes, while substantially lowering human error and workload.

Interested in more from our customer interviews? Check out: Docusign’s Managing Director DACH, Kai Stuebane, sat down with us to discuss how secure digital identity verification is transforming digital signing amid Germany’s evolving regulatory landscape. DGGS’s CEO, Florian Werner, talked to us about how strict regulatory requirements are shaping online gaming in Germany and what it’s like to be the first brand to receive a national slot licence.

By

Nikita Rybová
Customer and Product Marketing Manager at IDnow
Connect with Nikita on LinkedIn


Ockto

Column: AI is een briljante puber

Voor de HypoVak-special van InFinance schreef Gert Vasse de volgende column: AI lijkt al snel een BFF © (best friends forever) te worden. Het duikt in rap tempo op in allerlei handige toepassingen. Sindskort geeft bijvoorbeeld Google bij veel zoekopdrachten een handig AI-overzicht. Die functie bespaart je veel zoekwerk en geeft een goede samenvatting inclusief bronvermeldingen.

Voor de HypoVak-special van InFinance schreef Gert Vasse de volgende column:
AI lijkt al snel een BFF © (best friends forever) te worden. Het duikt in rap tempo op in allerlei handige toepassingen. Sindskort geeft bijvoorbeeld Google bij veel zoekopdrachten een handig AI-overzicht. Die functie bespaart je veel zoekwerk en geeft een goede samenvatting inclusief bronvermeldingen.


Duitse en Franse cybersecurity autoriteiten: let op AI-fraude bij digitale identificatie

Betrouwbare en veilige klantidentificatie is binnen de financiële sector een kernvoorwaarde om te voldoen aan wet- en regelgeving (Wwft, AML5, eIDAS, AVG). Met de introductie van ID-Wallets en eIDAS2.0 in 2028/2029 zal vanuit de overheid een structurele oplossing voor veilige digitale identificatie worden geboden.

Betrouwbare en veilige klantidentificatie is binnen de financiële sector een kernvoorwaarde om te voldoen aan wet- en regelgeving (Wwft, AML5, eIDAS, AVG). Met de introductie van ID-Wallets en eIDAS2.0 in 2028/2029 zal vanuit de overheid een structurele oplossing voor veilige digitale identificatie worden geboden.


Geverifieerde brondata: betere risico-inschatting met minder handwerk

Incomplete dossiers, ontbrekende documenten, langdurige doorlooptijden. Het verzamelen van klantdata is in veel kredietprocessen nog een tijdrovende stap. Er zijn meerdere contactmomenten nodig, aangeleverde gegevens zijn onduidelijke en er is het risico op fouten of fraude.

Incomplete dossiers, ontbrekende documenten, langdurige doorlooptijden. Het verzamelen van klantdata is in veel kredietprocessen nog een tijdrovende stap. Er zijn meerdere contactmomenten nodig, aangeleverde gegevens zijn onduidelijke en er is het risico op fouten of fraude.


Spherical Cow Consulting

Pirates, Librarians, and Standards Development

With the right motivation, even I will write a blog post on a dare. And the dare I got was to write a post about what librarians and pirate captains have in common, and why it matters for standards development. (If you can’t have fun when writing, what’s the point?) The post Pirates, Librarians, and Standards Development appeared first on Spherical Cow Consulting.

“With the right motivation, even I will write a blog post on a dare. And the dare I got today was to write a post about what librarians and pirate captains have in common, and why it matters for standards development.”

(If you can’t have fun when writing, what’s the point?)

I’m sure you all want to know what on earth THAT conversation was about. It started with the desire to assign vanity titles to friends. One friend was assigned “Intrepid bass-playing sailor cyber warrior” (though that one is possibly still a work in progress). So, of course, I had to ask what my title would be.

She thought something pirate-based. I thought maybe mob boss was more appropriate. But, no: “Nah, you don’t rule through fear. You set rules, and then people come to learn that obeying the rules brings progress while disobeying the rules brings a walk down the plank. Very impersonal, no bloodshed, just terminal disapproval.” Which I read not so much as Pirate as Librarian, and in either case, reminds both of us of what the standards development process is like.

In a way, this builds on a post I wrote a few weeks ago about needing all kinds of people and skills to develop good standards.

A Digital Identity Digest Pirates, Librarians, and Standards Development Play Episode Pause Episode Mute/Unmute Episode Rewind 10 Seconds 1x Fast Forward 30 seconds 00:00 / 00:07:50 Subscribe Share Amazon Apple Podcasts CastBox Listen Notes Overcast Pandora Player.fm PocketCasts Podbean RSS Spotify TuneIn YouTube iHeartRadio RSS Feed Share Link Embed

You can Subscribe and Listen to the Podcast on Apple Podcasts, or wherever you listen to Podcasts.

And be sure to leave me a Rating and Review!

Librarians and pirates: unlikely comparisons

On the surface, librarians and pirates couldn’t be more different. One rules a quiet, organized room full of catalogues and classification systems. The other shouts orders across a storm-tossed deck, treasure map in hand.

But scratch at the stereotypes, and the similarities pop up:

Both guard treasure — knowledge or gold. Both rely on codes that aren’t strictly laws, but that everyone learns to respect. Both lead crews (or patrons) who don’t always agree but who need to move in the same direction. And both know that without discipline, the whole ship — or library — quickly sinks.

Standards development, in its own way, needs a bit of both. Librarians bring order, taxonomies, metadata, and interoperability. Pirates bring the consequences: if you won’t play along with the standard, good luck finding allies or charting your course without a map.

Leadership characteristics

So what’s actually useful, whether you’re wrangling sailors, cataloguing a collection, or chairing a standards meeting?

Ability to engage people so they pay attention. Whether it’s a weary deckhand, a confused student, or a standards group at the two-hour mark, keeping attention is half the battle. Ability to raise one eyebrow sternly. Every ship, library, or working group needs That Person. The person who has one eyebrow that says: “Are you sure you want to keep going down that path?” Sometimes it’s more effective than three paragraphs of meeting minutes. Ability to lead people to their own conclusions. Neither pirate captains nor librarians hand you the final answer. The captain points at the map and lets you realize the treasure’s yours to dig up. The librarian nudges you toward the right catalogue entry. In standards, this is the art of facilitation — nudging until consensus emerges. What doesn’t work Leading purely through fear. Fear doesn’t build commitment — it drives people away. Pirates who rule by terror end up facing mutiny, and librarians who inspire only dread will find books mysteriously mis-shelved out of spite (I hate it when that happens). In standards, disengagement is fatal: if people only show up to avoid backlash, the work stalls and the draft sinks. Letting others set the tone of fear. A crew ruled by grudges goes nowhere, and a library ruled by petty turf wars becomes unusable. The same is true in standards: if flame wars and side agendas become scarier than the actual process, people stop showing up; without participation, no standard survives. Romance, intrigue, and life

Obviously, this is a very romanticized version of a pirate (and of a librarian, for that matter). Real librarians don’t spend their time swashbuckling, and real pirates were often violent criminals (also without the swashbuckling). But when I’m not writing, editing, researching, or running meetings, I’m reading trashy romance novels. Romanticized life in my spare time is my idea of entertainment.

And maybe that’s the point: we bring our own metaphors and stories to how we think about leadership and collaboration. Whether you fancy yourself the stern-eyebrowed librarian or the captain with a plank, the truth is that standards need both. Someone to keep the ship steady, someone to keep the records straight, and all of us learning when to raise an eyebrow at just the right time.

Hopefully, this post made you smile. And if it didn’t, I have a Very Stern Look at the ready for you.

If you’d rather track the blog than the podcast, I have an option for you! Subscribe to get a notification when new blog posts go live. No spam, just announcements of new posts. [Subscribe here

Transcript Introduction

00:00:31 Hello and welcome back to A Digital Identity Digest.

00:00:35 Today’s episode comes from a dare. And honestly, if you know me, you’ll understand that’s a very dangerous way to start anything.

The dare was simple: write a post about what librarians and pirate captains have in common and why that matters to standards.

How could I say no to that?

00:00:52 Because let’s be honest—if you can’t have fun with your writing, what’s the point?

Pirates and Librarians: Not So Different

00:00:57 At first glance, pirates and librarians couldn’t be more different.

Pirates live on the high seas, sword in hand, shouting orders across storm-tossed decks. Librarians work in hushed halls, surrounded by catalogs and metadata, raising an eyebrow when needed.

And yet, if you look closely, there’s surprising overlap.

00:01:25 This all started with a conversation about vanity titles—those fun, unofficial roles we give each other.

A friend was dubbed the Intrepid Bass-Playing Cyber Sailor Warrior. Mine was harder: pirate? mob boss? librarian?

00:02:06 The final suggestion landed: I don’t rule through fear—I set rules. And when followed, they bring progress. Ignore them, and… well, it’s a walk down the plank.

That sounded far less like a pirate and far more like a librarian—which is fitting, since I have a degree in library science.

Shared Treasures and Shared Codes

00:02:24 So, what do pirates and librarians actually do?

Pirates guard treasure: gold, jewels, captured loot. Librarians guard knowledge: books, archives, collections, and digital resources.

00:02:42 Both operate according to a code.

Pirates had their Pirate Code—rules about dividing loot, settling disputes, and running the ship. Librarians have cataloging standards, metadata schemas, and classification systems.

00:03:08 Neither set of rules carries the weight of law, but ignoring them leads to chaos.

00:03:19 And both depend on their crews. Pirates don’t sail alone; librarians don’t run libraries without staff, volunteers, and community support.

This is the essence of standards development:

Gathering crews Establishing codes Protecting shared treasure (protocols, specifications, best practices)

Ignore the structure, and everything sinks fast.

The Keys to Leadership

00:03:39 So, what makes leadership work—whether on a ship, in a library, or in a standards group?

00:03:53 First: the ability to engage people.

Pirates had to keep their crews motivated. Librarians help people navigate information overload. Standards leaders cut through noise and keep focus.

00:04:02 Second: the power of the raised eyebrow.
Every community has that one look that says: “Are you sure you want to go down that path?” Subtle signals can be powerful leadership tools.

00:04:22 Third: leading people to their own conclusions.

Pirates pointed to treasure maps. Librarians point to catalogs and shelves. Standards leaders facilitate consensus rather than forcing agreement. What Doesn’t Work

00:04:41 Now, let’s talk about what doesn’t work.

Leading through fear. Fear breeds disengagement. Pirates who ruled by terror faced mutiny. Librarians who ruled by dread found books deliberately mis-shelved. In standards, disengagement kills progress. Letting others set the tone of fear. If grudges rule the ship, it goes nowhere. If turf wars rule a library, the whole community suffers. If flame wars dominate standards groups, the work halts.

Leaders must set the tone. If fear takes over, participation drops—and without participation, nothing survives.

Romanticizing the Metaphor

00:05:43 If you’ve stayed with me this long, you’re probably either giggling or dismayed.

Yes, this is a romanticized version of pirates and librarians.

Real pirates were often violent criminals. Real librarians are not criminals—and do far more than raise their eyebrows.

00:06:13 But that’s exactly what makes the metaphor fun. We all bring our own stories into how we think about leadership and collaboration.

The Balance We Need

00:06:24 Whether you see yourself as a pirate captain, a librarian, or something in between, the truth is: standards need both.

Someone to keep the ship steady. Someone to keep the record straight. And all of us knowing when to raise that well-timed eyebrow.

00:06:41 This episode was short—part reflection, part fun—but with a reminder: standards are made by people. People with quirks, with stories, and sometimes with pirate hats or card catalogs.

Closing Thoughts

00:06:56 Thanks for listening to A Digital Identity Digest.

If you enjoyed this episode:

Subscribe and share it with someone who needs to know that standards don’t have to be boring. Connect with me on LinkedIn at @hlflanagan. Leave a rating or review on Apple Podcasts or wherever you listen.

00:07:14 You can also find the written post at sphericalcowconsulting.com.

Stay curious, stay engaged, and let’s keep these conversations going.

The post Pirates, Librarians, and Standards Development appeared first on Spherical Cow Consulting.


Herond Browser

The Ultimate List of Best Board Games of All Time You Must Play

Discover the best board games of all time! Our ultimate list features timeless classics and modern hits you must play, with tips on how to choose and where to buy them. The post The Ultimate List of Best Board Games of All Time You Must Play appeared first on Herond Blog. The post The Ultimate List of Best Board Games of All Time You Must Play appeared first on Herond Blog.

Looking for the perfect game night? Whether you’re a seasoned tabletop veteran or just getting started, the world of board games offers endless fun and strategy. But with thousands of games to choose from, how do you find the true classics that stand the test of time? This comprehensive guide cuts through the noise to bring you The Ultimate List of Best Board Games of All Time You Must Play. We’ve curated a list of essential games – from timeless classics to modern masterpieces – that are guaranteed to deliver unforgettable experiences with friends and family.

The Ultimate List of Best Board Games of All Time

Catan

A classic strategy game where players trade resources and build settlements to expand their empire.

Pandemic

A cooperative game where players team up to stop global disease outbreaks and save the world.

Ticket to Ride

A strategic game for all ages, focusing on planning and connecting train routes across a map.

Settlers of Catan

A negotiation-driven game where players develop settlements and trade in a shared world.

Carcassonne

A tile-laying game where players build medieval villages and score points strategically.

Ticket to Ride – Europe

An enhanced version with tunnels and stations, adding complexity to train route planning.

Azul

An artistic tile-placement game with stunning design, challenging players to create beautiful patterns.

7 Wonders

A card-based strategy game where players build civilizations through ages of development.

Wingspan

A relaxing engine-building game themed around collecting and managing bird species.

Twilight Imperium

An epic space conquest game designed for advanced players seeking deep strategy.

When diving into a new board game, understanding the rules is half the battle. You can use Herond Browser to explore game rules online effortlessly and securely. With its built-in ad and tracker blocker, Herond provides a clean, distraction-free environment, so you can focus on complex rulebooks or video tutorials without annoying pop-ups. Its seamless design makes it easy to switch between game guides and other resources, ensuring you can quickly master any game and get straight to the fun.

How to Choose the Best Board Game

Player Count & Age Range

Think about who you’re playing with. Some games are designed for two, while others need a larger group. Check the recommended age to ensure it’s a good fit for everyone.

Game Length & Complexity

Consider how much time you have and how much effort you want to put in. Choose a light, fast-paced game for a quick session or a complex, long-form strategy game for an all-day event.

Genre & Theme

What kind of experience are you looking for? Pick a genre that appeals to your group, whether it’s cooperative, competitive, party-style, or a deep, story-driven adventure.

Tips for an Enjoyable Board Game Experience

Here are some tips to help you and your group have the best board game night possible.

Understand the Rules Before You Start

Nothing slows down a game more than trying to learn the rules as you go. Before game night, have one person read the rulebook and watch a video tutorial. They can then teach others, making the setup much smoother.

Create the Right Atmosphere

Set the mood for your game. If it’s a long, strategic game, make sure everyone has comfortable seating and good lighting. For a party game, put on some background music and have snacks and drinks ready.

Manage Expectations

Be upfront with your group about what kind of game you’re playing. If it’s a competitive game, remind everyone to keep it friendly. If it’s a long one, let people know how long it might take so they can plan accordingly.

Put Away Distractions

Encourage everyone to put their phones away. This helps players stay focused on the game, makes for better conversation, and ensures everyone is engaged in the experience.

Where to Buy or Play These Board Games Online

You have a couple of great options for getting your hands on these games, whether you prefer the physical version or want to play digitally.

Where to Buy Physical Board Games

Specialty Board Game Stores

For the best selection and expert advice, visit local or online hobby stores. These shops often have knowledgeable staff and a curated collection of both classic and new games.

Large Online Retailers

Major online marketplaces like Amazon offer a huge variety of games, often with competitive prices and fast shipping. Just be sure to check the seller’s reviews to ensure you’re getting a genuine product.

Where to Play Board Games Online

Board Game Arena

This is one of the most popular platforms for playing a wide range of board games in your browser. It’s user-friendly, automates the rules for you, and offers a large community for real-time and turn-based play.

Tabletop Simulator

If you prefer a more realistic, sandbox-style experience, this is a great choice. Available on Steam, it’s a digital physics sandbox where you can move pieces and interact with games just like you would on a real table.

Dedicated Game Apps

Many popular board games, like Catan or Wingspan, have their own official digital apps available on platforms like Steam, iOS, or Android. These apps often feature polished graphics and a streamlined interface.

Conclusion

No matter if you’re a seasoned gamer or just starting out, the perfect board game is waiting for you. This list represents the best of the best, with games that have stood the test of time and created countless unforgettable memories. From quick, competitive rounds to deep, cooperative adventures, there’s a game here for every group and occasion. So, gather your friends and family, choose a game from this ultimate list, and get ready to roll the dice on your next great game night.

DOWNLOAD HEROND About Herond

Herond Browser is a Web browser that prioritizes users’ privacy by blocking ads and cookie trackers, while offering fast browsing speed and low bandwidth consumption. Herond Browser features two built-in key products:

Herond Shield: an adblock and privacy protection tool; Herond Wallet: a multi-chain, non-custodial social wallet.

Herond aims at becoming the ultimate Web 2.5 solution that sets the ground to further accelerate the growth of Web 3.0, heading towards the future of mass adoption.

Join our Community!

The post The Ultimate List of Best Board Games of All Time You Must Play appeared first on Herond Blog.

The post The Ultimate List of Best Board Games of All Time You Must Play appeared first on Herond Blog.


FastID

The Tools Gap: Why Developers Struggle to Code Green

77% of developers want to code sustainably, but most lack the tools to measure impact. Fastly’s survey reveals the barriers and opportunities in green coding.
77% of developers want to code sustainably, but most lack the tools to measure impact. Fastly’s survey reveals the barriers and opportunities in green coding.

Monday, 22. September 2025

Anonym

How to use MySudo phone numbers for free international calls

If you love travelling, you know the value of unlimited possibilities. That’s why you’re going to want to travel with MySudo app. MySudo is the original all-in-one privacy app that lets you protect your identity and your information with second phone numbers, secure email, private browsers, and virtual cards – all wrapped into secure digital […] The post How to use MySudo phone numbers for free

If you love travelling, you know the value of unlimited possibilities. That’s why you’re going to want to travel with MySudo app.

MySudo is the original all-in-one privacy app that lets you protect your identity and your information with second phone numbers, secure email, private browsers, and virtual cards – all wrapped into secure digital profiles called Sudos.

Every MySudo feature is handy for international travel, but it’s using the phone numbers for free international calls that will really save you money while you’re away.

But even if you’re not about to hop on a plane, MySudo is still your go-to for free international calls to family and friends.

Here’s how to use MySudo for free international calls whether you’re travelling overseas or calling loved ones from home:

Overseas traveller

If you’re travelling overseas, MySudo gives you free international calling in a choice of regions and area codes. That means no fees and no need for an international roaming plan. Here’s how to set it up:

Download MySudo for iOS or Android. Choose Sudo Max plan for unlimited minutes and messages for up to 9 separate Sudo phone numbers. (Read: What do I get with SudoMax?) Choose a phone number and area code in the region you want to travel. MySudo numbers are currently available in the US, UK*, and Canada. Call and message anyone for free within the region under your SudoMax plan. Give your Sudo number to locals and they can call you as if it’s a local call (and you can avoid high inbound charges).

So long as you’ve got access to hotel or public wi-fi you can use MySudo for free calls. If you think you’ll be out of WiFi range sometimes, you can get an e-sim or international data roaming plan to use local data and MySudo will also work with those.

Calling loved ones from home

MySudo lets you call anyone anywhere in the world for free so long as the person you’re calling is using MySudo. Calls between users are end-to-end encrypted, so you can talk privately and securely. Here’s how to Invite your friends to MySudo:

Tap the menu in the top left corner. Tap Invite your friends. Choose to invite your friends from your device via another app or from your MySudo account.  Select the Sudo you want to invite from (if you have more than one Sudo). Follow the prompts.

After you’ve invited a friend, they will receive a link with your MySudo contact information (email, handle and phone number if you have one), which will prompt them to install MySudo. Once they have the app installed, they can instantly start communicating with you. Remember, all video and voice calls, texts and email between MySudo users are end-to-end encrypted.

But wait, there’s more …

7 more facts about MySudo phone numbers MySudo numbers are real, unique, working phone numbers. Each phone number has customizable voicemail, ringtones, and contacts list. You can also mute notifications and block unwanted callers. MySudo numbers are fully functional for messaging, and voice, video and group calling.  Calls and messages with other MySudo users are end-to-end encrypted. Calls and messages out of network are standard. MySudo phone numbers don’t expire. Your phone numbers will auto-renew so long as you maintain your paid plan. Calling with MySudo works like WhatsApp or Signal, but with the privacy advantage that you’re not handing over your real number to sign up. You can manage multiple numbers all in one app (read: How to Get 9 “Second Phone Numbers” on One Device). Under SudoGo plan, you get 1 included phone number; under SudoPro plan, you get 3 included phone numbers; and under SudoMax plan, you get 9 included phone numbers. If you need additional phone number resets, you can purchase them within the app for a small fee. You can always check your plans screen to see how many phone numbers you have remaining before you’ll be prompted to purchase one.

So, to recap how to use MySudo for free international calls:

To make free calls while travelling overseas, choose a Sudo number and area code in your region of travel and get unlimited minutes and messages under SudoMax plan. Available regions are the United States, United Kingdom*, and Canada. To make free, end-to-end encrypted calls anywhere in the world, invite your friends to the app. To call or message regular numbers abroad, use a Sudo number in their region, but sign up to SudoMax so there’s no limit on minutes or messages.

*In order to comply with government and service provider regulations to limit the risk of fraud, users are required to provide their accurate and up-to-date legal identity information before they can obtain UK phone numbers. 
Read: Why are you asking for my personal information when creating a phone number?

Take control and simplify your communication today. Download MySudo.

Before you go, explore the full MySudo suite.

The post How to use MySudo phone numbers for free international calls appeared first on Anonyome Labs.


Ocean Protocol

DF154, DF155 Complete and DF156 Launches

Predictoor DF154 & DF155 rewards are available. DF156 runs September 18th — September 25th, 2025 1. Overview Data Farming (DF) is an incentives program initiated by ASI Alliance member, Ocean Protocol. In DF, you can earn OCEAN rewards by making predictions via ASI Predictoor. Data Farming Round 154 (DF154) completed on September 11th, and DF Round 155 completed on September 18th, both
Predictoor DF154 & DF155 rewards are available. DF156 runs September 18th — September 25th, 2025 1. Overview

Data Farming (DF) is an incentives program initiated by ASI Alliance member, Ocean Protocol. In DF, you can earn OCEAN rewards by making predictions via ASI Predictoor.

Data Farming Round 154 (DF154) completed on September 11th, and DF Round 155 completed on September 18th, both without issues following the restoration of Predictoor. During these rounds, we carefully monitored the Predictoor system and community feedback to ensure users could access Predictoor feeds and claim rewards distributions without any interruption in service.

DF156 is live as of September 18th. It concludes on September 25th. For this DF round, Predictoor DF has 3,750 OCEAN rewards and 20,000 ROSE rewards.

2. DF structure

The reward structure for DF156 is comprised solely of Predictoor DF rewards.

Predictoor DF: Actively predict crypto prices by submitting a price prediction and staking OCEAN to slash competitors and earn.

3. How to Earn Rewards, and Claim Them

Predictoor DF: To earn: submit accurate predictions via Predictoor Bots and stake OCEAN to slash incorrect Predictoors. To claim OCEAN rewards: run the Predictoor $OCEAN payout script, linked from Predictoor DF user guide in Ocean docs. To claim ROSE rewards: see instructions in Predictoor DF user guide in Ocean docs.

4. Specific Parameters for DF156

Budget. Predictoor DF: 3.75K OCEAN + 20K ROSE

Networks. Predictoor DF applies to activity on Oasis Sapphire. Here is more information about Ocean deployments to networks.

Predictoor DF rewards are calculated as follows:

First, DF Buyer agent purchases Predictoor feeds using OCEAN throughout the week to evenly distribute these rewards. Then, ROSE is distributed at the end of the week to active Predictoors that have been claiming their rewards.

Expect further evolution in DF: adding new streams and budget adjustments among streams.

Updates are always announced at the beginning of a round, if not sooner.

About Ocean, DF and ASI Predictoor

Ocean Protocol was founded to level the playing field for AI and data. Ocean tools enable people to privately & securely publish, exchange, and consume data. Follow Ocean on Twitter or TG, and chat in Discord. Ocean is part of the Artificial Superintelligence Alliance.

In Predictoor, people run AI-powered prediction bots or trading bots on crypto price feeds to earn $. Follow Predictoor on Twitter.

DF154, DF155 Complete and DF156 Launches was originally published in Ocean Protocol on Medium, where people are continuing the conversation by highlighting and responding to this story.


ComplyCube

ComplyCube Named as an AML Industry Leader in the G2 Fall 2025 Report

ComplyCube has reinforced its Leader status in G2's 2025 Fall Grid Report. The company has achieved recognition for its ease of implementation and ROI in categories including AML, customer onboarding, and biometric authentication. The post ComplyCube Named as an AML Industry Leader in the G2 Fall 2025 Report first appeared on ComplyCube.

ComplyCube has reinforced its Leader status in G2's 2025 Fall Grid Report. The company has achieved recognition for its ease of implementation and ROI in categories including AML, customer onboarding, and biometric authentication.

The post ComplyCube Named as an AML Industry Leader in the G2 Fall 2025 Report first appeared on ComplyCube.


uquodo

UAE’s Move Beyond OTPs: Biometric Authorization for Seamless Transactions

The post UAE’s Move Beyond OTPs: Biometric Authorization for Seamless Transactions appeared first on uqudo.

Kin AI

Kinside Scoop 👀 #14

Better customisation, better memory, better Kin

Hey folks 👋

We’ve kept busy working on Kin - it’s been two weeks already!

Read on to hear what we’ve been up to, and reach the end for this edition’s super prompt.

What’s new with Kin 🚀 Smarter characters, easier flow ✏

We’ve cleaned up the home screen, and made it possible to edit advisor characters right from the homepage selector.

This way, you can make sure all the sides of Kin are exactly who you need them to be - not just your own custom prompt.

Advisors that advise 🧙‍♂️

Your advisors are no longer passive chat partners - when they’ve got something to say (like wondering whether you’ve remembered that meeting you usually forget), they’ll reach out to you personally with a push notification.

You’re in control of this: feel it’s too much? You can turn down the frequency in the app. But if you like it? You can turn it up too.

Memory that remembers who matters 🫂

Our next memory update means Kin now does a better job of extracting people from your messages into your Kin’s private database.

Conversations about important folks should feel more accurate and natural now, as Kin remembers more of the important stuff about them.

Help getting what you need 💡

We’ve also added advisor interaction reminders and frequency tracking. Now you can see how often you’ve chatted with each advisor, and set up reminders to make sure you’re talking with each advisor as often as you’d like.

Voice mode 🎙

We’ve heard your thoughts loud and clear: voice mode is a favorite, but more stability and longer usage times are needed.

There was also an issue for Android users with headsets - we’ve dealt with that, so now Kin’s voice mode shouldn’t get so confused by wires.

For everything else, we’re working on improvements to make it feel seamless. More soon.

Other fixes & polish 🛠

Removed emojis from filter types for better readability

Tweaked chat font design for smoother legibility

Fixed the journal voice button floating mid-screen (no more runaway buttons)

Cleaned up chat formatting in general

Further fixes for Android keyboard issues (hopefully the last!)

Fixed Journal title generation, so auto-generated titles should work much better now

Resolved the double user issue, for those that had it!

Your turn 💭

Kin is moving fast. We have big plans to reach by the end of the year - and we want to make sure we arrive at a place you love as much as us.

So, like we say every time, there are multiple ways to tell us your thoughts about Kin. Good, bad, strange… we want them all!

You can reach out to the KIN team at hello@mykin.ai with anything, from feature feedback to a bit of AI discussion (though support queries will be better helped over at support@mykin.ai).

For something more interactive, the official Kin Discord is still the best place to talk to the Kin development team (as well as other users) about anything AI.

We have dedicated channels discussing the tech behind Kin, networking users, sharing support tips, and for hanging out.

We also regularly run three casual calls every week, and you’re invited:

Monday Accountability Calls - 5pm GMT/BST
Share your plans and goals for the week, and learn tips about how Kin can help keep you on track.

Wednesday Hangout Calls - 5pm GMT/BST
No agenda, just good conversation and a chance to connect with other Kin users.

Friday Kin Q&A - 1pm GMT/BST
Drop in with any questions about Kin (the app or the company) and get live answers in real time.

You’re the centre of this conversation - make sure you take your place. Kin’s for you, not for us.

Finally, you can also share your feedback in-app. Just screenshot to trigger the feedback form!

Our current reads 📚

Article: How people really use AI (Claude vs ChatGPT)
READ - thedeepview.co

Report: Mobile app trends in Denmark
READ - franma.co

Article: Apple launch the iPhone 17 pro, featuring the new A19 chipset built with running LLMs in mind (making a truly-local Kin instance more possible)
READ - Apple

Report: a16z’s app affinity scores for AI users (what other AI apps are users of particular AI most likely to have?)
READ: Olivia Moore via x

This edition’s super prompt 🤖

This time, we’re asking your Kin:

What kind of support do I best respond to?”

If you have Kin installed and up to date, you can tap the link below (on mobile!) to explore how you think about pressure, and how you can keep cool under it.

As a reminder, you can do this on both iOS and Android.

Try prompt in Kin

This is your journey 🚢

Kin always has been and always be for you as users. We want to build the most useful and supportive AI assistant we can.

So, please: email us, chat in our Discord, or even just shake the app to reach out to us with your thoughts and ideas.

Kin is only what our users make of us.

With love,

The KIN Team


Veracity trust Network

2025 bot trends see rise of Gen-AI continuing

One of the 2025 bot trends which will continue into the future is the use of GenAI-powered technology to spearhead attacks on both private business and critical infrastructure. This rising trend has been growing at a pace since 2023 and shows no sign of slowing down and, according to many reports, is likely to become an even greater threat. The post 2025 bot trends see rise of Gen-AI continu

One of the 2025 bot trends which will continue into the future is the use of GenAI-powered technology to spearhead attacks on both private business and critical infrastructure.

This rising trend has been growing at a pace since 2023 and shows no sign of slowing down and, according to many reports, is likely to become an even greater threat.

The post 2025 bot trends see rise of Gen-AI continuing appeared first on Veracity Trust Network.


Okta

Introducing the Okta MCP Server

As AI agents and AI threats proliferate at an unprecedented rate, it becomes imperative to enable them to communicate safely with the backend systems that matter the most. A Model Context Protocol (MCP) server acts as the bridge between an LLM and an external system. It translates natural language intent into structured API calls, enabling agents to perform tasks like provisioning users, managi

As AI agents and AI threats proliferate at an unprecedented rate, it becomes imperative to enable them to communicate safely with the backend systems that matter the most.

A Model Context Protocol (MCP) server acts as the bridge between an LLM and an external system. It translates natural language intent into structured API calls, enabling agents to perform tasks like provisioning users, managing groups, or pulling reports, all while respecting the system’s security model. Establishing a universal protocol eliminates the need to build custom integrations. Enterprises can now easily connect their AI agents with Okta’s backend systems to achieve automation of complex chains of activities, quick resolution of issues, and increased performance throughput.

Table of Contents

What the Okta MCP Server brings Tools and capabilities Highlights at a glance Getting started with the Okta MCP Server Initializing the project Authentication and authorization Configuring your client Using the Okta MCP Server with VS Code Enable agent mode in GitHub Copilot Update your VS Code settings Start the server Examples in action Read more about Cross App Access, OAuth 2.0, and securing your applications What the Okta MCP Server brings

The Okta MCP Server brings this capability to your identity and access management workflows. It connects directly to Okta’s Admin Management APIs, giving your LLM agents the ability to safely automate organization management.

Think of it as unlocking a new interface for Okta, one where you can ask an agent:

“Add this new employee to the engineering group.” “Generate a report of inactive users in the last 90 days.” “Deactivate all users who tried to log in within the last 30 minutes.” Tools and capabilities

In its current form, the server allows the following actions:

User Management: Create, list, retrieve, update, and deactivate users. Group Management: Create, list, retrieve, update, and delete groups. Group Operations: View assigned members, view assigned applications, add, and remove users. System Information: Retrieve Okta system logs.

And many more actions with application and policies APIs as well.

Using the above operations as a base, complex real-life actions can also be performed. For example, you can ask the MCP server to generate a security audit report for the last 30 days and highlight all changes to user and group memberships according to your desired report template.

Highlights at a glance Flexible Authentication: The server supports both interactive login (via Device Authorization Grant) and fully automated, browserless login (via Private Key JWT). Whether you’re experimenting in development or running a headless agent in production, you can authenticate in the way that fits your workflow. More Secure Credential Handling: Your authentication details are managed through scoped API access and environment variables, keeping secrets out of code. Tokens are issued only with the permissions you explicitly grant, following least-privilege best practices. Seamless Integration with Okta APIs: Built on Okta’s official SDK, the server is tightly integrated with Okta’s Admin Management APIs. That means reliable performance, support for a wide range of identity management tasks, and an extensible foundation for adding more endpoints over time. Getting started with the Okta MCP Server

Now that you know what the Okta MCP server is and why it’s useful, let’s dive into how to set it up and run it. Before you proceed, you will need VS Code, Python environment (Python 3.9 or above), and uv.

Initializing the project

The Okta MCP server comes packaged for quick setup so you can clone and run it. We use uv (a fast Python package manager) to help ensure your environment is reproducible and lightweight.

Install uv

Clone the repository: git clone https://github.com/okta/okta-mcp-server.git Install dependencies and set up the project: cd okta-mcp-server && uv sync

At this point, you have a working copy of the server. Next, we’ll connect it to your Okta org.

Authentication and authorization

Every MCP server needs a way to prove its identity and access your Okta APIs more securely. We support two authentication modes, and your choice depends on your use case.

Option A: Device authorization grant (recommended for interactive use)

This flow is best if you’re running the MCP server locally and want a quick, user-friendly login. After you start the server, it triggers a prompt to log in via your browser. Here, the server exchanges your browser login for a secure token that it can use to communicate with Okta APIs.

Use this if you’re experimenting, developing, or want the simplest way to authenticate.

Before you begin, you’ll need an Okta Integrator Free Plan account. To get one, sign up for an Integrator account. Once you have an account, sign in to your Integrator account. Next, in the Admin Console:

Go to Applications > Applications Click Create App Integration Select OIDC - OpenID Connect as the sign-in method Select Native Application as the application type, then click Next

Enter an app integration name

Configure the redirect URIs: Redirect URI: com.oktapreview.java-oie-sdk:/callback Post Logout Redirect URI: http://com.oktapreview.java-oie-sdk/ In the Controlled access section, select the appropriate access level Click Save Where are my new app's credentials?

Creating an OIDC Native App manually in the Admin Console configures your Okta Org with the application settings.

After creating the app, you can find the configuration details on the app’s General tab:

Client ID: Found in the Client Credentials section Issuer: Found in the Issuer URI field for the authorization server that appears by selecting Security > API from the navigation pane. Issuer: https://dev-133337.okta.com/oauth2/default Client ID: 0oab8eb55Kb9jdMIr5d6

NOTE: You can also use the Okta CLI Client or Okta PowerShell Module to automate this process. See this guide for more information about setting up your app.

Note: While creating the app integration, make sure to select the Device Authorization in the Grant type.

Once the app is created, follow these steps:

Grant API scopes (for example: okta.users.read, okta.groups.manage).


Copy the Client ID for later use.

Note: Why “Native App” and not “Service”?
Device Auth is designed for user-driven flows, so it assumes someone is present to open the browser.

Option B: Private key JWT (best for automation, CI/CD, and “headless” environments)

This flow is perfect if your MCP server needs to run without human intervention, for example, inside a CI/CD pipeline or as part of a backend service. Instead of prompting a person to log in, the server authenticates using a cryptographic key pair.

Here’s how it works:

You generate or upload a public/private key pair to Okta. The server uses the private key locally to sign authentication requests. Okta validates the signature against the public key you registered, ensuring that only your authorized server can act on behalf of that client.

Use this if you’re automating, scheduling jobs, or integrating into infrastructure.

In your Okta org, create a new API Services App Integration.


Under Client Authentication, select Public Key / Private Key.


Add a public key: either generate it in Okta (recommended) and copy it in PEM format, or upload your own keys.


Copy the Client ID and Key ID (KID).


Grant the necessary API scopes (e.g., okta.users.read, okta.groups.manage) and provide Super Administrator access.

Configuring your client

You can use Okta’s MCP server with any MCP-compatible client. Whether running a lightweight desktop agent, experimenting in a local environment, or wiring it into a production workflow, the setup pattern is the same.

For this guide, we’ll walk through the setup in Visual Studio Code with GitHub Copilot - one of the most popular environments for developers. The steps will be similar if you use another client like Claude Desktop or AWS Bedrock.

Using the Okta MCP Server with VS Code Enable agent mode in GitHub Copilot

The Okta MCP server integrates with VS Code through Copilot’s agent mode.

Install the GitHub Copilot extension Open the Copilot Chat view in VS Code.

To enable the Agent mode, checkout the steps mentioned in the VS Code docs.

Update your VS Code settings

Next, you’ll tell VS Code how to start and communicate with the Okta MCP server. This is done in your settings.json. You can also create your own mcp.json and set this up.

{ "mcp": { "inputs": [ { "type": "promptString", "description": "Okta Organization URL (e.g., https://trial-123456.okta.com)", "id": "OKTA_ORG_URL" }, { "type": "promptString", "description": "Okta Client ID", "id": "OKTA_CLIENT_ID", "password": true }, { "type": "promptString", "description": "Okta Scopes (separated by whitespace, e.g., 'okta.users.read okta.groups.manage')", "id": "OKTA_SCOPES" }, { "type": "promptString", "description": "Okta Private Key. Required for 'browserless' auth.", "id": "OKTA_PRIVATE_KEY", "password": true }, { "type": "promptString", "description": "Okta Key ID (KID) for the private key. Required for 'browserless' auth.", "id": "OKTA_KEY_ID", "password": true } ], "servers": { "okta-mcp-server": { "command": "uv", "args": [ "run", "--directory", "/path/to/the/okta-mcp-server", "okta-mcp-server" ], "env": { "OKTA_ORG_URL": "${input:OKTA_ORG_URL}", "OKTA_CLIENT_ID": "${input:OKTA_CLIENT_ID}", "OKTA_SCOPES": "${input:OKTA_SCOPES}", "OKTA_PRIVATE_KEY": "${input:OKTA_PRIVATE_KEY}", "OKTA_KEY_ID": "${input:OKTA_KEY_ID}" } } } } }

Running the server for the first time prompts you to enter the following information:

Okta Organization URL: Your Okta tenant URL. Okta Client ID: The client ID of the application you created in your Okta organization. Okta Scopes: The scopes you want to grant to the application, separated by spaces. For example: "OKTA_SCOPES": "${input:OKTA_SCOPES = okta.users.read okta.users.manage okta.groups.read okta.groups.manage okta.logs.read okta.policies.read okta.policies.manage okta.apps.read okta.apps.manage}"

Note: Add scopes only for the APIs that you will be using.

Okta Private Key and Key ID: You only need to enter this key when using browserless authentication. If you’re not using that method, just press Enter to skip this step and use the Device Authorization flow instead. Start the server

When you open VS Code, you’ll now see okta-mcp-server as an option to start.

Click Start to launch the server in your mcp.json file.

The server will check your authentication method:

If using Device Authorization, it triggers a prompt to log in via your browser.

If using Private Key JWT, it will authenticate silently using your key.

Once connected, Copilot will automatically recognize the Okta commands you can use.

At this point, the MCP server has established a connection between VS Code and your Okta organization.You can now manage your organization using natural language commands directly in your editor.

Examples in action

1. Listing Users

2. Creating Users

3. Group Assignment

4. Creating an Audit Report

We invite you to try out our MCP server and experience the future of identity and access management. Meet us at Oktane, and if you run into issues, please open an issue in our GitHub repository.

Read more about Cross App Access, OAuth 2.0, and securing your applications Integrate Your Enterprise AI Tools with Cross App Access Build Secure Agent-to-App Connections with Cross App Access (XAA) OAuth 2.0 and OpenID Connect overview Why You Should Migrate to OAuth 2.0 From Static API Tokens How to Secure the SaaS Apps of the Future

Follow us on LinkedIn, Twitter, and subscribe to our YouTube channel for more developer content. If you have any questions, please leave a comment below!

Sunday, 21. September 2025

Rohingya Project

Rohingya Project Launches R-Coin Presale on PinkSale, Powering Blockchain Ecosystem for Stateless Rohingya

The Rohingya Project today announced the launch of its R-Coin token presale on the PinkSale launchpad, inviting impact-driven and crypto-savvy investors to support an innovative social-impact initiative. R-Coin (RCO) is the native token of the project’s SYNU Platform, a blockchain-based network designed to empower over 3.5 million stateless Rohingya refugees worldwide. By participating in the […]
The Rohingya Project today announced the launch of its R-Coin token presale on the PinkSale launchpad, inviting impact-driven and crypto-savvy investors to support an innovative social-impact initiative. R-Coin (RCO) is the native token of the project’s SYNU Platform, a blockchain-based network designed to empower over 3.5 million stateless Rohingya refugees worldwide. By participating in the […]

Saturday, 20. September 2025

Recognito Vision

Everything You Need to Know About Face Recognition Systems

Facial recognition is no longer just a sci-fi plot twist. It is now a part of daily life, from unlocking smartphones to airport security checks. A face recognition system uses advanced algorithms to scan, analyze, and verify identities in seconds. Businesses, schools, and governments are rapidly adopting it, but it’s worth digging deeper into how...

Facial recognition is no longer just a sci-fi plot twist. It is now a part of daily life, from unlocking smartphones to airport security checks. A face recognition system uses advanced algorithms to scan, analyze, and verify identities in seconds. Businesses, schools, and governments are rapidly adopting it, but it’s worth digging deeper into how it works, its benefits, and what challenges still exist.

 

Facial Recognition System

At its core, a facial recognition system relies on biometric technology. It captures a person’s facial features, converts them into a digital template, and compares that data with stored profiles to confirm identity. Unlike fingerprints or ID cards, you don’t need to touch anything. Just look at the camera, and the system does the rest.

This technology uses complex neural networks trained on thousands of images. The system maps out key points like the distance between eyes, nose shape, and jawline. The result is a unique faceprint that is nearly impossible to duplicate. Accuracy levels are improving quickly thanks to evaluations like the NIST Face Recognition Vendor Test, which tracks the performance of leading algorithms worldwide.

 

How Face Recognition Technology Works

Understanding the process makes it clear why it is so widely trusted. Here’s a simple breakdown:

Image Capture – A camera captures a person’s face in real time.

Face Detection – The system locates the face in the image and isolates it from the background.

Feature Extraction – Algorithms analyze facial features such as cheekbones, chin curves, and lip contours.

Template Creation – The extracted data is turned into a digital faceprint.

Comparison and Match – The faceprint is compared with existing records to confirm identity.

Accuracy rates are consistently improving. According to NIST FRVT 1:1 testing, leading systems now achieve over 99% verification success under ideal conditions.

 

Face Anti-Spoofing and Its Role in Security

Every great lock needs a strong defense. This is where face anti spoofing comes in. Without it, someone could trick the system using a photo, video, or even a 3D mask. Spoofing attempts are surprisingly common in fraud-heavy industries like finance.

Modern systems fight this using liveness detection. The camera checks for natural movements such as blinking, skin texture changes, and depth. Some solutions even shine light on the face and measure reflections to confirm the presence of a real person. These layers of defense ensure that recognition remains both fast and secure.

 

Face Recognition Attendance System

Schools, offices, and even factories are adopting a face recognition attendance system. No more long queues at biometric scanners or manual sign-in sheets. Employees just walk in, glance at a camera, and their presence is automatically logged.

The benefits are clear:

No contact required which keeps it hygienic.

Faster processing compared to manual punching.

Reduced buddy punching where one employee marks attendance for another.

Accurate reporting that syncs directly with payroll systems.

Organizations save time and prevent fraud while employees enjoy a hassle-free experience.

 

Face Scanning Attendance System in Education

Schools and universities are also experimenting with a face scanning attendance system. Teachers can focus on teaching instead of wasting class time marking attendance. Parents get real-time updates if their child is present, while administrators gain detailed records for compliance.

Though promising, it does raise questions about student privacy. Educational institutes must handle such systems responsibly and align with global data protection standards like GDPR.

 

Benefits of Face Recognition in Real-World Applications

Let’s talk numbers and impact. The global facial recognition market is projected to reach over $16 billion by 2030. Here’s why it’s growing so fast:

Security – Airports use it to screen passengers quickly.

Fraud Prevention – Banks use it to stop identity theft.

Convenience – Smartphones unlock instantly with a glance.

Efficiency – Attendance and access control become effortless.

Quick Fact Table:

Application Benefit Example Use Case Banking Stops account fraud Mobile banking logins Airports Speeds up security checks Passport verification Education Saves teaching time Student attendance Workplace Prevents time theft Employee attendance tracking

 

Privacy and Ethical Concerns

As powerful as the technology is, it sparks serious debates. Who owns the face data? How securely is it stored? What if it gets misused? Regulations are starting to catch up. In Europe, GDPR rules require companies to get clear consent before storing or using biometric data.

Transparency and user control are key. People need to know how their face data is being used and have the right to opt out. Striking a balance between security and privacy remains one of the biggest challenges for the industry.

 

Case Studies: Where It Works Best Airports – The U.S. Customs and Border Protection agency reported that facial recognition has caught thousands of identity fraud attempts since its rollout.

Corporate Offices – Large firms in Asia have reduced payroll fraud by adopting face-based attendance.

Healthcare – Hospitals use it to secure patient data and restrict access to sensitive areas.

These case studies highlight how versatile and impactful the technology can be when used responsibly.

 

The Future of Face Recognition

Imagine walking into a store, picking items, and leaving without waiting in line. Payment is automatically processed after the system confirms your face. This futuristic scenario is closer than you think. Retailers are already piloting systems where face recognition replaces credit cards.

At the same time, research is focusing on reducing bias. Early systems struggled with accuracy across different ethnicities. Today, continuous improvements are making recognition fairer and more reliable. Open-source contributions on platforms like GitHub are accelerating innovation by giving developers direct access to tools and data.

 

Conclusion

A face recognition system is more than just a tech buzzword. It is reshaping industries by offering speed, security, and convenience. From attendance tracking to fraud prevention, its applications are only expanding. But with great power comes great responsibility, and balancing innovation with privacy will decide how widely it gets adopted in the future. For organizations exploring the technology, brands like Recognito are paving the way with practical, secure, and developer-friendly solutions.

Friday, 19. September 2025

Shyft Network

Middle East Crypto in 2025: From Wild Experiments to Ironclad Rules

The Middle East’s crypto scene is no longer a playground for bold experiments. By September 2025, the region is laying down the law, transforming from a sandbox of ideas into a powerhouse of regulated innovation. Dubai’s regulators are cracking the whip, Bahrain’s rolling out bold new laws, and the UAE’s dirham is staking its claim as the backbone of digital payments. This isn’t just a shift — it’

The Middle East’s crypto scene is no longer a playground for bold experiments. By September 2025, the region is laying down the law, transforming from a sandbox of ideas into a powerhouse of regulated innovation. Dubai’s regulators are cracking the whip, Bahrain’s rolling out bold new laws, and the UAE’s dirham is staking its claim as the backbone of digital payments. This isn’t just a shift — it’s a seismic leap toward a future where compliance fuels growth. Let’s dive into the forces reshaping the region’s crypto landscape.

Dubai: Where Stablecoins Meet Serious Oversight

Dubai’s Virtual Assets Regulatory Authority (VARA) isn’t messing around. Gone are the days of loose guidelines and “let’s see what sticks.” VARA’s 2025 rulebook is a masterclass in clarity, dictating how stablecoins (Fiat-Referenced Virtual Assets) and tokenized real-world assets (RWAs) must be issued, backed, and disclosed. Want to launch a stablecoin or tokenize a skyscraper? You’d better have your paperwork in order.The real game-changer? Enforcement. VARA recently slapped a fine on a licensed firm, sending a crystal-clear message: licenses aren’t just badges of honor — they’re contracts with accountability. Dubai’s saying loud and clear: innovate, but play by our rules. This isn’t just regulation; it’s a blueprint for trust in a digital age.

Abu Dhabi: The Institutional Crypto Haven

While Dubai swings the regulatory hammer, Abu Dhabi Global Market (ADGM) is crafting a different narrative. Its Financial Services Regulatory Authority (FSRA) has fine-tuned its crypto framework to welcome institutional heavyweights. From custody to payment services, ADGM’s rules for fiat-referenced tokens are a magnet for serious players. Yet, privacy tokens and algorithmic stablecoins? Still persona non grata.

ADGM’s approach is a tightrope walk: embrace cutting-edge innovation while ensuring every move can withstand the scrutiny of global finance. It’s less about flashy pilots and more about building a crypto hub that lasts.

UAE’s Central Bank: Dirham Takes the Digital Crown

The Central Bank of the UAE (CBUAE) is drawing a line in the sand. As of September 2025, only dirham-pegged stablecoins can power onshore payments. Foreign tokens? Relegated to niche corners. This isn’t just policy — it’s a bold bet on the dirham as the anchor of the UAE’s digital economy. By prioritizing local currency, the CBUAE is ensuring the UAE doesn’t just participate in the crypto revolution — it leads it.

Dubai’s Real Estate Revolution: Tokenization Goes Big

Remember when Dubai’s tokenized real estate pilots were just a cool idea? Those days are gone. Recent sales, run with the Dubai Land Department, vanished in minutes, pulling in investors from every corner of the globe. The DIFC PropTech Hub is doubling down, turning these pilots into a full-blown movement. Tokenized property isn’t a gimmick anymore — it’s a market poised to redefine how we invest in real estate.

Bahrain and Beyond: The GCC’s Crypto Patchwork

Bahrain’s not sitting on the sidelines. Its new laws for Bitcoin and stablecoins are designed to make trading safer and more attractive to institutions. Meanwhile, Kuwait and Qatar are playing it cautious, keeping their crypto gates tightly shut. The GCC isn’t moving in unison, but the UAE and Bahrain are sprinting ahead, setting the pace for a region-wide crypto renaissance.

The Privacy Puzzle: Navigating the FATF Travel Rule

Behind the headlines lies a thornier challenge: the FATF Travel Rule. Virtual Asset Service Providers (VASPs) now have to share user data across borders, stirring up privacy and operational headaches. Enter Shyft Veriscope, a peer-to-peer platform that lets firms comply without exposing sensitive customer data to centralized risks. In a region obsessed with trust and growth, tools like these are the unsung heroes of crypto’s next chapter.

Why 2025 Is the Year to Watch

The Middle East isn’t just dabbling in crypto anymore — it’s rewriting the rules of the game. From dirham-backed stablecoins to tokenized skyscrapers, the region is building a digital asset economy where compliance isn’t a burden but a springboard. For founders, investors, and innovators, the message is clear: get on board, align with the rules, and seize the opportunity to shape a future where crypto isn’t just a buzzword — it’s a legacy.

About Veriscope

‍Veriscope, the compliance infrastructure on Shyft Network, empowers Virtual Asset Service Providers (VASPs) with the only frictionless solution for complying with the FATF Travel Rule. Enhanced by User Signing, it enables VASPs to directly request cryptographic proof from users’ non-custodial wallets, streamlining the compliance process.

For more information, visit our website and contact our team for a discussion. To keep up-to-date on all things crypto regulations, sign up for our newsletter and follow us on X (Formerly Twitter), LinkedIn, Telegram, and Medium.

Book your consultation: https://calendly.com/tomas-shyft or email: bd@shyft.network


iComply Investor Services Inc.

KYB Compliance Software for Regulated Entities: Navigating Global AML Shifts

KYB requirements are tightening worldwide. This guide helps regulated firms navigate evolving AML expectations and shows how iComply streamlines compliance with secure, scalable software.

Regulated entities – including PSPs, VASPs, investment platforms, and trust companies – must meet rising KYB and AML expectations. This article highlights emerging requirements across the UAE, UK, EU, Singapore, and U.S.

Regulated entities operate in complex environments where KYB and AML compliance are non-negotiable. Whether your firm is a payment service provider (PSP), virtual asset service provider (VASP), investment platform, corporate services provider, a real estate agent, a mortgage broker, regulators are tightening standards.

In 2025 and beyond, firms must demonstrate robust KYB controls, real-time screening, and jurisdictional audit readiness – especially as rules evolve in key markets like the UK, UAE, and EU.

Emerging Global AML Requirements for Regulated Entities United Kingdom Regulators: Companies House, FCA Shifts: Mandatory KYB and identity verification for directors and PSCs; AML registration and sanctions screening under MLR 2017 United Arab Emirates Regulators: CBUAE, DFSA, VARA, ADGM Requirements: Risk-based onboarding, KYB for corporate clients, Travel Rule compliance, UBO discovery, and localized data handling European Union Regulators: AMLA (in development), national competent authorities Shifts: 6AMLD mandates KYB, UBO transparency, risk scoring, and centralized reporting; MiCA introduces crypto-specific controls Singapore Regulator: MAS Requirements: CDD/EDD obligations, sanctions list monitoring, transaction screening, and UBO tracking for regulated businesses United States Regulators: FinCEN, SEC, CFTC, state agencies Shifts: BOI reporting under the Corporate Transparency Act; mandatory KYB and AML controls for regulated financial service providers Compliance Challenges for Regulated Entities

1. Overlapping Regulatory Bodies
Firms often face scrutiny from sector-specific and national agencies.

2. Diverging Standards
KYB requirements vary across regions, and privacy rules complicate data handling.

3. High-Risk Clients and Transactions
Cross-border payments and digital assets raise red flags.

4. Legacy Compliance Systems
Siloed tools delay onboarding and lack real-time visibility.

iComply: Leading KYB Compliance Software for Global Entities

iComply enables regulated firms to standardize and scale AML workflows across jurisdictions with modular tools and built-in localization.

1. KYB + KYC Automation Verify entities and individuals using real-time registry, document, and biometric checks Visualize UBO networks and flag nominee ownership Encrypted edge processing for global data privacy compliance 2. KYT + Risk Monitoring Monitor transactions for suspicious patterns or volume anomalies Score risk based on client type, geography, and transaction behaviour Trigger escalations and audit-logged alerts automatically 3. Centralized Case Management Unify screening, onboarding, and regulatory review workflows Track every decision, flag, and escalation in one dashboard Export formatted reports for FinCEN, FCA, AMLA, and MAS 4. Deployment + Localization Deploy on-prem, in private cloud, or across multiple regions Jurisdiction-specific policies, thresholds, and audit trails Seamless integration with banking, CRM, and identity tools Case Insight: DIFC-Based Corporate Services Firm

A UAE-regulated corporate services firm implemented iComply’s KYB software to unify compliance across business clients:

Cut onboarding time by 70% Automated UBO and sanctions monitoring Passed DFSA audit with zero deficiencies

As KYB expectations evolve globally, regulated entities must modernize fast. iComply’s compliance software simplifies onboarding, standardizes audit preparation, and supports confident cross-border operations.

Talk to iComply to see how our KYB compliance software helps PSPs, VASPs, and financial institutions stay compliant—no matter where they operate.


BlueSky

Building Healthier Social Media: Updated Guidelines and New Features

Public discourse on social media has grown toxic and divisive, but unlike other platforms, Bluesky is building a social web that empowers people instead of exploiting them.

Public discourse on social media has grown toxic and divisive. Traditional social platforms drive polarization and outrage because they feed users content through a single, centralized algorithm that is optimized for ad revenue and engagement. Unlike those platforms, Bluesky is building a social web that empowers people instead of exploiting them.

Bluesky started as a project within Twitter in 2019 to reimagine social from the ground up — to be an example of “bluesky” thinking that could reinvent how social worked. With the goal of building a healthier, less toxic social media ecosystem, we spun out as a public benefit corporation in 2022 to develop technologies for open and decentralized conversation. We built Authenticated Transfer so Twitter could interoperate with other social platforms, but when Twitter decided not to use it, we built an app to showcase the protocol.

When we built the app, we first gave users control over their feed: In the Bluesky app, users have algorithmic choice — you can choose from a marketplace of over 100k algorithms, built by other users, giving you full control over what you see. There is also stackable moderation, allowing people to spin up independent moderation services, and giving users a choice in what moderation middleware they subscribe to. And of course there is the open protocol, which lets you migrate between apps with your data and identity, creating a social ecosystem with full data portability. Just today, we announced that we are taking the next step in decentralization.

Although we focused on building these solutions to empower users, we still inherited many of the problems of traditional social platforms. We’ve seen how harassment, vitriol, and bad-faith behavior can degrade overall conversation quality. But innovating on how social works is in our DNA. We’ve been continuously working towards creating healthier conversations. The quote-post used to let harassers take a post out of context, so we gave users the ability to disable them. The reply section often filled up with unwanted replies, so we gave users the ability to control their interaction settings.

Our upcoming product changes are designed to strengthen the quality of discourse on the network, give communities more customized spaces for conversation, and improve the average user’s experience. One of the features we are workshopping is a “zen mode” that sets new defaults for how you experience the network and interact with people. Another is including prompts for how to engage in more constructive conversations. We see this as part of our goal to make social more authentic, informative, and human again.

We’ve also been working on a new version of our Community Guidelines for over six months, and in the process of updating them, we’ve asked for community feedback. We looked at all of the feedback you gave and incorporated some of your suggestions into the new version. Most significantly, we added details so everyone understands what we do and do not allow. We also better organized the rules by putting them into categories. We chose an approach that respects the human rights and fundamental freedoms outlined in the UN Guiding Principles on Business and Human Rights. The new Guidelines take effect on October 15.

In the meantime, we’re going to adjust how we enforce our moderation policies to better cultivate a space for healthy conversations. Posts that degrade the quality of conversations and violate our guidelines are a small percentage of the network, but they draw a lot of attention and negatively impact the community. Going forward, we will more quickly escalate enforcement actions towards account restrictions. We will also be making product changes that clarify when content is likely to violate our community guidelines.

We were built to reimagine social from the ground up by opening up the freedom to experiment and letting users choose. Social media has been dominated by a few platforms that have closed off their social graph and squashed competition, leaving users few alternatives. Bluesky is the first platform in a decade to challenge these incumbents. Every day, more people set up small businesses and create new apps and feeds on the protocol. We are continuing to invest in the broader protocol ecosystem, laying a foundation for the next generation of social media developers to build upon.

Today’s Community Guidelines Updates

In January, we started down the path of updating our rules. Part of that process was to ask for your thoughts on our updated Community Guidelines. More than 14,000 of you shared feedback, suggestions, and examples of how these rules might affect your communities. We especially heard from community members who shared concerns about how the guidelines could impact creative expression and traditionally marginalized voices.

After considering this feedback, and in a return to our experimental roots, we are going to bring a greater focus to encouraging constructive dialogue and enforcing our rules against harassment and toxic content. For starters, we are going to increase our enforcement efforts. Here is more information about our updated Community Guidelines.

What Changed Based on Your Feedback

Better Structure: We organized individual policies according to our four principles – Safety First, Respect Others, Be Authentic, and Follow the Rules. Each section now better explains what's not allowed and consolidated related policies that were previously scattered across different sections. More Specific Language: Where you told us terms were too vague or confusing, we added more detail about what these policies cover. Protected Expression: We added a new section for journalism, education, advocacy, and mental health content that aims to reduce uncertainty about enforcement in those areas.

Our Approach: Foundation and Choice

We maintain baseline protections against serious harms like violence, exploitation, and fraud. These foundational Community Guidelines are designed to keep Bluesky safe for everyone.

Within these protections, our architecture lets communities layer on different labeling services and moderation tools that reflect their specific values. This gives users choice and control while maintaining essential safety standards.

People will always disagree about whether baseline policies should be tighter or more flexible. Our goal is to provide more detail about where we draw these boundaries. Our approach respects human rights and fundamental freedoms as outlined in the UN Guiding Principles on Business and Human Rights, while recognizing we must follow laws in different jurisdictions.

Looking Forward

Adding clarity to our Guidelines and improving our enforcement efforts is just the beginning. We also plan to experiment with changes to the app that will improve the quality of your experience by reducing rage bait and toxicity. We may not get it right with every experiment but we will continue to stay true to our purpose and to listen to our community as we go.

These updated guidelines take effect on October 15, and will continue to evolve as we learn from implementation and feedback. Thank you for sharing your perspectives and helping us build better policies for our community.

Thursday, 18. September 2025

LISNR

How Mobility Leaders Turn Idle Ride Time into Opportunity

How Mobility Leaders Turn Idle Ride Time into Opportunity Mobility leaders across the globe are searching for a constant communication channel with their end customers. For transit leaders, there are three main touchpoints with their end consumers: Ticketing (Boarding), In-Transit, and Exit (Disembarkation). Most mobility leaders perfect one of the three, leaving possible revenue channels […] Th
How Mobility Leaders Turn Idle Ride Time into Opportunity

Mobility leaders across the globe are searching for a constant communication channel with their end customers. For transit leaders, there are three main touchpoints with their end consumers: Ticketing (Boarding), In-Transit, and Exit (Disembarkation). Most mobility leaders perfect one of the three, leaving possible revenue channels and ideal rider experiences on the table.

What communication channel can be capitalized across all three consumer journey touchpoints within mobility?

The Problem: Current proximity modalities are limited by one of the following: distance, throughput, hardware limitations, and interoperability.

The Solution: LISNR Radius offers a unique proximity modality that changes the way consumers interact throughout the rider journey. Our Radius SDK relies on ultrasonic communication between standard speakers (already installed in transit vehicles and stations) and microphones found in everyday devices like smartphones. By establishing a communication channel directly between the consumer device and the vehicle or station, transit operators can reduce wait times, improve accessibility, capitalize on idle time in transit, and segment their riders for variable pricing. 

Furthermore, LISNR offers Quest, our loyalty and gamification portal, which allows mobility leaders to keep a unified record of key customer interactions. With Quest, mobility leaders can incentivize off-peak rides and partner with nearby shops to offer advertisements directly to a rider in transit.

Talk with Our Team about Mobility Solutions The Proliferation of LISNR-Enabled Digital Touchpoints in Mobility

LISNR empowers businesses to capitalize on the digital touchpoints found in everyday transit experiences. By enabling the delivery of speedy ticketing and personalized offers directly to consumers’ devices, transit operators can engage their riders during all three stages of transit.

Ticketing

Legacy ticketing infrastructure creates long queues, is easy to bypass, and simply doesn’t work without a stable internet connection. Radius redefines this process with our ultrasonic SDK by working at longer ranges than NFC, with more pinpoint precision than BLE, and without a network connection at the time of transaction. Radius is already gaining major traction as a ticketing alternative in the mobility space. With our recent partnership with S-Cube, LISNR has expanded to provide a mass ticketing solution to the busiest transit stations in India.

S-Cube needed a faster and more secure way to enable ticketing for millions of riders. Moreover, S-Cube needed ticketing technology that could perform without a reliable network connection. Radius was able to achieve all of these and more. In testing, S-Cube saw a dramatic increase in rider throughput by switching from QR codes to Radius for ticketed gate access. They moved from processing 35 riders per minute to 60 riders per minute, representing an over 70% improvement.

 

S-Cube uses a Zone 66 broadcast at entry allowing consumers to identify themselves and validate their ticket as they approach the turnstile. Once at the turnstile, consumers can broadcast their account-based ticket information to the ticketing machine (Point1000 on Channel 0 from their device’s speaker). Since they have already been identified and validated, their passengers can breeze through the ticketing process.

See More Product Demos In-Transit Promotion

In-transit promotions are not a new concept, with buses and trains already filled with billboard-like advertising. More recently, rideshare applications have started showing ad space on the home page and key active pages. Unfortunately, these advertisements often go unnoticed, are rarely relevant to the end customer, and for rideshares, are only presented to the paying device. LISNR solves these problems with Radius and Quest.

Using Radius, transit operators can capitalize on idle time in transit by sending promotional offerings directly to all consumers’ devices that are present in the vehicle. For example, businesses at certain stops can target specific riders based on their commute patterns. Furthermore, food/grocery delivery platforms can focus on a tired passenger coming home from work.

By establishing this additional communication channel to their riders, the transit operator can send promotional messages from their partners directly to the most important audiences. By communicating at the device level, promotional offerings can be sent with the preferences of the end customer. Radius’s ultrasonic SDK operates above audible frequencies, meaning that even in noisy conditions, riders are still able to receive their promotions.

By incorporating Quest, transit operators (or their marketing partners) can keep a unified record of customers and the promotions they interact with. Over time, this leads to more relevant promotions and a better experience for marketers and riders alike. With Quest and Radius, transit operators can capitalize on riders’ idle time in transit while establishing a positive connection with them.

Radius tone being broadcast at a frequency higher than human hearing Example of Quest, gamified loyalty for a mobility ecosystem leader Identify the Exit Point

In some modes of transit it’s easy to identify when the consumer exits the vehicle (planes, rideshares), however, most modes of public transit are left in the dark. This lack of visibility into rider disembarkation makes certain variable pricing nearly impossible. With Radius, transit operators can leverage the rider’s microphone when in-app to detect and confirm the presence of the device. With Radius enabled, mobility operators can begin to charge based on a “Be-In-Be-Out” pricing model. These seamless transit experiences are gaining traction with the global contactless transit market projected to grow to $33.5B by 2030 (CAGR ~15%). This major shift is driven by account-based ticketing and distance/usage-based fares (Source: Allied Market Research, 2023). 

LISNR is here to enable transit ecosystem leaders with the technology to support a near-frictionless be-in/be-out user flow for consumers. Our long-range (Zone) ultrasonic tones can broadcast in-vehicle to detect the presence of devices. As riders exit the vehicle, the tones will no longer be detected and the app backend will end the variable pricing model for their trip.

Conclusion

LISNR’s contactless solutions help support the mobility and transit ecosystems across all major digital touchpoints in the consumer journey, from ticketing to exit. With these contactless touchpoints optimized for speed and security, ecosystem leaders can capitalize on variable pricing and answer the growing demand for frictionless experiences; all while establishing new revenue streams with in-transit promotions. 

Our customer loyalty and gamification portal, Quest, can support and optimize consumer touchpoints across the journey. Riders can be incentivized to travel in off-peak hours, receive bonuses for promotions that they convert on, and be rewarded for their achievements such as lifetime rides.

We’ve put together a comprehensive PDF that outlines where LISNR outperforms other contactless technologies commonly found in mobility. If you’re interested in learning more or sharing with a colleague, please feel free to download a copy below.

We’ve created an easily digestible overview of this process, highlighting the digital touchpoints for your passengers. Fill out your contact information below to download a digital copy.

The post How Mobility Leaders Turn Idle Ride Time into Opportunity appeared first on LISNR.


IDnow

Why compliance and player protection define iGaming in Germany – DGGS’s CEO Florian Werner on leading the way.

We spoke with Florian Werner, CEO of Deutsche Gesellschaft für Glücksspiel (DGGS), the operator behind the JackpotPiraten and BingBong brands, to understand how strict regulatory requirements under the Interstate Treaty on Gambling (GlüStV 2021) are shaping iGaming in Germany. From the country’s strong focus on player protection to navigating compliance challenges Werner explains how DGGS […]
We spoke with Florian Werner, CEO of Deutsche Gesellschaft für Glücksspiel (DGGS), the operator behind the JackpotPiraten and BingBong brands, to understand how strict regulatory requirements under the Interstate Treaty on Gambling (GlüStV 2021) are shaping iGaming in Germany.

From the country’s strong focus on player protection to navigating compliance challenges Werner explains how DGGS balances regulation with player experience – and why trusted partners like IDnow are essential for building a sustainable, responsible iGaming market. 

As one of Germany’s earliest licensed iGaming operators, DGGS has taken on both the pride and responsibility of setting industry standards. With its JackpotPiraten and BingBong brands, the company is committed to combining entertainment with strong compliance and social responsibility. In this interview, CEO Florian Werner shares how DGGS works with regulators, leverages technology to protect players and adapts to the challenges of one of Europe’s most tightly regulated markets. 

Why being first in Germany came with pride – and responsibility  In 2022, DGGS’ JackpotPiraten and BingBong became the first brands to receive a national slot licence from the German regulator, GGL. What did that milestone mean for you as an operator – especially in terms of your responsibility to lead in compliance and player protection?

We were delighted and proud to be the first operator to meet the necessary requirements for entering the German market. At the same time, we are fully aware of the responsibility this entails. That is why we are committed to acting responsibly and have deliberately chosen such an experienced partner as IDnow to stand by our side, supporting us actively in key areas such as player protection, account verification, and the safety of our players.

How does IDnow help you protect your players?

IDnow helps us reliably verify the identity of our players, making sure that no one can play under a false name. At the same time, the solution provides a secure and compliant identity check that effectively prevents underage gaming and fraud. This way, we create a trustworthy and protected environment for all our players.

Why regulation in Germany creates both challenges and opportunities  What were the most significant regulatory and operational challenges you faced in those first months?  

The biggest challenges in the regulated German market have remained unchanged since legalization. These primarily include the high tax burdens in Germany, which have a negative impact on payout ratios and the overall gaming experience of virtual slot machines. In addition, requirements such as a €1 stake limit and the mandatory delay between game rounds (the ‘5-second rule’) pose significant challenges. Since many of these regulations were newly introduced under the 2021 Interstate Treaty on Gambling (GlüStV 2021), a meaningful exchange of experiences was initially difficult. However, we are in contact with various industry representatives and remain hopeful for a more attractive offering for German players in the future.

How does the DGGS work with GGL and other regulators to protect players and combat fraud and how does it stay up to date with any regulatory changes to ensure continuous compliance? 

We are engaged in regular dialogue on multiple levels, collaborating closely with both industry associations and regulatory representatives. In particular our compliance team maintains an ongoing exchange that we experience as collegial, constructive, and open.

Why technology and trusted partners are the backbone of compliance  What role do trusted technology or identity verification partners play in maintaining your compliance and risk posture? 

Verification and identity-check technologies are of vital importance. In Germany, strict regulations rightly govern the handling of personal data. To meet these standards effectively, we rely on experienced external providers whose expertise ensures secure, efficient, and reliable processes at a scale that would not be possible manually.

Why responsible gambling is more than a legal requirement  The German GGL regulation is centred on social responsibility and player protection. What specific measures do you have in place to identify and assist players at risk of gambling harm? 

At our online casinos JackpotPiraten and BingBong, we analyze player behavior and ensure a safe gaming experience. If signs of problematic gambling emerge, we are able to reach out directly to the player and if necessary, exclude them from play. As part of the regulated market, we see this consistent and responsible approach as one of our core duties in protecting players.

How do you ensure that your responsible gambling tools are actually effective? Do you measure outcomes or make improvements based on player feedback or behavioral data? 

We take responsible gambling very seriously and therefore conduct ongoing monitoring of player activity. If signs of problematic gambling behavior are detected and cannot be changed, we can take a range of measures, including the closure of the player’s account.

Can you describe how the OASIS self-exclusion system is integrated into your platform and how you handle self-excluded or returning players? 

Players can exclude themselves at any time directly on our platforms through the OASIS self-exclusion system. In addition, a ‘panic button’ is available, enabling an immediate 24-hour break from play. Once registered with OASIS, players are automatically blocked from accessing our platforms and are prevented from receiving any form of personalized advertising. These measures reflect our strong commitment to responsible gambling and player protection.

What trends are you seeing in player behavior since the introduction of the new regulatory framework? 

In international comparison, German legislation for virtual slot games is very strict. Tax rates are set at a high level, which negatively impacts the payout ratios of the games. In addition, there are stake restrictions and a requirement for a minimum game round duration of five seconds. Players view these measures very critically and often turn to the less restrictive and more attractive offerings of the black market. As a result, tax revenues in Germany from virtual slot games have been continuously declining, an unfortunate negative trend.

Transparency is key in regulated markets. How do you communicate responsible gambling features and policy updates to your players in a clear and proactive way? 

At Deutsche Gesellschaft für Glücksspiel, raising awareness among players about responsible gaming is a core priority. We follow a dual strategy that goes well beyond legal requirements. In line with regulations, we provide a dedicated information section on our platforms that explains how to use gambling products safely. Clear warnings about potential risks are displayed transparently, and players can access support organizations directly through the links we provide.

Going further, we actively engage our players through a regular newsletter and our innovative Slot Academy. Here, education takes place via live video sessions that continuously address the risks of virtual slot games and promote responsible, informed play.

Why entertainment and responsibility can go hand in hand  Looking ahead, what’s next for DGGS? Are there upcoming developments, features, or goals you’re particularly excited about? 

This year we are celebrating the Jackpot Video Awards 2025. The idea for an event together with our players came directly from the community. The Jackpot Video Awards combine entertainment with player protection and are eagerly anticipated by both our team and the players.

Interested in more from our customer interviews? Check out: Docusign’s Managing Director DACH, Kai Stuebane, sat down with us to discuss how secure digital identity verification is transforming digital signing amid Germany’s evolving regulatory landscape.

By

Nikita Rybová
Customer and Product Marketing Manager at IDnow
Connect with Nikita on LinkedIn


FastID

Publish your website without a host

Deploy static sites to Fastly Compute directly from your browser or IDE. Publish blogs, apps, and websites at the edge without hosting.
Deploy static sites to Fastly Compute directly from your browser or IDE. Publish blogs, apps, and websites at the edge without hosting.

Wednesday, 17. September 2025

Dark Matter Labs

Where to? Five pathways for a regenerative built environment

Where to next? Five pathways for a regenerative built environment Possibilities for the Built Environment, part 2 of 3 This is the second in a series of three provocations, which mark the cumulation of a collaborative effort between Dark Matter Labs and Bauhaus Earth to consider a regenerative future for the built environment as part of the ReBuilt project. In the first piece, we sugg
Where to next? Five pathways for a regenerative built environment Possibilities for the Built Environment, part 2 of 3

This is the second in a series of three provocations, which mark the cumulation of a collaborative effort between Dark Matter Labs and Bauhaus Earth to consider a regenerative future for the built environment as part of the ReBuilt project.

In the first piece, we suggested how six guiding principles for a regenerative built environment could redirect our focus. In this piece, we lay out six pathways toward regeneration, with suggested benchmarks and possible demonstrators, as a means of starting conversations, and identifying allies and tensions. The final piece in the series uses the configuration of the cement industry to explore the idea of nested economies and possible regenerative indicators.

Toward a process-based definition of regeneration

This piece leans into the friction between today’s extractive norms and the regenerative futures we have yet to realise.

We propose five pathways to establish regenerative practices throughout the built environment: these will span scales and sectors while driving change aligned with the principles laid out in the previous provocation. These pathways represent five modes for developing a multiplicity of new metrics, as well as creating the conditions for further progress to be taken on by future generations. Embedded in this logic are multiple and diverse systemic entry points for various actors to engage along the way.

These pathways are directions of travel that can be launched within the current economic system, without adopting a solution mindset. However, there are still real challenges to progress because of today’s political economy and scale of the polycrisis. While these pathways can be initiated within the current economic system, to be fully realised they must transform the system itself along the way.

One aspiration for these pathways is that they can capture the imagination and energies of a range of stakeholders, by creating containers for the changes it will take to bring us to a regenerative built environment. If we assume that to reach this future we will need both paradigm-shifting ‘impossible’ ideas and real demonstrations of best practices within our current contexts, then these pathways can hold together the different strands of effort, from the more feasible to the boundary-pushing, in one directional container. In each pathway, we ourselves look toward collaborators across geographies and disciplines to imagine, visualise and orient ourselves toward where these shifts could take us, in 2030, 2050 and beyond.

On a pragmatic level, structures to support initiation and governance of these pathways already exist and can be further fostered. Ownership for pathways can sit at the city or municipal level, supported by city networks such as Net Zero Cities, C40 cities and others, and further enabled through multi-municipal or regional coalitions to reach national scales. This type of multi-scalar, integrated approaches to the pathways can create the conditions for bottom-up schemes and ideas in communities and allow these to grow. The scale and pace of the transition we need requires governing decision-makers to have visibility over exceptional ideas that can push at the edges of the Overton window.

These pathways are not wholesale solutions to the problem, but rather provocative visions to incite discussion, draw out coalitions, grow a sense of responsibility and build momentum. It’s not that if we do these five things that a regenerative future will be reached. Rather, these are components of a re-envisioning.

Pathway 1: Maximising utilisation

Maximising the utilisation of our existing resources, spaces and infrastructures is one of the most transformative actions we can undertake in a context of resource shortage, carbon emissions crisis and labour crisis. That is especially relevant in the European context where our resource and space use inefficiencies are massive. Unlocking this latent capacity promises significant advancements in social justice and decoupling space and use creation from extraction and pollution. This develops a range of strategies from full utilisation of existing building stock, sharing models, flexible space use, with instruments such as open digital registries, smart space use platforms, smart contracts, and the like.

Image: Ivana Stancic, Dark Matter Labs, ‘A New Economy for Europe’s Built Environment’ white paper, for New European Bauhaus lighthouse project Desire: An Irresistible Circular Society, 2024.

Deep structural changes in mechanisms to challenge speculative land markets and reform regulatory frameworks will be needed to embed redistributive and democratic principles into the governance of urban space.

Potential challenges:

The implementation of maximal utilisation is severely constrained by today’s profit-driven development logic, which prioritises profit through new development and property speculation over efficient or shared use. Institutional inertia, entrenched ownership regimes and the financialisation of housing all work against such a shift, while digital tools like registries and smart contracts risk reinforcing existing inequalities if not democratically governed.

System demonstrator: reprogramming office buildings from 35% to a 90% use, increasing financial flows of the building
What could this look like in 2050? Multi-actor spatial governance frameworks and use-based permissions Dynamic pricing structures for building use based on occupancy and social value creation Highly durable building structures with adaptable multi-use internal spaces Outcomes-based financing models tied to social and ecological impacts Mixed use public-private-NGO partnerships Public digital booking platforms for maximised utilisation of spaces Pathway 2: Next-generation typologies

Next typologies are no longer governed by the principle that form follows function. Instead, they transcend traditional asset classes based on programmatic use, as a new asset class valued for the optionality, flexibility, use efficiency and value creation they provide. Decoupling value creation from extraction, systemic inefficiencies and carbon emissions here happens through focusing on social capital–for instance, radical sharing and cooperation models, as well as intellectual capital–as new innovation models and new design typologies.

Image: Ivana Stancic, Dark Matter Labs, ‘A New Economy for Europe’s Built Environment’ white paper, for New European Bauhaus lighthouse project Desire: An Irresistible Circular Society, 2024.

Without directly challenging speculative land markets, financialisation, and the classed and racialised histories embedded in built form, next-generation typologies may risk becoming a greenwashed evolution of the status quo rather than a transformative departure from it.

Potential challenges:

In capitalist urban systems, typologies and asset classes are produced through financial logics, property relations and commodification. Reframing buildings as flexible, innovation-driven assets may simply reproduce these dynamics in a new guise, reinforcing speculative value creation and market discipline under the banner of sustainability.

System demonstrator: Community living rooms–lightweight extensions on existing buildings, providing amenities with the right to use
What could this look like in 2050? Building public awareness in benefits of social time in relation to mental health New standards and codes for shared spaces and assets Tax reductions linked to carbon reduction impact of maximising efficiency Shared kitchens, living rooms, laundry rooms, appliances, tools and workshops Policy innovation enabling categorisation of shared spaces Increased cross-generational support, decreased loneliness, depression, stress levels Pathway 3: Systems for full circularity

Even though we have comprehensive knowledge on circularity, current levels in Europe are extremely low, and globally its rate is declining, thus this work focuses on the systems unlocking it and instruments driving its advancement on the ground. Apart from a comprehensive understanding of the craft (design for disassembly, development of city-scale material components networks, use of non-composite materials), we need the institutional economy and systems enabling circularity. That includes instruments such as material registries, material passports, financing mechanisms, design regulations, all developed simultaneously to unlock the new systems for circularity.

Image: Ivana Stancic, Dark Matter Labs, ‘A New Economy for Europe’s Built Environment’ white paper, for New European Bauhaus lighthouse project Desire: An Irresistible Circular Society, 2024.

For circularity to be genuinely transformative, it must be accompanied by political and economic restructuring — challenging the growth imperative, redistributing material control, and embedding democratic governance into how urban resources are managed and reused.

Potential challenges

Structural barriers hinder circularity. Extraction, planned obsolescence and short-term profit maximisation, which are the main imperatives in the current system, actively disincentivise long-term material stewardship. Circular practices often require slower, more localised and collaborative modes of production, which clash with the logics of global supply chains, speculative development and financialised real estate.

Moreover, without addressing issues of ownership, labour relations and uneven access to materials and technologies, circular systems risk being implemented in ways that benefit private actors while offloading costs onto public bodies or marginalised communities.

System demonstrator: City-scale architectural components bank, with developers’ right-to-use models
What could this look like in 2050? Material data registries and warranties for secondary materials Lightweight extensions, maximising utilisation and reuse of existing buildings City-scale material balance sheets and data registries for localised material cycles Civic material hubs for storage and distribution, zero carbon transport and logistics networks Demountable and highly adaptable building design Sinking funds for facilitating material reuse during deconstruction Pathway 4: Biogenerative material economy

The long-term future of our material economy must be bioregenerative. This transition needs deep understanding of systems impacts, avoiding further global biodiversity and land degeneration through green growth. This shift requires a transformation in land use for materials, moving from “green belts’’ to permaculture and regenerative methods, from supply chains to local supply loops. This requires developing new local material forests, zero-carbon local transport, non-polluting construction methods, as well as the policy, operational and financial innovation for a successful implementation of a fully biocompatible material economy.

Image: Ivana Stancic, Dark Matter Labs, ‘A New Economy for Europe’s Built Environment’ white paper, for New European Bauhaus lighthouse project Desire: An Irresistible Circular Society, 2024.

True transformation will involve challenging capitalist land markets, redistributing land and decision-making power and centering indigenous and community-led stewardship practices within the material economy.

Potential challenges:

We must not underestimate how global capitalism — through land commodification, agribusiness and extractive supply chains — actively undermines regenerative potential. Transforming green belts into permaculture zones, or establishing local material forests, requires not just technical and policy innovation, but a fundamental shift in land ownership, governance and power relations. Without addressing who controls land and resources, and whose interests are served by current material economies, there is a danger that biogenerative strategies become niche or elite enclaves, rather than systemic solutions.

System demonstrator: Neighbourhood gardens of biomaterials for insulation panels components for on site retrofitting
What could this look like in 2050? Regenerative agriculture & forestry practices and open education programs Certification for regenerative agriculture & carbon storage Macro-investments in bioregional forests & urban farms Civic biomaterial experimentation workshops & micro-factories Land restoration & rewilding sinking funds Regional, regenerative biomaterial supply chains, zero-carbon logistics networks Pathway 5: Shifting comfort, increasing contact

The ways we live in buildings today alienates us from our environmental and earthly context. Today’s built environment is designed to optimise for sterilisation through conditioned environments, separating us from the biomatter that is both input and output to our livelihoods. In providing comfort, we have been depending on extraction of resources, other species, biodiversity and ironically ourselves. We need to decouple the economy of comfort, which is here a shorthand for human-optimised environmental conditions, from extraction and externalisation. Pathways in driving this shift include participation and care models, increasing social values, shifting human relation to nature, a shift from technological to ecological services providing comfort, an increase in social and physical activity, a shift from the building scale to other scales, such as city-scale nature-based infrastructures and micro-scale furniture or clothing.

Image: Ivana Stancic, Dark Matter Labs, ‘A New Economy for Europe’s Built Environment’ white paper, for New European Bauhaus lighthouse project Desire: An Irresistible Circular Society, 2024.

Real progress will involve confronting the socio-economic systems that produce uneven access to comfort, land and energy, and reconfiguring them through justice-oriented redistribution, democratic urban governance and decommodified approaches to housing and care.

Potential challenges:

In this pathway, we must not romanticise behavioural or cultural change without sufficiently addressing the structural conditions that produce and maintain the current ‘economy of comfort’. The alienation it describes is not simply the result of misplaced design priorities or cultural habits, but of a capitalist system that commodifies comfort, standardises it through global construction norms, and externalises its costs onto ecosystems and marginalised communities. Some people experience the comfort constructed by today’s systems much more than others.

Shifting toward ecological and participatory models of comfort is valuable, but without challenging the political economy that privileges resource-intensive, climate-controlled lifestyles for some while denying basic shelter or agency to others, such shifts may remain symbolic or limited in scope.

System demonstrator: Retrofitting a neighbourhood to new comfort standards to increase this area’s economic resilience to changing energy landscape.
What could this look like in 2050? New standards and codes for comfort Tax reductions linked to shifts in investments from mechanical towards ecological services Curriculum rethinking lifestyles in relation to health impacts Investments in extending ecological services and permeable surfaces for flood mitigation, indoor and outdoor comfort through passive climatisation Infrastructures for integral value accounting Capturing and measuring physical and mental health impacts More community and individual knowledge about how to deal with the material world, ranging from biomatter to biodegradable consumer goods Local biowaste sorting and utilisation in industry/agriculture From a static to a process-based definition of a regenerative future

In viewing our transition to a regenerative built environment through these core shifts, we look toward a process-based definition of what is regenerative. A process-based definition would be an understanding of the regenerative that is calculated not by fixed, profit-driven metrics, determined on the basis of isolated data-points, or tied to particular policy benchmarks, but rather something dynamic, intuitive, and assembled from across knowledge-spheres and perspectives, with their associated means of measurement.

A process-based definition might adapt to the changing data landscape, material reality, technopolitical ground conditions and Overton windows of different contexts. Whereas absolute metrics like embodied carbon are difficult to attain with accuracy, and fail to capture the whole picture, targets pegged to individual points in time and specific standards can quickly become obsolete. A process-based approach is inspired by DML’s Cornerstone Indicators [more information at this link], a methodology which creates composite, intuitive indicators for assessing change over time, co-developed and governed in place.

Originally co-designed with Dr Katherine Trebeck, the Cornerstone Indicators were initiated in the city of Västerås in Sweden to support citizens to co-design simple, intuitively understandable indicators that encapsulate what thriving means to the people of the Skultana district. The indicators, which align with overall goals like ‘health & wellbeing’ and ‘strong future opportunities’, can facilitate greater understanding of a place, enable further conversation, and guide future decisions. The initial 9-month workshop process to design this first iteration of the Cornerstone Indicators, resulted in indicators such as ‘the number of households who enjoy not owning a car’, and ‘regularly doing a leisure activity with people you don’t cohabit with’ which were analysed and offered to local policymakers. The success of this process has led to explorations of the Cornerstone Indicator process across Europe and North America. Initiatives like the Cornerstone Indicators present a model of how momentum toward a regenerative future for the built environment can be built. It’s urgent that we begin using process-based definitions and practices to bring more people to the table and increase the potential for transition pathways to gain traction.

Conclusion

In the first two pieces in this series, we have explored the idea of a regenerative future in the built environment by examining how our current frameworks for regeneration fall short of meeting the demands of the present moment. We outline principles and pathways for charting a course toward genuine transformation.

In providing examples of leading-edge organisations making progress toward a regenerative future, these pieces are intended to invite conversation, feelings of agency and reflection, even in the face of prevailing systemic constraints. Rather than offering neat solutions, this piece seeks to open doors to new possibilities.

The context and projections offered here raise a number of questions. For a wholesale transition, it will be important to understand what will indicate progress toward regeneration, as well as how decisions will be made in order to resist the co-opting of regenerative principles into status quo ways of operating.

The remaining piece in this series will explore:

How configurations of material extraction, labour and monetary capital entrench nested economies and particular power relations, using the example of the cement industry Possible indicators of progress toward a regenerative built environment, and of the limitations encountered

Together these pieces aspire to introduce the idea of a regenerative built environment and associated promises and challenges, to inspire a sense of direction and to sketch the broader systemic shifts to which we must commit.

This publication is part of the project ReBuilt “Transformation Pathways Toward a Regenerative Built Environment — Übergangspfade zu einer regenerativen gebauten Umwelt” and is funded by the German Federal Ministry for the Environment, Nature Conservation, Nuclear Safety and Consumer Protection (BMUV) on the basis of a resolution of the German Bundestag.

This piece represents the views of its authors, including, from Bauhaus Earth, Gediminas Lesutis and Georg Hubmann, and from Dark Matter Labs, Emma Pfeiffer and Aleksander Nowak.

Where to? Five pathways for a regenerative built environment was originally published in Dark Matter Laboratories on Medium, where people are continuing the conversation by highlighting and responding to this story.


Shyft Network

Shyft Network’s Veriscope Powers Compliant Crypto Trading with Nowory in India

India’s crypto market, with 93 million investors, demands infrastructure that balances innovation with FATF Travel Rule compliance. Shyft Network, a leading blockchain trust protocol, has partnered with Nowory, an Indian crypto trading platform, to integrate Veriscope, the only frictionless solution for regulatory compliance. This collaboration showcases Veriscope’s ability to enable secure, compl

India’s crypto market, with 93 million investors, demands infrastructure that balances innovation with FATF Travel Rule compliance. Shyft Network, a leading blockchain trust protocol, has partnered with Nowory, an Indian crypto trading platform, to integrate Veriscope, the only frictionless solution for regulatory compliance. This collaboration showcases Veriscope’s ability to enable secure, compliant digital finance in high-growth markets while prioritizing user privacy.

Why Veriscope Matters for India’s

Crypto EcosystemAs India’s regulatory framework evolves, Virtual Asset Service Providers (VASPs) need tools to ensure compliance without complexity. Veriscope leverages cryptographic proof technology to facilitate secure, privacy-preserving data exchanges, aligning with FATF Travel Rule requirements. By integrating Veriscope, Nowory demonstrates how VASPs can achieve regulatory readiness seamlessly.

Nowory’s Role in the Partnership

Nowory, launched in August 2025, is an Indian crypto trading platform designed to serve India’s 93 million crypto investors with a secure and efficient bank-to-crypto gateway. By integrating Veriscope, Nowory aligns with global compliance standards, eliminating risky P2P trading and supporting India’s growing demand for regulated crypto infrastructure.

Key Benefits of Veriscope’s Integration

The Shyft Network-Nowory partnership highlights Veriscope’s power to transform crypto compliance:

Frictionless Compliance: Simplifies FATF Travel Rule adherence without burdening platforms or users. Privacy-First Design: Protects user data using cryptographic proofs, ensuring autonomy. Scalable Solutions: Supports growing VASPs in dynamic markets like India.

Zach Justein, co-founder of Veriscope, emphasized the integration’s impact:

“India’s crypto market needs solutions that streamline compliance while preserving privacy. Veriscope’s integration with Nowory reflects Shyft Network’s commitment to secure, compliant blockchain infrastructure.”
Powering a Compliant Crypto Future

Nowory joins a global network of VASPs adopting Veriscope to meet regulatory demands seamlessly. This partnership underscores the need for secure, compliant crypto infrastructure in high-growth markets like India.

About Veriscope

Veriscope, built on Shyft Network, is the leading compliance infrastructure for VASPs, offering a frictionless solution for FATF Travel Rule compliance. Powered by User Signing, it enables VASPs to request cryptographic proof from non-custodial wallets, simplifying secure data verification while prioritizing privacy. Trusted globally, Veriscope reduces compliance complexity and empowers platforms in regulated markets.

About Nowory

Nowory is an Indian crypto trading platform launched in August 2025, designed for secure and efficient trading of assets like Bitcoin, Ethereum, and Solana. It provides a direct bank-to-crypto gateway for India’s 93 million crypto investors, emphasizing regulatory readiness and the elimination of risky P2P trading.

Stay ahead in crypto compliance.

Visit Shyft Network, subscribe to our newsletter, or follow us on X, LinkedIn, Telegram, and Medium.

Book a consultation at calendly.com/tomas-shyft or email bd@shyft.network

Shyft Network’s Veriscope Powers Compliant Crypto Trading with Nowory in India was originally published in Shyft Network on Medium, where people are continuing the conversation by highlighting and responding to this story.


Herond Browser

Where to Watch Cartoons Online: Your Complete Guide to Every Genre

This guide simplifies the search by providing a comprehensive overview of the best sites to watch cartoons online. The post Where to Watch Cartoons Online: Your Complete Guide to Every Genre appeared first on Herond Blog. The post Where to Watch Cartoons Online: Your Complete Guide to Every Genre appeared first on Herond Blog.

Cartoons aren’t just for kids; they are a timeless form of entertainment that spans genres from lighthearted comedy to deep, serialized dramas. With so many streaming services and platforms available today, finding where to watch your favorite animated shows can be a challenge. This guide simplifies the search by providing a comprehensive overview of the best sites to watch cartoons online. Whether you’re looking for classic Saturday morning nostalgia, the latest anime hits, or cutting-edge adult animation.

What to Look for in Watch Cartoons Online Streaming Sites Content Variety

The best platforms offer a diverse and regularly updated library. Look for a mix of classic cartoons, new releases, and a range of genres, including kids’ animation, anime, and shows for adults.

User Experience

A good streaming site should have a clean, easy-to-use interface, high-quality video (HD or 4K), and reliable playback. Useful features like parental controls, watchlists, and an ad-free option are also major pluses.

Legality and Safety

To ensure your security and support content creators, stick to reputable services. Look for platforms that have a clear business model, whether through subscriptions or authorized, ad-supported content. Avoid sites with excessive pop-ups or suspicious download prompts.

Top Sites to Watch Cartoons Online by Genre Netflix

A global streaming giant with a vast library of animated content. This site includes a growing number of original series for both kids (e.g., The Dragon Prince) and adults (e.g., BoJack Horseman, Arcane).

Hulu

Known for its mix of classic and modern cartoons. Hulu offers a wide range of content from networks like Cartoon Network and Nickelodeon, as well as a strong lineup of adult animated hits like Family Guy and Bob’s Burgers.

Max (formerly HBO Max)

The hub for Warner Bros.’ extensive catalog. Max is a go-to for many of the most popular cartoons from Cartoon Network and Adult Swim, including Adventure Time, Rick and Morty, and The Powerpuff Girls.

Disney+

The ultimate destination for Disney and Pixar fans. Disney+ provides access to nearly every animated movie and series from these studios, along with content from Marvel, Star Wars, and National Geographic.

Crunchyroll

For anime enthusiasts, Crunchyroll is the premier service. It offers the world’s largest library of Japanese animation, with new episodes often streaming just an hour after they air in Japan. They also have a limited free section for non-subscribers.

Tubi

A completely free, ad-supported streaming service. Tubi has an impressive and diverse collection of cartoons, from nostalgic classics like Scooby-Doo to popular anime and adult animated series.

YouTube

A massive repository of animation. You can find official channels from studios (like Warner Bros. and PBS Kids). The full episodes of shows that are in the public domain, and a huge community of independent animators sharing their work.

Pluto TV

Another free streaming service that operates like a mix between traditional television and on-demand streaming. It has dedicated channels for various cartoons, including classics and anime, as well as a selection of on-demand content.

Hoopla & Libby

If you have a public library card, these apps are fantastic, completely legal, and free options. They allow you to borrow and stream digital comics, animated shows, and movies from your local library’s collection.

Common Mistakes to Avoid When You Watch Cartoons Online Using Illegal Streaming Sites

The biggest mistake is using unofficial sites that host pirated content. These platforms are a major source of malware, viruses, and endless pop-up ads, which can compromise your computer and personal data.

Falling for Phishing Scams

Be cautious of sites that ask for your personal information, credit card details, or require you to “log in” to another service. Always double-check the URL and never enter sensitive information on a site that seems suspicious.

Disabling Security Software

Some unreliable sites might trick you into disabling your antivirus or ad-blocker to watch a show. This is a red flag and should never be done, as it leaves your device vulnerable to a variety of threats.

Ignoring Parental Controls

For families, a common oversight is not using the parental control features available on most major streaming services. These tools are essential for ensuring that children only have access to age-appropriate content.

Clicking on Suspicious Ads

Even on legal, ad-supported sites, be careful where you click. Avoid engaging with pop-ups or banners that promise free prizes, downloads, or “miracle” products, as they can lead to malicious websites.

Forgetting VPNs for Regional Content

Some shows might be restricted to certain countries. A common mistake is not using a Virtual Private Network (VPN) to access legally available content from another region where you have a subscription.

Tips for Safe and High-Quality Cartoon Streaming Using Reputable Platforms

The most important tip is to stick to legal and well-known streaming services like Netflix, Hulu, Max, and Disney+. These platforms have official partnerships with content creators, guaranteeing that the shows are authorized and free of malware.

Enable Parental Control

For families, it is crucial to set up and use parental controls. Most major streaming services offer robust tools that allow you to create profiles for children and restrict content based on age ratings, preventing them from accessing inappropriate material.

Be Wary of Free Sites

While some free, ad-supported services like Tubi and Pluto TV are legitimate, you should be extremely cautious of obscure sites. If a site offers a massive, brand-new library for free with no subscriptions or ads, it is likely illegal and could be a source of viruses and malware.

Using a VPN

A Virtual Private Network (VPN) can be a great tool for secure streaming. It encrypts your internet traffic and hides your IP address, adding a layer of privacy and security. It can also be used to access content that is legally available in other regions.

Avoid Suspicious Ads and Downloads

On ad-supported sites, never click on pop-up ads, download buttons, or links that seem out of place. These are often phishing attempts or malicious software disguised as something else.

Conclusion

The world of animation is vast and vibrant, offering something for every age and interest. With a clear understanding of the best platforms and a few safety tips, you can unlock a universe of cartoons without hassle. Whether you prefer the convenience of a subscription service like Netflix or the extensive free libraries of Tubi and YouTube, there are plenty of legal options available. By choosing a reputable platform and being mindful of potential risks, you can ensure a safe and high-quality streaming experience, making it easier than ever to enjoy your favorite animated adventures.

About Herond

Herond Browser is a cutting-edge Web 3.0 browser designed to prioritize user privacy and security. By blocking intrusive ads, harmful trackers, and profiling cookies, Herond creates a safer and faster browsing experience while minimizing data consumption.

To enhance user control over their digital presence, Herond offers two essential tools:

Herond Shield: A robust adblocker and privacy protection suite. Herond Wallet: A secure, multi-chain, non-custodial social wallet.

As a pioneering Web 2.5 solution, Herond is paving the way for mass Web 3.0 adoption by providing a seamless transition for users while upholding the core principles of decentralization and user ownership.

Have any questions or suggestions? Contact us:

On Telegram https://t.me/herond_browser DM our official X @HerondBrowser Technical support topic on https://community.herond.org

The post Where to Watch Cartoons Online: Your Complete Guide to Every Genre appeared first on Herond Blog.

The post Where to Watch Cartoons Online: Your Complete Guide to Every Genre appeared first on Herond Blog.

Tuesday, 16. September 2025

Extrimian

Why Extrimian is an AI-First Company

Why Extrimian’s AI‑First Approach Improves Digital Credential Solutions Let’s start explaining why Extrimian is an AI-First company. Our goal is to give universities and other startups, a faster, more reliable way to issue, manage, and verify credentials—while ensuring our own teams work smarter behind the scenes. This post explains how our AI‑first ethos (via the […] The post Why Extrimian is a
Why Extrimian’s AI‑First Approach Improves Digital Credential Solutions

Let’s start explaining why Extrimian is an AI-First company. Our goal is to give universities and other startups, a faster, more reliable way to issue, manage, and verify credentials—while ensuring our own teams work smarter behind the scenes. This post explains how our AI‑first ethos (via the internal agent Micelya) makes Extrimian more efficient, and how our University Portal product solves the very real problems of diploma fraud, identity theft and manual verifications.

TL;DR Extrimian’s AI‑first philosophy refers to how we work internally, not how we verify credentials. Our agent Micelya organises knowledge and speeds up development and support. Self‑Sovereign Identity (SSI) and cryptographic signatures secure the credentials; AI is not used in the verification flow. By using AI internally and SSI externally, Extrimian delivers more complete features, faster updates and a calmer verification process for universities and students. What does “AI‑first” really mean in Extrimian? AI – Artificial intelligence, future technology innovation. Extrimian AI-First Company

When Extrimian says we are AI‑first, we’re talking about our own processes, not the product’s cryptographic core. We have an internal agent called Micelya that acts like a living knowledge hub for our teams. It stores and organises product specifications, SOPs, design decisions and customer insights, making them easy to find and apply. 

How do we use Micelya internally? Agile and interdisciplinary processes

To keep Micelya truly useful, our product and engineering teams continually feed it with the latest internal documentation, release notes, process playbooks and step‑by‑step guidelines for every product. This curated knowledge helps the agent surface the right answers, recommend the correct templates and shorten hand‑offs across the organisation.

When engineers or product managers work on a new release, Micelya suggests the right protocol or template and reminds us of past decisions. This means we iterate more quickly, avoid duplication, and keep every improvement in play. The agent doesn’t handle your credentials; it powers how we build and support the product.

How does Micelya make Extrimian faster and more consistent?

Micelya’s role is to optimize Extrimian’s internal processes. It automatically flags related resources—SOPs, integration steps, templates—at the moment a team member needs them. It nudges us when something requires approval or when a template must be updated. It also stores lessons learned from support tickets and feature requests, so improvements become part of our future releases. This means we respond to universities more quickly, address issues more consistently, and ship updates faster. Because the agent streamlines our internal workflow, you receive a product that evolves continuously without long delays.

Why does AI‑first matter for universities if it’s only internal?

You might wonder why our internal AI should matter to you. Simply put, Micelya makes Extrimian more efficient, which reflects in our product and support. Faster iteration cycles mean new features and fixes arrive sooner. A shared knowledge hub ensures you receive consistent advice regardless of who answers your call. When updates roll out, they’re informed by a complete history of past decisions and user feedback. Although AI never touches your credentials or verification flow, our AI‑first culture ensures we deliver a more refined, dependable product.

Why is it good to be an AI‑first company?

Being AI‑first has benefits that extend beyond Extrimian; companies in many sectors adopt AI to become more responsive, innovative, and resilient. Here’s a concise summary of key advantages and how they play out in our case:

Benefit of being AI‑first Impact on operations Extrimian example Efficiency Faster decisions & shorter release cycles Micelya surfaces the right SOPs and templates so teams ship updates quicker Knowledge retention Shared, up‑to‑date repository of policies & best practices Our knowledge hub prevents repeated mistakes and speeds new‑hire onboarding Cross‑team alignment Consistent workflows and communication across departments Product, engineering & support teams work from the same playbook Continuous improvement AI highlights patterns & informs roadmaps Micelya captures feedback loops so each release builds on lessons learned Better customer experience Quicker responses & higher‑quality products Universities see faster support, smoother updates and less rework

This table illustrates why an AI‑first mindset isn’t just a buzzword—it underpins real gains in speed, quality and alignment. For Extrimian, those gains help us deliver a stable verification product more rapidly and consistently.

What do students and verifiers experience?

From a student’s perspective, digital credentials mean convenience and control. They receive tamper‑proof proofs right in their ID Wallet and share them through a link or QR code. They aren’t forced to disclose their entire transcript when only enrollment status is needed. For verifiers, checking credentials is just as straightforward: visit the university’s verification page, scan the QR code or paste the link, and see an immediate result with clear guidance. No waiting for emails, no guesswork, and no reliance on appearance. This streamlined experience increases trust and speeds up decision‑making for everyone.

AI for process, cryptography for trust

Extrimian’s approach balances two forces: cryptographic security for credentials and AI‑driven efficiency for internal work. SSI and digital signatures make diplomas and enrolment proofs tamper‑proof, while the AI‑first mindset (through Micelya) reduces friction in our development and support processes. The two realms remain separate; AI does not verify credentials, but it helps us build better products and respond faster. For universities, this means a reliable, ready‑to‑use product backed by a company that continuously improves without sacrificing trust.

Recommended resources: Internal links University Portal overview – Learn more about our University Portal and how it issues tamper‑proof credentials.
ID Wallet page – link to the page that introduces the student/employee wallet used to store and share verifiable credentials.
Anchor text: “See how the ID Wallet lets students carry and share their credentials securely. About Extrimian / Our Story – Discover who we are and why we invest in internal AI to deliver better products.” Blog archive or Learning Resources – For a deeper dive into SSI and digital identities, explore our resources page or related articles. Contact or Demo page – If you’d like to see the portal in action, book a demo with our team.
External links W3C Verifiable Credentials specification – The W3C’s Verifiable Credentials Data Model defines how digital credentials are issued and verified. Self‑Sovereign Identity (SSI) explainer – Self‑Sovereign Identity (SSI) is an approach that puts individuals in control of their data; this SSI overview explains the core principles. Industry research or reports by EDUCASE – Recent studies show credential fraud is on the rise; this EDUCAUSE report outlines the challenge for universities. FIDO Alliance passkey standards – Passkeys are based on the FIDO2/WebAuthn standard for secure, phishing-resistant login.

 

The post Why Extrimian is an AI-First Company first appeared on Extrimian.


Holochain

Dev Pulse 151: Network Improvements in 0.5.5 and 0.5.6

Dev Pulse 151

We released Holochain 0.5.5 on 19 August and all tooling and libraries are now up to date.

Holochain 0.5.5 and 0.5.6 released

With these releases, we’re continuing to work on network performance for the Holochain 0.5.x series. There’s been a bunch of bug fixes and improvements:

New: At build time, Holochain can be switched between libdatachannel and go-pion WebRTC libraries, with libdatachannel currently the default in the Holochain conductor binary release and go-pion the default in Kangaroo-built hApps. go-pion is potentially free from an unwanted behaviour in libdatachannel, in which the connection is occasionally force-closed after a period of time. If you’ve seen this behaviour, consider trying your hApp in a Kangaroo-built binary to see if it’s resolved. Changed: Some tracing messages are downgraded from info to debug in Kitsune2 to reduce log noise. Bugfix: Make sure the transport layer has a chance to fall back to relay before timing out a connection attempt. Bugfix: When Holochain received too many requests for op data, it would start closing connections with the peers making the requests it couldn't handle. This caused unnecessary churn to reconnect, rediscover what ops need fetching, and send new requests. Instead, the requests that can't be handled are dropped and have to be retried. The retry mechanism was already in place, so that part just works. When joining a network with a lot of existing data, the sync process is now a lot smoother. Bugfix: Established WebRTC connections would fall back to relay mode when they failed; now the connection is dropped, and peers will try to establish a new WebRTC session. Bugfix: If a WebRTC connection could not be established, the connection would sometimes be left in an invalid state where it could not be used to send messages and Holochain wouldn't know to replace the connection to that peer. Bugfix: Holochain was using the wrong value for DHT locations. This was leading to differences being observed in the DHT model between peers, who would then issue requests for the missing data. The data couldn't be found because the requested locations didn't match what was stored in the database. This led to DHT sync failing to proceed after some period of time. Note: updating a hApp from Holochain 0.5.4 or earlier might cause a first-run startup delay of a few seconds as the chunk hashes are recalculated. Bugfix: Kitsune2 contains a fix for an out-of-bounds array access bug in the DHT model. Shifted priorities for 0.6

We’d originally planned to start the groundwork for coordinator updates (allowing a cell’s coordinator zomes to be updated) and DHT read access gating via membrane proofs in Holochain 0.6. We’re now going to push those to a later release in favour of focusing on warrants and other features that offer functionality that considers the strategically critical priorities of our partners.

These are the major themes of our work on 0.6:

Resolving incomplete implementations of the unstable warrants feature, writing more tests, and marking the feature stable for all app and sys validation except chain forks. Finishing the work that allows Holochain to block peers at the network level if they publish invalid data. Making sure that the peer connection infrastructure is production-ready. Continuing to build out the Wind Tunnel infrastructure and test suite.

There are a few smaller themes; check out the 0.6 milestone on GitHub for the full story.

Wind Tunnel updates

With many of the big gains in network performance and reliability realised in the 0.5 line and two new developers joining our team, we’ve freed up developer hours to focus on the Wind Tunnel test runner once again. Our big goal is: make it more usable and used. To this end, here are our plans:

We want to run the tests on a regular, automated schedule to gather lots of data and track changes over Holochain’s development. Rather than it being a requirement that a conductor is running alongside Wind Tunnel, Wind Tunnel itself will run and manage the Holochain conductor, allowing us to test conductors with different configs or feature flags within a scenario. Wind Tunnel already collects metrics defined in each scenario, but we are expanding on this to collect metrics from the host OS, such as CPU usage, and from the conductor itself. This will give us insight into system load and how the conductor is performing during the scenarios. More scenarios will be written, including complex ones involving malfunctioning agents and conductors with different configurations. More dashboards are being created to display the new metrics and give us insight into how the scenarios perform from version to version. These will then make it easy for us to track how Holochain's performance envelope changes as new features are added, and also to make it easier to prioritize where to focus our optimization efforts. We plan to run multiple scenarios on a single runner in parallel to make better use of the compute resources we have in our network. Along with adding more runners to the network, this will reduce the time it takes to run all of the tests, which will let us run the tests more often. We’re creating an OS installation image for Wind Tunnel runners, allowing any spare computer to be used for Wind Tunnel testing. This will let people support Holochain by adding their compute power to our own network. Holochain Horizon livestream

If you’re reading this, you probably care about more than just the state of Holochain development. We’re starting a series of livestreams that talk about things like where the Holochain Foundation is headed and what’s happening in the Holochain ecosystem.

The first one, a fireside chat between Eric Harris-Braun, the executive director of the Foundation, and Madelynn Martiniere, the Foundation’s newest council member and ecosystem lead, was on Wed 30 Jul at 15:00 UTC. Watch the replay on YouTube.

Next Dev Office Hours call: Wed 17 Sept

Join us at the next Dev Office Hours on Wednesday 17 Sept at 16:00 UTC — it’s the best place to hear the most up-to-date info about what we’ve been working on and ask your burning questions. We have these calls every two weeks on the DEV.HC Discord, and the last one was full of great questions and conversations. See you there next time!


Indicio

From paper to Proven: what the EUDI wallet means for the secure document printing industry

The post From paper to Proven: what the EUDI wallet means for the secure document printing industry appeared first on Indicio.
The shift to digital identity is accelerating and 2026 will be a critical year for the security printing and paper businesses. Now is the time to prepare.

By Helen Garneau

For decades, trust has been printed. Passports, ID cards, certificates, and other official, government-issued, and securitized documents have been how people prove who they are.  The European Digital Identity (EUDI) wallet signals the end of the era for exclusive use of paper and plastic-based identity. 

The regulation, set to be mandated with new technologies rolled out within the next year, introduces a way for citizens, residents, and businesses to securely share digital identity data in the form of  Verifiable Credentials across all EU member states; banking, travel, enterprises and government services are already piloting credential implementations. 

As with many transformative technologies, change happens slowly and then very fast.  

Companies that adapt quickly will stay relevant and leverage digital identity to deliver better products and services and innovate around seamless authentication and digital trust. Those that delay risk being left behind.

The question for companies in the secure document printing market is: how to not become obsolete when cryptography can make digital credentials every bit as trustworthy as the most secure physical document?

Just because the EUDI wallet framework architecture describes Verifiable Credentials, a digital identity technology that is interoperable, secure, and easy to use, the shift to digital identity doesn’t spell the end of physical documents.

Position for the great transition

The next few years will see a transition to verifiable digital identity and verifiable digital data and identity documents are the on-ramp. A key example: The International Civil Aviation Organization (ICAO) specifications for Digital Travel Credentials start with self-derived credentials (DTC-1), which means people are able to extract the data in the passport’s RFID chip then comparing the image in the chip with a real-time liveness check of the person scanning the passport and issuing a digital credential version of the passport. The passport can then be validated to confirm the data came from an official government source. They’ll still need their physical passport when they travel but it will only be for backup. 

The next step will be governments directly issuing digital passport credentials (following DTC-2 specifications) along with a person’s physical passport. The person will still need this physical passport when they travel.

In both cases, the digital passport credential will do all the heavy lifting in terms of identity authentication that enables the passenger to seamlessly check-in, access a lounge, cross a border, pick up a rental car, and check into their hotel. 

After these have been successfully implemented, we’ll move to a DTC-3 type credential — a fully digital passport where no physical back up is required. 

Where are we in the transition process? Well, with Indicio Proven, governments are able to issue DTC-2 type credentials. Expect to see them soon.

Driver’s licenses, diplomas

It’s not just passports that are being digitalized. The same liveness check and face-mapping that happens with DTCs can be done with government-issued documents, such as driver’s licences and Optical Character Recognition can read the data in the absence of the RFID chip. More US states are adopting Mobile Driver’s Licenses (mdoc/mDL), while the European Union expects this standard to be implemented in Europe by 2030

One bug in this rollout is that many mDL implementations don’t include the verification software businesses need to validate digital versions. These businesses still rely on physical driver’s licenses for customer identity authentication. If you want an mDL with simple, mobile, scalable verification Indicio Proven has you covered.

Diplomas, degrees, course transcripts and certificates are also being rendered as tamper-proof digital credentials through the Open Badges 3.0 specification. While their physical counterparts are not secured in the same way as government-issued identity, the Open Badges 3.0 standard makes these documents impossible to fake, binds them to their rightful holders, and renders them instantly verifiable.

The key to managing the transition to digital identity documents is to enable transition to these documents. And this is where Indicio Proven is unique in the marketplace.

Indicio Proven: your bridge from the physical to digital

Indicio Proven® gives printing companies a direct path into the digital era by transforming secure physical documents into Verifiable Credentials, the same technology outlined in the EUDI specification.

With Proven, your physical products become anchors, on-ramps, or companions to digital credentials. Passports can be turned into DTCs, and more than 15,000 types of identity documents from 250+ countries and territories can be credentialized. Driver’s licenses and other official documents can also be validated, bound with biometrics, and issued as tamper-proof digital Verifiable Credentials that are:

Fraud-resistant and cryptographically secure Combine with biometrics and stored on individual’s own device Portable across borders Instantly verifiable without complex checks

Proven is a fast, simple, and cost-effective way to extend your role in the EUDI realm today that helps your customers:

Save costs by reducing manual checks Protect against fraud with secure digital credentials Unlock new revenue by offering digital trust services alongside physical products

This technology also opens the door to offering new services in identity verification. When passports become Digital Passport Credentials and driver’s licenses become mobile driver’s licenses, organizations like financial institutions, airlines, and government agencies can verify and trust the information. Processes that were once inefficient and cumbersome—such as age verification, KYC, and cross-border travel—become seamless, premium services that create value and potential revenue streams every time they’re issued and verified.

The next chapter for printing and paper

Physical cards and certificates will not disappear overnight, but their primary value will shift. And that doesn’t mean paper-based industries are left out—your expertise in trust, security, and document integrity is more valuable than ever. 

Proven makes this transition easy, enabling your business to grow as identity goes digital. With Indicio, you can carry that expertise into the digital age and position your company at the center of the EUDI wallet revolution.

The world is moving from paper to Proven. The opportunity is here—are you ready to take it? 

Contact us today to get your complimentary EUDI digital identity strategy from one of our experts.

###

The post From paper to Proven: what the EUDI wallet means for the secure document printing industry appeared first on Indicio.


Ontology

How Smart Accounts Are Reinventing The Web3 Wallet

If you’ve ever used a crypto wallet like MetaMask, you’ve used an externally owned account (EOA). It’s a simple pair of keys: a public address that acts as your identity and a private key that proves you own it. This model is powerful but rigid, putting the entire burden of security and complexity on the user. Lose your seed phrase? Your funds are gone forever. Find transactions confusing? The eco

If you’ve ever used a crypto wallet like MetaMask, you’ve used an externally owned account (EOA). It’s a simple pair of keys: a public address that acts as your identity and a private key that proves you own it. This model is powerful but rigid, putting the entire burden of security and complexity on the user. Lose your seed phrase? Your funds are gone forever. Find transactions confusing? The ecosystem has little flexibility to help.

A new standard is emerging to solve these problems, moving us from rigid key-based wallets to programmable, user-friendly interfaces. The answer is smart accounts.

What is a smart account?

A smart account (or smart wallet) is not controlled by a single private key. Instead, it is a smart contract that acts as your wallet. This shift from a key-based account to a contract-based account is revolutionary because smart contracts are programmable. They can be designed to manage assets and execute transactions based on customizable logic, enabling features that were previously impossible.

This transition is powered by account abstraction (AA), a concept that “abstracts away” the rigid requirements of EOAs, allowing smart contracts to initiate transactions. While the idea isn’t new, it recently gained mainstream traction thanks to a pivotal Ethereum standard: EIP-4337.

EIP-4337 (the game changer)

EIP-4337: Account Abstraction via Entry Point Contract achieved something critical: it brought native smart account capabilities to Ethereum without requiring changes to the core protocol. Instead of a hard fork, it introduced a higher-layer system that operates alongside the main network.

Here’s how it works: UserOperations: You don’t send a traditional transaction. Instead, your smart account creates a UserOperation — a structured message that expresses your intent. Bundlers: These network participants (such as block builders or validators) collect UserOperation objects, verify their validity, and bundle them into a single transaction. Entry Point Contract: A single, standardized smart contract acts as a gatekeeper. It validates and executes these bundled operations according to the rules defined in each user’s smart account.

This system is secure, decentralized, and incredibly flexible.

Other key proposals (EIP-3074 and EIP-7702)

The journey to account abstraction has involved other proposals, each with different approaches.

EIP-3074: This proposal aimed to allow existing EOAs to delegate control to smart contracts (called invokers). While simpler in some ways, it raised security concerns due to the power given to invoker contracts. It has since been paused. EIP-7702: Proposed by Vitalik Buterin, this upgrade would allow an EOA to temporarily grant transaction permissions to a smart contract. It offers a more elegant and secure model than EIP-3074 and may complement — rather than replace — the infrastructure built around EIP-4337.

For now, EIP-4337 is the live standard that developers and wallets are adopting.

Why smart accounts matter

The real value of smart accounts lies in the user experience and security improvements they enable.

Gas abstraction: Apps can pay transaction fees for their users or allow payment via credit card, removing a major barrier to entry. Social recovery: Lose your device? Instead of a single seed phrase, you can assign “guardians” — other devices or trusted contacts — to help you recover access. Batch transactions: Perform multiple actions in one click. For example, approve a token and swap it in a single transaction instead of two. Session keys: Grant limited permissions to dApps. A game could perform actions on your behalf without being able to withdraw your assets. Multi-factor security: Require multiple confirmations for high-value transactions, just like in traditional banking. The future is programmable

Smart accounts represent a fundamental shift in how we interact with blockchains. They replace the “all-or-nothing” key model with programmable, flexible, and user-focused design. Major wallets like Safe, Argent, and Braavos are already leading the way, and infrastructure from providers like Stackup and Biconomy is making it easier for developers to integrate these features.

We’re moving beyond the era of the seed phrase. The future of Web3 wallets is smart, secure, and designed for everyone.

How Smart Accounts Are Reinventing The Web3 Wallet was originally published in OntologyNetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


liminal (was OWI)

Turning Competitive Intelligence into Messaging That Wins (with examples)

Why competitive intelligence often fails in messaging I’ve seen it firsthand: competitor battlecards stacking up in shared drives, analyst PDFs collecting dust, and persona research tucked into charts that never see daylight. It’s easy to feel overwhelmed by the noise and unsure where to even start. I’ve been there more times than I’d like to […] The post Turning Competitive Intelligence into Me
Why competitive intelligence often fails in messaging

I’ve seen it firsthand: competitor battlecards stacking up in shared drives, analyst PDFs collecting dust, and persona research tucked into charts that never see daylight. It’s easy to feel overwhelmed by the noise and unsure where to even start. I’ve been there more times than I’d like to admit. The problem isn’t a lack of data; it’s the ability to digest it and translate it into messaging that actually differentiates. Without that step, teams fall back on the same empty claims: “innovative,” “customer-first,” “the most trusted.” Buyers tune it out. Competitive intelligence only works when it becomes narrative. The raw material exists: persona insights, competitor positioning, feature data – but without the right framework, it collapses into noise. In fact, 83% of B2B buyers now expect personalization on par with consumer experiences, which means vague promises no longer earn attention.

The three pillars of messaging that stand out Buyer persona insights

Great messaging doesn’t start with features; it starts with people. Early on, I wrote messaging as if “the buyer” was a monolith. It fell flat. A CMO trying to differentiate a brand doesn’t think like a sales leader trying to speed up onboarding. Persona-based marketing insights can surface those distinctions, but the job of messaging is to speak to those specific goals and pain points, not to the broadest common denominator.

Competitor messaging & positioning

Copycat messaging is the silent killer of differentiation. Throw the first stone if you’ve never obsessed over a competitor’s launch while paying too little attention to how they positioned their value. Competitive benchmarking is useful, but not if it leads you to recycle the same message with a “we do it better” twist. The real win comes from understanding where you truly differentiate and telling the story of why that matters in the first place.

Feature differentiation that resonates

I used to think listing every capability would convince buyers, but it never did. Features only matter when they connect to buyer outcomes that feel tangible. In fraud prevention, that might mean reducing chargeback losses by 40%. In cybersecurity, it might mean cutting breach detection time in half. The point is not to list what your product does but to anchor why it matters in the buyer’s world, and only nerd about the specifics once you have their undivided attention.

Generic vs persona-informed messaging

To show the difference, here’s a snapshot of how messaging shifts when intelligence is applied. Generic copy focuses on features and broad claims, while persona-informed messaging uses ICP data and persona pain points to connect with specific buyers.

DomainGeneric MessagePersona-Informed MessagePersona ExampleFraud Prevention“We help enterprises stop fraud before it happens by detecting suspicious activity, flagging risky transactions, and protecting customer accounts. Our platform is designed to keep your business safe and secure.”
“You’re responsible for revenue protection across global sales flows, which means chargebacks and payment fraud land on your desk. Teams like yours cut chargeback losses by 40% with real-time fraud alerts that protect revenue without slowing deals. Buyers expect both outcomes: silent protection and measurable margin impact.”
VP of Sales, BDR LeaderFinancial Crimes Compliance (AML/KYC)“We help compliance teams stay audit-ready with AML and KYC tools that reduce risk, cut down on false positives, and keep your business aligned with evolving regulations.”“As Chief Compliance Officer, you know false positives are the hidden tax on your team. Cutting them by 50 percent means analysts focus on true risk while you stay audit-ready against FATF and DOJ scrutiny. Clients report faster SAR filing cycles and stronger exam outcomes that regulators can see.”Chief Compliance OfficerCybersecurity / Threat IntelligenceWe help enterprises stay ahead of account takeover, session hijacking, and phishing attacks with advanced detection and monitoring that safeguard sensitive data and protect customer accounts.”“Your bottleneck probably isn’t a lack of MFA; it’s gaps in mobile session integrity and weak recovery bindings. Leading platforms now combine FIDO2 passkeys, device certificates, runtime attestation, and behavioral biometrics into a single API. Results often show 90–99% reductions in ATO flows and deployments measured in weeks, not quarters, while fitting directly into CI/CD pipelines.”CISOTrust & Safety (Age Assurance, Platform Integrity)“We help platforms create safe online spaces by stopping fake accounts, preventing underage sign-ups, and protecting users from harmful activity. Our solution builds trust across your community.”“You’ve grown marketplaces quickly, but fake accounts and underage signups erode trust as fast as growth builds it. Trust & Safety leaders block fraudulent accounts at scale, improving conversion while lifting NPS. Clients see measurable drops in fake account creation alongside sustained growth.”
Head of Trust & Safety
Risk Management“We help companies manage third-party risk by identifying potential vulnerabilities, monitoring vendor compliance, and providing visibility across your supply chain.”“Your mandate is to catch vendor risk before it turns into tomorrow’s crisis. Risk leaders using continuous monitoring spot supplier red flags weeks earlier. That foresight prevents compliance failures and costly breaches that would otherwise reach the boardroom.”
CRO, Risk Manager

This table turns the theory into practice: with competitive intelligence in play, messaging shifts from broad and forgettable to precise and compelling.

The challenge, of course, is scale. Tailoring a handful of persona-informed messages is one thing. Refreshing them continuously across dozens of campaigns, competitors, and markets is another. That’s where AI-enhanced intelligence platforms become indispensable. By monitoring live market signals, competitor narratives, and persona insights, AI can help us surface fresh message updates, stress-test positioning, and keep playbooks aligned with the market, so teams never slip back into generic messaging.

A framework for refreshing messaging without reinventing the wheel

High-performing teams do not wait for annual off-sites to rethink their messaging. They run refreshes as an ongoing discipline. So, how do we actually keep messaging fresh without burning cycles? Here is a practical process that has worked for us:

Collect signals continuously – competitor launches, persona survey data, market shifts. Map signals to differentiation – identify where buyer priorities intersect with unique strengths. Stress-test narratives – run them through sales conversations, campaign pilots, and post-call analytics. Refresh, don’t rewrite – evolve messaging every few weeks, not every few quarters.

The result is messaging that stays alive, tuned to the market, and sharper than the competition.

How leading teams operationalize competitive intelligence

It’s one thing to know the process, another to make it work at scale. The best GTM teams operationalize competitive intelligence through three capabilities:

1. Always-on market signals

Static PDFs cannot keep up with dynamic markets. Teams that win track real-time signals like funding rounds, regulatory shifts, competitor campaigns, and feed them straight into campaign planning.

2. Persona-level insights at scale

Instead of treating personas as theater, leading teams embed real-time buyer insights into campaigns and sales workflows. Every refresh reflects what buyers are actually thinking now, not last year.

3. Embedded intelligence in workflows

Intelligence only works if it lives where teams work: Slack alerts pushing industry shifts in real time, SEO content built on market truth, email campaigns aligned with buyer signals, and sales calls armed with live AI intelligence. Intelligence becomes actionable in the moment, not theoretical.

The challenge of messaging in niche markets

As adoption grows, so does the data: companies using competitive intelligence report a 15% boost in revenue growth. Platforms like Link are built to deliver these capabilities, from event monitoring and perpetual surveys to dynamic playbooks and post-call analytics. The real challenge is not more data, but the right data — intelligence that is specific enough to your market to make messaging credible and differentiated.

And this is where it gets tricky in niche markets. Sure, we can create a neat competitive battlecard, but what do we actually put on it if I don’t understand how the ICP is behaving in the real world? We can send a well-designed email, but if the target is a cybersecurity leader, they might care more about an upcoming TPRM webinar than a case study from the banking sector. The reality is that without specific, contextual intelligence, even polished campaigns miss the mark without the right segmentation.

At the end of the day, buyers don’t want platitudes; they want proof. In specialized markets, the cost of undifferentiated messaging isn’t just lost deals, it’s lost trust and stalled growth.

Key Takeaways Competitive intelligence fails when it sits in decks and PDFs. It only creates value when it fuels differentiated narratives buyers actually hear. Messaging that stands out comes from three things: persona insights, competitor positioning, and outcomes buyers can measure. Refreshing messaging is not a one-off exercise. The teams that win treat it as an ongoing discipline. Intelligence has to live where teams work: in Slack alerts, sales calls, campaigns, and content, so it becomes actionable in the moment. In niche markets, buyers don’t want platitudes, they want proof. Miss that, and you lose both deals and trust.

The post Turning Competitive Intelligence into Messaging That Wins (with examples) appeared first on Liminal.co.


Spherical Cow Consulting

Who Really Pays When AI Agents Run Wild? Incentives, Identity, and the Hidden Bill

Google recently gave us something we’ve been waiting on for years: hard numbers on how much energy an AI prompt uses. According to their report, the median Gemini prompt consumes just 0.24 watt-hours of electricity — roughly running a microwave for a second — along with some drops of water for cooling. The post Who Really Pays When AI Agents Run Wild? Incentives, Identity, and the Hidden Bill a

“Google recently gave us something we’ve been waiting on for years: hard numbers on how much energy an AI prompt uses.”

According to their report, the median Gemini prompt consumes just 0.24 watt-hours of electricity — roughly running a microwave for a second — along with a few drops of water for cooling.

On its face, that sounds almost negligible. But the real story isn’t the number itself. It’s about incentives: who benefits, who pays, and how those dynamics shape how we deploy AI.

A Digital Identity Digest Who Really Pays When AI Agents Run Wild? Incentives, Identity, and the Hidden Bill Play Episode Pause Episode Mute/Unmute Episode Rewind 10 Seconds 1x Fast Forward 30 seconds 00:00 / 00:11:21 Subscribe Share Amazon Apple Podcasts CastBox Listen Notes Overcast Pandora Player.fm PocketCasts Podbean RSS Spotify TuneIn YouTube iHeartRadio RSS Feed Share Link Embed

You can Subscribe and Listen to the Podcast on Apple Podcasts, or wherever you listen to Podcasts.

And be sure to leave me a Rating and Review!

A history lesson from the cloud

To understand how incentives can blindside us, let’s revisit the cloud computing boom. You remember that, right? “Save all the money! Get rid of your datacenter! Cloud computing ftw!”

In 2021, Sarah Wang and Martin Casado of Andreessen Horowitz published “The Cost of Cloud: A Trillion-Dollar Paradox.” They showed how cloud services, while indispensable for speed and agility, became a drag on profitability at scale. Dropbox famously repatriated workloads back from public cloud and saved $75 million over two years — a shift that doubled their gross margins from 33% to 67%. CrowdStrike and Zscaler adopted hybrid approaches for similar reasons.

The takeaway: Early incentives reward adoption. But when the bills grow large enough, cost discipline suddenly becomes a board-level issue. By then, inefficiency is already baked into operations.

AI energy use is following the same arc. Vendors and enterprises alike are celebrating adoption, but the hidden costs are waiting to surface.

The incentives for vendors

AI vendors want mass adoption, and their incentives reflect that. They’ll emphasize efficiency gains — like Gemini’s 33-fold reduction in energy per query from 2024 to 2025, according to their recent report — but those are selective disclosures.

As the MIT Tech Review story “In a first, Google has released data on how much energy an AI prompt uses” pointed out, disclosures become marketing tools without standardized metrics. Vendors reveal what flatters them, not necessarily what helps customers make better choices.

And the race to ship bigger, more capable models only deepens this misalignment. Scale brings revenue. The energy, water, and carbon costs? Those are someone else’s problem.

The incentives for enterprises

Enterprises often don’t see the full picture either. A cloud invoice hides the per-prompt costs. IAM and security teams grant permissions to agents, but they don’t own the sustainability budget. Sustainability teams, meanwhile, don’t have visibility into permissions and entitlements.

The result: over-provisioning goes unnoticed. AI agents are allowed to “just run,” and every permissioned action quietly consumes resources. Those costs add up, but they land in someone else’s ledger, often long after the decisions were made.

This is the same organizational mismatch cloud adoption created: IT ops pays the bill, developers get the flexibility, and the CFO finds out later. AI is just the next chapter.

Incentives and regulation

Here’s where things start to change. Environmental, Social, and Governance (ESG) reporting isn’t optional anymore; regulators are giving incentives real teeth.

United States: The SEC’s new climate disclosure rule requires large public companies to report greenhouse gas emissions. Failure to comply has already resulted in multimillion-dollar fines for ESG misstatements, like Deutsche Bank’s $19M settlement. Europe: The EU’s Corporate Sustainability Reporting Directive (CSRD) sets steep penalties. In Germany, fines can reach €10 million or 5% of turnover. In France, executives risk prison time for obstructing disclosures. Australia: Directors must certify sustainability data as part of financial filings. Failure to comply can trigger civil penalties in the hundreds of millions, with individuals personally liable for up to AUD 1.565 million.

None of this is about fearmongering. (OK, maybe it’s a little bit of fearmongering in the hope of catching your attention.) It’s also a reality. Boards are now directly accountable for climate and resource disclosures. AI usage may feel “small” at the per-prompt level, but at enterprise scale, it becomes part of that regulatory picture.

Where identity comes in

So where does identity fit?

Every AI-agent action isn’t just a governance event; it’s also a consumption event. Permissions are no longer just about who can do what. They’re also about what we’re willing to pay, financially and environmentally, for them to do it.

Standing access matters here, too. A human user with unused entitlements is a risk; an AI with broad entitlements is a resource leak. It will happily keep churning until someone tells it to stop — and by then the costs have already piled up.

Imagine if your audit logs evolved to show not just “who accessed what,” but “how much energy and water those actions consumed.” It sounds futuristic, but sustainability reporting is heading in that direction. IAM teams may find themselves pulled into ESG conversations whether they want to be or not.

Runtime governance as sustainability

Earlier, I argued that runtime governance is essential when AIs can act faster than human oversight cycles. Here’s the sustainability angle: runtime checks can throttle not just security risks, but waste.

Deny agents the ability to hammer a system with brute-force permutations. Flag actions that consume far more resources than typical queries. Revoke unnecessary entitlements before they become both a risk and an expense.

Governance is shifting from “is this allowed?” to “is this worth it?”

Bridging past lessons with today’s challenges

The hidden costs of the cloud were supposed to teach us that efficiency ignored eventually becomes inefficiency entrenched. I’m not convinced people and organizations have learned that lesson, but regardless, AI is repeating that story, with energy, water, and carbon as the currencies.

Like cloud spend, AI resource usage may start small, but it scales faster than oversight cycles. And when regulations demand transparency, boards will want answers.

Identity leaders are uniquely positioned here. Permissions are the gate between an agent’s intent and its actions. Expanding the governance lens to include consumption could help organizations stay ahead of both the bills and the regulators.

Putting it together

So let’s put this together:

Vendors are incentivized by adoption and scale, not efficiency. Enterprises have silos that hide true costs. Regulators are introducing real penalties for climate and resource misstatements. Identity teams are sitting at the chokepoint, granting permissions that double as consumption choices.

The shift isn’t about turning identity professionals into sustainability officers. It’s about recognizing that incentives travel with permissions. And when permissions scale through AI, the hidden costs travel with them.

So here’s my question for you: have you seen incentives around AI use in your organization, good or bad? And if so, how did those incentives shape the choices your teams made?

Because incentives aren’t just a policy issue or a compliance box. They’re the difference between governance, which you can explain to your board, and governance, which you only notice when the bill or the fine arrives.

If you’d rather track the blog than the podcast, I have an option for you! Subscribe to get a notification when new blog posts go live. No spam, just announcements of new posts. [Subscribe here

Transcript

[00:00:29] Hi everyone, and welcome back to A Digital Identity Digest. I’m Heather Flanagan, and today we’re going to talk about something that’s only just starting to make the headlines: what happens when AI agents run wild—and who actually ends up footing the bill.

Spoiler alert: it’s probably not the vendors themselves, and it’s probably not who you think inside your own organizations either.

[00:00:53] In this episode, we’ll explore:

The incentives driving AI adoption The role of identity in hidden costs The growing regulatory landscape around sustainability Setting the Stage

[00:01:04] What inspired today’s conversation is a recent Google report that finally revealed some long-awaited data: how much energy a single AI prompt consumes.

[00:01:20] Their findings? The median Gemini prompt uses about 0.24 watt hours of electricity.

[00:01:28] To put it in perspective:

That’s like running your microwave for one second, plus a few drops of water for cooling. At first glance, it seems tiny. But at scale, millions of these “drops in the ocean” can eventually flood entire continents.

[00:01:46] The real story isn’t about that single number. Instead, it’s about the incentives behind those numbers—who benefits, who pays, and how those dynamics shape AI deployment.

Lessons from the Cloud

[00:01:57] To understand today’s AI landscape, let’s rewind to the early days of cloud computing. Remember the pitch? “Save money, get rid of your data center—cloud computing for the win.”

[00:02:20] But by 2021, Sarah Wang and Martin Casado at Andreessen Horowitz highlighted the Trillion Dollar Paradox:

Cloud was amazing for speed and agility. Yet at scale, it dragged on profitability.

[00:02:30] Dropbox learned this firsthand, repatriating workloads from the public cloud and saving $75 million over two years—doubling their margins in the process.

[00:02:51] The key lesson? Early incentives reward adoption. But once costs balloon, discipline becomes a board-level issue.

[00:03:10] AI is following the same arc. We’re in the “woohoo adoption” phase now, but hidden costs are waiting to catch up.

Vendor Incentives

[00:03:24] Let’s start with the incentives for LLM vendors. These are crystal clear: encourage mass adoption.

[00:03:33] Vendors emphasize efficiency gains. Google bragged about a 33-fold reduction in energy per query between 2024 and 2025.

[00:03:43] Sounds impressive. But disclosures are:

Not standardized Highly selective Designed to flatter the vendor, not inform customers

[00:03:53] Meanwhile, the race for bigger, flashier, more capable models continues. The revenue comes in, but the energy, water, and carbon costs are left as someone else’s problem.

Enterprise Incentives

[00:04:09] For enterprises, the picture is murkier. Why? Because:

Cloud invoices hide the per prompt cost. IAM and security teams grant permissions but don’t own the sustainability budget. Sustainability teams lack visibility into entitlements.

[00:04:34] The result?

Over-provisioning goes unnoticed. AI agents run unchecked. Bills land on someone’s desk long after the fact—often someone who had no say in granting permissions.

[00:04:58] This is déjà vu from the cloud era. Ops pays the bill, developers enjoy flexibility, and the CFO discovers the hit too late.

Regulators Enter the Chat

[00:05:03] Unlike the early cloud days, regulators are already watching. ESG (Environmental, Social, and Governance) reporting is now mandatory in many regions.

[00:05:15] Examples include:

United States: SEC Climate Disclosure Rule, with fines already issued (e.g., Deutsche Bank’s $19M settlement). Europe: Corporate Sustainability Reporting Directive (CSRD), with penalties up to €10 million or 5% of turnover. France: Executives can face prison time for obstructing disclosures. Australia: Civil penalties can reach hundreds of millions, with directors personally liable.

[00:06:20] This isn’t fearmongering—it’s reality. Boards are accountable, and one AI prompt may seem trivial, but multiplied across millions of queries, it becomes a regulatory reporting item.

Where Identity Comes In

[00:06:38] Every AI agent action is more than a governance event—it’s also a consumption event.

Permissions = not just who can do what, but what we’re willing to pay financially and environmentally. An unused human entitlement is a risk. An AI with broad entitlements is a resource leak that runs until stopped.

[00:07:15] Imagine if audit logs didn’t just say who accessed what, but also recorded how much energy and water were consumed.

[00:07:24] That may sound futuristic, but sustainability reporting is moving that way. IAM teams could soon be pulled into ESG discussions—whether they feel it’s their role or not.

Governance Shifts

[00:07:37] Governance isn’t just about security anymore. With AI, it’s about balancing risk and resource consumption.

Runtime checks can throttle wasteful AI actions. Agents can be denied brute-force or high-cost queries. Entitlements can be revoked before they pile up into risks—or expenses.

[00:08:07] Governance now asks not only “Is this allowed?” but also “Is this worth it?”

History Repeats Itself

[00:08:14] Cloud should have taught us that ignored inefficiency becomes entrenched inefficiency. Once it’s embedded in infrastructure, it’s painfully hard to extract.

[00:08:38] AI is repeating that story—with water, energy, and carbon as the new currencies.

[00:08:54] When regulators demand transparency, boards will expect clear, defensible answers. And that’s where identity leaders can step up.

[00:09:01] Permissions sit at the choke point between agent intent and agent action. Expanding governance to include consumption metrics gives organizations a head start on both the bills and regulatory scrutiny.

Bringing It All Together

[00:09:16] To recap:

Vendors chase adoption and scale, not efficiency. Enterprises operate in silos that hide true costs. Regulators are introducing significant penalties for ESG misstatements. Identity teams control permissions, which now double as consumption risks.

[00:09:41] IAM professionals don’t need to become sustainability officers. But they must recognize that incentives travel with permissions—and when AI scales, costs scale too.

[00:09:57] So here’s the key question:
Have you seen incentives around AI use in your organization—good or bad? And how are those incentives shaping your team’s decisions?

Because incentives aren’t just about compliance checkboxes. They’re the difference between proactive governance, you can explain to your board, and reactive governance, you only notice when the bill—or the fine—lands on your desk.

Closing Thoughts

[00:10:23] That’s it for this episode of A Digital Identity Digest. If you found it useful, subscribe to the podcast or visit the written blog at sphericalcowconsulting.com for reference links.

[00:10:45] If this episode brought clarity—or at least sparked curiosity—share it with a colleague and connect with me on LinkedIn at lflanagan. Don’t forget to subscribe and leave a review on Apple Podcasts or wherever you listen.

Stay curious, stay engaged, and let’s keep these conversations going.

The post Who Really Pays When AI Agents Run Wild? Incentives, Identity, and the Hidden Bill appeared first on Spherical Cow Consulting.


iComply Investor Services Inc.

AML in Real Estate: Source of Funds, Identity, and Global Risk Controls

From complex ownership to offshore funding, real estate is high-risk for money laundering. This guide shows how iComply helps brokers, lawyers, and lenders simplify AML compliance across jurisdictions.

Real estate professionals face rising AML scrutiny across markets. This article breaks down identity verification, source of funds, and beneficial ownership rules in the U.S., Canada, UK, EU, and Australia – and shows how iComply helps automate compliance across agents, lawyers, and lenders.

Real estate is a prime target for financial crime. High-value transactions, opaque ownership structures, and limited oversight have made the sector vulnerable to money laundering worldwide.

From regulators to investigative journalists, scrutiny is intensifying, compliance expectations are evolving. Brokers, lawyers, developers, mortgage professionals, and title companies all have a role to play.

Shifting AML Expectations in Real Estate United States Regulators: FinCEN, state real estate commissions Requirements: Geographic targeting orders (GTOs), beneficial ownership reporting (CTA), SARs, and KYC for buyers and entities Canada Regulators: FINTRAC, provincial real estate councils Requirements: KYC, source of funds verification, PEP/sanctions screening, STRs, and compliance program requirements (as reinforced by the Cullen Commission) United Kingdom Regulators: HMRC, FCA (for lenders), SRA (for law firms) Requirements: Client due diligence, UBO checks, transaction monitoring, and compliance under MLR 2017 European Union Regulators: National AML authorities under AMLD6 Requirements: Risk-based customer due diligence, UBO transparency, STRs, and GDPR-aligned reporting Australia Regulator: AUSTRAC (legislation pending for real estate-specific coverage) Requirements: AML risk management for law firms, lenders, and trust accounts; expected expansion to include property professionals Real Estate-Specific Risk Factors

1. Complex Ownership Structures
Use of shell companies, nominees, and trusts can obscure true buyers.

2. Source of Funds Obscurity
Large cash deposits or offshore funding require enhanced scrutiny.

3. Multi-Party Transactions
Buyers, sellers, agents, lawyers, lenders, and developers often use disconnected systems.

4. Regulatory Patchwork
Requirements vary by jurisdiction and professional role.

How iComply Helps Real Estate Professionals Stay Compliant

iComply enables unified compliance across real estate workflows—from individual onboarding to multi-party coordination.

1. Identity and Entity Verification KYC/KYB onboarding via secure, white-labeled portals Support for 14,000+ ID types in 195 countries UBO discovery and documentation 2. Source of Funds Checks Collect and validate financial statements, employment records, or declarations Risk-based automation of EDD triggers Document retention for regulator inspection 3. Sanctions and Risk Screening Real-time screening of all participants (buyers, sellers, brokers, law firms) Automated refresh cycles and trigger alerts 4. Cross-Party Case Collaboration Connect agents, legal counsel, and lenders in a single audit-ready file Assign roles, track tasks, and escalate within shared dashboards 5. Data Residency and Privacy Compliance Edge computing ensures PII is encrypted before upload Compliant with PIPEDA, GDPR, and U.S. state laws On-premise or cloud deployment options Case Insight: Vancouver Brokerage

A Canadian real estate firm used iComply to digitize ID checks and SoF verification for domestic and foreign buyers:

Reduced onboarding time by 65% Flagged two nominee structures linked to offshore trusts Passed a FINTRAC audit with zero deficiencies Final Take

Real estate professionals can no longer afford fragmented compliance. With global pressure mounting, smart automation ensures faster onboarding, better oversight, and fewer audit risks.

Talk to iComply to learn how we help brokers, lawyers, and lenders unify AML workflows – without slowing down the deal.


PingTalk

Accelerating Financial Service Innovation With Identity-Powered Open Banking in the Americas

Explore how financial institutions across the Americas are using open banking and identity-powered APIs to drive innovation, enhance security, and deliver personalized customer experiences.

Open banking is rapidly becoming a critical plank of digital innovation in the financial services industry across both North and South America. Whether driven by regulation, market innovation, or consumer demand, the financial industry across both continents is increasingly embracing a standards-based, application programming interface (API)-first mindset in a bid to accelerate hyper-personalization, trust-based relationships, and value upsell.

 

While digital challengers continue to capture digitally-savvy customers, incumbent providers are scrambling to meet the increasing demand for seamless and customer-centric experiences in a bid to maintain competitiveness. What might come as a surprise, is this paradigm shift is underpinned by technical standards that govern financial-grade APIs (FAPIs) interacting with enterprise-grade identity and access management (IAM). 

 

The battle for market share in North and South American banking, and indeed the wider financial services industry, will hinge on the degree to which financial service providers embrace these technologies and industry standards and leverage underlying investments to deliver differentiated customer experiences.

 


FastID

Teach Your robots.txt a New Trick (for AI)

Control how AI bots like Google-Extended and Applebot-Extended use your website content for training. Update your robots.txt file with simple Disallow rules.
Control how AI bots like Google-Extended and Applebot-Extended use your website content for training. Update your robots.txt file with simple Disallow rules.

Monday, 15. September 2025

Dark Matter Labs

What’s guiding our Regenerative Futures?

Expanding our view toward six guiding principles for regenerative practice. Image: Dark Matter Labs. Adapted from Jan Konietzko, ‘Carbon Tunnel Vision’. Possibilities for the Built Environment, part 1 of 3 This is the first in a series of three provocations, which mark the cumulation of a collaborative effort between Dark Matter Labs and Bauhaus Earth to consider a regenerative future fo
Expanding our view toward six guiding principles for regenerative practice. Image: Dark Matter Labs. Adapted from Jan Konietzko, ‘Carbon Tunnel Vision’. Possibilities for the Built Environment, part 1 of 3

This is the first in a series of three provocations, which mark the cumulation of a collaborative effort between Dark Matter Labs and Bauhaus Earth to consider a regenerative future for the built environment as part of the ReBuilt project.

In this publication, we lay out the historical, professional and theoretical context for the contemporary push toward regenerative practice, and offer six guiding principles for a regenerative built environment, looking beyond profit tunnel-vision. In the second and third pieces, we propose pathways, configurations and indicators of the transformation our team envisions.

What isn’t regenerative? Debunking a misconception

When it was completed in 2014, Bosco Verticale, a pair of 40-story residential towers on Milan’s outskirts, was celebrated as an example of leading-edge regenerative building design for the 800 or so trees cascading from its balconies. In describing the project, its architect Stefano Boeri sketches the figure of the “biological architect”, who is driven by biophilia and prizes sustainability above other design concerns. Praise for Bosco Verticale, in the architectural press and beyond, implies that the development’s vegetal adornments represent a meaningful substitution of traditional building materials with bio-based ones, and further that measures supporting biodiversity constitute climate-positive architecture.

The list of green credentials associated with the project ignores other characteristics of Bosco Verticale that don’t align with this vision. The steel-reinforced concrete structure was designed with unusually substantial 28cm deep slabs to support the vegetation’s weight (which totals an estimated 675 metric tons) and associated dynamic loads. Considering that this slab depth is about twice that of comparable buildings without the green facade, the embodied carbon associated with the project’s 30,000m² floor slabs alone is approximately double that of a standard building.

In tandem, an existing workspace for local artists and artisans based in a former industrial building was demolished to make space for the premium residential units accessible only to the few. Although a replacement workspace was eventually built nearby, the structure’s regenerative aspirations are weighed down by profound contradictions beneath the leafy surface.

Certainly, Bosco Verticale is significant as an exceptional investment in urban greening on the part of the developer, and as a leading-edge demonstration of innovations that enhance the multiple benefits of green infrastructure. Bosco Verticale contributed to the viability of future developments that extend the geographic reach of urban greening discourse into new geographies: copy-cat schemes have been built in East Asia and elsewhere. However, it’s clear that Bosco Verticale fails to stand up to a holistic consideration of what regenerative building looks like. Many voices overlooked the social and material impacts of the project, instead dazzled by the urban greening.

Puzzle pieces of the regenerative

In recent years, societies worldwide have become familiar with weather events and political shifts that were unprecedented or previously unthinkable. Six of the nine planetary boundaries that demarcate the safe operating space for humanity were crossed as of 2023. There is now a strong case for the idea that our entangled human and planetary systems exist in a state of polycrisis. Bearing this in mind, what do we mean when we refer to a built environment that is regenerative?

This piece aims to add nuance and system-scale perspective to our working definitions. As examples like Bosco Verticale show, it’s possible to be green in the public eye while counteracting what is regenerative. Perhaps we need new methods to help us understand:

How long a building will last, How its materials will be stewarded, Whether it is built in a context that enables low-carbon living, And what its end of life might involve.

System-scale perspective is needed because the built environment cannot be disentangled from systemic needs like the demand for affordable housing and the reality of physical, material constraints. Although we do need initial demonstrations to spark change, a single, locally-sourced timber building constructed with ethical labour does not define wholly regenerative practice in itself.

What is regenerative?

Regenerative is the term of the moment, yet it remains loosely defined in public discourse: we rely on examples, implicit understandings, and theoretical frameworks to give it meaning. How, then, is it used in particular contexts?

Beyond ‘green’

Regeneration refers to approaches that seek to balance human and natural systems, allowing for coexistence, repair and self-regulation over time.

The regenerative paradigm seeks to look beyond what’s merely ‘green’, and to do net good. A broader lineage of thinking around the term spans agriculture, biology and ecology, medicine, urbanism and design: disciplines and industries that connect to the health and wellbeing of biomes, bodies and buildings. Variation in definition can be observed in different contexts, sectors and aims.

‘Regenerative’: a brief history of the term
The term regenerative began to gain traction in fields including agriculture and development to outline a new paradigm from the 1980s. The US’ Rodale Institute popularised the term ‘regenerative agriculture’ to describe farming systems that go beyond sustainability by improving soil, biodiversity and ecosystem health. The practices invoked are ancient, with precedents across the globe, and rooted in Indigenous land management. However, this specific application of the term ‘regenerative’ articulated an emergent attitude in this period that focused on renewal and improvement of ecological and social systems. The Rodale Institute advanced this concept through research, advocacy, farmer training, publications and consumer education geared toward regenerative organic agriculture, laying the groundwork for its integration into mainstream agricultural discourse and integration into other disciplines.
From the early 2000s, the work of Bill Reed and the Regenesis Institute for Regenerative Practice has anchored the application of regeneration to design fields and the built environment in particular. With a focus on ecosystem renewal and coevolution of human and natural systems, Reed’s framework implies that regenerative design goes beyond sustainability by restoring and renewing ecosystems, integrating humans and nature in a symbiotic relationship. Expanding this idea beyond ecology, many architects and urbanists have adapted Reed’s model to their own corners of their fields, looking for design that doesn’t simply do less harm, but does more good. Bauhaus Earth maps Reed’s familiar bowtie-shaped diagram onto four basic categories for the built environment: from conventional, to green, to restorative and finally regenerative–that which has the greatest positive environmental and social impact.
Across applications, several elements of a core meaning of what is regenerative exist: a focus on supporting systems of different scales to recover from loss, to take on new life, to grow responsively. The evocative nature of this idea, easily applied across different disciplines, has inspired a range of permutations and schools of thought.
Other key references on the regenerative:
1 Regenerative Development, Regenesis Group, 2016.
2 Regenerative Development and Design, Bill Reed and Pamela Mang, 2012.
3 Shifting from ‘sustainability’ to regeneration, Bill Reed, 2007.
4 Towards a regenerative paradigm for the built environment, Chrisna du Plessis, 2011.
5 Doughnut for Urban Development, Home.Earth, 2023.
6 The Regenerative Design Reading List, Constructivist, 2024.
Image: Bauhaus Earth, adapted from Bill Reed’s ‘Trajectory of Ecological Design’

The term’s uses have gained traction and proliferated within the particular historical context of the last half-century, during which concepts like the anthropocene and the full extent of human impact on the planet have been evidenced. As technology has enabled our understanding of the ways in which humanity has degraded our environments — at scales from the cellular to whole earth systems — to grow, so too has our desire for models that point to possible ways to repair this damage. Conceptualising the regenerative across scales and disciplines opens the door to alternative futures in which planetary demise at the hands of humans is not inevitable. The application of the core elements of regenerative theory to fields like architecture has spurred a range of generative and planet-benefitting practices. However, these individual actions, and even the rise of the sustainability paradigm across design fields, cannot override the prevailing limitations of capitalism that continue to increase rates of extraction, social inequality and environmental degradation. As it stands, regenerative approaches continue to be exceptions working against the odds.

The main limitation: political economy

These frameworks were written within academic and industrial contexts, largely from a Western, wealthy nations’ perspective. While regenerative thinking has inspired thinkers across the planet and across fields, attempts to translate these concepts into a global, political economic scale fails to account for deep-seated inequalities. We are limited by the systems and power imbalances in which we’re working. Capitalism, in particular, compounds these blindspots, limiting attempts to translate regenerative thinking into other spaces such as the built environment. As such, while trailblazing organisations, communities and individuals are offering proofs of possibilities in regenerative infrastructure and urbanism, these are currently exceptional cases. It is not yet evident how these ideas can be instantiated at scale to benefit all people and meaningfully address systemic inequalities.

The role for and responsibilities of professionals

The interconnected challenges of this moment invoke new layers of complexity. But if professionals can’t understand or deploy the idea of regeneration, then it won’t guide their decisions and actions.

Extractive activities led by the industrialised global North continue to irreversibly alter our planet at pace, while the transition to renewable energy will involve even higher rates of extraction of critical minerals than those of today. As such, the earth’s systems’ ability to regenerate is stressed more than ever. The built environment, with its outsized responsibility for global carbon emissions associated with construction, building operations and demolition, must admit these impacts and face up to its epoch-defining responsibility. So how do we get off the one-way road of identifying problems without solutions?

There is a separation between perceived responsibility and power in today’s professional landscape. This moment necessitates a shift from individual to collective agency in taking on advocacy for the regenerative potential of the built environment.

Imagine this: you are an architect today, trying to answer the client’s brief by maximising the use of responsibly-sourced bio-based materials, embedding social justice in your design processes and objectives, and considering carbon-storage potential and place stewardship for future generations, while accepting that your brief is to create market-rate apartments. This is nearly impossible in the context of today’s imperative to maximise profits and commodify housing. Architects in the current professional environment are profoundly limited in means to meaningfully address these intersecting priorities, whether one at a time or in concert. Our current economic system simply does not position architects to be the core innovators, as much as Stefano Boeri’s reflections on the Bosco Verticale boast otherwise.

These professional limitations are an indirect signal of the political economy of real estate development and the power relations underpinning the construction industry. Only a systemic shift can address the limitations facing individuals operating within a design scope. To genuinely take on the intersections of ecology, social justice and the built environment, architects need to see their work for all its entanglement with the broader political, economic and social forces, using the tools of the profession and connections, bolstered by connections with aligned collaborators, and their collective power to dismantle the systems of power that limit transformation at across scales.

We’re orienting ourselves toward a future in which there is more latitude for these crucial priorities to be addressed. This future will hold an altered scope for decisions made by architects and other built environment professionals in the course of development processes, and a transition to a regenerative built environment driven by collective commitment.

A growing field: precedents and trailblazers

A range of contemporary initiatives, programmes and projects aim to establish frameworks to define the idea of a regenerative built environment. Drawing on advancements in circular economic thinking, increasing recognition of the significance of embodied carbon in addition to operational carbon in buildings, and as the industry’s understanding of indicators like biodiversity and water use that are tied to planetary boundaries grows, these programmes help experts and the general public to move beyond misconceptions.

Bauhaus Earth emerged in 2021 as an initiative around the use of timber and other bio-based materials for construction and their ability to store carbon. Today, Bauhaus Earth is a research and advocacy organization dedicated to transforming the built environment into a regenerative force for ecological restoration. It brings together experts from architecture, planning, arts, science, governance, and industry to promote systemic change in construction practices.

Index of aligned enquiries

A global range of community-led and grassroots organisations focusing on the work and needs of underserved groups receive grant funding from and can be discovered via the Re:arc Institute.
Non-Extractive Architecture(s)’ directory gathers a global index of projects that rethink the relationship between human and natural landscapes, alongside questions about the role of technology and politics in future material economies. The directory is an ongoing project itself.
A range of related organisations and initiatives in the working ecosystem of Europe can be found in the table below. The range in types of these enquiries represents the broad coalition of stakeholders and types of activity that will be required to activate transformation toward a regenerative built environment.
Index of related initiatives in Europe. For links, see the end of this post.
Bio-based building materials are an important nexus of social and material relations. These materials, which bridge human and earth-based capacities for creation, urge an expanded view of stewardship. Understanding this will enable us to move past a paradigmatic dichotomy between the human and the natural, which enables humans to exploit planetary resources. Bio-based building materials were humans’ first building materials, and over millennia the practices, most notably agricultural and indigenous ones, that created the materials we work with today, have developed in concert with human civilisations and material realities. Holding these strands together, it’s evident why a maintained focus upon bioregionally-sourced and bio-based materiality is crucial for a regenerative future.
For a contemporary design and research practice that focuses on this intersection of agendas, see Material Cultures.
Regeneration across time horizons: shortsightedness and the Capitalocene

As Reed’s Trajectory of Ecological Design diagram and the examples above indicate, regeneration of ecosystems and societies are continuous, open-ended processes that occur over time, at scales from the cellular, to the neighbourhood, and to the planetary. As the repair and balancing of regenerative processes have occurred in many contexts across eons, we need to understand regeneration across multiple accordant time horizons. Within this complex and extensive landscape, time horizons can act as organising units that help make sense of interconnections and nested scales of action.

In construction, key processes take place across different timescales. These range from time needed for a regenerative resource such as a forest to grow, to the lifespan of a building, to the longer time periods associated with meaningful carbon sequestration. In each of these cases, regenerative interventions involving acts of maintenance and design directly modulate the temporal register of the built environment. For example, extending a building’s lifespan through processes of care and preventing demolition impacts the future form of its locale and pushes back against the conceptualisation of buildings strictly as sources of profit within capitalist logic–that is, viewing buildings primarily in terms of their capacity to generate immediate economic returns through cycles of development, exploitation and obsolescence. By this means, it is within the medium of time that a regenerative lens on the built environment can be most revealing.

Regeneration in deep time and at the timescale of ecosystems has been disrupted by human processes. We are accustomed to the idea of the Anthropocene, in which an epoch defined by human activity has become the dominant influence on climate and the environment, which was initiated by the industrial revolution. However, recent discussions by Jason W Moore, Andreas Malm and others offer a critique of this concept in making the case for the Capitalocene as a more precise term. Rather than treating humanity as a homogenous force as Anthropocene theory does, the Capitalocene examines how differences in responsibility, power and agency within societies have been compounded in the context of the capitalist system, and how this system has driven ecological crisis. Rather than humanity as a whole, Moore argues that we should examine how the social, economic and political processes that have shaped recent centuries, and which reach back to the early modern period, provide a better basis for understanding the relationship between human activity and planetary wellbeing, and how this dynamic produces ecological crises. Using this focus on the un-natural and political origins of the crisis we face today, it’s possible to see how shifting senses of responsibility, agency and relationships, operating against capitalist logics, are essential for developing effective pathways toward planetary regeneration. In the predominant logic of the Capitalocene, short-term profits, increases in productivity, and optimisation around flawed ideas of efficiency are necessitated–and regeneration could be mistaken for a loss, an indicator of inefficacy, a concession to the ineffable–and as such, unwarranted. This is the systemic logic that must be resisted.

The prevalence of demolition today is one example of how this systemic short-sightedness is bad for people and the planet. The UK is now facing the consequences of the prevalent use of reinforced aerated autoclave concrete (‘RAAC’), in municipal buildings nationwide during the 1980s. With a material lifespan of only 30 years, many hospitals and schools built of RAAC are now being demolished. Indeed, the lifespan of many of the structures that are most viable in our current urban development models are steadily decreasing in spite of increasing awareness of the embodied carbon impacts of demolition.

We would do well, in looking toward a regenerative future for the built environment, to retune our time horizons. This might involve syncing carbon sequestration time with lifecycles for construction that create value over time, taking into account things like municipal land leases and emerging whole life carbon regulations. What if we had a way to see the long-term impact of decisions made today?

In this effort to hold more timescales in mind when we consider processes of regeneration, we can learn a great deal from indigenous cultures from across the world, many of whom have developed, over the course of millennia, methods and ideologies supporting the human ability to connect with scales of time beyond our species-specific and news-cycle dependent parameters. Some of these examples are evidenced in the above Index of enquiries.

Theoretical underpinnings: what constitutes a regenerative built environment?

The built environment is both a physical and a social construct: it’s not fitting in this moment of polycrisis to continue to abstract the physical materials that shelter us from the labour that built them, the livelihoods that maintain them, the design processes that make them fit for purpose, and the policies or decisions that keep them standing.

To identify ways to directly address the injustices to people and the planet engendered by the Capitalocene, we need to look to historical and political decisions that have driven the crises in housing affordability and race-based inequality that are defining features of cities today. In recent years, there has been a greater focus on how the built environment can benefit from the application of lenses that focus on the distribution of power and agency within societies, including critical theory and urban political ecology. These approaches can help us to articulate how the built environment and natural resources can be viewed in the context of human struggles to meet their needs in the context of today’s critical conditions.

David Harvey, most notably in Social Justice and the City, points to how a purely quantitative or spatial design-based approach to understanding urban space consistently fails to engage socioeconomic phenomena like inequality and urban poverty, while arguing for the necessity of approaches that integrate the spatial with the social. Harvey’s reading, grounded in radical geography, makes clear how spatial development processes are driven by financial capital, which keeps governments, civil society, communities and individuals in predetermined roles, ill-equipped to resist the calcification of capitalised space. Recently, climate justice movements like the Climate Justice Alliance (on the grassroots side) have formed alliances with decision-makers and activists in the built environment around causes like health and buildings, retrofit poverty and feminist approaches to building, under banners like a Global Green New Deal, in which a spatialised social justice lens can be directly applied.

Harvey’s work is a key influence on urban political ecology approaches, which assist us in understanding of how cities are hybrids of natural and social processes, rejecting a dichotomy between people and nature. Similarly, Marxist political economic thinkers like Raymond Williams have pointed to how capitalism organises space and produces environmental inequalities, as analysed using multiscalar analysis, among other techniques. Through a political ecology lens, we see that developers and investors, not communities or ecological needs, shape the built environment, often through speculative real estate practices that exploit labour and resources. These critiques of the built environment emphasise that urban development is driven primarily by capitalist interests, prioritising profit over social and environmental well-being, leading to inequality, displacement, and environmental degradation. Theory can support an analysis of exclusion in planning, and advocacy for participatory processes that could support socially regenerative places.

In sum, focusing exclusively on buildings misses the point that cities are fluid, open, contested multivocal landscapes. At scales from the individual building, to the neighbourhood, including infrastructure like street systems, as well as cities and regions, the built environment is a negotiation between matter, human behaviour and social systems over time.

As we look to the future, how will our urban environments be produced? Who will benefit from them? And how can we challenge the environmental injustices inherent to the systems we live in?

Guiding principles for regenerative practice Six layered principles for a regenerative built environment

Expanding our definition of what’s regenerative in the built environment calls for clear ways to speak to the material, economic and social dimensions of cities. We need ways of accessing and assessing regeneration that cut across disciplinary boundaries, invite broader participation in these conversations, and account for future risks and technological developments.

What layers and principles might expand and deepen our understanding of systemic interactions as we work toward more holistic indicators? Below are six suggestions to focus our gaze.

Time horizons and generational preparedness

Future indicators of a regenerative built environment must take a long-term view. If the built environment is to form a matrix in support of human life for generations to come, it should fundamentally be building material preparedness for the future. This means the way we measure and quantify what the built environment does ought to speak to this extended time horizon, for example by considering how much carbon is stored for three generations to come, how much of our timber is sourced in a way that will allow for replanted trees that will mature over decades, or how much of a building’s material stock can be disassembled and reused within the same settlement.

Today we have standard metrics like Floor Area Ratio (FAR) that are aligned with present development models and profit-driven logics requiring maximum saleable use of space, fundamentally constraining possibilities for the built environment. Foregrounding time horizons for change enables retooling of these ways of measuring cities, focusing not on short-term, singular profits and benefits, but rather on the future generations and our planetary resources.

Geopolitical resilience and security

Future indicators for a regenerative built environment should address the geopolitical stakes of decisions.This is especially relevant now in Europe, with regard to geopolitical dynamics within and between the US, Russia and China, in light of multipolarity and the EU Strategic Autonomy conversation. Can we refashion the socioeconomic and material dependencies in cities so that they are resilient to the crises that may face future generations, while supporting enhanced responses to geopolitical dangers? We should look to modes of resilience that address the political and economic systems that exacerbate geopolitical precarity, such as the extractive nature of global trade, and the ongoing influence of multinational corporations in shaping environments across scales. The status quo propositions toward resilience often fall short of addressing geopolitical power structures.

Place-based and planetary approaches

Future policies and indicators should adopt a multiscalar view that takes into account the unique local context to which it’s applied, as well as the transformative potential and influence interventions may leverage across scales (e.g. throughout the value chain). Contextual specificity is associated with direct impact in regenerative efforts, but these must be connected to transformative change that fundamentally alters the properties and functions of systems.

Living systems approach

Actions should help to shift thinking towards more holistic and ecocentric worldviews, in which non-capitalistic, nature-centred systems of values are given primacy. This layer considers interventions as part of dynamic social-ecological systems rather than isolated components. It is crucial to see these social-ecological systems for their complex adaptive qualities, in which people and nature are inextricably linked.

A living systems approach supports biogenerative thinking, in which processes, systems, or designs that actively promote, support, and regenerate life — both biological and ecological — create conditions for continuous growth, renewal, and self-sustaining ecosystems.

Co-evolutionary and community-led

Interventions should structurally empower communities to act and evolve in line with their ecosystems. Structural empowerment means building systems and resources to make communities stronger and self-sufficient and allowing nature to flourish in tandem. This approach foregrounds the utility of feedback mechanisms from nature, like soil health indicators, phenological changes, and biodiversity and species presence, to support the co-evolution and improvement of social-ecological systems.

Supporting holistic value creation

A regenerative built environment should operate on the basis of a broad definition of value, from economic, to ecological and social. As the theoretical approaches discussed previously indicate, the built environment is a hybrid of natural and social processes occurring in the constraints of systems that thrive on extraction and inequality. A holistic approach that combines material, interpersonal and spatial integrators to consider what is regenerative generates cascading value across multiple scales.

“Measuring the impact of regenerative practices on living systems must therefore recognise entangled systemic value flows. Current economic approaches fail to account for this complexity.”
— Dark Matter Labs, A New Economy for Europe’s Built Environment, white paper, 2024
Conclusion

In the context of the polycrisis, we need to move beyond notions of sustainability, toward, as Bill Reed’s diagram suggests, creating healthy, counter-extractive communities and bioregions that can scale from exceptions to define new norms.

Embracing a broadened definition of regenerative practice — one which is informed by the historical and contemporary context of such practices — will evidence the potential contradictions and tensions in the current system. Deploying multimodal metrics and indicators, of the type that the principles introduced in this piece imply, will enable new thinking for net-regenerative outcomes in our cities. Without redirecting our points of orientation toward these six principles, even motivated actors will be limited by today’s system, which allows only for shifting of blame and incremental, localised improvements in the status quo. We will never reach a regenerative built environment without transformational change.

Further pieces in this series will explore in more detail the systemic shifts we envision, pathways toward regenerative practice, and possible indicators for recognising progress.

This publication is part of the project ReBuilt “Transformation Pathways Toward a Regenerative Built Environment — Übergangspfade zu einer regenerativen gebauten Umwelt” and is funded by the German Federal Ministry for the Environment, Nature Conservation, Nuclear Safety and Consumer Protection (BMUV) on the basis of a resolution of the German Bundestag.

This piece represents the views of its authors, including, from Bauhaus Earth, Gediminas Lesutis and Georg Hubmann, and from Dark Matter Labs, Emma Pfeiffer and Aleksander Nowak.

Additional links: Built By Nature Material Cultures Ecococon LUMA Arles / Le Magasin Électrique HouseEurope! Rotor Gleis 21 Home Silk Road Kalkbreite La Borda Living for Future Habitat for Humanity Poland

What’s guiding our Regenerative Futures? was originally published in Dark Matter Laboratories on Medium, where people are continuing the conversation by highlighting and responding to this story.


uquodo

How Businesses Can Detect Crypto Fraud and Protect Digital Assets

The post How Businesses Can Detect Crypto Fraud and Protect Digital Assets appeared first on uqudo.

ComplyCube

Online Safety Act 2023 vs. EU DSA: What You Need to Know

Discover how the UK Online Safety Act 2023 and the EU Digital Services Act differ on age verification, compliance, and platform accountability to protect children online. The post Online Safety Act 2023 vs. EU DSA: What You Need to Know first appeared on ComplyCube.

Discover how the UK Online Safety Act 2023 and the EU Digital Services Act differ on age verification, compliance, and platform accountability to protect children online.

The post Online Safety Act 2023 vs. EU DSA: What You Need to Know first appeared on ComplyCube.


IDnow

Why eID will be key in Germany’s digital future – Docusign’s Kai Stuebane on trust, timing and transformation.

We spoke with Kai Stuebane, Managing Director for DACH at Docusign, to explore how secure digital identity verification is transforming digital signing amid Germany’s evolving regulatory landscape. From navigating increasing compliance demands to delivering seamless user experiences, we discussed why eID (Electronic Identification) is becoming a strategic priority for faster, more secure, and legal
We spoke with Kai Stuebane, Managing Director for DACH at Docusign, to explore how secure digital identity verification is transforming digital signing amid Germany’s evolving regulatory landscape.

From navigating increasing compliance demands to delivering seamless user experiences, we discussed why eID (Electronic Identification) is becoming a strategic priority for faster, more secure, and legally compliant digital signatures – and how Docusign’s partnership with IDnow is empowering enterprises to stay ahead with secure, scalable and user-centric digital workflows.

Why now: Perfect conditions for eID to scale In today’s rapidly evolving regulatory landscape, particularly in Germany but also across Europe, digital identity is becoming increasingly significant. From Docusign’s perspective, what factors are driving the growing importance of secure digital identity solutions in the enterprise environment? 

First, regulatory compliance is a major driver. Regional laws such as eIDAS, and the impending eIDAS 2.0 in the EU are enhancing the need for digital authentication solutions across the region by introducing initiatives such as European Digital Identity Wallets (EUDI). In Germany, the focus on digital trust services, enforced by institutions such as BaFin and regulations like GwG, demand robust, verifiable digital identity solutions. Enterprises must meet strict requirements for customer identification and authentication when signing or executing agreements electronically. 

Second, security concerns and fraud prevention are top priorities. According to a recent Docusign global survey into the identity verification landscape, 70% of organisations agree that identity fraud attempts are on the rise, as remote and hybrid work models become the norm and businesses continue digitising their operations. As a result, companies require robust authentication solutions that ensure document integrity and signer identity across borders and devices.

A third major driver is that user expectations have shifted. Both customers and employees now expect seamless, secure digital experiences, with 50% of organisations actually prioritising customer experience over fraud prevention, given its perceived importance. Organisations like Docusign enable enterprises to deliver this through a frictionless signing experience while maintaining high standards of security and trust. For example Grenke who, in addition to offering IDnow’s videoident process through Docusign, decided to also add the new eID capability in order to offer more convenience to their customers.  

Finally, digital transformation continues to accelerate. Enterprises are modernising legacy workflows at an exponential rate, and secure digital identity is foundational to automating agreement processes end-to-end. Digital-first solutions empower businesses to operate faster, more efficiently, and with greater legal certainty – particularly in highly regulated markets like Germany.

As Germany advances its digital transformation initiatives, how do you anticipate electronic identification (eID) solutions will reshape document signing processes for both enterprises and consumers in the German market?

There is an overall shift within the identity verification and authentication landscape  where organisations are actively seeking-out solutions that enable them to maintain security and compliance, without impacting the user experience.  

For enterprises, eID solutions will help streamline identity verification, enabling faster onboarding, contract execution, and compliance with stringent regulatory requirements such as eIDAS and Germany’s Trust Services Act. Again, take Grenke as an example, the ability to integrate German eID schemes into their existing signing workflow – especially for digital signatures – means they can ensure the highest level of legal validity while reducing manual processes and streamlining the customer experience.

For consumers, eID will offer a more seamless and familiar experience whilst maintaining security – something we pride ourselves on delivering here at Docusign. With familiar national identity methods integrated into digital transactions, users will be able to verify their identity and complete agreements with confidence and ease. This not only enhances trust but also accelerates adoption in regulated sectors like finance, insurance, and real estate.

Through our partnership with IDnow, Docusign is committed to supporting the German market by leaning into evolving regulations and integrating eID solutions into its portfolio, meeting local regulatory needs while delivering the trusted experience that users expect.

The eID advantage: Seamless UX meets compliance How can Germany unlock and accelerate the full potential of eID?

Based on our experience, accelerating eID adoption in Germany hinges on three key factors: user experience, awareness, and interoperability. 

First, simplifying the user experience is critical. For individuals to embrace eID for digital agreement completion, the process must be intuitive, fast, and secure. Reducing friction, such as removing lengthy registration steps or complex verification methods, can significantly increase user adoption. By leveraging the familiar eID methods, this will streamline this experience while maintaining high levels of identity assurance.

Second, education and awareness are essential. Many individuals are unaware that their national eID can be used as part of the digital agreement process. Promoting the benefits (legal validity, security, and convenience, etc.) will help build trust and drive usage across different age and user groups.

Third, ensuring broad interoperability with public and private identity schemes is key. Businesses need confidence that the eID solutions they implement will work across sectors and meet local (GwG) and regional (eIDAS) regulatory standards.

In what ways has Docusign enhanced its signing workflows by incorporating eID with other IDnow-powered verification solutions?

Docusign has a long-standing partnership with IDnow. The evolution of this partnership to now include IDnow’s eID capabilities enhances the security and user experience of its joint offering in the following ways:

Automation: Customers can make the most of an Identification method that simply relies on  the electronic identification (eID) function of the German national identity card.  Security: Two factors of authentication for additional security:  PIN entry  Scanning of the near field communication (NFC) chip contained within German eIDs  Familiarity and ease of use: not only are eIDs increasingly adopted across Germany, but the fact we leverage new technology such as NFC provides an additional element of ease of use. Real-world application: GRENKE’s eID-first transformation For businesses that already use Docusign but haven’t yet implemented eID-based signing, what are the key benefits they might be missing out on?

Ultimately, we can distill the key benefits to: 

Increased completion rates, driven through familiarity: enable customers to use their German eID for straightforward, intuitive identity verification that supports compliance obligations.  Secure, simplified signing:  built-in security enhancements (i.e. use of PIN, scanning of NFC, etc.) mean that SMS re-authentication and live video interactions are no longer required, resulting in an even faster identification process for signers. Storage and centralisation of key identity information: continue to download or easily access required signer identity information through Docusign and IDnow, to demonstrate compliance with BaFin GwG requirements  Can you share a real-world example of how a customer of Docusign is using eID to improve efficiency and achieve measurable business outcomes?

A strong example is our long-standing collaboration with Grenke, a leading provider of leasing and financing services. For several years, Grenke has enabled customers and dealers to digitally sign contracts using Docusign eSignature, with IDnow’s VideoIdent solution supporting identity verification.

Recently, Grenke enhanced this process by integrating IDnow’s eID solution as an alternative verification method. The impact has been clear: the introduction of eID has helped Grenke accelerate contract turnaround times, reduce reliance on physical materials, and improve the overall user experience. This has translated into greater operational efficiency, enhanced customer satisfaction, and measurable progress toward the company’s digital and sustainability goals.

What’s next: Looking beyond legal requirements As we anticipate the implementation of eIDAS 2.0 and the European Digital Identity framework in the coming months, how do you envision these regulatory advancements shaping the evolution of electronic identification and digital signature solutions across Germany and the broader European market?

These regulatory advancements will establish a unified, interoperable framework for digital identity across EU member states, enabling individuals and businesses to authenticate and complete digital agreements securely and seamlessly across borders. For Germany, this means greater alignment with a pan-European standard that facilitates trust, legal certainty, and smoother cross-border transactions.

eIDAS 2.0 introduces the concept of the European Digital Identity Wallet (EUDI), which empowers citizens to manage, store and share verified identity attributes as they wish. This will significantly enhance user control, reduce onboarding friction, and boost adoption of high-assurance digital signatures, particularly Qualified Electronic Signatures (QES). At Docusign our stated ambition is to become an federator of identities, where all EUDI wallets are available through our platform . 

For businesses, these changes will reduce complexity in managing multiple identity systems while improving compliance and scalability. 

We’re excited for what’s to come. 

Interested in more from our customer conversations? Check out: Holvi’s Chief Risk Officer, René Hofer, sat down with us to discuss fraud, compliance, and the strategies needed to stay ahead in an evolving financial landscape.

By

Nikita Rybová
Customer and Product Marketing Manager at IDnow
Connect with Nikita on LinkedIn

Sunday, 14. September 2025

Innopay

Mariane ter Veen to speak on responsible AI adoption at MyData 2025

Mariane ter Veen to speak on responsible AI adoption at MyData 2025 from 24 Sep 2025 till 26 Sep 2025 Trudy Zomer 14 September 2025 - 16:36 Helsinki, Finland 60.110698558061, 25.01868035 We’re e
Mariane ter Veen to speak on responsible AI adoption at MyData 2025 from 24 Sep 2025 till 26 Sep 2025 Trudy Zomer 14 September 2025 - 16:36 Helsinki, Finland 60.110698558061, 25.01868035

We’re excited to announce that Mariane ter Veen, INNOPAY’s Director Data Sharing, will speak at the MyData 2025 conference, taking place in Helsinki from 24–26 September 2025.

MyData 2025 is one of the world’s leading conferences on human-centric data sharing, bringing together innovators, policymakers, and experts from across the globe. This year’s programme highlights the growing importance of digital sustainability, with a dedicated track exploring how organizations can innovate responsibly in the age of AI.

In her session, Mariane will introduce INNOPAY’s Triple AI framework (Access, Integrity & Intelligence): a practical approach to adopting artificial intelligence effectively, responsibly, and sustainably. She’ll share insights on how organizations can:

Align digital innovation with societal values while safeguarding trust and inclusivity Gain control over AI strategies to unlock responsible innovation at scale Create long-term value by linking environmental, social, and economic sustainability goals

Drawing on INNOPAY’s expertise in creating trusted digital ecosystems, Mariane will explore how AI, data, and governance can work together to deliver innovation with purpose.

Event details
 

Date: 24–26 September 2025
Location: Helsinki, Finland
More information — MyData 2025 programme


Mariane ter Veen to speak at Andersen Lab conference on digital sovereignty

Mariane ter Veen to speak at Andersen Lab conference on digital sovereignty from 23 Oct 2025 till 23 Oct 2025 Trudy Zomer 14 September 2025 - 16:25 NEMOS Suite, Frankfurt, Germany 50.121329352631, 8.6365638
Mariane ter Veen to speak at Andersen Lab conference on digital sovereignty from 23 Oct 2025 till 23 Oct 2025 Trudy Zomer 14 September 2025 - 16:25 NEMOS Suite, Frankfurt, Germany 50.121329352631, 8.6365638

On 23 October, Mariane ter Veen, Director Data Sharing at INNOPAY, will deliver a keynote at an exclusive Andersen Lab conference in the NEMOS Suite in Frankfurt.

In her session, "The next competitive edge: building a sovereign and sustainable digital future," Mariane will highlight how organisations can leverage digital sovereignty and sustainable data ecosystems to gain a competitive advantage.

Andersen Lab hosts high-level conferences for executives, innovators, and strategic decision-makers driving digital transformation. These events combine thought leadership and in-depth knowledge sharing in an exclusive, focused setting

Date and location
23 October 2025
NEMOS Suite, Frankfurt, Germany

For more details and registration go to the event website.


Mariane ter Veen to speak at Andersen Lab conference on digital sovereignty

Mariane ter Veen to speak at Andersen Lab conference on digital sovereignty from 04 Nov 2025 till 04 Nov 2025 Trudy Zomer 14 September 2025 - 16:22 hotel Jakarta, amsterdam On 4 November, Mariane ter Veen, Director Data Sharing at INNOP
Mariane ter Veen to speak at Andersen Lab conference on digital sovereignty from 04 Nov 2025 till 04 Nov 2025 Trudy Zomer 14 September 2025 - 16:22 hotel Jakarta, amsterdam

On 4 November, Mariane ter Veen, Director Data Sharing at INNOPAY, will speak at an exclusive Andersen Lab conference at Hotel Jakarta in Amsterdam.

In her keynote, "The next competitive edge: building a sovereign and sustainable digital future," Mariane will explore the strategic importance of digital sovereignty and how organisations can use it to create sustainable competitive advantage.

Andersen Lab organises exclusive, small-scale conferences for C-level executives and decision-makers in the financial and technology sectors. The events bring together thought leaders to share insights, explore visions, and shape the digital future.

Date and location

4 November 2025
Hotel Jakarta, Amsterdam, the Netherlands

For more details and registration go to the event website.

Saturday, 13. September 2025

Recognito Vision

The Future of Face ID Search in Smartphones 2025

Face ID search technology has rapidly evolved, becoming a standard feature in smartphones. In 2025, its capabilities are expected to expand even further, offering a seamless, secure, and personalized experience for users. This blog explores the future of Face ID search in smartphones, how it integrates with existing technology, and the potential benefits and challenges...

Face ID search technology has rapidly evolved, becoming a standard feature in smartphones. In 2025, its capabilities are expected to expand even further, offering a seamless, secure, and personalized experience for users. This blog explores the future of Face ID search in smartphones, how it integrates with existing technology, and the potential benefits and challenges of this advancement.

 

What is Face ID Search?

It is a technology that uses facial recognition to unlock smartphones and enable various features such as security, payments, and app access. Unlike traditional password systems, it allows users to unlock their devices by simply looking at them, using the unique features of their faces as identification.

This technology has come a long way since its inception and continues to evolve with advancements in 3D facial recognition and other biometrics. By 2025, Face ID will likely be even more accurate, efficient, and secure.

 

How Facial ID Recognition Works

It relies on advanced facial recognition algorithms and hardware, such as depth sensors, infrared cameras, and AI-powered software. It captures the unique features of a person’s face, including the distance between their eyes, nose, mouth, and other defining characteristics.

In the case of smartphones, Face ID works by:

Scanning your face using a 3D depth sensor to create a detailed map of your features. Comparing the scanned data to the stored template to confirm your identity. Unlocking the device or allowing access to apps, payment systems, and more once the match is confirmed.

This process is both fast and secure, offering a more convenient method of authentication compared to traditional PIN codes or passwords.

 

The Future of Face ID Search in Smartphones (2025)

As we look toward the future of smartphones, Face recognition is set to play an even more central role. Here are some expected advancements:

 

1. Improved Accuracy with 3D Facial Recognition

Currently, Face ID systems rely on 2D mapping and some 3D depth sensors for better security. However, by 2025, 3D facial recognition will likely become the standard for even more accurate and precise identification. With the integration of advanced 3D facial recognition, your smartphone will be able to detect your face from multiple angles, providing enhanced security and reducing the risk of errors in recognition.

 

2. More Personalized User Experience

It will move beyond just unlocking your phone. By 2025, smartphones will likely offer a personalized user experience based on facial recognition. For instance, Face ID search could automatically:

Adjust screen brightness or display settings based on your face. Personalize app suggestions or content based on your past preferences. Unlock specific apps and features automatically when the phone detects that you are looking at it.

This level of personalization can enhance user engagement and make smartphone interactions more intuitive.

 

3. Facial Recognition for Payments and Secure Transactions

Already, smartphones with Face ID capabilities allow users to make payments through mobile wallets like Apple Pay or Google Pay. By 2025, face unlock for payments will become even more common and secure. We may see Face ID search systems that can perform secure transactions, even without the need for an additional password or PIN. This will make financial transactions quicker and more secure for users.

 

4. Integration with Augmented Reality (AR)

Augmented reality is quickly gaining popularity, and Face ID search will likely integrate seamlessly with AR experiences. Imagine using your smartphone’s facial recognition to control AR experiences unlocking virtual environments, personalizing characters, and interacting with digital content. 3D facial recognition will provide accurate data to ensure a more immersive experience, enabling personalized AR interactions based on your facial features.

 

5. Enhanced Privacy and Security Features

With the growing concern over digital privacy, the future of Face ID search will focus on enhancing security measures. Face unlock technology will be enhanced to ensure that it is more difficult for people to bypass the system. Expect additional layers of security such as liveness detection, where the phone can determine if it’s looking at a real face (not a photo or video), or multi-factor authentication (combining face recognition with voice or fingerprint authentication).

 

Its Impact on the Smartphone Industry

The introduction of Face ID is already changing the way we interact with our smartphones. By 2025, it will likely have a profound impact on various industries:

 

1. Mobile Payments and E-Commerce

As smartphones adopt Face ID search technology, mobile payment and e-commerce platforms will see an uptick in secure transactions. Users will no longer need to fumble with passwords, credit cards, or PINs. Just a glance at their phone will be enough to authorize payments, making online shopping and in-store purchases more efficient.

 

2. Smartphone Security

Smartphone security will continue to evolve. With improved facial recognition technology, phone manufacturers will likely be able to deliver a much higher level of security. This could reduce the likelihood of data theft and unauthorized access, making smartphones much more secure.

 

3. Privacy Concerns

As Face ID search becomes more widespread, privacy concerns are likely to rise. Many people worry about the potential for their facial data to be stored and misused. The smartphone industry will need to address these concerns by implementing stronger encryption and giving users control over their data.

 

Challenges and Concerns in the Future of Face ID Search

While Face ID search has many advantages, it does come with its challenges:

 

1. Privacy and Security Risks

Storing and using facial data raises privacy concerns. If this data is hacked or stolen, it could lead to identity theft. To combat these risks, manufacturers will need to adopt robust encryption and make sure that personal data is stored securely.

 

2. Facial Recognition Accuracy

While facial recognition technology has improved, it’s still not flawless. Factors such as lighting, aging, or facial hair changes can affect recognition. As we move toward 2025, more accurate 3D facial recognition systems will likely emerge to minimize these issues.

 

3. Increased Dependency on Facial Recognition

As more tasks are tied to Face ID search, users may become overly reliant on facial recognition for security. This could present issues if the system fails or the user’s facial features change significantly due to injury or surgery.

 

Conclusion

The future of Face ID search in smartphones looks promising. By 2025, it will be more accurate, secure, and integrated with other technologies, enhancing the user experience and providing improved functionality. Whether for security, payments, or personalization, Face ID search will be a key player in how we interact with our smartphones.

If you’re a business or developer interested in incorporating facial recognition technology into your app, tools like Recognito’s Face ID SDK can help. Tested under the NIST FRVT 1:1 case study, it delivers reliable performance while prioritizing both security and privacy. Recognito offers robust, easy-to-integrate solutions for adding face unlock features into your products. To learn more and explore the implementation, you can also visit Recognito’s GitHub repository.

The future is looking brighter with Face ID search, but it’s essential to address privacy, accuracy, and security concerns as the technology continues to evolve.

 

Frequently Asked Questions

1) What is Face ID search, and how does it work?

Face ID search uses facial recognition technology to unlock your smartphone by scanning unique facial features and matching them to a stored template.

 

2) Is Face ID search more secure than traditional passwords?

Yes, Face ID search is more secure as it uses biometric data, which is harder to guess or steal compared to traditional passwords.

 

3) Can Face ID search be fooled by photos or videos?

Modern Face ID systems use liveness detection, making it difficult for photos or videos to fool the system.

 

4) What happens if Face ID search doesn’t recognize my face?

If Face ID fails, you can unlock your device with an alternative method like a password, PIN, or fingerprint.

 

5) Will Face ID search work if my face changes significantly (e.g., due to aging, makeup, or injury)?

Face ID can adapt to minor changes but might struggle with significant changes like severe injuries or drastic aging.

Tuesday, 26. August 2025

Radiant Logic

Rethinking Enterprise IAM Deployments with Radiant Logic’s Cloud-Native SaaS Innovation

Learn how Radiant Logic’s cloud-native SaaS redefines IAM operations with agility, resilience, and real-time observability, empowering enterprises to thrive in the cloud era. The post Rethinking Enterprise IAM Deployments with Radiant Logic’s Cloud-Native SaaS Innovation appeared first on Radiant Logic.

Ocean Protocol

Service Resumes — DF153 Completes and DF154 Launches

Service Resumes — DF153 Completes and DF154 Launched Predictoor DF153 rewards are available after a temporary disruption in service — no rewards were lost in the process. DF154 ran September 4th — September 11th, 2025 1. Overview Data Farming (DF) is an incentives program initiated by ASI Alliance member, Ocean Protocol. In DF, you can earn OCEAN rewards by making predictions via ASI
Service Resumes — DF153 Completes and DF154 Launched Predictoor DF153 rewards are available after a temporary disruption in service — no rewards were lost in the process. DF154 ran September 4th — September 11th, 2025 1. Overview

Data Farming (DF) is an incentives program initiated by ASI Alliance member, Ocean Protocol. In DF, you can earn OCEAN rewards by making predictions via ASI Predictoor.

Data Farming Round 153 (DF153) completed on September 4th following an unexpected disruption in service that began on Wednesday, August 6th and was fixed by Monday, September 1st. No Predictoor rewards were lost in the process. Rewards due from August 6th to September 1st will be available as part of the usual rewards-claiming process.

DF154 is live as of, September 4th. It concluded on September 11th. For DF round 154, Predictoor DF had 3,750 OCEAN rewards and 20,000 ROSE rewards.

2. DF structure

The reward structure for DF154 is comprised solely of Predictoor DF rewards.

Predictoor DF: Actively predict crypto prices by submitting a price prediction and staking OCEAN to slash competitors and earn.

3. How to Earn Rewards, and Claim Them

Predictoor DF: To earn: submit accurate predictions via Predictoor Bots and stake OCEAN to slash incorrect Predictoors. To claim OCEAN rewards: run the Predictoor $OCEAN payout script, linked from Predictoor DF user guide in Ocean docs. To claim ROSE rewards: see instructions in Predictoor DF user guide in Ocean docs.

4. Specific Parameters for DF154

Budget. Predictoor DF: 3.75K OCEAN + 20K ROSE

Networks. Predictoor DF applies to activity on Oasis Sapphire. Here is more information about Ocean deployments to networks.

Predictoor DF rewards are calculated as follows:

First, DF Buyer agent purchases Predictoor feeds using OCEAN throughout the week to evenly distribute these rewards. Then, ROSE is distributed at the end of the week to active Predictoors that have been claiming their rewards.

Expect further evolution in DF: adding new streams and budget adjustments among streams.

Updates are always announced at the beginning of a round, if not sooner.

About Ocean, DF and ASI Predictoor

Ocean Protocol was founded to level the playing field for AI and data. Ocean tools enable people to privately & securely publish, exchange, and consume data. Follow Ocean on Twitter or TG, and chat in Discord. Ocean is part of the Artificial Superintelligence Alliance.

In Predictoor, people run AI-powered prediction bots or trading bots on crypto price feeds to earn $. Follow Predictoor on Twitter.

Service Resumes — DF153 Completes and DF154 Launches was originally published in Ocean Protocol on Medium, where people are continuing the conversation by highlighting and responding to this story.


iComply Investor Services Inc.

Nonprofit Due Diligence: How to Manage Global Compliance Without Mission Drift

Nonprofits face growing AML obligations. This guide explains how to verify donors, partners, and grantees while maintaining trust and operational focus using iComply.

Nonprofits are under growing pressure to vet grantees, partners, and donors to meet global AML standards. This article outlines key KYC and KYB expectations in the U.S., UK, EU, Canada, and Australia – and shows how iComply enables automated risk screening without disrupting trust or operations.

Nonprofits and non-governmental organizations (NGOs) are mission-driven – but increasingly, they’re also AML-obligated. Regulators, donors, and banking partners now expect them to verify counterparties, conduct due diligence on sub-recipients, and track risk exposure across jurisdictions.

Global AML rules are expanding—and nonprofits must ensure their programs and funds are not diverted for criminal or terrorist use.

Emerging AML Obligations for Nonprofits United States Regulators: FinCEN, IRS, Department of State Requirements: Due diligence on foreign grantees, donor vetting, sanctions screening, and enhanced scrutiny of transactions involving high-risk countries United Kingdom Regulators: Charity Commission, HMRC Requirements: Financial controls, PEP and sanctions screening, and governance reviews for organizations handling overseas grants European Union Regulators: National charity bodies, AML authorities Requirements: UBO transparency, transaction monitoring, GDPR-compliant due diligence, and STR obligations Canada Regulator: CRA, FINTRAC Requirements: Anti-terrorist financing controls, donor due diligence, reporting obligations, and foreign activity reviews Australia Regulator: ACNC, AUSTRAC Requirements: AML/CTF compliance for overseas programs, sanctions compliance, and source-of-funds transparency Challenges Nonprofits Face

1. Resource Constraints
Small compliance teams, tight budgets, and limited infrastructure

2. Complex Grant Networks
Sub-grantees, international affiliates, and in-country partners with limited transparency

3. Donor Sensitivity
Trust and confidentiality must be preserved during verification

4. High-Risk Regions
Operations often focus on areas with elevated AML or sanctions risk

iComply: Mission-Aligned AML Tools for Nonprofits

iComply offers a lightweight, privacy-respecting AML platform that supports risk screening and verification across the nonprofit ecosystem.

1. KYC + KYB for Partners and Grantees Verify local nonprofits, vendors, and individuals with document and registry checks Onboard stakeholders using multilingual, mobile-ready portals Collect declarations, signatures, and supporting documentation securely 2. Sanctions and Risk Screening Screen partners and donors against OFAC, EU, UN, and national sanctions lists Apply configurable thresholds and refresh cycles Automate PEP/adverse media checks without storing unnecessary PII 3. Privacy-First Infrastructure Data processed on-device before transmission Full compliance with PIPEDA, GDPR, and local privacy laws Configurable consent workflows and retention schedules 4. Case Management and Reporting Assign compliance reviews and track escalations Export audit logs for internal governance or third-party funders Maintain a defensible trail of due diligence Case Insight: Charitable Gifting Platform

A Canadian-registered charitable gifting platform operating across North America adopted iComply to manage grantee and partner due diligence. Results:

Screened 60+ partners in under 4 weeks Flagged one entity with prior sanction exposure Increased trust with a major foundation through automated compliance The Bottom Line

Doing good doesn’t exempt you from doing due diligence. Nonprofits that integrate smart, mission-aligned compliance tools can:

Meet funder and regulatory expectations Maintain operational focus Build donor and partner trust

Talk to iComply to learn how we help nonprofits automate global AML screening – without sacrificing impact or transparency.


Aergo

BC 101 #6: Why Exchanges Are Building Their Own Blockchains

Crypto exchanges are no longer content with just being marketplaces. Increasingly, they are launching their own networks. On the surface, this appears to be a bid to reduce costs or capture transaction fees. But the real agenda is bigger: to become the gateway. The Strategic Position of Exchanges Exchanges already sit at the most valuable chokepoints in crypto: They own the user 

Crypto exchanges are no longer content with just being marketplaces. Increasingly, they are launching their own networks. On the surface, this appears to be a bid to reduce costs or capture transaction fees. But the real agenda is bigger: to become the gateway.

The Strategic Position of Exchanges

Exchanges already sit at the most valuable chokepoints in crypto:

They own the user funnels. They aggregate liquidity. They provide fiat on/off ramps. They hold the keys to KYC and AML compliance, giving them regulatory leverage and privileged access to the intersection of traditional finance and crypto.

By creating their own blockchains, exchanges extend this power. They no longer just host trading. They design the rails on which trading, applications, and interactions take place. In doing so, they secure the single sign-on (SSO) layer for Web3 and dApps.

A Familiar Playbook: Enterprises and Stablecoins

This strategy mirrors what is happening in traditional finance. Top enterprises and financial institutions are increasingly launching their own stablecoins, not because they want to compete with Bitcoin or Ethereum directly, but because they see stablecoins as the gateway to the digital financial system. Whoever owns the stablecoin rails owns the access point to payments, settlements, and capital flows.

In both cases — exchanges with blockchains and enterprises with stablecoins — the logic is the same: secure the gateway, and you secure the market.

Lessons from the Internet

We’ve seen this dynamic before. In the early days of the web, Facebook dominated single sign-on (SSO) by making “Login with Facebook” the default across apps and websites. Today, that role has largely shifted to Google, which owns identity and access at internet scale.

Exchanges are now attempting to replicate this playbook for Web3. By pushing users and developers onto their own chains, they position themselves as the default login layer of the crypto economy. Meanwhile, enterprises aim to achieve the same goal in finance through stablecoins, thereby creating a default settlement layer for the digital economy.

The Bigger Picture

What looks like fragmented innovation is in fact the same strategic move: to own the gateway layer of the future.

Exchanges are building a crypto SSO for decentralized apps.
Enterprises are building a financial SSO for digital payments.

Both are racing to become the indispensable entry point to their respective domains.

And yet, there is a third frontier emerging: the gateway for AI-native infrastructure. That story belongs to HPP, and it’s one we’ll explore in the next article.

BC 101 #6: Why Exchanges Are Building Their Own Blockchains was originally published in Aergo (HPP) on Medium, where people are continuing the conversation by highlighting and responding to this story.


FastID

Fastly + Scalepost: Extending the Fastly platform to manage AI Crawlers

See when and how AI chatbots use your content. With Fastly and ScalePost, publishers finally gain visibility into how their work shows up in AI-generated answers.
See when and how AI chatbots use your content. With Fastly and ScalePost, publishers finally gain visibility into how their work shows up in AI-generated answers.

Thursday, 11. September 2025

Indicio

Credence Nigeria joins the Indicio Network as a global Node Operator

The post Credence Nigeria joins the Indicio Network as a global Node Operator appeared first on Indicio.
Today, Indicio welcomes Credence Nigeria as the latest organization to join the Indicio Network as a global Node Operator.

Credence Networks Inc is a Canadian-Nigerian based technology company that builds foundational infrastructure for digital trust ecosystems. Their platform enables governments and businesses to build trust in digital platforms that fosters the emerging digital economy. This collaboration grows the global footprint of the Indicio Network–hosted across seven continents and 11 countries. Both organizations are committed to working together to create the systems and technologies that will accelerate the adoption of decentralized identity and Verifiable Credentials.

As a Node Operator Credence joins the ecosystem of companies and institutions operating on the Indico Network, a decentralized network where organizations build and deploy trusted digital identity solutions. Indicio powers three professionally managed networks the TestNet, DemoNet, and MainNet. The TestNet and DemoNet are free to use as part of our Public Benefit community offering. The MainNet is an enterprise-grade, identity network designed for the exchange of Verifiable Credentials and the creation of decentralized identity services at scale.

“We’re delighted to welcome Credence Networks as a Node Operator,” said Heather Dahl, CEO of Indicio. “They’re commitment to transforming manual, costly, and fraud-prone credential verification into instant and secure digital processes is a mission we are aligned on. We look forward to growing the network together and continuing to provide companies the opportunity to launch and scale decentralized identity solutions.”

Engr. Malik Itopa Sule, co-founder of Credence Networks, explained that this partnership establishes the groundwork for the portability of Nigerian-issued credentials, enabling them to be verified internationally.

Indicio’s community of network partners are deploying real-world solutions that prioritize interoperability, user agency, and security. Join the Indicio Network as a Node Operator and Transaction Endoser today by completing this form or by talking with our team today.

Visit credence.com.ng or contact us at info@credenc.com.ng to learn more about Credence Networks Inc.

The post Credence Nigeria joins the Indicio Network as a global Node Operator appeared first on Indicio.


Shyft Network

UAE Crypto Regulation: From Experiments to Enforcement

The UAE’s crypto story has often been framed as a race to innovate. But Q3 2025 marks a turning point: regulators aren’t just experimenting anymore — they’re enforcing. Across Dubai, Abu Dhabi, and the mainland, five authorities pushed new rules that will reshape how stablecoins, tokenized assets, and payment tokens operate in one of the world’s most ambitious digital-asset hubs. Stablecoins and

The UAE’s crypto story has often been framed as a race to innovate. But Q3 2025 marks a turning point: regulators aren’t just experimenting anymore — they’re enforcing. Across Dubai, Abu Dhabi, and the mainland, five authorities pushed new rules that will reshape how stablecoins, tokenized assets, and payment tokens operate in one of the world’s most ambitious digital-asset hubs.

Stablecoins and RWAs Step Into the Spotlight

Dubai’s VARA made its Virtual Asset Issuance Rulebook effective this June, locking in disclosure duties, reserve requirements, and full licensing for fiat-referenced (FRVA) and asset-referenced (ARVA) tokens. Translation? If you want to issue a stablecoin or tokenize real-world assets in Dubai, you’re now playing by institutional-grade rules — and VARA is already testing the waters with enforcement.

Securities Meet Sukuk on Chain

The SCA introduced a new framework for Security and Commodity Tokens, bringing digital contracts under existing securities law. At the same time, it consulted on tokenized sukuk, hinting at a future where Islamic finance and blockchain converge. If realised, that could be a global first — making sukuk more accessible and liquid through fractionalisation.

ADGM: Innovation With Guardrails

In Abu Dhabi, the FSRA updated its digital-asset guidance, streamlined approvals, and drew a hard line against privacy coins and algorithmic stablecoins. It also opened consultation on fiat-referenced tokens — expanding oversight to custody, payments, and intermediation. The message is clear: ADGM wants to attract serious players, but only those willing to play inside the guardrails.

Payments Tighten Under the Central Bank

The CBUAE officially ended its transition period for Payment Token Services. From now on, general retail payments onshore can only be made with licensed, dirham-pegged stablecoins. For merchants and PSPs, that narrows the rails to CBUAE-approved tokens — a major nudge toward a domestic stablecoin ecosystem.

Real Estate Goes On-Chain — And Sells Out

Perhaps the most headline-grabbing news came from the Dubai Land Department (DLD). Its property-title tokenization pilots sold out instantly, drawing hundreds of investors from dozens of countries. With the launch of the DIFC PropTech Hub, the UAE is building a sandbox-to-scale pipeline for tokenized real estate. In a country where property is king, this is a glimpse of the future.

The Quiet Challenge: Data & the Travel Rule

Behind all these flashy pilots and frameworks lies a less visible, but equally crucial shift: compliance with the FATF Travel Rule. VASPs must now share user data across borders, creating new privacy risks and operational headaches. This is where tools like Shyft Veriscope come in — offering a frictionless, peer-to-peer way to comply without parking sensitive data in centralised databases. For firms in the UAE, that could be the difference between regulatory success and privacy failure.

Why This Quarter Matters

The UAE is moving from regulatory ambition to execution. Stablecoins are regulated, tokenized assets have clear pathways, and payments are narrowing to licensed rails. At the same time, real estate tokenization is proving there’s real demand beyond theory.

For founders, issuers, and investors, the signal is clear: the UAE isn’t just a crypto playground anymore — it’s becoming a serious, rules-based market. Those who embrace compliance as part of their strategy, rather than a burden, will be best placed to ride the next wave of growth.

About Veriscope

‍Veriscope, the compliance infrastructure on Shyft Network, empowers Virtual Asset Service Providers (VASPs) with the only frictionless solution for complying with the FATF Travel Rule. Enhanced by User Signing, it enables VASPs to directly request cryptographic proof from users’ non-custodial wallets, streamlining the compliance process.

For more information, visit our website and contact our team for a discussion. To keep up-to-date on all things crypto regulations, sign up for our newsletter and follow us on X (Formerly Twitter), LinkedIn, Telegram, and Medium.

Book your consultation: https://calendly.com/tomas-shyft or email: bd@shyft.network

UAE Crypto Regulation: From Experiments to Enforcement was originally published in Shyft Network on Medium, where people are continuing the conversation by highlighting and responding to this story.


Veracity trust Network

UK’s Data Act now in force – aims to establish new investment regime

New data laws aimed at making life easier for people within the UK are now in force. The Data (Use and Access) Act received Royal Assent following a number of setbacks in the House of Lords as Peers claimed parts of the Bill would leave the UK vulnerable to AI copyright breaches. The post UK’s Data Act now in force – aims to establish new investment regime appeared first on Veracity Trust Ne

New data laws aimed at making life easier for people within the UK are now in force.

The Data (Use and Access) Act received Royal Assent following a number of setbacks in the House of Lords as Peers claimed parts of the Bill would leave the UK vulnerable to AI copyright breaches.

The post UK’s Data Act now in force – aims to establish new investment regime appeared first on Veracity Trust Network.


1Kosmos BlockID

1Kosmos Takes the Lead in Workforce Identity Verification

The 2025 Gartner® Magic Quadrant for Identity Verification report offers compelling insights and underscores a critical reality: identity verification sits at the core of cybersecurity. This annual report—departing from the usual bi-annual cycle—highlights the escalating threat of identity-based attacks and the rapid technological evolution needed to counter them. The report emphasizes growing con

The 2025 Gartner® Magic Quadrant for Identity Verification report offers compelling insights and underscores a critical reality: identity verification sits at the core of cybersecurity. This annual report—departing from the usual bi-annual cycle—highlights the escalating threat of identity-based attacks and the rapid technological evolution needed to counter them.

The report emphasizes growing concerns about identity fraud in critical business operations. In logistics and transportation, for example, false identity credentials create significant operational and liability risks. When unverified, untrained, or uninsured individuals operate commercial vehicles, companies face regulatory violations, safety incidents, and supply chain disruptions.

Recent headlines about Scattered Spider social engineering attacks and an FBI warning about North Korean operatives targeting American businesses through hiring fraud illuminate the current threat landscape. These incidents demonstrate that traditional identity verification processes are failing under modern attack methods.

Our Journey to Leader in Workforce Identity in One Year

Last year, 1Kosmos was selected from numerous competitors to join the Magic Quadrant alongside a handful of other vendors. Twelve months later—after tripling our annual recurring revenue (ARR) and securing $57 million in venture backing—we’ve emerged as the sole solution provider in the Challenger quadrant.

More significantly, 1Kosmos ranked Highest for Workforce Use Cases in the 2025 Gartner® Critical Capabilities for Identity Verification report. This recognition validates our core principle: securing the person, not just the credential, forms the foundation of modern enterprise security.

What Sets 1Kosmos Apart: The Trifecta of Trust

Gartner’s analysis highlighted three core strengths that differentiate 1Kosmos:

1. FedRAMP High Authorization

The 1Kosmos platform has achieved FedRAMP High Authorization —the highest security compliance level under the Federal Risk and Authorization Management Program. 1Kosmos is the only vendor holding this authorization while also being a Kantara-certified full-service Credential Service Provider (CSP). Since we offer the same platform to commercial customers, these organizations benefit from an identity verification solution that has passed rigorous testing against over 420 separate security controls.

2. Comprehensive Integration Ecosystem

While many identity verification vendors struggle with basic workforce integrations, 1Kosmos provides deep, prebuilt connectors across the identity and access management stack. We integrate seamlessly with Active Directory, Ping, CyberArk, Okta, Microsoft Entra ID, and emerging tools for recruitment and IT service management.

3. Advanced Biometric Authentication

Our extensive face biometrics experience extends beyond one-time verification. We enable continuous, adaptive authentication that detects and responds to threats in real-time, creating a persistent security layer that evolves with your risk profile. No other vendor offers this comprehensive support for both identity verification and a reusable identity wallet for biometric authentication.

Innovation That Drives Results

Our privacy-by-design architecture represents more than marketing messaging—it’s a fundamental architectural advantage. By combining identity verification, passwordless authentication, and a distributed ledger for user-managed privacy, we’ve created a platform that rapidly adapts to new threats and requirements.

This approach recently earned recognition from KuppingerCole, who ranked 1Kosmos highest in innovation among identity verification vendors in their 2025 Leadership Compass for Identity Verification report. When two leading analyst firms independently validate your technical approach, it signals you’re solving problems correctly.

The results demonstrate our platform’s effectiveness: customers have reduced identity fraud by more than 40% within six months of deployment, while our global platform processes over one billion daily authentications for 75+ million users.

Solving Real Business Problems

The 1Kosmos platform defends against stolen and fake identities daily at some of the world’s largest organizations, whether addressing in-person or online identity fraud.

We protect major retailers from identity fraud at point-of-sale and equipment rental locations. We secure logins for one of the largest global business process outsourcing firms and support one of the world’s largest FIDO2 deployments.

Our solutions protect healthcare workers and secure patient information for medical service providers, while enabling workforce logins at major financial services firms worldwide.

The 1Kosmos Difference: Complete Digital Identity

Combining identity verification, passwordless authentication, and user-controlled privacy in a single platform that supports both customers and workers delivers concrete business value.

This approach provides more than enhanced security against hiring fraud and social engineering attacks on IT service desks—it improves user experience. When employees can securely access all work applications through a single, verified digital identity, productivity increases while security risk decreases.

We’re the only company providing users with a digital identity wallet they control, enabling convenient and secure access to enterprise applications like Microsoft, Saviynt, ServiceNow, and Epic.

For privileged access management, our platform ensures that access to mission-critical systems remains tied to verified, identity-backed biometrics.

Speed of Deployment, Strength of Security

For enterprise decision-makers, 1Kosmos delivers these capabilities through rapidly deployable cloud services. While point solutions can require weeks or months to implement, our platform typically deploys in hours to days. In a threat environment where speed matters, this deployment advantage can mean the difference between preventing an attack and becoming a headline.

Looking Forward

Gartner’s recognition validates our approach while reinforcing our responsibility to continue pushing boundaries and exploring new possibilities in identity security. As threats evolve, our defenses must evolve accordingly. The criminals behind Scattered Spider and similar operations are sophisticated and well-funded—our response must be equally sophisticated and agile.

We’re building more than improved identity verification; we’re constructing the foundation for a more secure digital economy where trust is verifiable, privacy is preserved, and organizations can confidently embrace digital transformation without compromising security or convenience.

The future of enterprise security begins with identity. And identity security starts with verified trust.

The post 1Kosmos Takes the Lead in Workforce Identity Verification appeared first on 1Kosmos.

Wednesday, 10. September 2025

liminal (was OWI)

The Convergence of Authentication and Fraud Prevention

The post The Convergence of Authentication and Fraud Prevention appeared first on Liminal.co.

Ockto

Eerlijk isoleren met HouMeerOver: zo verdelen gemeenten subsidies

Gemeenten willen verduurzaming versnellen. Dat lukt alleen als bewoners ook echt meedoen, juist díe mensen die het moeilijk kunnen betalen. Het Nationaal Isolatieprogramma stelt middelen beschikbaar, maar de praktijk laat zien dat die subsidies vaak terechtkomen bij huishoudens die het eigenlijk zonder hulp ook wel redden.

Gemeenten willen verduurzaming versnellen. Dat lukt alleen als bewoners ook echt meedoen, juist díe mensen die het moeilijk kunnen betalen. Het Nationaal Isolatieprogramma stelt middelen beschikbaar, maar de praktijk laat zien dat die subsidies vaak terechtkomen bij huishoudens die het eigenlijk zonder hulp ook wel redden.


IDnow

Serious about fraud prevention? Visit IDnow at SBC Summit.

Are you ready for the future of Gaming? Prepared for the industry’s upcoming fraud and compliance challenges? IDnow’s identity verification experts will be on hand to answer all your IDV-related questions at Booth E405.  We will be attending SBC Summit in Lisbon from September 16-18 to share actionable insights on how to onboard players in […]
Are you ready for the future of Gaming? Prepared for the industry’s upcoming fraud and compliance challenges? IDnow’s identity verification experts will be on hand to answer all your IDV-related questions at Booth E405. 

We will be attending SBC Summit in Lisbon from September 16-18 to share actionable insights on how to onboard players in seconds, remain compliant throughout Europe, and block fraud before it impacts the customer experience.  

As one of the first companies in Europe to receive certification under the latest ETSI standard for remote identity proofing (a key requirement for eIDAS 2.0 and EUDI Wallet compliance), IDnow is well equipped to assess how prepared and future-ready businesses are for upcoming regulatory challenges. The team can be found at Booth E405 in Hall 4 and will be demonstrating how its wide range of automated and expert-led identity verification solutions can unlock safer and more secure gaming experiences. 

Gaming operators are also invited to swing by to check out some of IDnow’s latest product developments, from its expanded fraud prevention technology to its NFC-enabled offering, which provides a seamless and streamlined experience, from document tap to trusted onboarding. 

At midday on September 18, don’t forget to head over to Stage 3 – Technology & Compliance to attend the ‘AML 2.0: Getting Serious about Fraud’ panel.

This will be a great opportunity to hear from Edouard Baussier, Solution Sales Director at IDnow, who, alongside other industry leaders and insiders, will explore how AI, real-time data, and regulations are transforming AML efforts. 

Traditional AML strategies are often too rule-based and reactive; focusing more on catching yesterday’s fraud than tomorrow’s. I look forward to joining my peers from the gaming and gambling space to explore how AI, data enrichment and behavioral analytics could be used to shape the future of AML.

Edouard Baussier, Solution Sales Director at IDnow
Hoping for the treble. 

IDnow will also be hoping history repeats itself at this year’s SBC Awards (taking place on the final day of SBC Summit Lisbon on September 18,) as it has once again been nominated for the ‘Fraud and Compliance Solution of the Year’ award. 

Having won the award in both 2023 and 2024, the Munich-headquartered identity verification platform provider will be hoping to win the prestigious award for three years in a row. 

Schedule a meeting with the IDnow team at SBC Summit by clicking below.

By

Jody Houton
Senior Content Manager at IDnow
Connect with Jody on LinkedIn

SBC Summit Lisbon Schedule a meeting with the team to discover how IDnow’s range of automated and expert-led solutions can help you unlock safer and more secure gaming and gabling experiences. Book a meeting

Dock

The 3 Steps You Need to Take for eIDAS 2.0 Compliance

We sat down with Viky Manaila (Trust Services Director at Intesi Group) and Vedran Lalic (Digital Identity Consultant at the World Bank) to break down a massive topic:  By 2026, eIDAS 2.0 will change how digital identity works in Europe.  The shift to&

We sat down with Viky Manaila (Trust Services Director at Intesi Group) and Vedran Lalic (Digital Identity Consultant at the World Bank) to break down a massive topic: 

By 2026, eIDAS 2.0 will change how digital identity works in Europe. 

The shift to verifiable credentials and digital wallets isn’t optional, it’s happening. 

Governments, businesses, and institutions that adapt early will gain a competitive advantage. Those who don’t? They’ll be scrambling to keep up.

So, what should you be doing right now to get ahead? Let’s break it down.


PingTalk

The Competitive Advantage of Decentralized Identity in European Finance

Discover how eIDAS 2.0 and decentralized digital identity are reshaping European financial services - reducing fraud, improving CX, and enabling growth.

From opening a bank account to approving a mortgage or executing a cross-border payment, trust in a person’s digital identity is what keeps the financial system running smoothly. But in Europe, the digital identity landscape has long been fragmented with each country relying on its own tools, trust schemes, and identity providers. For financial services providers operating across borders, that means rising compliance costs, customer friction, and missed growth opportunities. The EU’s eIDAS 2.0 regulation is about to change all that, and for banks, insurers, and fintechs, the implications are massive.


BlueSky

Our Approach to Age Assurance

We’re committed to keeping our community informed as we navigate new regional regulations.

At Bluesky, we’re working to drive large-scale adoption of technologies for open and decentralized public conversation. We built our app to provide you with better choices when it comes to privacy, expression, and safety. That’s why we give people options for how content moderation works, on top of our baseline policies.

We recognize that promoting safety for young people is a shared responsibility, and we support the idea of collective action to protect children from online risks. We also recognize that governments may have strong, often conflicting, views on these issues and how to weigh competing priorities. In this rapidly evolving regulatory environment, our goal is to respect the law while balancing safety, free expression, and user privacy to serve the greater good of our community. Responding to new laws and regulations will require pragmatism and flexibility.

In the UK, we complied with a new law that requires platforms to restrict children from accessing adult content. In Mississippi, the law requires us to restrict access to the site for every unverified user. To implement this change, we would have had to invest substantial resources in a solution that we believe limits free speech and disproportionately harms smaller platforms. We chose not to offer our service there at this time while legal challenges continue.

South Dakota and Wyoming have also passed online safety laws that impose requirements on services like ours. These are very similar to the requirements of the UK Online Safety Act. So, as we did in the UK, we’ll enable Kids Web Services’ (KWS) age verification solution for users in these states. Through KWS, Bluesky users in South Dakota and Wyoming can choose from multiple methods to verify their age. We believe this approach currently strikes the right balance. Bluesky will remain available to users in these states, and we will not need to restrict the app for everyone.

We’re committed to keeping our community informed as we navigate these new regulations. As more states and countries adopt similar requirements, we will update this blog post accordingly.

Update, September 26: Ohio has a law similar to South Dakota and Wyoming regulations, so we'll be implementing the same solution in Ohio, effective September 29th.


FastID

DDoS in August

August 2025 DDoS attack trends: Hyperscale clouds are the source for 70% of attacks. Get insights on the latest application DDoS trends to strengthen security.
August 2025 DDoS attack trends: Hyperscale clouds are the source for 70% of attacks. Get insights on the latest application DDoS trends to strengthen security.

Control and Monetize Your Content with the RSL Standard

AI crawlers are scraping the web, often ignoring rules and costing publishers resources. The new RSL Standard lets you block, allow, or even charge AI for access to your content. Here’s how it works.
AI crawlers are scraping the web, often ignoring rules and costing publishers resources. The new RSL Standard lets you block, allow, or even charge AI for access to your content. Here’s how it works.

Tuesday, 09. September 2025

Indicio

Indicio’s authenticated biometrics — a simple defense against a “tidal wave” of synthetic identity fraud

The post Indicio’s authenticated biometrics — a simple defense against a “tidal wave” of synthetic identity fraud appeared first on Indicio.
With leading research company Juniper predicting a “fraud tidal wave,” Indicio’s authenticated biometric credential solution is a simple, powerful, cost effective defense against synthetic identity fraud and deepfakes while also streamlining account access, mobile, and cross-border payments.

By Tim Spring

Juniper Research predicts fraud will cost financial institutions $58.3 billion dollars, globally, by 2030 — and the bill is coming from synthetic identity fraud, where real, stolen, and fake information is combined to trick institutions into opening accounts and granting credit.

Add this to bots, phishing attacks, account takeovers, and AI being used to accelerate attacks, and generate deepfakes.

Meanwhile, the demand for seamless, fast, mobile banking and payments has only increased. Juniper also forecasts that mobile payments will grow to over $8 trillion dollars by 2028.

Money 20/20 — Indicio is “poised to transform the world of money”

We’re doing this with authenticated biometric credentials, a simple, cost-effective solution to these authentication and KYC problems that can scale from the smallest SME to the corporations and countries.

With Indicio Proven software, any government issued identity document containing an image can be bound to the person who rightfully owns it — through a combination of face-mapping and liveness checking. And through our partnership with Regula, thousands of official identity documents from all over the world can be validated as authentic.

The result is a Verifiable Credential that contains an authenticated biometric — a combination of personal identity data and a biometric image that can be presented anywhere for instant verification — no centralized storage of personal or biometric data needed.

What makes this so powerful is that the issuer of the credential — a bank, a brokerage, a financial institution — can be cryptographically proven, along with the integrity of the data.

And this authentication takes place before any data is shared.

So if you trust the bank, you can trust the information in the credential — plus, you can automatically compare a live image of the person with a tamper-proof copy of their biometrics, a simple way to identify deepfakes.

The result is the most powerful digital identity in the global marketplace — one that can be created in minutes and verified with simple mobile software anywhere.

Bonus — with Indicio Proven, your authenticated biometric credential is globally interoperable, meaning it can work with the European Union’s new Digital Identity Wallet.

Indicio — the IDV disruptors

We first created this solution to enable seamless border crossing with the world’s first digital passport credential based on international standards. We won awards. But more importantly, we saw how this could transform identity verification for everyone and meet the emerging challenges of synthetic identity fraud.

Our software enables anyone to hold an authenticated biometric of themselves and instantly share it anywhere as the ultimate proof of identity in a world of fakery. And we also make it easy to verify anywhere, even offline.

It’s simple to implement — it will work with your existing systems. It’s simple to use — generate or scan a QR code; integrate with existing biometric infrastructure. And it is significantly less expensive than traditional IDV — but you’ll have to contact us to find out by how much.

The question is, in a world where synthetic identities and deepfakes threaten the financial security of your company, can you afford not to ask for a Proven biometric?

Getting Started

To get a better understanding of the technologies involved, you can visit our banking and finance page. To discuss specifics or learn how you can start integrating this solution into your systems today, please contact our team and we will be happy to answer any questions or set up a time for a free consultation.

###

The post Indicio’s authenticated biometrics — a simple defense against a “tidal wave” of synthetic identity fraud appeared first on Indicio.


Tokeny Solutions

Talent Interview | José

The post Talent Interview | José appeared first on Tokeny.
Tokeny's Talent 9 September 2025 Talent Interview | José Talent Interview | José Tokeny's Talent 9 September 2025 José Navalon is Lead Backend Developer, he joined the company in 2021. Reflecting on the 4-year Journey You’ve been with the company for four years, as a Lead Backend Developer. How has the company supported your growth during this time?

These 4 years at Tokeny have honestly flown by. From the beginning, I’ve had a lot of freedom to propose ideas, build things from scratch, and push improvements across the backend. That kind of trust and ownership really helped me grow, not just technically but also in how I approach teamwork and long-term architecture. It’s been a great place to keep learning while actually making an impact.

Tokeny’s Culture Involvement Tokeny has grown significantly since you joined. How has the company culture evolved in your opinion?

When I joined, Tokeny felt very startup-like. The team was small, and everyone wore multiple hats. Even though we’ve grown a lot, that openness and transparency are still there. What’s changed is that the different departments are way more aligned now. Marketing, product, tech… we’re all more connected, and that helps a lot in daily work.

“Above all, people still care, which makes it easy to stay motivated.” “Above all, people still care, which makes it easy to stay motivated.” How would you describe your own personal growth within the company?

I’ve definitely grown a lot here. In the beginning, I focused mostly on solving backend tasks, but over time I started thinking more about the full picture: scalability, performance, developer experience, and how backend supports business needs. I’ve also learned how to mentor others, manage complexity better, and communicate across teams. I guess I’ve moved from just coding to building systems that last.

The last point I’d like to emphasize is that our team is committed to both achieving results and maintaining work-life balance. When urgent matters arise, we tackle them swiftly and efficiently, ensuring that nothing is left unresolved. At the same time, if no urgent issues arise, we ensure that our team members can fully enjoy their holidays, recognizing that recharging is essential for sustained performance. This balanced approach allows us to consistently deliver exceptional results while keeping the team motivated and at their best.

“Management genuinely puts people first, valuing rest as a way to prevent burnout and keep energy levels high.” “Management genuinely puts people first, valuing rest as a way to prevent burnout and keep energy levels high.” Company Values in Practice You mentioned in your previous interview how much you enjoyed working with a team that is honest and transparent. Can you share an example of a project where you or your team used this honesty, and how it was received?

One example that sticks with me was during a backend refactor. Halfway through, we realized our initial plan wasn’t working well. Instead of pushing forward blindly, we stopped, had a proper conversation, and agreed to pivot. It was a bit uncomfortable at first, but being honest saved us time and stress. And the team appreciated the transparency. It turned into a better solution in the end.

Reflections and Future Outlook If you could give advice to your younger self, just starting out at Tokeny, what would it be?

I’d probably tell myself: “Don’t try to be the hero, collaborate more, and ask questions earlier.” Also: “Write better docs. Future-you will hate current-you if you don’t.” 😅And finally: enjoy the ride, it’s a great team and there’s a lot to learn if you stay curious

As someone who has been with the company through significant milestones, where do you see Tokeny going in the next five years, and how do you envision your role evolving in that journey?

I think Tokeny is on track to become one of the key players in regulated digital assets, especially as more institutions look for serious infrastructure.

“I see us moving toward even more modular and scalable services.” “I see us moving toward even more modular and scalable services.”

Potentially even opening new products or markets. I’d love to keep helping with that, especially on the architecture side, and also mentoring new developers as the team grows.

Finally, as we’ve gotten to know you over the years, you’ve often shared your love for cooking traditional Valencian dishes. Do any learnings or skills from these hobbies translate into your work at Tokeny

For me, it’s all about timing, balance, and attention to detail. That actually translates really well into how I work. In backend development, you also need the right ingredients, a solid plan, and a lot of care to build something that works smoothly. Both give me that same feeling when everything comes together just right.

More Stories  Talent Interview | José 9 September 2025 Talent Interview | Héctor 10 July 2025 Talent Interview | Thaddee 2 May 2025 Talent Interview | Nida 21 February 2025 Tokeny’s Talent | Philippe’s Story 30 January 2025 Tokeny’s Talent | Satjapong’s Story 19 November 2024 Tokeny’s Talent | Jordi’s Story 1 November 2024 Tokeny’s Talent | Shurong 18 September 2024 Tokeny’s Talent | Cristian 13 June 2024 Tokeny’s Talent | Adrian 15 May 2024 Join Tokeny Family We are looking for talents to join us, you can find the opening positions by clicking the button. Available Positions

The post Talent Interview | José appeared first on Tokeny.


Spherical Cow Consulting

AI Permissions vs. Human Permissions: What Really Changes?

We’ve been talking about identity and access for people for decades (millennia if you think outside tech). Policies, role assignments, reviews, zero trust — these are familiar tools. The assumptions that go into them, however, don't quite work when the "user" is no longer a person." Enter in the AI Agent. The post AI Permissions vs. Human Permissions: What Really Changes? appeared first on Spher

“We’ve been talking about identity and access for people for decades (well, millennia if you think outside the tech box). Policies, role assignments, reviews, zero trust — these are familiar tools. The assumptions that go into them, however, don’t quite work when the “user” is no longer a person.”

Enter in the AI Agent.

An AI doesn’t log in, perform a task, and then head off to lunch. It doesn’t get tired, second-guess itself, or stop at the boundaries we assume people understand. Instead, it keeps going (was the Energizer Bunny an early AI? Hmmmm) at a scale no human can match. That difference matters. The way we’ve designed permissions for humans has always relied on certain constraints: limited speed, bounded intent, and oversight cycles that can reasonably keep up.

When the actor is an AI, those constraints are gone. What we’re left with is a gap between the pace at which machines can act and the pace at which human-designed governance can respond. Unfortunately, I don’t think that the gap can be smoothed over with existing tools.

This post looks at three of those cracks: how policy enforcement differs for people and AIs, why runtime governance becomes essential, and what zero trust does (and doesn’t) offer when roles blur.

A Digital Identity Digest AI Permissions vs. Human Permissions: What Really Changes? Play Episode Pause Episode Mute/Unmute Episode Rewind 10 Seconds 1x Fast Forward 30 seconds 00:00 / 00:10:38 Subscribe Share Amazon Apple Podcasts CastBox Listen Notes Overcast Pandora Player.fm PocketCasts Podbean RSS Spotify TuneIn YouTube iHeartRadio RSS Feed Share Link Embed

You can Subscribe and Listen to the Podcast on Apple Podcasts, or wherever you listen to Podcasts.

And be sure to leave me a Rating and Review!

Policy enforcement for people vs. AIs

With humans, policies usually align with job functions: a role grants access, and reviews catch drift over time. Even if people sometimes work around the edges of a policy, they’re bounded by human limits: a person can only click so fast, submit so many forms, or request so many resources. Enforcement mechanisms are tuned to those limits.

With AI, those assumptions evaporate. One executive at a very large enterprise told me — and asked me not to name them publicly — that they’d watched their own AI agents behave exactly like an attacker. The agents weren’t malicious; they were just single-minded. When faced with a roadblock, they tried every possible permutation of the request until something went through. From the agent’s point of view, this was just persistence in solving a problem. From a security team’s perspective, it looked indistinguishable from a brute-force attack.

That story captures the core difference: enforcing policies on humans is about constraining intent, while enforcing policies on AIs is about constraining behavior patterns that can unfold at machine speed.

Why runtime governance matters more

Oversight loops designed for quarterly certifications or annual audits simply don’t scale when an AI can run thousands of actions in seconds. Quarterly access reviews, audit reports, entitlement certifications: these are slow, deliberate checks designed for slow, deliberate actors. That’s why governance is shifting toward runtime validation. NIST’s AI Standards “Zero Drafts” Pilot Project makes a similar point in its early work on Testing, Evaluation, Verification, and Validation (TEVV): evaluation results are time-bound and must be re-established in live contexts as systems and environments change.

But an AI agent can spin through thousands of transactions in seconds. If one of those transactions violates policy, you don’t have three months to catch it. By the time the audit report lands, the damage is done.

That’s why runtime governance matters more in an AI world. Instead of periodic reviews, you need ongoing checks that validate each action in real time against business state, risk scores, and context. Governance has to run in the same tight loops as the systems it’s meant to protect. The consequences here aren’t theoretical. Weak runtime governance shows up directly in compliance failures, operational risks, and security exposures. If your audit assumes human pacing but your agents act at machine speed, that mismatch can quickly become costly.

This isn’t a radical departure from what we already know, but it is definitely a sidestep. It’s the same shift we’ve been making with zero-trust networking when verifying every access, every time. But with AIs, the volume and unpredictability make runtime enforcement non-negotiable.

Zero trust and blurred roles

Zero trust, in human terms, is simple enough: don’t assume trust based on location or role; verify every request.

But what does that look like when an AI agent is simultaneously:

Acting as a customer service rep, Writing new code modules, Spinning up cloud infrastructure, and Querying internal HR data?

With people, those roles are clearly separated. With an AI, the boundaries collapse. The same system may be acting across functions at once, not because of malice but because it was asked to “just get the job done.”

Zero trust principles such as least privilege, continuous verification, and minimizing standing access still apply, but they need a new level of granularity. Instead of asking “Does this role have permission to access this system?”, the question becomes “Does this pattern of behavior still look acceptable, given what this agent is trying to achieve?”

And that’s not a static answer. It has to be recalculated in real-time because the roles themselves blur when machines act faster than our ability to categorize them.

What really changes?

For humans, permissions are about who can do what. For AIs, permissions are about what actions are acceptable, in what sequence, at what speed, and with what guardrails.

The shift is from assigning access to governing behavior, from periodic reviews to runtime enforcement, static roles to dynamic patterns. It’s not that the old tools are obsolete. Roles, reviews, and zero trust still matter, but they’re no longer sufficient on their own. When your “users” are tireless, literal, and unimaginably fast, you need governance that matches that pace.

The enterprise anecdote I mentioned earlier — of an AI acting like an attacker just to finish its assigned task — is a preview. It’s what happens when yesterday’s assumptions about permission models meet today’s machine-driven reality.

In my earlier post on Agentic AI in the open standards community, I mentioned that standardization work is starting to grapple with these questions, too. Whether it’s NIST’s early TEVV guidance or W3C and IETF discussions on agent behavior, there’s a growing recognition that machine permissions as much a governance challenge as they are a technical one.

Closing thought

The real change isn’t in the idea of permissions itself. It’s in the urgency of treating permissions as living, runtime checks rather than dusty entitlements waiting for an audit.

So here’s my question to you: Are your permissions models built for human pace or machine pace? If you’ve already run into this problem in your deployments, I’d love to hear what you saw and how you dealt with it.

If you’d rather track the blog than the podcast, I have an option for you! Subscribe to get a notification when new blog posts go live. No spam, just announcements of new posts. [Subscribe here

Transcript Permissions in the Age of AI Agents

[00:00:30] Hi everyone, and welcome back.

[00:00:32] Today I want to talk about something that sounds deceptively familiar: permissions. Specifically—who is allowed to access what, when, where, why, and how?

[00:00:42] The tech space has been dealing with identity and access for decades. It’s a core concept not only for cybersecurity, but also for how businesses function.

[00:00:50] And honestly, if you zoom out far enough, humanity has been grappling with this concept for millennia—whether priests deciding who can enter a temple, or sysadmins deciding who can SSH into a server.

Policy Enforcement in a Human vs. AI World

[00:01:02] My very first tech job was in the 90s as a Galacticom BBS operator. My primary function was to create accounts, group users, and ban them when needed. In other words, managing who could and couldn’t access certain spaces.

[00:01:30] Enter stage left: the AI agent.

[00:01:34] Unlike humans, AI agents don’t self-limit. People get tired, bored, or notice they’re pushing too far. They can only click so fast or request so many resources before fatigue sets in.

[00:01:52] AI does not have those limits. It doesn’t need a coffee break. It doesn’t get bored. And it doesn’t stop at the guardrails we assume humans understand.

Humans → bounded by natural constraints AI → tireless, literal, and unimaginably fast

[00:02:07] That difference matters. For years, permissions assumed humans were the actors—even bad actors. Governance cycles, reviews, and controls were tuned to human pace and intent.

[00:02:29] But when the actor is an AI, those assumptions fall apart. What we’re left with is a widening gap between machine speed and human-designed governance.

Governance at Machine Speed

[00:02:46] In this episode, I want to dig into three challenges:

How policy enforcement differs for people and AIs Why runtime governance becomes essential What zero trust really gives us when roles blur

[00:03:00] Let’s start with policy enforcement.

[00:03:03] With humans, policies align with job functions. Roles grant access, and reviews catch drift. Sure, people sometimes find workarounds, but their intent and ability are still bounded.

[00:03:20] With AI, those assumptions evaporate.

[00:03:37] I spoke with an executive at a large enterprise who shared a telling story. Their AI agents behaved almost exactly like attackers—not because they were malicious, but because they were single-minded.

The AI hit a roadblock Instead of asking for new permissions, it tried every possible permutation until something worked To the AI, that was persistence. To the security team, it looked like brute force

[00:04:10] Here’s the difference:

With humans → enforcing policies means constraining intent With AI → enforcing policies means constraining behavior at machine speeds Why Runtime Governance Matters

[00:04:25] Oversight cycles work for people: quarterly reviews, annual audits, entitlement certifications.

[00:04:42] But AI agents can execute thousands of transactions in seconds. If just one violates policy, waiting months for an audit report is far too late.

[00:04:56] This mismatch shows up in:

Failed audits Blown budgets Security incidents no one saw coming

[00:05:16] This is why runtime governance matters more in an AI world. Instead of periodic reviews, we need continuous validation:

Every action checked in real time Risk scores recalculated constantly Context updated dynamically

[00:05:29] NIST is already moving in this direction with the AI Standards Zero Drafts. One key theme: evaluation results are time-bound.

[00:05:52] AI permissions can’t be static entitlements waiting for audits. They must be living checks, recalculated as conditions shift.

Rethinking Zero Trust

[00:06:23] Let’s talk about zero trust.

[00:06:25] For humans, the principle is simple: don’t assume trust based on network location or job role. Verify every request.

[00:06:42] But what happens when the “user” is an AI agent?

[00:06:53] Unlike humans, who work within distinct roles, an AI might simultaneously:

Act as a customer service rep Write new code modules Spin up cloud infrastructure Query HR data

[00:06:59] No human does all of that at once. But for AI, boundaries collapse.

[00:07:17] Zero trust still applies—least privilege, continuous verification, minimizing standing access. But it must go further.

[00:07:23] The real question isn’t does this role have access? It’s:

Does this behavior pattern look acceptable given the AI’s task?

[00:07:30] And those patterns aren’t static. They must be recalculated in real time because roles blur faster than we can categorize them.

From Permissions to Governance

[00:07:40] So what really changes when the user is an AI?

For humans → permissions define who can do what For AIs → permissions define what actions are acceptable, in what sequence, at what speed, under which guardrails

[00:07:53] This represents a fundamental shift:

From assigning access → to governing behavior From periodic reviews → to runtime enforcement From static roles → to dynamic patterns

[00:08:18] Roles, reviews, and zero trust still matter. But on their own, they’re no longer enough when users act tirelessly and unimaginably fast.

[00:08:31] The anecdote I shared earlier of an AI acting like an attacker? That’s what happens when yesterday’s permission models collide with today’s machine-driven reality.

The Urgency of Machine-Ready Permissions

[00:08:47] This isn’t just happening inside one enterprise. Standards bodies like W3C and IETF are also recognizing that permissions for machines are more than just a technical detail.

[00:09:05] The real shift isn’t only about permissions—it’s about urgency. Permissions can’t sit as dusty entitlements waiting for audits. They must become runtime checks, recalibrated constantly for actors without human limits.

[00:09:22] So here’s a question for you: Are your permission models built for human pace, or for machine pace?

[00:09:33] If you’ve already seen cracks—your AI systems bumping up against the edges of human-centric permission models—I’d love to hear your stories. Maybe they’ll even make it into a future post.

Closing Thoughts

[00:09:52] Thank you for listening. Please share this with your colleagues and tune in again next week.

[00:10:02] That’s it for this week’s episode of Digital Identity Digest.

If this helped make things clearer—or at least more interesting—share it with a friend or colleague. You can also:

Connect with me on LinkedIn: @hlflanagan Subscribe and leave a rating on Apple Podcasts (or wherever you listen) Read the full written post at sphericalcowconsulting.com

Stay curious, stay engaged, and let’s keep these conversations going.

The post AI Permissions vs. Human Permissions: What Really Changes? appeared first on Spherical Cow Consulting.


IDnow

IDnow and Docusign partner to expand secure and compliant digital identity and e-signature solutions in Germany

Munich, September 9, 2025 – IDnow, a leading identity verification platform provider in Europe, and Docusign, the Intelligent Agreement Management company, today announced the launch of a joint solution enabling customers’ compliance with Germany’s Anti-Money Laundering (Geldwäschegesetz, or GwG) law through secure and automated identity verification and electronic signatures, powered by Germany’s

Munich, September 9, 2025 – IDnow, a leading identity verification platform provider in Europe, and Docusign, the Intelligent Agreement Management company, today announced the launch of a joint solution enabling customers’ compliance with Germany’s Anti-Money Laundering (Geldwäschegesetz, or GwG) law through secure and automated identity verification and electronic signatures, powered by Germany’s electronic ID (eID).

A joint solution for trust, speed, and compliance

The new joint offering is designed to support customers’ obligations to meet GwG requirements and is aligned with evolving BaFin guidance and the EU eIDAS regulation, streamlining digital onboarding and agreement processes across regulated industries. This collaboration addresses the increasing demand for compliant, user-friendly digital identification services in the German market, particularly in sectors such as finance, insurance, and public administration.

In light of recent legislative discussions in Germany around enabling more automated identity solutions under GwG, and the growing expectation among users for faster and more intuitive experiences, this partnership broadens the available options for secure and compliant digital identification, reflecting the industry’s ongoing shift toward more flexible, future-ready technologies.

Leveraging combined expertise for enhanced solutions

This integrated solution leverages IDnow’s latest eID-based technology, fully integrated within the new AI-powered Docusign IAM platform. The process uses the Near Field Communication (NFC) chip and PIN functionality of German eID cards to enable automated, eIDAS-compliant, and binding e-signatures, allowing signers to verify their identity and complete agreements using just their smartphone, in under a minute. It delivers a seamless, secure and mobile-first experience, without video calls or manual checks, for both businesses and their customers.

Together, IDnow and Docusign now offer:

Solution to enable customers’ compliance with GwG using digital identification with Qualified Electronic Signature (QES) A completely automated user experience, removing the need for video verification Integration with Docusign’s trusted eSignature and Maestro workflows Certification via IDnow Trust Services AB, an EU-accredited Qualified Trust Service Provider (QTSP)

We are thrilled that Docusign has extended its existing partnership with IDnow, adding IDnow Trust Services AB to its network of qualified trust service providers, and leveraging our eID solution.

Uwe Stelzig, Managing Director DACH at IDnow.

“This partnership will not only streamline and accelerate digital signing processes for holders of the German eID card and resident permits but also make identification more convenient. With the growing complexity of digital regulations across Europe, it is more important than ever to have a secure, compliant and seamless solution in place for electronic signatures and identity verification,” added Stelzig.

“Germany is a priority market for Docusign, where we’re seeing digital transformation accelerate and demand for compliant, seamless digital experiences rise rapidly across financial services, insurance, and beyond,” said Maxime Hambersin, Senior Director, Product Management International at Docusign. “By combining our trusted eSignature capabilities with IDnow’s advanced identity verification, we’re removing friction while increasing compliance.”


iComply Investor Services Inc.

AML Essentials for MSBs: Screening, Sanctions, and Global Oversight

MSBs face intense global AML scrutiny. This article breaks down jurisdictional requirements and shows how iComply streamlines onboarding, monitoring, and reporting across borders.

Money service businesses (MSBs)—including remittance providers, currency exchanges, and prepaid platforms – face some of the strictest AML expectations globally. This article breaks down key KYC, KYB, KYT, and AML requirements in the U.S., UK, EU, Canada, Australia, and Singapore – and how iComply helps automate screening and reporting across borders.

Money service businesses (MSBs) operate in high-risk zones for financial crime, often processing large volumes of low-margin transactions across borders. As a result, regulators expect MSBs to maintain exceptional AML programs – on par with traditional banks.

With sanctions enforcement, PEP exposure, and transaction monitoring under scrutiny, MSBs need real-time, automated tools to meet growing global expectations.

AML Requirements for MSBs by Jurisdiction United States Regulator: FinCEN Requirements: MSB registration, SARs, Travel Rule compliance, OFAC screening, and AML program implementation United Kingdom Regulator: FCA Requirements: AML registration, customer due diligence (CDD), sanctions/PEP screening, and transaction monitoring European Union Regulators: National AML authorities (under AMLD6) Requirements: CDD, UBO verification, risk-based monitoring, and suspicious transaction reporting (STR) Canada Regulator: FINTRAC Requirements: MSB registration, client identification, sanctions list checks, STRs, and transaction recordkeeping Australia Regulator: AUSTRAC Requirements: AML/CTF compliance, customer verification, risk assessment, sanctions screening, and SMRs Singapore Regulator: MAS Requirements: AML licensing, KYC/EDD procedures, real-time screening, Travel Rule compliance, and robust recordkeeping Top Compliance Challenges for MSBs

1. High Volume, Low Margin
Manual processes are unsustainable at scale.

2. Multi-Jurisdictional Risk
Global MSBs must satisfy overlapping and sometimes contradictory AML obligations.

3. Sanctions Exposure
Real-time OFAC, UN, EU, and national list screening is mandatory—and changing daily.

4. Complex Workflows
Onboarding, transaction monitoring, and alert handling often happen in siloed tools.

How iComply Supports Global MSBs

iComply offers MSBs a fully integrated platform to manage end-to-end AML workflows—designed to scale with global growth.

1. KYC + KYB with Edge Security Verify individuals and businesses with on-device document processing UBO mapping and risk profiling by geography, industry, and behavior Supports ID types and languages in 195+ countries 2. Sanctions and PEP Screening Real-time screening against OFAC, EU, UN, UK, and local lists Refresh cycles and trigger-based review automation Configurable thresholds and escalation rules 3. Transaction Monitoring (KYT) Score by volume, frequency, and velocity Detect structuring, layering, and red-flag behaviours Trigger SAR/STR workflows automatically 4. Centralized Case Management Assign reviews, document findings, and resolve alerts in one interface Export audit logs for FinCEN, FCA, AUSTRAC, and others 5. Deployment and Data Governance Cloud, private cloud, or on-premise setups Data residency controls for sensitive jurisdictions (e.g., UAE, EU) Consent management and end-to-end encryption Case Insight: Global Remittance Platform

A cross-border remittance provider integrated iComply to centralize onboarding and monitoring across Africa, North America, and Europe:

Reduced sanctions screening false positives by 45% Consolidated compliance review into one multilingual dashboard Passed audits in three jurisdictions with unified audit logs Final Thought

Regulators treat MSBs like banks – but most MSBs aren’t staffed or equipped like one. The only way forward is automation.

Talk to iComply to discover how our AML tools help MSBs manage global compliance, eliminate manual reviews, and focus on serving their customers.


FastID

Sustainability dashboard: Shine a light on your digital carbon footprint

Fastly's Sustainability dashboard provides instant access to electricity-related Scope 2 & 3 emissions data. Understand and optimize your digital carbon footprint with ease.
Fastly's Sustainability dashboard provides instant access to electricity-related Scope 2 & 3 emissions data. Understand and optimize your digital carbon footprint with ease.

CISO Perspective: Q2 2025 Threat Insights Report

Explore Fastly's Q2 2025 Threat Report through our CISO, Marshall Erwin's eyes. Uncover bot traffic insights and key security practices.
Explore Fastly's Q2 2025 Threat Report through our CISO, Marshall Erwin's eyes. Uncover bot traffic insights and key security practices.

Monday, 08. September 2025

Dock

How to Turn Open Finance Data into Digital ID Credentials and Connect IAM Silos [Video and Takeaways]

The way organizations handle digital identity is rapidly evolving and nowhere is this more visible than in Brazil’s booming Open Finance and Open Insurance ecosystems.  To explore how verified financial data can be transformed into reusable digital identity credentials, Dock Labs recently hosted a live podcast: 

The way organizations handle digital identity is rapidly evolving and nowhere is this more visible than in Brazil’s booming Open Finance and Open Insurance ecosystems. 

To explore how verified financial data can be transformed into reusable digital identity credentials, Dock Labs recently hosted a live podcast: How to Turn Open Finance Data into Digital ID Credentials and Connect IAM Silos.

The session was led by Nick Lambert, CEO of Dock Labs, and featured industry leaders shaping the future of identity in Latin America:

André Facciolli, CEO of Netbr, a consultancy specializing in end-to-end identity management solutions that works with Brazil’s top 10 banks. Alan Kim Mareines, CEO of Lina, a technology provider delivering Open Finance and Open Insurance infrastructure across Brazil. Rodrigo Azevedo, Developer at Netbr, who built and presented the live proof-of-concept demo showing how Open Finance data can be issued as verifiable credentials and used across real-world scenarios like hotel check-ins or age verification at a pub.

Together, the panel explored the challenges large enterprises face with siloed IAM systems, the benefits of combining Open Finance with verifiable credentials, and the broader implications for user privacy, security, and business innovation.


Shyft Network

Shyft Network and IN1 Powering Privacy-Preserving Compliance for Unified Digital Finance

Shyft Network, the trust protocol, has entered into a partnership with IN1, a unified fintech platform offering fiat and crypto financial services, to support scalable regulatory readiness as the company expands globally. As digital finance platforms increasingly integrate both traditional and crypto assets, companies like IN1 are ensuring compliance with FATF regulations. Through this partnershi

Shyft Network, the trust protocol, has entered into a partnership with IN1, a unified fintech platform offering fiat and crypto financial services, to support scalable regulatory readiness as the company expands globally.

As digital finance platforms increasingly integrate both traditional and crypto assets, companies like IN1 are ensuring compliance with FATF regulations. Through this partnership, IN1 will integrate Veriscope, Shyft Network’s Travel Rule solution, providing seamless regulatory compliance. Unlike traditional approaches, Veriscope facilitates the exchange of verified user data between Virtual Asset Service Providers (VASPs) using cryptographic proof — ensuring compliance without compromising user privacy or operational efficiency.

For emerging fintech platforms operating across multiple jurisdictions, building trust through transparent and compliant infrastructure is critical. This collaboration reflects growing demand for solutions that bridge the gap between privacy, innovation, and regulatory alignment.

“As unified financial platforms mature, there is a clear need for tools that simplify compliance without burdening users or platforms,” said Zach Justein, co-founder of Veriscope. “IN1’s commitment to seamless Veriscope integration aligns with our mission to embed privacy and compliance into digital finance infrastructure.”

IN1’s platform combines traditional banking services with cryptocurrency capabilities through a single mobile app, serving users across multiple countries. The platform emphasizes security, regulatory compliance, and user accessibility — principles that resonate strongly in today’s evolving financial landscape.

With this integration, IN1 joins other VASPs choosing Veriscope to meet regulatory requirements without friction. The move reflects Shyft Network’s broader mission to enable secure, compliant digital finance infrastructure for innovative financial service providers.

About Veriscope

Veriscope is the only frictionless FATF Travel Rule compliance solution, enabling VASPs to securely verify and share user data through cryptographic proof. Built on Shyft Network, it reduces complexity and risk while protecting user autonomy — trusted by leading VASPs worldwide.

About IN1

IN1 is a unified fintech platform offering fiat accounts, crypto wallets, and the world’s first dual fiat-crypto payment card in a single mobile app. VASP-licensed and serving users across 35+ countries, IN1 delivers seamless financial management with plans for global expansion.

Shyft Network and IN1 Powering Privacy-Preserving Compliance for Unified Digital Finance was originally published in Shyft Network on Medium, where people are continuing the conversation by highlighting and responding to this story.


Kin AI

The Kinside Scoop 👀 #13

Updates, podcasts, and keeping cool under pressure

Hey folks 👋

We’re back with another update on what’s new, what’s brewing, and what’s inspiring us this month at Kin.

As always, stick around to the end for this month’s super prompt - this time, you can learn more about who you are under pressure.

But first…

What’s new with Kin 🚀 Listening, learning, and stabilizing ⚓

We’ve been gathering feedback on our newly-released advisor system, so we can make sure it’s the best it can be.

It’s been exciting to see the ways you’ve all been using it, and we’re already using your insights to make it sharper, smoother, and more supportive.

Reminders that actually remind you ⏰

Our reminders have gotten a tune-up. They’re now more stable, more reliable, and more ready to keep you on track without slipping.

The return of Custom Kin ✨

A lot of you missed the ability to create and edit custom prompts for your Kin, outside of the advisor profiles - so it’s coming back.

Right now, if you already had custom Kin instructions, you can view and edit them directly in the app.

If you didn’t set them up before the advisor update, don’t worry. The ability to create and edit your own Kin persona is coming back soon.

Kin in conversation 🎙

I (Kasper, Kin’s CEO) recently sat down for a podcast with ai4that to talk about what Kin is, why we’re building it, and how we’ve made it talk so far.

You can listen here.

Secret things ahead 👀

Like we say in every edition, we have new features to make Kin an even better companion (group) to have in your pocket on the cusp of release. Keep an eye out for updates!

Your Kin, your rules 💌

Kin can only get better when you tell us what you think.

So from here on, we’ll be regularly reminding you how to get in touch in your Kinside Scoops.

You can always reach out to the KIN team at hello@mykin.ai with anything, from feature feedback to a bit of AI discussion (though support queries will be better helped over at support@mykin.ai).

For something more interactive, the official Kin Discord is still the best place to talk to the Kin development team (as well as other users) about anything AI.

We regularly run three casual weekly calls, and you’re invited:

Monday Accountability Calls - 5pm GMT/BST
Share your plans and goals for the week, and learn tips about how Kin can help keep you on track.

Wednesday Hangout Calls - 5pm GMT/BST
No agenda, just good conversation and a chance to connect with other Kin users.

Friday Kin Q&A - 1pm GMT/BST
Drop in with any questions about Kin (the app or the company) and get live answers in real time.

Big or small, we want to hear your thoughts and feelings. Kin’s for you, not for us.

Our current reads 📚

Article: Claude starts training on user chat transcripts
READ - The Verge

Article: Anthropic spends $1.5B to settle book theft lawsuit
READ - The Guardian

Tool: Switzerland launches a fully open LLM as an experiment
READ - ETH Zurich

Article: Denmark begins the process of giving everyone the copyright of their personal likenesses
READ - The Guardian

This week’s super prompt 🤖

In this edition, we’re asking:
“How can I better respond to pressure?”

If you have Kin installed and up to date, you can tap the link below (on mobile!) to explore how you think about pressure, and how you can keep cool under it.

As a reminder, you can do this on both iOS and Android.

Try prompt in Kin

We need you 🤝

Kin is currently going through more changes than it ever has - and we want to make sure it’s your steering the ship, not us.

So, please: email us, chat in our Discord, or even just shake the app to reach out to us with your thoughts and ideas.

You are, and always will be, the core of Kin.

With love,

The KIN Team


Veracity trust Network

AI coding practices are exposing UK companies to security risks

Escalating software supply chain threats and the rise in companies adopting AI coding practices are putting UK business at risk. The Cloudsmith 2025 Artifact Management Report has revealed that organisations are being forced to rethink how they manage, secure and scale their software artifact infrastructure as a result of security issues surrounding GenAI-powered codebases. The post AI codin

Escalating software supply chain threats and the rise in companies adopting AI coding practices are putting UK business at risk.

The Cloudsmith 2025 Artifact Management Report has revealed that organisations are being forced to rethink how they manage, secure and scale their software artifact infrastructure as a result of security issues surrounding GenAI-powered codebases.

The post AI coding practices are exposing UK companies to security risks appeared first on Veracity Trust Network.


PingTalk

Complying with NIST SP 800-63-4 Standards: Identity as the Roadmap

Learn how NIST SP 800-63-4 transforms identity assurance with IAL, AAL, and FAL—and how Zero Trust and modern identity platforms simplify compliance and reduce risk.

FastID

Bridging the real-time testing gap: Fanout support in local development for Fastly Compute

Fastly Compute now supports local Fanout testing, letting you build and validate real-time features without deploying to production.
Fastly Compute now supports local Fanout testing, letting you build and validate real-time features without deploying to production.

Sunday, 07. September 2025

Ontology

What is Account Abstraction? The Bridge to Web3 Mass Adoption

Imagine trying to send an email but first having to manually configure SMTP servers, manage encryption keys, and pay postage fees in a specific currency you don’t own. This is essentially what Web3 feels like today. Account Abstraction (AA) promises to change that, making blockchain interactions as seamless as using Gmail. The Current Problem: Web3’s User Experience Crisis Today’s Ethereum

Imagine trying to send an email but first having to manually configure SMTP servers, manage encryption keys, and pay postage fees in a specific currency you don’t own. This is essentially what Web3 feels like today. Account Abstraction (AA) promises to change that, making blockchain interactions as seamless as using Gmail.

The Current Problem: Web3’s User Experience Crisis

Today’s Ethereum wallets rely on Externally Owned Accounts (EOAs) accounts controlled by a single private key. While groundbreaking for decentralization, EOAs create massive friction:

Gas Token Dependency: You must hold ETH to pay fees, even for simple token transfers Single Point of Failure: Lose your seed phrase, lose everything forever Complex Interactions: Each transaction requires manual approval and gas estimation Poor Recovery: No built-in way to recover lost accounts

These limitations explain why Web3 remains challenging for mainstream users. Account Abstraction addresses these pain points by reimagining how accounts work entirely.

What is Account Abstraction?

Account Abstraction transforms user accounts from simple private key wallets into programmable smart contracts. Instead of being bound by EOA limitations, Account Abstraction allows accounts to define custom logic for authentication, fee payment, and transaction execution.

Think of it as upgrading from a flip phone to a smartphone, the core functionality remains, but possibilities expand dramatically.

How Account Abstraction Works Smart Contract Wallets

Instead of being tied to a private key, Account Abstraction uses a smart contract that acts as your account. This smart contract holds your tokens and assets while containing custom logic for managing the account.

ERC-4337: The Technical Foundation

The primary technical implementation of Account Abstraction comes through EIP-4337, which enables Account Abstraction without changing Ethereum’s core protocol. Here’s the simplified flow:

UserOperations: Users create “UserOperations” containing their intended actions like token transfers. Bundlers: Special actors collect UserOperations and submit them in bundles. EntryPoint Contract: A singleton contract that validates and executes operations. Smart Wallets: Execute the actual transactions based on their programmed logic.

An in-depth explanation on the abstraction process can be found on this Proposal.

Paymasters: The Game Changer

Paymasters are entities that can sponsor transaction fees, enabling gasless transactions. A dApp can pay your gas fees, or you can pay in USDC instead of ETH.

Key Benefits of Account Abstraction for Users Gasless Transactions Enables users to pay fees in any token (USDC, DAI, etc.)via paymaster. dApps can sponsor your transaction costs. No need to hold ETH for every interaction. Social Recovery

Set up recovery procedures with trusted contacts or services. Lost your keys? Your designated recovery guardians can help restore access, no more permanent fund loss.

Customized Security Multi-signature requirements Spending limits for large transactions Time delays for high-value transfers Biometric authentication (Face ID, Touch ID) Improved User Experience Session Keys: Authorize games to make small purchases automatically. Transaction Bundling: Execute multiple operations in one confirmation. Automated Execution: Set up recurring payments or trading strategies. One-Click Onboarding: Start using Web3 without seed phrases. Real-World Applications

Gaming: Players authorize a game for micro-transactions within set limits, eliminating constant wallet confirmations while maintaining security.

DeFi: Users set automated strategies like “swap to stablecoins if my portfolio drops 20%” without keeping devices online.

E-commerce: Shoppers pay with any token they own, while merchants receive their preferred currency all sponsored by the platform.

Enterprise: Companies implement multi-department approval workflows for large transactions.

Current Implementation & Tools Coinbase Smart Wallet: Mainstream-friendly onboarding. UniPass: Actively enhancing Account Abstraction capabilities in partnership with Keystone. Biconomy: Developer infrastructure for gasless experiences Alchemy’s Account Kit: Tools for building Account Abstraction-enabled dApps

Layer 2 networks like Polygon and Arbitrum are optimizing specifically for smart contract wallets, making AA transactions faster and cheaper.

The Road Ahead

While ERC-4337 works today, additional proposals could enhance Account Abstraction:

EIP-3074: Allows existing EOAs to delegate control to smart contracts EIP-7702: Proposes native account abstraction at the protocol level

These aren’t competing solutions but complementary approaches that could coexist, providing migration paths for existing users.

Why This Matters for Web3 Adoption

Account Abstraction represents Web3’s evolution from a power-user tool to a mainstream platform. Current barriers preventing mass adoption. Complex key management, mandatory gas tokens, poor recovery options are solved by Account Abstraction.

The infrastructure is maturing rapidly. What took Web2 decades to develop (user-friendly authentication, payment flexibility, account recovery) can now be built into Web3 from the ground up.

Conclusion: The Account Abstraction Revolution

Account Abstraction isn’t just a technical upgrade, it is the bridge between Web3’s technical sophistication and mainstream usability. By making accounts programmable, we unlock user experiences that rival traditional applications while maintaining blockchain’s core benefits: self-custody, transparency, and decentralization.

The question isn’t whether Account Abstraction will succeed, major wallets and dApps are already implementing it. The question is how quickly the entire ecosystem will embrace this paradigm to build truly user-friendly Web3 experiences.

As we move toward blockchain interactions as seamless as using any modern app, Account Abstraction stands as the critical infrastructure making that future possible. Web3’s next billion users won’t need to understand private keys, gas fees, or seed phrases, they’ll just use applications that happen to be decentralized.

Ready to explore the practical side? Next week, we’ll dive into Smart Accounts: the actual implementation of Account Abstraction that’s transforming user experiences across Web3.

What is Account Abstraction? The Bridge to Web3 Mass Adoption was originally published in OntologyNetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.

Saturday, 06. September 2025

Recognito Vision

What Is Face Identity Search and Why It’s Useful

Face identity search is a method that uses AI-powered facial matching instead of IDs or passwords. A system compares key features like eye spacing or cheek shape to a stored faceprint. It’s fast, contactless, and often more accurate than manual checks. People use it in banks, airports, and healthcare settings. Structurally, it works like this:...

Face identity search is a method that uses AI-powered facial matching instead of IDs or passwords. A system compares key features like eye spacing or cheek shape to a stored faceprint. It’s fast, contactless, and often more accurate than manual checks.

People use it in banks, airports, and healthcare settings. Structurally, it works like this:

Captures a face image

Extracts meaningful facial points

Creates and compares a faceprint

Outputs a match or no-match result

This technology offers quick and secure identity checks without needing physical tokens. You can even explore open-source projects like Recognito’s GitHub repository to see how developers are building practical tools with it.

 

Why Modern Systems Depend on AI-Driven Face Matching

Passwords and IDs can be lost or stolen. That’s why many systems now rely on biometric verification for better security, speed, and ease of use.

Benefits include:

Fast identity checks for crowds or busy queues

Higher accuracy than visual or document-based ID

Hands-free operation—no scanning or swiping cards

Scalable systems for millions of users

Studies show biometric tech is growing fast, with accuracy and adoption soaring across industries. Independent evaluations, such as the Face Recognition Vendor Test (FRVT), confirm which systems are the most reliable in real-world conditions.

 

How Independent Testing Sets the Gold Standard

Governments and businesses lean on NIST’s FRVT program to judge performance, fairness, and accuracy. This ongoing benchmark evaluates algorithms on speed, bias, and resilience to poor image quality. Full results are published openly, like in NIST’s FRVT 1:1 reports, which compare one-to-one verification across different vendors.

By using such public benchmarks, companies can pick technologies that are not only fast but also proven to be fair and secure.

 

Everyday Applications

This technology is no longer confined to research labs. It’s already part of daily life:

 

Security and Policing

Authorities use it to identify suspects in public areas. London’s police reported dozens of arrests in a single week of trial deployments.

Financial Services

Banks now let users unlock apps or approve payments by simply looking into the camera, improving both speed and trust.

Travel and Border Control

Airports in Singapore and the US speed up boarding by replacing paper tickets with biometric gates.

Healthcare

Hospitals deploy it to verify patient identities and reduce fraud in insurance systems.

Business and Retail

Companies use it for employee access, while retailers are testing it to create personalized shopping experiences.

 

Strengths and Weaknesses

Advantages

Quick and seamless compared to ID cards

Helps prevent fraud and identity theft

Improves user experience

Works at scale for large organizations

Challenges

Raises privacy concerns if misused

Accuracy can drop with poor image quality

Bias risk if systems aren’t trained on diverse datasets

Sensitive databases may attract hackers

The good news is that testing programs like FRVT are pushing the industry to improve. For example, error rates have fallen drastically as vendors adapt their algorithms to meet those standards.

The Future of Face Identity Search

Looking ahead, we’ll see this technology combining with other biometrics like voice and fingerprint for multi-factor security. Processing will also move to local devices using edge computing, making systems faster and less dependent on cloud storage.

Smart cities may integrate it for public safety, while businesses will use it to enhance customer experiences. As the technology matures, issues like bias and privacy will need strict regulation, but the potential is too strong to ignore.

 

Conclusion

Face identity search is reshaping how people prove who they are. From faster airport boarding to secure banking apps, it blends convenience with stronger protection. Independent testing programs, such as the FRVT run by NIST, ensure that the systems are fair, accurate, and ready for real-world use. The road ahead includes both challenges and opportunities, but its role in the future of digital identity is undeniable.

Recognito is helping lead the way in bringing this future closer

 

Frequently Asked Questions

 

What is face identity search?

Face identity search is a technology that scans and matches facial features with stored data to confirm identity. It’s widely used in banking, airports, and security systems.

How does face identity search work?

The system captures a face image, extracts unique points like eye distance or jawline, and creates a template. That template is compared with databases to confirm or deny a match.

Is face identity search safe?

It’s safe when managed properly. Trusted systems use encryption and comply with security standards, though privacy concerns exist if data is mishandled.

Where is face identity search used today?

You’ll find it in smartphone unlocks, airport boarding gates, online banking apps, and even healthcare systems that require quick patient verification.

What are the main advantages of face identity search?

It offers faster verification than ID cards, prevents fraud, improves user experience, and scales easily for large organizations.


Lockstep

Comparing Three Party and Four Party data verification models

Infostructure patterns One of the hottest topics in the digital economy has for some time been data sharing. Many proposals are evolving in Open Banking and Open Data, alongside digital identity frameworks and more specific digital credentialling. I’m seeing verifiable credentials methods and thinking leaning towards verified data. “Infostructure” is a term for the orchestrated... The post Compa
Infostructure patterns

One of the hottest topics in the digital economy has for some time been data sharing. Many proposals are evolving in Open Banking and Open Data, alongside digital identity frameworks and more specific digital credentialling. I’m seeing verifiable credentials methods and thinking leaning towards verified data.

“Infostructure” is a term for the orchestrated systems of policies, standards, rules, technologies and architecture that help control the use of important information.

Strikingly similar patterns are evident in the infostructures that have emerged in digital identity, open banking, card payments and digital credentialing. These patterns can help us solve the scaling problems that held back acceptance of digital IDs, and streamline the way we architect a number of important programs. It turns out that many of these programs are variations on a common theme.

The Standard Model of Digital Identity

The digital identity field has been dominated for twenty years by a supply-and-demand model featuring three types of participant: Subjects, Identity Providers (IdPs) and Relying Parties (RPs).

Technical standards, government policy, industry associations, businesses, and legislation have all been structured around this Three-Party model in which digital identities are “issued”, “held”, “presented”, “exchanged”, “used” and/or “consumed” as if these are a type of good.

The Standard Model has not gone well but we can look to a much older canonical data sharing model for help.

What’s holding back the digital identity market?

One huge historical challenge has been apportioning liability and allocating reasonable fees for digital identity services.  It’s never been really a clear in the standard three-party model of Digital Identity which parties gain the most economic benefit from assured qualities of the data they consume, and how do fees get fairly levied for these assurances.

This problem was solved over sixty years ago with the network business model of the credit card schemes. They realise a two-sided market of payment card issuers and merchants.  These are just special cases of ID Issuers and Relying Parties.

Credit card networks have one core job: distribute and verify customer IDs so that merchants can extend credit to customers without needing to know them, and moreover, without knowing the customers’ banks either.  That is, the networks join the credit providers (customers’ banks) to merchants without the merchants needing to make their own bilateral arrangements.

Don’t make this personal!

Another problem with traditional approaches to digital identity is they tend to over-complicate the problem, by framing it in terms of solving for “who someone is”.

Personal identity is complicated, hard to define, and impossible to standardise. In real life, “identity” means different things to different people. In transactional settings (where digital identity matters) each party needs to know different things about their counterparties, so a singular answer to “who you are” is fundamentally elusive.

On the other hand, if we reframe the digital identification problem around as What Do You Need To Know about a counterparty, and if we expect to address that question in different ways according to context, then the possible solutions look rather different from the traditional three-party model.

That is, let’s recognise digital identity as a special case of verified data sharing — and keep the personal out of it.

Generalising from Three Parties to Four

Lockstep has been working on a four-party data verification platform (DVP) architecture inspired by the credit card network model.  The DVP augments the traditional three players with a new fourth party that intermediates between Relying Parties and Issuers.

As I look at it, the awkward failures of Federated Identity (despite it seeming like such a great idea) shows that digital identity is not what we thought it was. But the tools and infrastructure that we’ve developed along the way can be repurposed.

It will be far more useful (and far less complicated) if we generalise digital identity frameworks from WHO to WHAT.

We should be issuing third party verifiable credentials to non-human Subjects (IoT devices, virtual agents, even AI algorithms themselves) to prove all the qualities and properties of interest. And to make these assertions legible and acceptable at scale, we need a new type of fourth party to intermediate between data sources and data receivers when these are at arm’s length from each other.

The fourth party onboards data receivers (just like acquiring banks onboard merchants into the card systems), executes a standard form of contract with them, and supports them with metadata (credential descriptors, accreditation information, public keys etc.).

The fourth party is the missing link in scalable systems of verifiable credentials.

Verifiable credentials cannot verify themselves. That is, the verification step requires essential metadata which need to be distributed to relying parties.  This metadata includes the public keys needed to cryptographically confirm the signatures on credentials and presentations. It also includes the names and target values of such things as credential issuers, credential types, accreditations etc. These are the critical details needed for relying party software to make programmatic decisions to accept or reject the data that it’s being presented with.

Comparing Three Party and Four Party models

The following tables compare several paragons of the two types of model.

The post Comparing Three Party and Four Party data verification models appeared first on Lockstep.

Friday, 05. September 2025

Anonym

How to stop your personal data from being used to train AI

Every year artificial intelligence (AI) is doing more, delivering better, and becoming faster. Apple says the AI revolution is “as big or bigger” than the internet, smartphones, cloud computing, and apps. Microsoft says AI technology will change every part of our lives. But our personal information is fuelling the AI revolution—and that presents massive AI […] The post How to stop your personal

Every year artificial intelligence (AI) is doing more, delivering better, and becoming faster. Apple says the AI revolution is “as big or bigger” than the internet, smartphones, cloud computing, and apps. Microsoft says AI technology will change every part of our lives. But our personal information is fuelling the AI revolution—and that presents massive AI privacy risks.

Without our consent, companies are scraping our personal information from across the internet and using it to train AI systems—and that’s just one way AI threatens personal privacy. Here we look at the long laundry list of AI privacy threats in 2025 and the tools you need to fight back.

12 AI privacy threats—and counting  

Everything we do generates data—and AI systems scrape, link together, and thrive off that data.

AI uses our information to both understand what we want from it and to perform its tasks. We give AI our data intentionally (e.g. by writing prompts containing personal details) and unintentionally (e.g. by being near facial recognition technology such as a Ring doorbell). 

But AI privacy and security threats don’t only stem from what we share with AI but also from how AI can analyze, infer, and act on that information without permission.Academics have identified at least 12 privacy risks from AI:

AI collects massive amounts of data from everywhere, increasing risks of surveillance. AI can harvest phone numbers, emails, and personal information and images from websites, social media, and public records. AI automatically links identity information across various data sources, increasing risk of personal identity exposure. Using pattern recognition, AI can match and correlate scraped data from scattered sources and readily knit it together into a clear profile of a person. When AI combines data about a person, it makes inferences from it, boosting the risks of privacy invasion. AI infers personality or social attributes from physical characteristics, potentially leading to bias and discrimination. AI repurposes data beyond its original intended use, further eroding user control. AI has opaque data practices which fail to inform and give users control over how their data is used. AI storage practices and data requirements risk data leaks and improper access. AI can reveal sensitive information, such as through generative AI techniques. AI’s ability to generate realistic but fake content makes it easier to spread false or misleading information. AI can cause improper sharing of data when it infers additional sensitive information from raw data. AI makes sensitive information more accessible to a wider audience than intended. AI technologies invade personal space or solitude, often through surveillance measures.

One rapidly growing impact of AI data gathering is targeted scams and phishing. AI makes fraud more convincing by using readily available personal data to tailor attacks. AI-generated voice deepfakes, and deepfake texts, emails and web sites promoting fake products, deals and giveaways are part of the highest reported form of scam, according to the FTC.

Artificial intelligence (AI) is the ultimate data broker

If you think about it, AI is the ultimate data broker.

Data brokers are companies that harvest, manipulate and even misrepresent consumer data and sell it to companies, usually for marketing. Data brokers are legitimate but unregulated businesses, there are about 4,000 of them worldwide, and their industry is worth about US $200 billion annually. The largest data brokers, such as Acxiom, have tens of thousands of servers collecting and analyzing thousands of data points per person from hundreds of millions of consumers globally.

AI systems basically do the same thing—and in turn data brokers are using AI to boost their success rate and profit margins. According to the Bureau of Investigative Journalism, “a rapidly growing industry has also sprung up to broker training data to AI companies with more niche requirements. Some of the datasets you can buy on this marketplace include images of conflict, protest crowds, adult content, audio datasets of recorded phone conversations on various topics, and social media posts classified by the sentiment they express.”

Auto opt-in to AI training is a big issue

A recent deep dive into how to stop AI from getting its bots on your personal data by The Guardian says default opt-ins are an industry-wide issue. It says a recent report by the FTC on the data practices of nine social media and streaming platforms including WhatsApp, Facebook, YouTube and Amazon “found that nearly all of them fed people’s personal information into automated systems with no comprehensive or transparent way for users to opt out.” The article gives instructions for opting out of the major platforms but warns it’s not easy.

Wired ran a similar article on how to opt out of AI training and covered more platforms including Figma, Adobe, Grammarly, Google Gemini, LinkedIn and loads more.

The article also has instructions but warns consumers to be realistic about the fact that the horse has already bolted.

“Any companies building AI have already scraped the web, so anything you’ve posted is probably already in their systems. Companies are also secretive about what they have actually scraped, purchased, or used to train their systems,” the Wired guide notes.

How to protect your personal information from AI

You can use The Guardian and Wired’s instructions for removing your data from AI training on all the major platforms, but there’s an easier strategy going forward: don’t expose your personal information in the first place. How do you do that? Use MySudo, MySudo Reclaim, and the rest of the MySudo suite. And note: this strategy for protecting your personal information from AI is the same strategy you’d use to protect your personal information from the surveillance capitalism machine that is big tech and others that profit from your personal data (even your bank!).

How MySudo protects your personal information from AI

MySudo is a privacy app that gives you up to 9 separate Sudos—secure digital profiles with phone, email, and payment cards to use instead of your own. Anywhere you would usually give your personal details, give your Sudo details instead.

Each Sudo has: 1 customizable phone number* 1 email address 1 virtual card* 1 private browser 1 handle**

In the AI era, Sudos are powerful because they:

Separate your identity from your activity:Each Sudo is compartmentalized. If you use one for online shopping, another for dating apps, and another for networking, for example, AI scrapers can’t easily link them together and build a profile on you. Limit your exposure: Instead of sharing your real phone number and email all over the internet, you share your alternative Sudo details, which breaks your data trail. Offer strong security: You can use a dedicated Sudo number for 2FA and account recovery, keeping your real number out of the databases that AI systems analyze.

What’s more, MySudo is an immediate safeguard for you and your family against voice deep fakes like the popular grandparent scam. To protect yourself:

Set up a Sudo and assign it a phone number that you only ever give out to your closest family and friends. Be diligent about only giving out the number to your loved ones so that you build and protect a trusted communication channel with your inner circle. If you have only carefully shared the Sudo number with those you trust, then you’ll know if that number rings, it’s a legitimate communication from within your circle and not a deepfake scammer impersonating you or your loved ones. If you’ve been diligent in protecting your safe Sudo number, it is very unlikely a criminal would have it. Invite your family and friends to use MySudo and use the app’s phone numbers or handle-based end-to-end encrypted calling to communicate with each other.

How MySudo Reclaim adds another layer of protection

The MySudo suite includes the MySudo app’s companion product, MySudo Reclaim, which helps you take back your personal data that AI systems mine (and bad actors can use for scams with or without AI).

MySudo Reclaim helps by:

Helping you to identity where your data is being held. Monitoring continuously to make sure your details don’t reappear or pop up anywhere else. Reducing the raw material AI can use to track, profile, or impersonate you.

By cutting your data off at the source, MySudo Reclaim ensures there’s less for AI—and bad actors—to exploit.

Why you need both MySudo and MySudo Reclaim to protect against AI privacy risks

Together, MySudo and MySudo Reclaim provide a two-pronged defense against AI-driven privacy risks:

MySudo prevents new exposure of your information by giving you secure, alternative phone numbers, email addresses, and virtual cards, which you can compartmentalize by Sudo (e.g. one for shopping, dating, networking, travel etc.), breaking your data trail and making it difficult to profile you. MySudo Reclaim cleans up your existing digital footprint by removing personal data from public access.

The result? Less exposure, less linkage, and more control over how your personal data exists in an AI-driven world. The horse might have bolted for AI data use, but you can have a second chance at digital privacy with MySudo and MySudo Reclaim.

Download MySudo

Try MySudo Reclaim

Explore the MySudo suite

Learn more on our blog

You might also like:

4 Ways MySudo Email is Better than Masked Email

How to Get 9 “Second Phone Numbers” on One Device

The Shocking Facts our CEO told Naomi Brockwell About Cell Phones

* Phone numbers and virtual cards are only available on a paid plan. Phone numbers available for US, CA and UK only. Virtual cards for US only. ** Handles are for end-to-end encrypted comms between app users.

The post How to stop your personal data from being used to train AI appeared first on Anonyome Labs.


HYPR

Making Self-Service Password Reset and Account Recovery Secure

Self-service password reset (SSPR) and self-service account recovery (SSAR) are essential for reducing IT workload and empowering users. However, these solutions, if not implemented securely, can become an organization's biggest security hole. Up to 50% of all IT help desk tickets are for password resets, costing approximately $70 each. While SSPR and SSAR aim to solve this, traditional

Self-service password reset (SSPR) and self-service account recovery (SSAR) are essential for reducing IT workload and empowering users. However, these solutions, if not implemented securely, can become an organization's biggest security hole. Up to 50% of all IT help desk tickets are for password resets, costing approximately $70 each. While SSPR and SSAR aim to solve this, traditional methods are often fundamentally broken, leaving organizations vulnerable to costly account takeovers.

What Are SSPR and SSAR?

SSPR and SSAR are self-service features that allow users to reset their passwords or recover access to their accounts without needing help from an IT professional. While this can drastically cut operational costs and reduce help desk tickets, it introduces a significant security issue.

Definitions and Business Use Cases:

SSPR (Self-Service Password Reset): Allows users to reset a forgotten password without IT intervention. SSAR (Self-Service Account Recovery): Enables users to regain access to a locked or compromised account on their own. The Risk of Traditional Recovery Methods

Traditional SSPR and SSAR solutions rely on methods that are easily exploited by attackers, turning a convenience into a major security vulnerability. These gaps leave organizations open to account takeover (ATO) and social engineering.

Security questions: Easily guessed or found online through social engineering, making them a weak form of authentication. SMS/email OTPs: Susceptible to phishing and SIM swaps, where attackers can intercept the codes sent to a user's device. Authenticator apps: Can be bypassed with "push bombing" attacks or rendered useless if a user loses or replaces their device. Why Identity Verification Is Critical

Verifying a user's identity before granting access is the only way to ensure security during password resets or recovery. Modern solutions use a multi-factor identity verification (IDV) process that combines document scanning with liveness detection to confirm that a real, present person is requesting access.

The Modern SSPR Challenge: Uniting Security and Simplicity

Effective account recovery presents a difficult challenge: how do you balance the need for absolute security with the user's demand for a fast, simple experience? Traditional methods often fail this test. A lengthy call to a help desk might be secure, but it creates frustration and high operational costs. Conversely, a simple security question is easy for the user but offers almost no real protection against a determined attacker.

The ideal solution is an intelligent, adaptive flow that can orchestrate multiple signals of identity. It should be able to create a recovery path that is appropriate for the level of risk, making the process frictionless for legitimate users while presenting insurmountable barriers for fraudsters.

This modern approach moves beyond simple checks to a holistic verification of a user's identity, ensuring that convenience and security are no longer a trade-off.

The HYPR Affirm SSPR/SSAR Flow

HYPR Affirm is a secure, self-service solution that solves the paradox of traditional SSPR and SSAR. It eliminates the vulnerabilities of legacy methods by using a robust, multi-layered identity verification process.

Here’s how Affirm verifies the user at each step:

User Initiates SSPR/SSAR: The process begins when the user requests a password reset or account recovery from the login screen or a dedicated service portal. Phone number, Location Check: This includes phone number verification to confirm possession, along with checks on geographic location to identify anomalies. ID Document Scan and Selfie Liveness Check: The user is prompted to scan a government-issued photo ID (like a driver's license or passport). HYPR then performs a certified liveness check with a selfie to confirm the user is physically present, preventing deepfake and presentation attacks in compliance with NIST standards. Automated Verification & Intelligent Escalation: The system instantly cross-references all identity data points to make a verification decision. If the evidence is conclusive, the user is approved. If the risk signals are uncertain, the flow can be automatically escalated to a secure manager or help desk agent chat or a live video call for final, human-assisted verification. Phishing-Resistant Credential Reset: Once fully verified, the user securely completes their password reset or account recovery, establishing a new, phishing-resistant credential for safe, ongoing access.

Conclusion Traditional SSPR/SSAR methods are not secure and can lead to costly account takeovers. Multi-factor identity verification is the most effective way to secure the recovery process. HYPR Affirm replaces vulnerable methods with a seamless, secure flow that cuts costs and reduces risk. FAQs

Q: How does HYPR Affirm prevent deepfake attacks? A: HYPR Affirm uses a certified liveness check that analyzes the user's selfie in real-time to ensure they are a physically present person, not a deepfake or a static photo.

Q: Can HYPR Affirm be used with different types of IDs? A: Yes, HYPR Affirm is designed to work with various government-issued photo IDs, such as driver's licenses and passports.

Q: What is the cost benefit of using HYPR Affirm? A: By reducing help desk tickets for password resets and account recovery by up to 95%, HYPR Affirm can drastically cut operational costs for organizations.

Related Resources  The Self-Service Paradox: Securing Password Reset Multi-Factor Authentication (MFA) vs. Phishing-Resistant MFA How to Implement a Secure SSPR Solution

Indicio

Five sessions not to miss at Identity Week America

The post Five sessions not to miss at Identity Week America appeared first on Indicio.
Identity Week is the place to learn about the latest in identity technology. Whether you are attending on behalf of a large enterprise, government agency, or small business, this is your chance to see what others are doing and what is coming next in the industry. Here are just a few sessions that Indicio is most excited about.

By Tim Spring

The Startup Pitch Competition (Day 2, Seminar Theater A, 12:50 – 2:50)

The startup pitch competition brings together 10 startups that have impressed the judges with their applications and technologies. This is your chance to evaluate up and comers in the space and ask questions about their products and services. With each competitor having only seven minutes to pitch and three  minutes for questions, this session moves fast and keeps things lively as you get a sneak peek at tomorrow’s tech. Be sure not to miss Indicio’s CEO Heather Dahl as she takes the stage at 1:25 to pitch Indicio and explain how our authenticated biometrics and verifiable credentials solution will save the world!

Digital IDs at a national scale (Day 1, Seminar Theater B, 3:00)

Mohamed Al Kuwaiti, Head of Cybersecurity, Cyber Security Council
David Almirol, Undersecretary for e-Government, Department of Information and Communication Technology
Moderator:
Scott Rea, Chief Operating Officer, CertiNext

The most important identity that most of us have is the one issued to us by our government, usually through a physical document like a driver’s license or passport. This panel brings together leaders from the United Arab Emirates and the Philippines who have both implemented digital national identities to learn more about their experiences and what the rest of the world can learn from their solutions. Our team is particularly interested in hearing about the benefits their citizens have realized, each government’s strategy for building trust and privacy, and their future plans for interoperability between their national systems and other countries.

Digital identity at the border: What it means for you, me, and global travel (Day 2, Theater 1, 11:50)

Michael Zureik, Head of Ecosystem Partnerships – Digital Travel, SITA

Verifiable Credentials containing authenticated biometrics enable “government-grade” digital identities. These can be used for preauthorized travel and seamless border crossing, transforming international travel. SITA’s Michael Zuriek explains the evolution of this technology, how it’s needed to meet the current and projected growth in international travel, how it benefits airlines, airports, governments, and travelers — and how crossing the border is only the start of the traveler’s digital identity journey.

Fighting fraud: Assessing the state of play across the fraud landscape (Day 1, Theater 3, 2:20)

Chris Skowronek, Dr. Solutions Engineering, Vonage
Raphael Tsow, Sr. Director, Identity and Risk Engineering, Ebay
Christian Guirnalda, Senior Director Network API Innovation, Verizon
Jon Prisby, Lead Biometric and Identity Technology Center, DHS S&T
Moderator:
Maria Karamalis, CEO/President, Karamalis Consulting LLC

Fraud is surging with identity-based attacks displacing malware as the critical vector of attack. Boosted by brute force attacks using AI tools and by the rise of sophisticated  generative AI deepfakes, it has never been easier to steal or impersonate someone’s identity. This session will discuss the most promising  strategies to combat fraud, how AI innovations are both enabling and preventing fraud, and how to better educate and protect the public. Our team is interested in hearing their thoughts as Indicio’s recent combination of authenticated biometrics in Verifiable Credentials presents a powerful way to prevent account phishing and synthetic identity fraud and bypass deepfakes.

Human-centered, business-ready: AI for smarter identity decisions (Day 2, Seminar Theater B, 1:30)

Arif Mamedov, CEO, Regula Forensics Inc.

Here’s the pitch from Regula Forensics CEO Arif Mamedov: “AI is transforming identity verification, but it is not magic. When used without context or proper control, even advanced systems can mislead. This session explores what makes AI truly effective in high-stakes identity workflows, from airports to banking. Drawing on Regula’s decades of forensic expertise, we will share how explainable logic, human-in-the-loop design, and well-defined boundaries lead to reliable, scalable business results – without relying only on automation.”  Count us interested!

Talk to Indicio at the conference

If you will be at the conference and would like to set up a time to talk with Heather or a member of our team one on one you can stop by booth S43 or reach out to our team here to coordinate a meeting.

If you would like to attend Identity Week but don’t already have a ticket please get in touch and our team can help get you a guest pass.

The post Five sessions not to miss at Identity Week America appeared first on Indicio.


Ontology

WHY THE ONTOLOGY NETWORK EXISTS

Building Trust In The Decentralized Era In a world that is rapidly moving towards decentralization, one question continues to dominate the conversation: how do we build trust when intermediaries disappear? This is the challenge that gave birth to Ontology Network a high performance, open source blockchain designed not just for speed or scalability, but for trust, identity, and data sovereignty.
Building Trust In The Decentralized Era

In a world that is rapidly moving towards decentralization, one question continues to dominate the conversation: how do we build trust when intermediaries disappear? This is the challenge that gave birth to Ontology Network a high performance, open source blockchain designed not just for speed or scalability, but for trust, identity, and data sovereignty.

The Problem: Trust in the Digital Age

The internet has connected billions, yet it has also created a paradox while information flows freely, trust remains scarce. Every time we log in, share data, or engage in digital transactions, we are forced to rely on centralized platforms. These platforms act as the gatekeepers of identity, data, and reputation.

But this centralization comes at a cost:

Data exploitation by corporations who monetize personal information.

Single points of failure that expose users to breaches, hacks, and censorship.

Lack of digital sovereignty, where individuals cannot truly own or control their digital identities.

Clearly, the digital future requires a new framework one that puts people, not platforms, at the center.

The Vision of Ontology

Ontology Network was created to answer this need. Its existence is grounded in one simple but transformative idea: trust should be decentralized, verifiable, and user owned.

By combining high-speed blockchain infrastructure with decentralized identity (DID) and data solutions, Ontology gives individuals and enterprises the ability to:

Own their identities across multiple platforms without relying on a central authority.

Control their data and decide who can access it, when, and for what purpose.

Transact securely and transparently, with trust anchored in cryptography rather than third parties.

Why The Ontology Network Exists

Ontology exists because the future of the internet demands more than just financial decentralization. While many blockchains focus primarily on tokenization and DeFi, Ontology focuses on the foundations of digital society: who we are, how we prove it, and how we interact.

Here’s what sets Ontology apart:

1. Decentralized Identity (ONT ID): A framework where individuals own their identity credentials and can use them anywhere.

2. Data Sovereignty: Instead of handing over your data to corporations, you control, share, and even monetize it on your own terms.

3. Enterprise Ready Infrastructure: Ontology provides the scalability and tools businesses need to integrate blockchain trust into their services.

4. Interoperability: Ontology is designed to work across chains, ensuring that identity and data can move freely across the Web3 ecosystem.

The Bigger Picture

Ontology doesn’t just exist to solve today’s problems. It exists to shape tomorrow’s digital world a world where:

Healthcare records belong to patients, not hospitals.

Educational achievements are verified and portable across borders.

Financial inclusion becomes a reality, as people without banks can still build verifiable reputations.

Communities thrive on trust that is algorithmically provable, not institutionally enforced.

CONCLUSION

The Ontology Network exists because trust is the currency of the future, and the way we build and verify that trust must evolve. By enabling decentralized identity, data sovereignty, and interoperable trust frameworks, Ontology is laying the foundation for a digital world that is more secure, transparent, and human centric.

The internet of the past belonged to corporations.
The internet of the future belongs to us.
And Ontology is here to make that future possible.

WHY THE ONTOLOGY NETWORK EXISTS was originally published in OntologyNetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


Dock

How to Create Government-Issued Digital Identities using Truvera [Demo]

Most interactions with local government still rely on paper forms, manual checks, and brittle PDFs. In this demo, Richard Esplin (Head of Product at Truvera) shows how a city can issue a digital residency credential and then use it to verifyeligibility across departments—from getting

Most interactions with local government still rely on paper forms, manual checks, and brittle PDFs. In this demo, Richard Esplin (Head of Product at Truvera) shows how a city can issue a digital residency credential and then use it to verifyeligibility across departments—from getting a library card to scheduling trash pickup—using verifiable credentials.

The front end for this proof-of-concept was spun up in an afternoon with an AI code generator, while Truvera handled issuance, verification, selective disclosure, revocation, and ecosystem governance. 

Watch the video above to see how easily digital IDs can slot into existing workflows.


How to Create Digital Verifiable Certificates with Truvera [Demo]

Managing and verifying professional certificates is still stuck in the paper era: paper documents are slow, insecure, and easy to fake. Digital PDFs aren’t much better — they can be forged, misplaced, or become outdated as soon as someone changes jobs. That’s where verifiable credentials come

Managing and verifying professional certificates is still stuck in the paper era: paper documents are slow, insecure, and easy to fake. Digital PDFs aren’t much better — they can be forged, misplaced, or become outdated as soon as someone changes jobs.

That’s where verifiable credentials come in. In this demo, Richard Esplin (Head of Product at Truvera) shows how fast and simple it is to build a credential issuance and verification solution using the Truvera platform. In just an afternoon, our team put together a proof of concept for issuing and verifying safety training certificates.


iComply Investor Services Inc.

AML and KYB for Commercial Lenders: Enabling Compliance Across Borders

Lenders face growing AML demands for business onboarding and UBO checks. This guide shows how iComply helps automate compliance and accelerate decision-making across jurisdictions.

Commercial lenders face heightened global AML expectations, especially around KYB, UBO verification, and ongoing monitoring. This article outlines key obligations across the U.S., UK, Canada, EU, and Australia—and how iComply helps automate compliance for business loan onboarding and risk management.

Commercial lenders – from banks to fintech platforms to leasing companies – are under increasing pressure to validate the legitimacy of the businesses they serve. Regulators worldwide now expect lenders to implement robust know-your-business (KYB) procedures, identify beneficial owners (UBOs), and monitor ongoing risk across their business lending portfolios.

With varying standards across borders and complex corporate structures at play, automation is no longer optional – it’s essential.

AML and KYB Expectations for Lenders United States Regulators: FinCEN, OCC, FDIC, state banking departments Requirements: BOI reporting under the Corporate Transparency Act, CDD Rule compliance, SAR filings, and sanctions screening United Kingdom Regulator: FCA, PRA Requirements: KYB, UBO verification, transaction monitoring, and enhanced due diligence (EDD) for high-risk entities Canada Regulator: FINTRAC Requirements: Business client verification, beneficial ownership discovery, ongoing monitoring, and STRs for suspicious transactions European Union Regulators: National regulators under AMLD6 framework Requirements: KYB and UBO collection, EDD for complex structures, and real-time transaction tracking Australia Regulator: AUSTRAC Requirements: AML/CTF compliance for non-bank lenders, UBO transparency, and reporting obligations for high-value transactions Lending-Specific Risk Factors

1. Opaque Business Structures
LLCs, trusts, and holding companies often obscure real ownership.

2. High Application Volume
Manual KYB checks don’t scale with demand.

3. Evolving Regulatory Standards
CTA in the U.S., EU AMLA rollout, and FATF alignment create shifting expectations.

4. Loan Fraud and Misuse of Funds
Inadequate checks can lead to reputational damage, defaults, and penalties.

How iComply Supports AML in Lending

iComply provides a configurable platform that simplifies KYB, UBO discovery, and AML monitoring for commercial lenders.

1. Streamlined KYB Onboarding Verify legal entities through registry and document checks Identify directors, shareholders, and authorized signatories Localized workflows and multilingual support 2. Beneficial Ownership Mapping Visual UBO trees across jurisdictions Automated detection of nominee owners and shell structures Apply configurable thresholds for deeper review 3. AML and Sanctions Screening Real-time screening of businesses and individuals against global watchlists Continuous monitoring with refresh cycles and trigger-based reviews Risk scoring by industry, geography, and transaction patterns 4. Case Management and Reporting Unified dashboard for all onboarding and screening activity Audit-ready logs and regulatory export templates (FinCEN, FCA, AUSTRAC, etc.) Track escalations, reviews, and resolution timelines Case Insight: SME Lender in the UK

A UK-based lender adopted iComply to digitize business borrower onboarding. Within 6 weeks:

Cut average application processing time by 45% Flagged 3 UBO anomalies across high-value applicants Passed an FCA review of UBO verification procedures and audit trails Final Word

Commercial lenders must scale responsibly. Those who embrace KYB automation now can:

Reduce onboarding friction Improve risk visibility Meet cross-border AML expectations with confidence

Talk to iComply to see how we help lenders automate 90% of compliance tasks—so your team can focus on building relationships, not chasing paperwork.


FastID

Powering PyPI with Advanced Traffic Engineering

PyPI serves millions daily. See how Fastly’s Individual Provider Anycast unlocks faster, smarter routing for Python’s package index.
PyPI serves millions daily. See how Fastly’s Individual Provider Anycast unlocks faster, smarter routing for Python’s package index.

Thursday, 04. September 2025

liminal (was OWI)

Why Ransomware Prevention Needs Intelligence, Not Just Defense

Ransomware is evolving faster than defenses. See why intelligence-driven ransomware prevention is essential for enterprises in 2025. The post Why Ransomware Prevention Needs Intelligence, Not Just Defense appeared first on Liminal.co.

Ransomware prevention is no longer about defense alone. It’s a Monday morning at a global consumer bank. Customers logging into online banking suddenly can’t access their accounts. Behind the scenes, ransomware has encrypted core systems and stolen millions of customer records. The attackers aren’t only demanding payment to restore access, they’re also threatening to release personally identifiable information (PII), exposing customers to fraud and the bank to severe regulatory penalties. This isn’t a nightmare scenario, but the reality that many financial institutions are already facing. According to the Link Index for Ransomware Prevention (2025), ransomware incidents are rising year-over-year in the financial services sector, with projected damages exceeding $30 billion annually by 2026. The Link Index echoes findings from Cybersecurity Ventures, which identify ransomware as one of the fastest-growing forms of cybercrime worldwide, with a new attack occurring every two seconds as perpetrators refine their malware payloads and extortion tactics.

What is Ransomware?

The Link Index defines ransomware as malicious software that encrypts or steals an organization’s data and demands payment for its return or release. Once considered a technical nuisance, ransomware has become a systemic cyber risk impacting industries from financial services to healthcare.

Types of Ransomware Attacks Encryption-based ransomware: Locks critical systems until ransom is paid. Double extortion: Combines encryption with data theft, threatening to publish sensitive data if payment is refused. AI-enabled ransomware: Accelerates the threat further, mutating payloads faster than defenders can respond. Why Traditional Defenses Fail

The Link Index highlights a persistent reliance on backups, endpoint detection (EDR), and extended detection and response (XDR) that are proving inadequate:

Backups no longer guarantee resilience, since stolen data can still be weaponized for extortion. EDR/XDR tools overwhelm analysts, with over 40% of ransomware alerts flagged as false positives in some enterprises.

These findings are reinforced by IBM and Ponemon Institute, which identify alert fatigue as one of the costliest inefficiencies for enterprise security teams. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) echoes this challenge, noting in its #StopRansomware Guide that traditional defenses often fail against modern double extortion and data destruction tactics.Perhaps most concerning: defenses can’t keep up with the speed of ransomware evolution. By the time a signature is written, AI-enabled ransomware variants like LockBit 3.0 and BlackCat have already mutated, leaving enterprises one step behind.

The Stakes Are Rising

According to Liminal’s research, the top drivers of enterprise adoption for ransomware prevention solutions are regulatory pressure, insurance mandates, and operational continuity. These forces are intensifying across global markets.

Top buyer adoption drivers for ransomware prevention solutions Regulatory Pressure: In the U.S., the SEC now requires public companies to disclose material cyber incidents on Form 8-K. In Europe, the EU NIS2 Directive enforces similarly strict resilience standards. Insurance Mandates: The Link Index found that insurance mandates rank among the top three adoption drivers, with industry leaders like Marsh confirming stricter underwriting standards. Operational Continuity: Downtime remains one of the most critical financial risks. Studies show a single day of ransomware downtime can cost enterprises $1M per day (ITIC via ransomware.org).

For broader strategies around managing supplier and insurer demands, see the Link Index for Cybersecurity Third-party Risk Management.

“We’re seeing ransomware shift from being an IT headache to a full-blown business crisis. The data shows damages climbing past $30B by 2026, and the old playbook of backups and detection just isn’t enough anymore. Enterprises need intelligence-first prevention to stay ahead.”— Jonathan Gergis, Insights Team Lead, Liminal

The Solution: How Intelligence-Driven Ransomware Prevention Works

The Link Index identifies a decisive shift toward intelligence-driven prevention as the new enterprise standard. Rather than waiting for alerts, enterprises are adopting solutions that:

Correlate weak signals across endpoints, cloud, and networks. Apply behavioral analytics to detect credential abuse and lateral movement. Provide real-time business context to analysts for decisive action.

This shift is visible in the market. Vendors are retooling product roadmaps to deliver ransomware-specific intelligence capable of detecting advanced variants like LockBit and BlackCat. Importantly, 63% of CISOs surveyed in the Link Index now rank intelligence-first ransomware prevention above legacy tool upgrades. This trend is echoed by Gartner, which emphasizes that behavioral detection and intelligence-driven strategies must replace signature-based tools.

Leading security vendors are already pivoting toward this model:

Microsoft has embedded ransomware-specific intelligence into its Defender platform. CrowdStrike has expanded its Falcon platform to correlate signals across endpoints and cloud. Palo Alto Networks is retooling its Cortex suite to emphasize prevention through behavioral analytics and automated response.

These shifts reflect a broader industry recognition that traditional defenses cannot keep pace with AI-enabled ransomware variants.

For broader strategies around managing AI Data Governance, see the AI Data Governance Link Index.

What CISOs Should Do Now

CISOs looking to strengthen resilience against ransomware should prioritize intelligence-first strategies. Key actions include:

Build cross-platform intelligence pipelines to unify data across endpoints, cloud, and network environments. Validate vendor claims by demanding proof of real-time ransomware variant detection, not just signature-based defenses. Update incident response playbooks to address modern double extortion scenarios. Align prevention strategies with regulations like the SEC’s cyber disclosure rules and the EU’s NIS2 Directive, ensuring compliance and insurer coverage. Invest across five prevention categories from the Ransomware Prevention Link Index: endpoint protection, backup and recovery, identity security, detection and response, and email/web security.

By embedding these practices into a unified, intelligence-driven prevention framework, enterprises can reduce reliance on reactive defenses and build resilience that meets both regulatory scrutiny and insurance mandates.

Key Takeaways $30B in annual ransomware damages by 2026 (Link Index). Traditional defenses fail against AI-enabled ransomware like LockBit 3.0 and BlackCat; false positives drain analyst resources. Intelligence-driven prevention is the new enterprise standard: signal correlation, behavioral analytics, and real-time context. Regulatory, insurance, and financial pressures SEC, EU NIS2, and leaders like Marsh, are accelerating adoption. CISOs must act now: align strategies with regulations and insurance standards while investing in intelligence-led prevention.

For deeper insights and data, access the full Link Index for Ransomware Prevention (2025) via Link.

The post Why Ransomware Prevention Needs Intelligence, Not Just Defense appeared first on Liminal.co.


ComplyCube

The CryptoCubed Newsletter: August Edition

Sit tight as we welcome you back to the latest edition of CryptoCubed. From Ripple Lab's high-stakes lawsuit to President Trump's executive orders, the crypto scene is buzzing with drama. Read on to learn more latest crypto news. The post The CryptoCubed Newsletter: August Edition first appeared on ComplyCube.

Sit tight as we welcome you back to the latest edition of CryptoCubed. From Ripple Lab's high-stakes lawsuit to President Trump's executive orders, the crypto scene is buzzing with drama. Read on to learn more latest crypto news.

The post The CryptoCubed Newsletter: August Edition first appeared on ComplyCube.


PingTalk

Trust at the Speed of Innovation: How Digital Identity Is Transforming Financial Services in ASEAN and ANZ

Discover how digital identity is reshaping financial services across ASEAN and ANZ. Learn how banks are fighting fraud, enabling seamless payments, and driving inclusion—at scale, with trust.

Across the Association of Southeast Asian Nations (ASEAN), including mature economies like Singapore and Malaysia, and high-growth markets like Indonesia, Vietnam, and the Philippines, as well as in Australia and New Zealand (ANZ), the future of finance is being written in real time. From Jakarta to Sydney, Bangkok to Wellington, financial institutions are embracing rapid digitization. Regulatory reform, fintech competition, rising fraud threats, and shifting consumer expectations are all pushing the industry to evolve rapidly.

 

But in this rush to innovate, success is no longer just about launching the next digital wallet, cashless payment option, or open banking Application Programming Interfaces (API). It’s about trust.

 

To grow and scale in today’s connected economy, financial services organizations must continuously prove who a customer is, whether a transaction is safe, and how data should be shared. That’s where digital identity, or identity and access management (IAM) comes in. Digital identity is not simply a technical enabler - it’s the connective tissue between trust, innovation, security, and scale. And across ASEAN and ANZ, it’s increasingly being recognized as the foundational capability that determines how, and how fast, financial services can evolve.

 

Wednesday, 03. September 2025

Extrimian

How to Protect Students Data: Digital Diplomas & Credentials

Your diploma, on your phone: a student-first guide to secure digital credentials Who this is for: students (and anyone helping students—career services, program leads, registrars) Promise: zero paper chase, faster opportunities, more privacy—without you learning any tech. TL;DR (read this if you’re between classes) Show proof in seconds. Instead of digging for PDFs or waiting […] The post How to
Your diploma, on your phone: a student-first guide to secure digital credentials

Who this is for: students (and anyone helping students—career services, program leads, registrars)
Promise: zero paper chase, faster opportunities, more privacy—without you learning any tech.

TL;DR (read this if you’re between classes) Show proof in seconds. Instead of digging for PDFs or waiting on office emails, you share a secure link or QR from your phone. Employers, scholarships, other schools—everyone gets a clear yes/no instantly. You control your info. Share only what’s needed (e.g., “enrolled this term” or “degree awarded”). No oversharing, no surprises. Built for real life. Lost your phone? Credentials can be re-issued. Name spelled wrong? They can revoke and fix fast, and verifiers always see the latest version. AI-first for safety. Extrimian uses AI to protect your identity and speed up university workflows—not to snoop on you or cut corners.

Why should you care (today, not “someday”)?

Scholarships and benefits need status now, not next week. Many proofs are simple: “Is this student currently enrolled?” Your enrollment credential answers that without dumping your full transcript. Fewer forms; faster yeses.

Study abroad and transfers are smoother. Another school can confirm a course completion or degree without emailing five offices. You share once; they verify independently; your application keeps moving.

Privacy actually improves. You don’t have to forward ancient PDFs that reveal way too much. With a digital credential, you show the minimum required—and only when you choose.

You always have it with you. Your phone already holds tickets, payments, and boarding passes. Your diploma and key proofs belong there too—secure, portable, ready when opportunity calls.

How it works—without the nerd talk

Think of each credential (your diploma, enrollment status, course badge) as a sealed envelope with your university’s unique stamp.

If someone opens it and changes even a line, the stamp breaks, and the checker immediately says Not valid. Extrimian provides the stamp (digital signature), the envelope (the credential in your wallet), and the counter window (the university’s one-page verification site) where anyone can check it—no emails, no guessing.

You don’t manage keys, blockchains, or any of that. You just receive, store, and share—and it works.

 

Real moments you’ll use it (and how it feels) 1) “Can you prove you actually graduated?”

You tap Share diploma, send a link or show a QR. The recruiter scans and sees: Valid — Degree: [Your Degree], Issuer: [Your University], Date: [Month/Year]. Done. No PDF edits, no “I’ll pass it to my manager,” no waiting.

2) “We need proof you’re enrolled for this semester.”

You share Enrollment: Current Term. It shows exactly that—and nothing else. If your status changes, the old credential is revoked and anyone who checks it sees that it’s no longer valid.

3) “Upload a course completion for credit transfer.”

You share a verifiable course credential that confirms you passed the class. The other school verifies it themselves and moves on to the next step. Less paperwork, fewer delays.

4) “Student discount—show ID?”

You present a student ID credential. The vendor or campus service scans and gets a simple Yes without seeing your grades, address, or anything personal they don’t need.

5) “Oh no, I lost my phone…”

If you lose your device, you tell the university. They revoke the old credentials and re-issue to your new device after confirming it’s you. The verification page always shows the latest truth, so you’re covered.

6) “There’s a typo on my diploma.”

It happens. The registrar revokes the old one and re-issues a corrected credential. Anyone who checks the old link sees “Revoked,” and the new link shows your accurate details. No awkward explanations.

Your data, your call (how privacy works in plain language) Share the minimum. Many checks only need a yes/no on a specific fact (enrolled, degree awarded, course completed). Your credential can provide just that. You choose when to share. Nothing leaves your wallet until you decide to present it. You’re in the driver’s seat. It’s obvious if someone tampers. If a file is altered, the verification fails immediately. You don’t have to argue; the page tells the truth. Clean history for you. When a credential is revoked and re-issued (e.g., to fix a typo), everyone sees the updated version at the same link. No “which PDF is the latest?” chaos. Get started in 3 easy steps (what you’ll actually do) Receive your credential.
When your university turns this on, you’ll get instructions to add a wallet (mobile or web) and receive your diploma/enrollment credentials securely. Keep it safe.
Set a PIN or biometric lock for the digital identity wallet (Face ID, fingerprint). If you change phones, you’ll have a simple way to recover or re-issue with university support. Share when needed.
For scholarships, or transfers: open the wallet → Share → send link or show QR. The other side gets a clear answer in seconds, and you keep control.

See a real live demo here from UAGRO, one of our succesfull cae studies: UAGRO – Students Credentials & Digital ID Wallet Demo

University Secure Identity & Data

FAQ about verified digital diplomas: Can I still get a paper diploma?

Yes, if your university offers it. The digital version is the official way to prove authenticity online—and you can even print a QR on the paper diploma that points back to it.

Do I need the internet to show it?

You can open your wallet and show the QR; the verifier needs a connection to check the status. If you’re somewhere with poor signal, you can share the link later. Many events now have scanners or staff with connectivity.

What if I don’t want to share my grades?

You don’t have to. Most checks only need a degree or enrollment. Share the minimum required for the situation.

What if something’s wrong on my credential?

Ask the registrar to revoke and re-issue. You’ll get the corrected one quickly, and anyone using the old link will see it’s no longer valid. No awkward “ignore my last attachment” moments.


Which benefits this tech offers to student & clubs Club badges and event passes: your university may issue digital badges for roles or events. They’re easy to share with sponsors or include in portfolios. Volunteering & labs: log verified hours or lab competencies as mini-credentials you can show to research programs or NGOs. Community trust: a simple Valid check reduces ticket fraud and line headaches at big events.

(Availability depends on what your university enables—ask your student affairs office what’s planned.)

What this means for your university

With Extrimian, the university issues tamper-proof digital credentials, offers one official page to verify them in seconds, and uses AI internally to spot risk and speed corrections. Students get control and privacy; employers get instant answers; staff spend less time on inbox ping-pong. It’s security and simplicity, together.

Ready when you are

When your university enables Extrimian credentials, you’ll receive a message with simple steps to get your wallet and your first credentials. Until then, save this page, tell your career office what you’d love to see first (diploma, enrollment, course badges), and get ready to retire the messy PDF folder.

Extrimian: AI-first for safety, student-first for experience.

Contact us

Further reading & internal links Fundamentals of SSI (plain-English intro): https://academy.extrimian.io/fundamentals-of-ssi/
Integrate Solution (connect issuer/verifier to SIS/LMS): https://academy.extrimian.io/integrate-solution/
Masterclass (training for registrar & IT/security): https://academy.extrimian.io/masterclass/

Contact Extrimian (book a 30-minute review): https://extrimian.io/contact-us

The post How to Protect Students Data: Digital Diplomas & Credentials first appeared on Extrimian.


Indicio

Indicio to advance trusted digital identity with APTITUDE, Europe’s newest Large Scale Project for digital wallet travel and payments

The post Indicio to advance trusted digital identity with APTITUDE, Europe’s newest Large Scale Project for digital wallet travel and payments appeared first on Indicio.
Through its partnership with SITA, Indicio will advance government-issued digital travel credentials in this two-year digital identity wallet trial, building on its success as the first to implement biometric-enabled credentials for international travel and border crossing.

By James Schulte

APTITUDE, one of the newest Large Scale Pilots backed by the European Commission, has officially launched, marking a major milestone in the EU’s drive to equip 80% of residents with a digital identity wallet by 2026 and setting out to prove how digital wallets can transform travel and payments across Europe.

What is APTITUDE?

APTITUDE is a groundbreaking €20 million cross-border initiative coordinated by the French government that brings together 118 partners from 11 EU Member States and Ukraine to analyze, integrate, and pilot real-world use cases for travel and payment within the European Digital Identity Framework (EUDI).

Backed by funding under the €8.1 billion Digital Europe Programme, APTITUDE is part of the EU’s broader effort to drive digital transformation and operationalize the European Digital Identity Wallet by demonstrating its value across critical industries.

The scale of APTITUDE reflects the importance of digital identity in enabling secure, efficient, and interoperable services across borders. The project is a milestone in the global movement to make digital identity secure, interoperable, and practical at scale. Uniting governments, technology providers, and industry leaders, APTITUDE will test and validate solutions that meet EU standards and deliver practical benefits to citizens and businesses.

The digital transformation of travel

Travel and payments are critical touchpoints between people, governments, and businesses. As more governments and businesses worldwide build new digital identity ecosystems, Indicio’s leadership and expertise in decentralized identity, its expertise in combining biometrics in Verifiable Credentials, and its focus on interoperability based on open standards, make digital identity in travel work seamlessly, simply, and cost-effectively across ecosystems while delivering real value.

With our partner SITA, a recognized leader in aviation technology, Indicio is helping to create the infrastructure and software solutions that allow digital identity to be securely verified and reused across airlines, airports, border control checkpoints, and payment channels.

Indicio’s technology streamlines the traveler’s journey by reducing repeated identity checks, reliance on paper documents, manual data entry, and visual inspections. It also increases airport capacity and enables governments to control their borders with the highest level of identity assurance.

The result is measurable value:

Airlines and airports reduce bottlenecks and improve operational flow without the need to increase resources or higher costs. Governments gain secure, interoperable systems that strengthen compliance and protect against identity fraud and document abuse. Travelers and citizens enjoy a  faster, seamless experience that safeguards their privacy and personal data. Global leadership, local impact

Indicio’s contributions to APTITUDE are part of our broader leadership in building solutions that deliver digital trust worldwide. From Africa, the Middle East, and Asia to Europe, the Carribean and the Americas, Indicio is connecting industries, governments, and citizens in ways that are fast, secure, private, and valuable.

APTITUDE shows what is possible when expertise and collaboration come together. By contributing to this large-scale pilot, Indicio is helping shape the future of travel and payments in Europe and the global framework for trusted digital identity.

If you are an organization preparing for the shift to digital identity, now is the time to act. Connect with Indicio to stay up-to-date with this project and to book a call with one of our experts to discuss how our solutions can rapidly deliver the benefits of trusted digital identity and data.

###

The post Indicio to advance trusted digital identity with APTITUDE, Europe’s newest Large Scale Project for digital wallet travel and payments appeared first on Indicio.


Innopay

FiDA Data Studios: Shaping The Future Of Financial Data

FiDA Data Studios: Shaping The Future Of Financial Data from 29 Sep 2025 till 29 Sep 2025 Trudy Zomer 03 September 2025 - 10:19  EintrachtLab, Deutsche Bank Park, Frankfurt am Main, Germany 50.06661481897, 8.64804
FiDA Data Studios: Shaping The Future Of Financial Data from 29 Sep 2025 till 29 Sep 2025 Trudy Zomer 03 September 2025 - 10:19  EintrachtLab, Deutsche Bank Park, Frankfurt am Main, Germany 50.06661481897, 8.6480471

What if regulation wasn’t a brake on innovation, but your biggest opportunity?

On 29 September 2025, innovators, strategists, regulators and product leads will gather at the EintrachtLab in Deutsche Bank Park, Frankfurt, for the FiDA Data Studios event. Together, we’ll explore how the Financial Data Access (FiDA) regulation could reshape Europe’s financial services industry.

Through scenario planning, deep-dive sessions and real-world use cases, the event goes beyond compliance to focus on new business and operating models, AI-powered products and how banks can strategically position in the data economy.

Join our expert roundtable:
INNOPAY’s Mounaim Cortet, Vice President, will host an expert roundtable on how financial institutions can strategically position to leverage the opportunities of FiDA to drive innovation and value creation.

Event highlights 5 expert sessions on AI, API infrastructure, strategy & more Executive briefings & high-level networking Shuttle service from TechQuartier Co-hosted by Deutsche Bank and TechQuartier

 

Program


Daytime sessions: 10:00 – 17:00 (expert sessions)
Evening program: from 17:00 onwards (presentation & networking)
Location: EintrachtLab, Deutsche Bank Park, Frankfurt am Main, Germany
Date: 29 September 2025

⚠️ Limited seats available - registration is on a first-come, first-served basis.

Register now through the event website.


Okta

Build Secure Agent-to-App Connections with Cross App Access (XAA)

Secure access with enterprise IT oversight between independent applications that communicate with each other is a recognized gap in OAuth 2.0. Enterprises can’t effectively regulate cross-app communication, as OAuth 2.0 consent screens rely on users granting access to their individual accounts. Now, with the advent of AI agents that communicate across systems, the need to solve the gap is even gre

Secure access with enterprise IT oversight between independent applications that communicate with each other is a recognized gap in OAuth 2.0. Enterprises can’t effectively regulate cross-app communication, as OAuth 2.0 consent screens rely on users granting access to their individual accounts. Now, with the advent of AI agents that communicate across systems, the need to solve the gap is even greater – especially given the growing importance of enterprise AI security in protecting sensitive data flows.

What is Cross App Access (XAA)?

Cross App Access (XAA) is a new protocol that lets integrators enable secure agent-to-app and app-to-app access. Instead of scattered integrations and repeated logins, enterprise IT admins gain centralized control: they can decide what connects, enforce security policies, and see exactly what’s being accessed. This unlocks seamless, scalable integrations across apps — whether it’s just two like Google Calendar and Zoom, or hundreds across the enterprise. Read more about Cross App Access in this post:

Integrate Your Enterprise AI Tools with Cross-App Access

Manage user and non-human identities, including AI in the enterprise with Cross App Access

Semona Igama

Or watch the video about Cross App Access:

In this post, we’ll go hands-on with Cross App Access. Using Todo0 (the Resource App) and Agent0 (the Requesting App) as our sample applications, and Okta as the enterprise Identity Provider (IdP), we’ll show you how to set up trust, exchange tokens, and enable secure API calls between apps that enable enterprise IT oversight. By the end, you’ll not only understand how the protocol works but also have a working example you can adapt to your own integrations.

If you’d rather watch a video of the setup and how XAA works, check this one out.

Prerequisites to set up the AI agent to app connections using Cross App Access (XAA)

To set up secure agent-to-app connections with Cross App Access (XAA), you’ll need the following:

Okta Developer Account (Integrator Free Plan): You’ll need an Okta Developer Account with the Integrator Free Plan. This account will act as your Identity Provider (IdP) for setting up Cross App Access. If you don’t already have an account, sign up for a new one here: Okta Integrator Free Plan Once created, sign in to your new org AWS Credentials: You’ll need an AWS Access Key ID and AWS Secret Access Key The IAM user or role associated with these credentials must have access to Amazon Bedrock, specifically the Claude 3.7 Sonnet model, enabled If you don’t know how to obtain the credentials, follow this guide Developer Tools: These tools are essential for cloning, editing, building, and running your demo applications Git – to clone and manage the repository VS Code – for reading and modifying the sample source code Dev Containers Extension (VS Code) – recommended, as it automatically configures dependencies and environments when you open the project Docker – required by the Dev Container to build and run the sample applications in isolated environments

Table of Contents

What is Cross App Access (XAA)? Prerequisites to set up the AI agent to app connections using Cross App Access (XAA) Use Okta to secure AI applications with OAuth 2.0 and OpenID Connect (OIDC) Enable Cross App Access in your Okta org Create the resource app (Todo0) Create the requesting app (Agent0) Establishing connections between Todo0 & AI agent (Agent0) Set up a test user in Okta org Create the test user Assign the Okta applications to the test user Configure the Node.js Cross App Access project The Cross App Access MCP project at a glance Configure OAuth 2.0 and AI foundation models environment files Generate OIDC configuration and access token files Configure AI and resource application connection values Register OAuth 2.0 redirect URIs for both apps Initialize the database and run the project Bootstrap the project Run and access the apps in your browser Testing the XAA flow: From Bob to Agent0 to Todo0 Interact with Todo0, the XAA resource app, by creating tasks Let the AI agent, the requesting app, access your todos Behind the scenes: the OAuth 2.0 Identity Assertion Authorization Grant Need help setting up secure cross-domain enterprise AI application access? Learn more about Cross App Access, OAuth 2.0, and securing your applications Use Okta to secure AI applications with OAuth 2.0 and OpenID Connect (OIDC)

Before we dive into the code, we need to register our apps with Okta. In this demo:

Agent0: the AI agent requesting app (makes the API call on behalf of the user) Todo0: the resource app (owns the protected API) Managed connection: the trust relationship between the two apps, created in Okta

We’ll create both apps in your Okta Integrator Free Plan account, grab their client credentials, and then connect them.

Enable Cross App Access in your Okta org

⚠️ Note: Cross App Access is currently a self-service Early Access (EA) feature. It must be enabled through the Admin Console before the apps appear in the catalog. If you don’t see the option right away, refresh and confirm you have the necessary admin permissions. Learn more in the Okta documentation on managing EA and beta features.

Sign in to your Okta Integrator Free plan account In the Okta Admin Console, select Settings > Features Navigate to Early access Find Cross App Access and select Turn on (enable the toggle) Refresh the Admin Console

Create the resource app (Todo0) In the Okta Admin console, navigate to Applications > Applications Select Browse App Catalog Search for Todo0 - Cross App Access (XAA) Sample Resource App, and select it Select Add Integration Enter “Todo0” in the Application label field and click Done Click the Sign On tab to view the Client ID and Client secret. These are required to include in your .env.todo

Create the requesting app (Agent0) Go back to Applications > Applications Select Browse App Catalog Search for Agent0 - Cross App Access (XAA) Sample Requesting App, and select it Select Add Integration Enter Agent0 in the Application label field and click Done Click the Sign On tab to view the Client ID and Client secret. These are required to be included in your .env.agent

Establishing connections between Todo0 & AI agent (Agent0) From the Applications page, select the Agent0 app Go to the Manage Connections tab Under App granted consent, select Add requesting apps, select Todo0, then Save Under Apps providing consent, select Add resource apps, select Todo0, then Save

Now Agent0 and Todo0 are connected. If you check the Manage Connection tab for either app, you’ll see that the connection has been established.

Set up a test user in Okta org

Now that the apps are in place, we need a test user who will sign in and trigger the Cross App Access flow.

Create the test user In the Okta Admin Console, go to Directory > People Select Add Person Fill in the details: First name: Bob Last name: Tables Username / Email: bob@tables.fake Under Activations, select Activate now, mark ☑️ I will set password, and create a temporary password Optional: You can mark ☑️ User must change password on first login Select Save (If you don’t see the new user right away, refresh the page)

Assign the Okta applications to the test user Open the Bob Tables user profile Select Assign Applications Assign both Agent0 (requesting app) and Todo0 (resource app) to Bob

This ensures Bob can sign in to Agent0, and Agent0 can securely request access to Todo0 on his behalf.

⚠️ Note: Bob will be the identity we use throughout this guide to demonstrate how Agent0 accesses Todo0’s API through Cross App Access.

Configure the Node.js Cross App Access project

With your Okta environment (apps and user) ready, let’s set up the local project. Before we dive into configs, here’s a quick look at what you’ll be working with.

Clone the repository:

git clone https://github.com/oktadev/okta-cross-app-access-mcp

Change into the project directory:

cd okta-cross-app-access-mcp

Open VS Code Command Palette and run “Dev Containers: Open Folder in Container”
To open Command Palette, select View > Command Palette…, MacOS keyboard shortcut Cmd+Shift+P, or Windows keyboard shortcut Ctrl+Shift+P

⚠️ Note: This sets up all dependencies, including Node, Redis, Prisma ORM, and Yarn.

The Cross App Access MCP project at a glance okta-cross-app-access-mcp/ ├─ packages/ │ ├─ agent0/ # Requesting app (UI + service) – runs on :3000 │ │ └─ .env # Agent0 env (AWS creds) │ ├─ todo0/ # Resource app (API/UI) – runs on :3001 │ ├─ authorization-server/ # Local auth server for ID-JAG + token exchange │ │ └─ .env.agent # IdP creds (Agent0 side) │ │ └─ .env.todo # IdP creds (Todo0 side) │ ├─ id-assert-authz-grant-client/ # Implements Identity Assertion Authorization Grant client logic ├─ .devcontainer/ # VS Code Dev Containers setup ├─ guide/ # Docs used by the README ├─ images/ # Diagrams/screens used in README ├─ scripts/ # Helper scripts ├─ package.json └─ tsconfig.json Configure OAuth 2.0 and AI foundation models environment files

At this point, you have:

Client IDs and Client Secrets for both Agent0 and Todo0 (from the Okta Admin Console)

Your Okta org URL, visible in the Okta Admin Console profile menu of the Admin Console. It usually looks like

https://integrator-123456.okta.com

This URL will be your IdP issuer URL and is shared across both apps.

Generate OIDC configuration and access token files

From the project root, run:

yarn setup:env

This scaffolds the following files:

packages/authorization-server/.env.todo packages/authorization-server/.env.agent packages/agent0/.env Configure AI and resource application connection values

Open each file and update the placeholder with your org-specific values:

authorization-server/.env.todo

CUSTOMER1_EMAIL_DOMAIN=tables.fake CUSTOMER1_AUTH_ISSUER=<Your integrator account URL> CUSTOMER1_CLIENT_ID=<Todo0 client id> CUSTOMER1_CLIENT_SECRET=<Todo0 client secret>

authorization-server/.env.agent

CUSTOMER1_EMAIL_DOMAIN=tables.fake CUSTOMER1_AUTH_ISSUER=<Your integrator account URL> CUSTOMER1_CLIENT_ID=<Agent0 client id> CUSTOMER1_CLIENT_SECRET=<Agent0 client secret>

agent0/.env

AWS_ACCESS_KEY_ID=<your AWS access key id> AWS_SECRET_ACCESS_KEY=<your AWS secret access key>

⚠️ Note:

The issuer URL (CUSTOMER1_AUTH_ISSUER) is the same in both .env.todo and .env.agent The Client ID/Client secret values differ because they come from the respective apps you created AWS credentials are required only for Agent0 (requesting app)
Register OAuth 2.0 redirect URIs for both apps

Finally, we need to tell Okta where to send the authentication response for each app.

For Agent0:

From your Okta Admin Console, navigate to Applications > Applications Open the Agent0 app Navigate to the Sign On tab In the Settings section, select Edit

In the Redirect URIs field, add

http://localhost:5000/openid/callback/customer1 Select Save

Repeat the same steps for Todo0:

Open the Todo0 app Go to the Sign On tab > Settings > Edit

In the Redirect URIs field, add:

http://localhost:5001/openid/callback/customer1 Select Save

Now both apps know where to redirect after authentication.

Initialize the database and run the project

With the apps and environment configuration in place, the next step is to prepare the local project, set up its databases, and bring both applications online.

Bootstrap the project

From the root of the repo, install all workspaces and initialize the databases:

yarn bootstrap

Since this is your first run, you’ll be asked whether to reset the database. Type “y” for both Todo0 and Agent0.

Run and access the apps in your browser

Once the bootstrap is complete, start both apps (and their authorization servers) with:

yarn start

Open the following ports in your Chrome browser’s tab:

Todo0 (Resource App): http://localhost:3001 Agent0 (Requesting App): http://localhost:3000

At this point, both apps should be live and connected through Okta. 🎉

Testing the XAA flow: From Bob to Agent0 to Todo0

With everything configured, it’s time to see Cross App Access in action.

Interact with Todo0, the XAA resource app, by creating tasks In the Work Email field, enter: bob@tables.fake, and select Continue You’ll be redirected to the Okta Login page. Sign in with the test user credentials: Username: bob@tables.fake Password: the temporary password you created earlier The first time you sign in, you’ll be prompted to: Set a new password Enroll in Okta Verify for MFA Once logged in, add several tasks to your to-do list Select one of the tasks and mark it as complete to verify that the application updates the status accurately Let the AI agent, the requesting app, access your todos Open the Agent0 app in your browser Select Initialize to set up the AWS Bedrock client. Once connected, you’ll see the following message:
✅ Successfully connected to AWS Bedrock! You can now start chatting. Select the Connect to IdP button Behind the scenes, Agent0 requests an identity assertion from Okta and exchanges it for an access token to Todo0 If everything is configured correctly, you’ll see the following message
Authentication completed successfully! Welcome back. To confirm that Agent0 is actually receiving tokens from Okta: Open a new browser tab and navigate to: http://localhost:3000/api/tokens You should see a JSON payload containing: accessToken, jagToken, and idToken This verifies that Agent0 successfully authenticated through Okta and obtained the tokens needed to call Todo0 Now interact with Agent0 using natural prompts. For example: write this prompt What's on my plate in my to-do list?

⚠️ Note: Agent0 will call the Todo0 API using the access token and return your pending tasks

Let’s try some more prompts Ask Agent0 to add a new task Ask it to mark an existing task complete Refresh the Todo0 app — you’ll see the changes reflected instantly Behind the scenes: the OAuth 2.0 Identity Assertion Authorization Grant

✅ Bob Tables logs in once with Okta
⏩ Agent0 (requesting app) gets an identity assertion from Okta
🔄 Okta vouches for Bob and exchanges that assertion for an access token
👋 Agent0 uses that token to securely call the Todo0 (resource app) API

🎉 Congratulations! You’ve successfully configured and run the Cross App Access project.

Need help setting up secure cross-domain enterprise AI application access?

If you run into any issues while setting up or testing this project, feel free to post your queries to the forum: 👉 Okta Developer Forum

If you’re interested in implementing Cross App Access (XAA) in your own application — whether as a requesting app or a resource app — and want to explore how Okta can support your use case, reach out to us at: 📩 xaa@okta.com

Learn more about Cross App Access, OAuth 2.0, and securing your applications

If this walkthrough helped you understand how Cross App Access works in practice, you might enjoy diving deeper into the standards and conversations shaping it. Here are some resources to continue your journey

📘 Cross App Access Documentation – official guides and admin docs to configure and manage Cross App Access in production 🎙️ Developer Podcast on MCP and Cross App Access – hear the backstory, use cases, and why this matters for developers 📄 OAuth Identity Assertion Authorization Grant (IETF Draft) – the emerging standard that powers this flow

If you’re new to OAuth or want to understand the basics behind secure delegated access, check out these resources:

What the Heck is OAuth? What’s the Difference Between OAuth, OpenID Connect, and SAML? Secure Your Express App with OAuth 2.0, OIDC, and PKCE Why You Should Migrate to OAuth 2.0 From Static API Tokens How to Get Going with the On-Demand SaaS Apps Workshops

Follow us on LinkedIn, Twitter, and subscribe to our YouTube channel for more developer content. If you have any questions, please leave a comment below!

Tuesday, 02. September 2025

ComplyCube

How to Comply with Failure to Prevent Fraud

The UK’s Failure to Prevent Fraud offence holds large firms liable for fraud by employees or agents unless “reasonable procedures” are in place. Finance and fintech face early scrutiny, with the SFO leading enforcement. The post How to Comply with Failure to Prevent Fraud first appeared on ComplyCube.

The UK’s Failure to Prevent Fraud offence holds large firms liable for fraud by employees or agents unless “reasonable procedures” are in place. Finance and fintech face early scrutiny, with the SFO leading enforcement.

The post How to Comply with Failure to Prevent Fraud first appeared on ComplyCube.


liminal (was OWI)

Fighting Third-Party Fraud

The post Fighting Third-Party Fraud appeared first on Liminal.co.

The post Fighting Third-Party Fraud appeared first on Liminal.co.


Dock

5 Identity Gaps That Put AI Agents at Risk

AI agents will soon be booking travel, managing workflows, and making purchases on our behalf. By next year, non-human agents may outnumber human users online.  The problem is, our identity systems were built for people, not for autonomous software. During our recent “Know Your Agent” 

AI agents will soon be booking travel, managing workflows, and making purchases on our behalf. By next year, non-human agents may outnumber human users online. 

The problem is, our identity systems were built for people, not for autonomous software.

During our recent “Know Your Agent” live session with Peter Horadan, CEO of Vouched, we went through the five critical identity problems we need to solve before agents become the default way we interact online:


Spherical Cow Consulting

Roads, Robots, and Responsibility: Why Agentic AI Needs Identity Infrastructure

We don’t spend much time thinking about the roads we drive on—until one cracks, collapses, or dumps us somewhere we didn’t mean to be. Identity in the age of agentic AI? Same deal. It’s infrastructure. Like a good road, it needs to be ready for traffic we can’t imagine. The post Roads, Robots, and Responsibility: Why Agentic AI Needs Identity Infrastructure appeared first on Spherical Cow Consul

“We don’t spend much time thinking about the roads we drive on—until one cracks, collapses, or dumps us somewhere we didn’t mean to be.”

Identity in the age of agentic AI? Same deal. It’s infrastructure. And just like a good road system, it needs to be engineered with care, built on solid standards, and ready for traffic we can’t even imagine yet.

Right now, autonomous agents are already taking actions on behalf of people and businesses—booking meetings, writing and summarizing emails, pushing code, moving money. Which means we should probably stop and ask: how are those identity and access decisions getting made? Are they secure? Reviewed? Built to best practices? Or are we flooring it across an uninspected bridge, hoping the potholes aren’t too deep?

The protocols making this possible—things like the Model Context Protocol (MCP) and Google’s Agent2Agent (A2A)—are still wet cement. If we want to go from today’s cow paths (cow poop included) to tomorrow’s superhighways, we can’t just slap on more lanes later. We need a strong identity layer poured in from the start.

This post is based on a keynote I gave recently at a large corporate event, where the audience was asking the right questions. If you’re building or maintaining systems that will eventually include autonomous agents, or you’re already there, this is for you.

A Digital Identity Digest Roads, Robots, and Responsibility: Why Agentic AI Needs Identity Infrastructure Play Episode Pause Episode Mute/Unmute Episode Rewind 10 Seconds 1x Fast Forward 30 seconds 00:00 / 00:12:22 Subscribe Share Amazon Apple Podcasts CastBox Listen Notes Overcast Pandora Player.fm PocketCasts Podbean RSS Spotify TuneIn YouTube iHeartRadio RSS Feed Share Link Embed

You can Subscribe and Listen to the Podcast on Apple Podcasts, or wherever you listen to Podcasts.

And be sure to leave me a Rating and Review!

What I mean by identity, identity infrastructure, and agentic AI

“Identity” and “identity infrastructure” can mean different things depending on who you ask. (Get a hundred IAM professionals in a room and you’ll get a thousand definitions.) Since this is my blog post, here’s how I’m using the terms:

Identity – a persistent, verifiable representation of an entity—human or non-human—that other systems can use to decide what it can do, when, for what purpose, and under what conditions. Identity infrastructure – the shared, stable, and standards-based systems, protocols, and governance that make those identities usable across teams, organizations, and technologies, securely, interoperably, and at scale. Agentic AI – borrowing NVIDIA’s phrasing, an AI system (often powered by large language models) with sophisticated reasoning and iterative planning that can autonomously solve complex, multi-step problems. The key word here is autonomous. Generative AI creates content; agentic AI takes action.

Without grounding in these definitions, it’s easy to talk past each other. With them, we can focus on the real issue: building identity infrastructure that works across both human and non-human actors, especially when those non-humans are making decisions at machine speed.

AI’s upside is real, but it’s missing a foundation

When most people talk about AI, we talk about the upside:

Faster iteration cycles Smart automation Real productivity gains Code generation Helpful chatbots that can field questions at scale

GitHub’s Octoverse report showed a 59% surge in contributions to generative AI projects and a 98% increase in the number of projects overall. Many contributions came from India, Germany, Japan, and Singapore. Interestingly, they also reported that AI hasn’t flooded open source with low-quality junk—if anything, it’s drawing more people into development. (I’m not sure I believe their assertion about the junk. That doesn’t match what I’m hearing anecdotally, but then again, that’s why there are actual studies to balance perception with facts.)

That’s all impressive, even when the results aren’t perfect. These tools are still young, evolving fast, and unlocking new creativity across the stack.

But there’s a missing question in all this excitement: who is acting? On whose behalf? And with what authority?

That’s the identity layer. Without it, all this innovation becomes harder to govern, harder to scale, and harder to trust.

Agents are already in your systems

This isn’t hypothetical. Agents are in your tools, updating dependencies, answering tickets, creating calendar invites, summarizing documents, pushing code, and talking to customers.

Microsoft’s 2025 Work Trend Index reports that global leaders rank customer service, marketing, and product development as the top three areas for accelerated AI investment in the next 12–18 months. Seventy-three percent of leading-edge companies will use AI for marketing. Sixty-six percent for customer success. Even internal communications sees 68% adoption.

That’s a lot of automation acting in our name. Without clear identity controls, there is also a lot of potential for AI “marketing fails” or, worse, high-stakes errors.

A few examples:

A rogue AI coding assistant wiped out a startup’s production database. AI-powered recruiting software rejected qualified applicants based purely on age and gender, landing the company in court with the EEOC.

These tools are powerful and fast—but oversight around identity and accountability hasn’t kept up.

Identity isn’t just a login box

Identity is infrastructure. And infrastructure is more than a username and password. When humans act, we typically have an audit trail: who did what, when, and why. We rely on login sessions, logs, access controls, and behavioral patterns.

But when AI agents act, especially ones with high autonomy, we need something more durable. We need fine-grained delegation models, audit trails tied to machine-driven decisions, and identity primitives that work across humans and non-humans alike.

Identity systems that recognize both human and non-human actors Delegation models that can express “who can do what, for whom, under what conditions” Clear provenance: who authorized the action, and is it appropriate in this context? Verifiability—so we can prove what happened, after the fact

Without that infrastructure, the entire agentic AI ecosystem risks becoming a black box. And for security teams, DevOps leads, and auditors, that’s a non-starter.

The right questions lead to better systems

If an agent makes a change, you should be able to answer: Was it authorized? Who delegated the authority? What policy applied?

Microsoft’s report hints at this by asking leaders: how many agents are needed for which roles and tasks, and how many humans to guide them? Those are good but very surface-level questions.

We can push further:

Do you have enough data to clearly scope the role for an AI? Can you give it only the access it needs, when it needs it, for the specific task at hand?

These questions aren’t just risk management. They’re a chance to improve system hygiene and clarity across the board.

Protocols are evolving but identity hasn’t caught up

You might be thinking: okay, so what’s out there to support this?

Protocols like the Multi-Agent Communication Protocol (MCP) and Agent2Agent (A2A) messaging are early candidates. They enable agents to communicate and coordinate in powerful ways. But they were designed to simplify agents’ communication with agents; they weren’t designed with identity in mind.

Even folks who helped shape OAuth are wrestling with how traditional delegation models fit—or don’t fit—into this space. The communication protocols aren’t broken, they’re just early. Identity hasn’t caught up yet.

And if we don’t make faster progress on these issues, we’ll be forever retrofitting trust into systems that were never built to handle it.

Why this can’t be proprietary

You might be tempted to solve this in-house. Build your own delegation model, your own trust chain, your own method for agentic AI authorization. This scenario freaks me out. If every organization invents its own approach to agent identity, we’ll end up right back where we started, in a world of fragile integrations, inconsistent assumptions, and big gaps in accountability.

We’ve ALL seen this before, and the result is always the same:

Fragile integrations Misaligned assumptions between systems Gaps in visibility and accountability Security holes you can drive a nation-state through

That’s why open standards matter, not as a checkbox, but as the only viable way to scale trust across systems, companies, and industries.

And to be clear, “open” doesn’t just mean “you can download the spec.” It means:

Shared governance Transparent development Real-world applicability Participation from a broad mix of stakeholders, including security, product, legal, and compliance

This isn’t easy work. But it’s the work that makes the rest possible. And when it works, we get something better than “compliant.” We get trustworthy infrastructure that scales.

What to do now—before the collapse

So where does that leave us?

If you’re building agentic AI capabilities into your platform, or even just experimenting with automation, you’re already laying infrastructure. The question is whether that infrastructure will support accountability, or collapse under the weight of delegation you can’t verify. Either we bolt identity onto agentic systems after the fact, or we treat identity like the infrastructure it is, and build it into the foundation.

You don’t need to have all the answers today. But you do need to start asking better questions:

Is identity part of the design, or bolted on later? Are we modeling trust relationships clearly, or making assumptions? Will our logs stand up in an audit, or are we relying on magic?

Start there.

And if you’re in a position to influence the broader direction of the industry, join a standards group. Challenge assumptions in product reviews. Push for interoperability, not lock-in. Make identity part of the foundation, not just a feature.

We don’t have to wait for things to fall apart. We can build roads we actually want to drive on.

If you’d rather track the blog than the podcast, I have an option for you! Subscribe to get a notification when new blog posts go live. No spam, just announcements of new posts. [Subscribe here

Transcript Roads as a Metaphor

[00:00:29] Welcome back to A Digital Identity Digest. I’m Heather Flanagan, and today we’re going to talk about roads. Yes, roads. They’re an amazing metaphor, and I’m just going to drive this one all night long.

[00:00:42] We usually don’t think about the roads we drive on—until one cracks, collapses, or leaves us stranded somewhere we never meant to be.

[00:00:49] Identity in the age of agentic AI works the same way. It is infrastructure. And like any good road system, it must be:

Engineered with care Built on solid standards Ready for traffic we can’t even imagine yet The Rise of Autonomous Agents

[00:01:04] Autonomous agents are already taking actions on behalf of people and businesses. They’re:

Booking meetings Writing and summarizing emails Pushing code Moving money

[00:01:14] Which raises the key question: how are identity and access management decisions being made for those actions?

Are they secure? Reviewed? Designed according to best practices? Or are we flooring it across an uninspected bridge, hoping the potholes aren’t too deep?

Protocols in Wet Cement

[00:01:34] Many of the protocols enabling this—such as Model Context Protocol (MCP) and Google’s Agent-to-Agent (A2A)—are still wet cement.

[00:01:44] If we want to move from today’s cow paths (cow poop included) to tomorrow’s superhighways, we can’t just slap on more lanes later. We need a strong identity layer poured in from the start.

Defining Identity and Agentic AI

[00:02:19] Let’s pause and define a few key terms. Because “identity” can mean wildly different things depending on who you ask.

Identity → A persistent, verifiable representation of an entity (person or machine) that other systems use to decide what it can do, when, and under what conditions. Identity Infrastructure → Shared, stable, standards-based systems and governance that make identity portable, interoperable, and reliable at scale. Agentic AI → Borrowing from Nvidia: AI, usually powered by large language models, that doesn’t just generate code but plans and reasons through complex multi-step problems on its own.

[00:03:46] Generative AI writes things.
[00:03:52] Agentic AI acts on things.

And that difference matters.

Productivity Gains vs. Identity Risks

[00:04:11] Conversations around agentic AI often emphasize upsides:

Faster iteration cycles Smarter automation Productivity gains Code generation Scalable chatbots

[00:04:25] GitHub’s Octoverse report shows:

59% surge in contributions to generative AI projects 98% increase in overall projects Growth driven by developers in India, Germany, Japan, Singapore, and Latin America

[00:05:15] But what’s often missing is the question: who or what is acting on whose behalf, and with what authority? Without identity, this innovation becomes harder to govern, scale, and trust.

Real-World Consequences

[00:06:19] Consider these examples:

An AI coding assistant that wiped out a startup’s production database. AI-powered recruiting software that rejected qualified applicants based on age and gender, resulting in lawsuits.

[00:06:47] These tools are fast and powerful—but oversight around identity and accountability has not caught up.

Why Identity Infrastructure Matters

[00:06:59] Infrastructure is more than usernames and passwords. When humans act, we leave audit trails.

[00:07:15] But when AI agents act at machine speed, we need more durable systems:

Identity recognition for both human and non-human actors Delegation models clarifying who can do what for whom Provenance signals to confirm authorization Verifiability to prove what happened

[00:07:42] Without this infrastructure, agentic AI becomes a black box—and that’s a nonstarter for security teams, DevOps leads, and auditors.

Open Standards, Not DIY

[00:09:34] You may be tempted to build your own delegation models and trust chains.

[00:09:42] Please don’t.

Doing so leads to:

Fragile integrations Misaligned assumptions Gaps in visibility and accountability Security holes you could drive a nation-state through

[00:09:56] That’s why open standards matter—not as a compliance checkbox, but as the only viable way to create scalable trust across companies and industries.

Building Roads That Last

[00:10:27] If you’re building agentic AI capabilities, you’re already laying down infrastructure. The question is:

Will your road support accountability? Or will it collapse under unverifiable delegation?

[00:10:49] Ask yourself:

Is identity part of the design—or bolted on later? Are trust relationships clearly modeled—or just assumed? Will logs stand up in an audit—or are you relying on magic?

[00:11:03] If you want to shape the standards of the future, join standards groups, challenge assumptions in product reviews, and push for interoperability—not lock-in.

[00:11:21] We don’t need to wait for the bridge to collapse. We can build roads we actually want to drive on.

Closing Thoughts

[00:11:28] Thanks for listening to A Digital Identity Digest. If this sparked questions or gave you something to debate, share it with your colleagues—the more voices in this conversation, the stronger our identity infrastructure can be.

[00:11:46] If you enjoyed this episode:

Share it with a friend or colleague Connect with me on LinkedIn Subscribe and leave a rating or review on Apple Podcasts or wherever you listen Read the full post at sphericalcowconsulting.com

Stay curious, stay engaged, and let’s build identity systems that last.

The post Roads, Robots, and Responsibility: Why Agentic AI Needs Identity Infrastructure appeared first on Spherical Cow Consulting.


iComply Investor Services Inc.

Legal KYC and AML: What Global Law Firms Need to Know About Client Verification

Law firms face growing AML pressure worldwide. This guide shows how to streamline compliance workflows without compromising client confidentiality or jurisdictional privacy laws.

Law firms face rising global AML expectations, especially for client onboarding, source of funds checks, and beneficial ownership verification. This article explores evolving KYC and KYB rules across Canada, the UK, the U.S., Australia, and the EU – and how iComply automates compliance without compromising client confidentiality.

For legal professionals, client trust is everything. But across key jurisdictions, law firms are being asked to do more: verify client identity, trace beneficial ownership, and flag suspicious behaviour—all while protecting solicitor-client privilege and meeting strict privacy laws.

In Canada, the U.S., UK, and beyond, anti-money laundering regulations are evolving quickly. Firms must now demonstrate that they not only follow procedures – but that their systems can withstand audits and adapt to new threats.

AML Obligations for Law Firms by Jurisdiction Canada Regulators: Law societies, FINTRAC Requirements: Client Identification Procedures (CIP), ongoing monitoring, beneficial ownership checks, privacy compliance (PIPEDA) United Kingdom Regulator: SRA (Solicitors Regulation Authority) Requirements: AML risk assessment, KYC for clients, source of funds/source of wealth checks, SARs, and recordkeeping under MLR 2017 United States Regulators: ABA model rules, BOI reporting (Corporate Transparency Act) Expectations: Evolving best practices for law firm AML controls, especially in real estate and corporate formation Australia Regulator: Legal Services Commissions, AUSTRAC guidance Requirements: Identification and verification for clients in regulated transactions; alignment with AML/CTF Act for high-risk sectors European Union Regulators: National bar associations, 6AMLD Requirements: Client due diligence, UBO transparency, suspicious transaction reporting, GDPR compliance Common Challenges in Legal Compliance

1. Confidentiality vs. Transparency
Law firms must balance their duty to clients with the obligation to detect and report suspicious activity.

2. Manual and Fragmented Workflows
Paper forms, email, and disconnected tools result in audit gaps and inefficiencies.

3. Complex Entity Structures
Client organizations often involve trusts, layers of ownership, or offshore nominees.

4. Jurisdictional Conflicts
Global clients mean law firms must harmonize privacy, AML, and risk obligations across borders.

iComply: Legal-Grade KYC and AML for Modern Firms

iComply offers a configurable platform designed to help law firms automate AML compliance while preserving client confidentiality.

1. Secure Client Onboarding (KYC/KYB) Edge-based identity and document verification No raw PII leaves the client device unencrypted Supports Canadian, U.S., UK, EU, and Australian standards 2. Beneficial Ownership Mapping Automatically uncover UBOs across jurisdictions Flag nominee structures and offshore shell patterns Enable configurable thresholds for review and escalation 3. Risk-Based Screening and Case Management Sanctions, PEP, and adverse media checks Centralized dashboard for audits, escalations, and decision documentation Secure retention policies to meet legal recordkeeping duties 4. Privacy and Privilege Safeguards Local hosting or on-prem options for law firm control Full audit logs without exposing client communications Compliance with GDPR, PIPEDA, and solicitor-client privilege standards Case Insight: Canadian Corporate Law Firm

A Toronto-based firm specializing in incorporations and M&A deals implemented iComply to digitize its CIP and UBO review processes. Results:

Reduced due diligence time by 70% Flagged two nominee structures with high-risk SOEs in a single case Expanded ability to engage directors, officers, and key stakeholders anywhere in the world Final Word

Legal compliance is evolving fast. Law firms that modernize with purpose-built, privacy-first tools can stay ahead of audits, reduce admin burden, and build deeper client trust.

Schedule a walkthrough with iComply to see how we help law firms automate AML obligations – without sacrificing discretion or control.

Monday, 01. September 2025

Ontology

After the Banking Data Leak Scandal

Ontology’s DIDs as a Solution for Global Financial Security The recent massive leaks of banking data have highlighted the vulnerability of centralized financial systems and the urgent need to rethink the security of personal information. In an increasingly digital world, where cyberattacks are commonplace, users’ trust in financial institutions has been shaken. In the face of this crisis of confi
Ontology’s DIDs as a Solution for Global Financial Security

The recent massive leaks of banking data have highlighted the vulnerability of centralized financial systems and the urgent need to rethink the security of personal information. In an increasingly digital world, where cyberattacks are commonplace, users’ trust in financial institutions has been shaken. In the face of this crisis of confidence, Decentralized Identities (DIDs), offered by platforms like Ontology, are emerging as a promising solution to strengthen global financial security. This article will explore how Ontology’s DIDs, by returning control of data to users, can transform the financial security landscape and prevent future scandals.

The Achilles Heel of Centralized Systems: Banking Data Leaks

Traditional banking systems rely on a centralized model where clients’ personal and financial information is stored in vast databases managed by institutions. Although these systems are protected by sophisticated security measures, they remain prime targets for cybercriminals. Each year, millions if not billions of customer records are compromised in data breaches, leading to significant financial losses, identity theft, and the erosion of public trust.

These incidents underline a fundamental weakness: the concentration of data creates a single point of failure. Once an attacker breaches an institution’s defenses, they potentially gain access to a goldmine of sensitive information. Moreover, the fact that data is managed by third parties means users have little to no control over how their information is stored, used, or shared. This lack of sovereignty over data is at the heart of today’s security issues.

ONT ID: Ontology’s Decentralized Identity Solution

Ontology offers a radically different approach to identity and data management through its decentralized identity framework, ONT ID. Based on W3C recommendations for Decentralized Identifiers (DID) and Verifiable Credentials (VC), ONT ID enables individuals and organizations to create and control their own digital identities. Unlike centralized systems, where data is held by third parties, ONT ID restores data sovereignty to the user.

With ONT ID, users can generate unique, self-sovereign identifiers that are not tied to any central entity. They can then collect verifiable credentials (e.g., diplomas, driver’s licenses, proof of residence) from trusted issuers and store them securely in their digital wallet. The crucial aspect is that the user decides when and with whom to share this information, and only the necessary data. For instance, to prove their age, a user would not need to reveal their exact date of birth, but only a verifiable proof that they are over 18. This approach minimizes the exposure of sensitive data and drastically reduces the attack surface for cybercriminals.

How DIDs Improve Global Financial Security

The integration of DIDs, and specifically ONT ID, into the financial sector provides several key advantages for security:

Reduced risk of massive data leaks: By decentralizing the storage of identity data and allowing users to control their information, DIDs eliminate the single point of failure represented by centralized databases. Even if a system is compromised, attackers would only access pseudonymous identifiers rather than full personal data. Stronger, passwordless authentication: DIDs enable more robust authentication methods than traditional passwords, which are frequent targets of hacking. DID-based authentication can leverage cryptographic keys, making phishing and identity theft attempts far more difficult. Improved regulatory compliance with privacy protection: DIDs allow for more effective and privacy-preserving KYC/AML compliance. Financial institutions can verify necessary credentials without storing full copies of clients’ documents. Zero-Knowledge Proofs (ZKP), often associated with DIDs, enable proving possession of an attribute (e.g., being of legal age) without disclosing the attribute itself. Fraud and identity theft prevention: By ensuring the authenticity of digital identities and making it harder to create fake ones, DIDs can significantly reduce financial fraud and identity theft. Each transaction or interaction can be tied to a verifiable identity, without revealing the real identity to all parties. Enhanced auditability and traceability: DID-related transactions are recorded on a blockchain, providing an immutable and transparent audit trail. This facilitates the detection of suspicious activities and the tracing of funds in case of fraud, while protecting legitimate users’ privacy through pseudonymization. Challenges and Future Outlook

Despite their revolutionary potential, widespread adoption of DIDs in the financial sector is not without challenges. Interoperability between different DID implementations, raising awareness and educating both users and institutions, and achieving global regulatory harmonization are all crucial steps. Governments and regulators will need to collaborate with decentralized technology developers to create frameworks that foster innovation while ensuring consumer protection and financial stability.

Ontology, with its commitment to W3C standards and its growing ecosystem, is well-positioned to play a leading role in this transition. By continuing to develop user-friendly tools and forging strategic partnerships, Ontology can help bridge the gap between blockchain technology and the needs of the traditional financial sector paving the way for a future where banking data security is inherently tied to digital identity sovereignty.

Conclusion

Banking data leak scandals are a stark reminder of the fragility of centralized systems and the urgent need to adopt more resilient solutions. Decentralized Identities (DIDs), and especially Ontology’s ONT ID, offer a promising path to redefining financial security. By empowering individuals to regain control of their data, strengthening authentication, enabling privacy-preserving compliance, and reducing fraud, DIDs can radically transform how we interact with our finances.

The future of global financial security no longer lies in reinforcing centralized fortresses but in distributing the power and responsibility of digital identity to the users themselves. Ontology is at the forefront of this revolution, providing the necessary tools to build a safer, fairer, and more resilient financial ecosystem.

After the Banking Data Leak Scandal was originally published in OntologyNetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.


Tokeny Solutions

SkyBridge Tokenises $300m Hedge Funds with Tokeny and Apex Group

The post SkyBridge Tokenises $300m Hedge Funds with Tokeny and Apex Group appeared first on Tokeny.
August 2025 SkyBridge Tokenises $300m Hedge Funds with Tokeny and Apex Group

Last month, together with Apex Group, we introduced Apex Digital 3.0, the first truly global single-source infrastructure designed to handle the full lifecycle of tokenised products. That includes fund creation, issuance, administration, custody, connectivity to multiple distribution channels, as well as the broader DeFi ecosystem.

$300m of hedge funds go on-chain for always-on services

In less than a month after the launch, SkyBridge Capital, founded by Anthony Scaramucci, a believer of bitcoin and former White House Communications Director, is moving $300m of its flagship hedge funds on-chain through Apex Digital 3.0.

Hedge funds are now open to invest in cryptocurrencies. These assets are designed to settle instantly, without friction. However, investors in those funds face the opposite reality as they are distributed on traditional rails.

It causes slow subscription, redemptions, and transfers due to fragmented settlements, as a transfer often has to pass through multiple layers of middlemen. It results in high transactional costs and delays, which in turn limit liquidity.

That’s why SkyBridge is moving on-chain to eliminate fragmentation and deliver real-time services. By tokenising its hedge funds, subscriptions, redemptions, and transfers can run 24/7 with full transparency. The result is lower costs, faster operations, and an investor experience that finally matches the always-on expectations of today’s markets.

Tokenisation market challenges

For years, tokenisation struggled to take off. Most early projects weren’t true tokenisation but digitalisation experiments. The problem wasn’t legal, but operational.

The key actors, including transfer agents, custodians, and asset managers, simply weren’t ready. They could put the asset on-chain, but struggled to manage subscriptions, redemptions, and custody on-chain. As a result, many institutional projects ended up with assets merely represented on the blockchain, while the servicing processes remained off-chain.

The market has been maturing, service providers have built the capabilities, custodians can hold tokenised assets, more people are equipped and accepting self-custody wallets, and regulators have set clearer frameworks. But integration remains critical and without it tokenisation risks becoming another silo.

On-chain finance adoption accelerates for real

That’s why we built Apex Digital 3.0. For too long, firms were promised “end-to-end” tokenisation, only to discover critical gaps. No legal structuring, no compliance support, no custody of the underlying assets, and no real distribution. The result was complexity, with issuers forced to juggle multiple providers and still falling short of scale.

Apex Digital 3.0 changes that. It brings everything together: legal setup, compliance advisory, issuance, custody, servicing, and cross-platform distribution in one infrastructure. Clients who want a complete 0-to-1 solution rely on us without the headache of managing separate partners. And, for those who already have preferred tools, our open architecture makes integration seamless.

With 22 years of proven trust and $3.5 trillion of assets under administration, Apex Group is the trusted bridge to on-chain finance, giving institutions the confidence to move massively.

SkyBridge’s $300m project is a live example, with more in the pipeline. This time, institutional adoption at scale is real.

Tokeny Spotlight

Press Release

SkyBridge Capital is tokenising $300m of hedge funds with Tokeny via Apex Digital 3.0.

Read More

SEC mentions ERC-3643

Paul S. Atkin, mentioned ERC-3643 in his speech for launching the Project Crypto.

Read More

Welcome to the Team

Meghavi Raval joins Tokeny. Learn about why she is a great fit to the team.

Read More

Exclusive Interview

Our CCO and Global Head of Digital Assets at Apex Group, Daniel Coheur, talks about Apex Digital 3.0

Read More

Apex Digital 3.0 is Live

Tokenisation is full of promise. But in reality, it’s still hard to execute. That Apex Digital 3.0 solves.

Read More

DAW NY Panel

“In 10 years time there won’t be any fiat left” – Peter Hughes Founder and CEO of Apex Group.

Read More Tokeny Events

Spark 25 by Fireblocks
September 8th-10th, 2025 | 🇪🇸 Spain

Register Now

Apex Invest Global Event Series 2025
September 22nd-23rd, 2025 | 🇨🇭 Switzerland

Register Now

Sibos 2025
September 29th-October 2nd, 2025 | 🇩🇪 Germany

Register Now

Tokeny Team Building
September 17th-19th, 2025 | 🇪🇸 Spain

Learn More

KCMC 2025
September 29th-30th, 2025 | 🇰🇷 South Korea

Register Now ERC3643 Association Recap

Stellar Development Foundation Joins ERC3643 Association

The Stellar Development Foundation (SDF), a non-profit organisation supporting the development and growth of the Stellar network, today announced it has joined the ERC3643 Association.

Learn more here

The U.S. White House has highlighted the growing impact of tokenisation in its newly released report.

On page 40, a market sizing chart for RWAs, provided by our member Plume, includes a small but meaningful footnote: the chart begins in September 2021, the month the Ethereum community officially recognised the ERC-3643 tokenisation protocol as an official standard for permissioned tokens.

Learn more here

Subscribe Newsletter

A monthly newsletter designed to give you an overview of the key developments across the asset tokenization industry.

Previous Newsletter  Oct10 Are markets ready for tokenised stocks’ global impact? September 2025 Are markets ready for tokenised stocks’ global impact? Nasdaq has filed with the SEC to tokenise every listed stock by 2026. If approved,… Sep1 SkyBridge Tokenises $300m Hedge Funds with Tokeny and Apex Group August 2025 SkyBridge Tokenises $300m Hedge Funds with Tokeny and Apex Group Last month, together with Apex Group, we introduced Apex Digital 3.0, the first… Aug1 Apex Digital 3.0 is Live – The Future of Finance Starts Now July 2025 Apex Digital 3.0 is Live – The Future of Finance Starts Now To truly scale tokenisation, we need a global force at the… Jul1 Real Estate Tokenization Takes Off in Dubai June 2025 Real Estate Tokenization Takes Off in Dubai Dubai’s real estate market is breaking records. According to data shared by Property Finder, Dubai recorded…

The post SkyBridge Tokenises $300m Hedge Funds with Tokeny and Apex Group appeared first on Tokeny.


LISNR

Bridging the In-Store Data Gap for Retail Media

The Unseen Divide The modern consumer’s journey is a fluid dance between digital and physical spaces, yet current solutions force the retail industry to treat these channels as separate entities. While e-commerce provides a wealth of data for personalization, the physical store remains a critical setting for brand loyalty and immersive experiences, yet it remains […] The post Bridging the In-Sto
The Unseen Divide

The modern consumer’s journey is a fluid dance between digital and physical spaces, yet current solutions force the retail industry to treat these channels as separate entities. While e-commerce provides a wealth of data for personalization, the physical store remains a critical setting for brand loyalty and immersive experiences, yet it remains siloed. This “unseen divide” prevents the creation of a truly unified customer profile, a single, holistic record that aggregates online and offline interactions to deliver the hyper-personalized experiences that drive revenue and retention.

The Business Problem: Fragmented Data and Impersonal Experiences

Today’s shoppers expect brands to know their interests and anticipate their needs, making personalization a competitive necessity and a key driver of success. According to a McKinsey & Company report, brands that excel at personalization are seeing significant gains in marketing efficiency and up to 40% increases in revenue and retention. Conversely, failing to link online and offline personas leads to:

Disjointed Customer Journeys: A customer who browses shoes online may be offered a generic in-store coupon for hats, an interaction that feels impersonal and out of context. Missed Revenue Opportunities: Store associates, lacking real-time insight into online purchase history or loyalty status, cannot offer the timely, personalized upsells, recommendations, or support that drive higher order value. Annoying Interactions: The inability to unify a customer’s activity across channels can result in a frustrating experience, such as being asked to review an item they have already returned.

The path to unified commerce, which integrates the physical and digital experiences into a seamless customer journey, requires a technology that can connect the last mile of the physical store to the digital customer record.

The Strategic Imperative: Proximity-Powered Personalization with LISNR

To bridge the retail data gap, businesses must leverage technology that can instantly and securely identify customers in physical spaces and link their real-time presence to their unified digital profiles. The LISNR solution, powered by the Quest Customer Engagement Platform and the Radius data-over-audio SDK, provides the technical foundation for this strategic imperative.

LISNR’s platform allows brands to move beyond traditional loyalty programs by creating gamified experiences and incentivizing the most impactful customer actions. This solution empowers retailers to drive revenue through loyalty, not just discounts.

Key benefits of adopting this platform for a unified strategy include:

Real-Time Customer Recognition: Identify and acknowledge a customer at the point of entry, not just the point of payment. Smarter Engagement: Engage customers with personalized, contextual messages at the precise decision point, such as the shelf, display, or waiting area. Data-Driven Loyalty: Leverage a unified customer record to offer incentives that are impactful to your business and rewarding to your consumers. Technical Solution: Implementation Roadmap for Retail Media

Implementing the LISNR solution involves integrating the proximity identification layer (Radius) with the engagement intelligence layer (Quest) into your existing retail technology stack. This roadmap is designed to facilitate the rapid deployment of contextual customer engagement.

Phase 1: Establish Proximity Context (LISNR Radius SDK Integration)

The first step is enabling the customer’s device to communicate securely with the physical store environment. This is achieved by integrating the Radius SDK into your existing consumer application, which turns every customer’s phone into a secure receiver for in-store context:

Mobile App Integration: For businesses with a native mobile app, the Radius SDK is integrated directly into the application. The SDK supports major development frameworks, allowing the app to securely listen for inaudible ultrasonic tones while the consumer is shopping. Security Configuration: During this phase, robust security features, such as ToneLock and AES 256 encryption, are configured. This is essential to ensure that only authorized receivers, specifically your customers’ applications, can securely demodulate the ultrasonic data payloads, protecting the data exchange. Phase 2: Deploy Engagement Infrastructure (Quest Platform Setup)

Once the consumer app is set up with Radius, Quest is deployed as the intelligence engine for gamification and personalization. Quest operates as a cloud-based control center:

Centralized Management Portal: Business users leverage the Quest management portal to define rules, create custom quests, design gamified loyalty experiences, and manage rewards. Create complete customer engagement programs in minutes with no coding required. Radius Integration via Webhooks: Quest allows businesses to incentivize any customer action, including ones tracked or triggered by Radius. For example, a business could give customers reward points just for stopping by a sample tasting. The merchant’s app would hear a tone (see Phase 3) signaling that a customer is near the sample booth, then send a webhook to Quest to give the customer credit for that action. Phase 3: In-Store Activation (Tone Broadcasting)

The final step is to activate the physical environment. This involves deploying simple, low-cost speakers or utilizing existing in-store audio playback capabilities, such as those embedded in digital signage, PA systems, or POS devices, to broadcast the inaudible ultrasonic tones.

Proximity Markers: These in-store audio sources act as precise, digital markers. When a customer’s app, running the Radius SDK, detects a tone, the app’s backend can instantly recognize the customer’s presence and their location within the store. This real-time context can then trigger personalized engagement, such as sending a targeted coupon or advancing a loyalty quest.

By following this three-phase roadmap, retailers can move beyond siloed data and rapidly deploy a unified commerce strategy that transforms physical store visits into measurable, high-value engagement opportunities.

The post Bridging the In-Store Data Gap for Retail Media appeared first on LISNR.


uquodo

How to Detect Deepfakes: Advanced Identity Verification for 2025

The post How to Detect Deepfakes: Advanced Identity Verification for 2025 appeared first on uqudo.

Saturday, 30. August 2025

Aergo

Cut the Noise, Find Conviction: Crypto’s Next Chapter with DeFAI and ArenAI

As markets oscillate between euphoria and despair, investors are left asking the timeless question: What do I own, and what do I trade? Yet in today’s world of TradingView charts, Twitter threads, Telegram calls, Medium deep-dives, and endless newsletters, the real challenge is not just deciding between BTC, ETH, or the next altcoin. It is cutting through the noise. Everyone has an opinion, and co

As markets oscillate between euphoria and despair, investors are left asking the timeless question: What do I own, and what do I trade? Yet in today’s world of TradingView charts, Twitter threads, Telegram calls, Medium deep-dives, and endless newsletters, the real challenge is not just deciding between BTC, ETH, or the next altcoin. It is cutting through the noise. Everyone has an opinion, and consuming them all takes enormous energy. Finding a strategy that actually fits your needs is harder than ever.

And even if you manage to find the right answer, that is only half the battle. Implementing it in your portfolio means identifying the best yield models, deciding between staking and re-staking, and continually rebalancing across different chains and platforms. For most, this becomes a full-time job.

That reality is about to change. DeFAI (Decentralized Finance + AI) is poised to unlock possibilities that many investors were previously unaware of. Intelligent systems can filter the noise, craft strategies tailored to your goals, and execute them automatically across chains. Instead of waking up at 3 AM to react to volatility, DeFAI agents will monitor, rebalance, and compound for you while you sleep.

ArenAI: The Investor’s Edge

For investors, ArenAI offers a straightforward way to access sophisticated strategies without requiring coding or tracking every market tick. You can browse models created by experts, select those that fit your goals, and let them work on your behalf in real time. Whether you want a conservative ETH staking strategy, an aggressive momentum trader, or a balanced multi-chain allocator, ArenAI lets you plug into ready-made intelligence that adapts as conditions change.

From Consumer to Creator

But ArenAI does not stop at consumption. If you have an investment thesis or a trading style that works, you can turn it into a model and offer it to others on a subscription basis. Your trading perspective becomes more than just a personal experiment. It becomes a product that others can use and pay for, creating an entirely new revenue stream. Instead of being lost in a sea of opinions, you can build, implement, and monetize your own edge.

Ready to cut through the noise and find your edge? Start the journey at hpp.io

Cut the Noise, Find Conviction: Crypto’s Next Chapter with DeFAI and ArenAI was originally published in Aergo (HPP) on Medium, where people are continuing the conversation by highlighting and responding to this story.

Friday, 29. August 2025

Recognito Vision

How Facial Recognition Attendance System Is Changing Attendance Management

Tracking attendance has evolved significantly from the old methods of paper registers and punch cards. Today, organizations are increasingly adopting facial recognition attendance systems to streamline tracking, improve security, and save time. These systems combine advanced face detection attendance system technology with AI to ensure accurate and hassle-free employee management. With workplaces g

Tracking attendance has evolved significantly from the old methods of paper registers and punch cards. Today, organizations are increasingly adopting facial recognition attendance systems to streamline tracking, improve security, and save time. These systems combine advanced face detection attendance system technology with AI to ensure accurate and hassle-free employee management.

With workplaces getting more tech-driven, integrating an AI attendance system not only improves efficiency but also reduces human errors associated with traditional attendance methods. This technology ensures that attendance is accurate, instantaneous, and tamper-proof, offering a significant upgrade over legacy systems.

 

What is a Facial Recognition System for Attendance

A facial recognition system for attendance uses biometric technology to identify individuals based on their unique facial features. Unlike cards or fingerprint scanners, face recognition offers touch-free verification, making it quicker and more sanitary.

These systems capture the user’s face using cameras and match it against a stored database. The system analyzes unique facial features, such as eye spacing, nose structure, and jaw contours, to confirm a person’s identity. Modern AI-powered systems even adapt to changes in lighting, angle, and facial accessories like glasses or masks.

 

Key Features of a Facial Recognition System for Attendance Contactless Verification: Reduces physical touchpoints, improving hygiene.

High Accuracy: Advanced algorithms minimize false positives and negatives.

Real-Time Tracking: Attendance logs update instantly.

Integration with Payroll: Automatically syncs attendance data with payroll systems.

Multi-Device Support: Works on cameras, smartphones, and tablets.

A study by NIST FRVT highlights the high accuracy rates of modern facial recognition algorithms, proving their reliability in real-world applications. For detailed technical insights, you can check their Face Recognition Technology Evaluation.

 

Benefits of Using a Face Detection Attendance System

Switching to a face detection attendance system offers several benefits for organizations, large or small:

Time Efficiency: Employees no longer wait in lines to clock in. Attendance is recorded within seconds.

Reduced Buddy Punching: Eliminates the risk of proxy attendance since the system identifies each individual uniquely.

Enhanced Security: Only authorized personnel can gain access to the premises.

Data Analytics: Offers detailed insights into attendance trends, overtime, and staff punctuality.

Cost Savings: Cuts down administrative work and prevents errors in manual attendance management.

 

AI-Based Face Recognition Attendance System in Modern Workplaces

The rise of AI has transformed traditional face recognition systems into AI-based face recognition attendance systems. These solutions not only identify faces but also analyze patterns, detect anomalies, and prevent fraud.

For instance, AI algorithms can detect if someone is trying to spoof the system using a photo or video. This adds an extra layer of security that older systems lacked. Additionally, AI models continuously learn from new data, improving their accuracy over time.

Companies implementing AI attendance systems have reported up to 30% reduction in payroll errors and significant improvements in attendance management efficiency.

 

Face Recognition Time Attendance vs Traditional Methods Feature Traditional Methods Face Recognition Time Attendance Verification Speed Slow (manual punch cards) Instant (seconds per employee) Contactless No Yes Accuracy Prone to errors High accuracy with AI algorithms Security Vulnerable to proxy Secure and tamper-proof Integration Manual processing Automated with payroll and HR tools

Switching to a face recognition time attendance system modernizes workplace management while improving employee experience and operational efficiency.

 

Implementing a Facial Recognition Attendance System

Setting up a facial recognition attendance system needs thoughtful preparation:

Assess Needs: Identify the number of employees, office layout, and data management requirements.

Choose the Right Software: Select software that is AI-driven, scalable, and compatible with your current HR systems.

Hardware Setup: High-quality cameras and controlled lighting improve recognition accuracy.

Training & Onboarding: Educate staff about system usage and privacy measures.

Regular Audits: Monitor accuracy and performance regularly to ensure reliability.

Organizations that implement these steps experience smoother adoption and minimal disruptions.

 

Use of Facial Recognition Attendance System in Different Industries

Facial recognition attendance systems are versatile and can benefit a wide range of industries, from education to healthcare. This is how various industries are putting this technology to use:

 

Education: Colleges and Schools Schools and colleges implement facial recognition system for attendance to automate class attendance, reduce buddy punching, and maintain secure campuses.

Real-time tracking helps identify latecomers and monitor classroom occupancy efficiently.

Corporate Offices Large companies use AI attendance systems to streamline employee check-ins and integrate with payroll.

Face recognition time attendance ensures only authorized personnel access sensitive areas.

Small Businesses Small businesses benefit from reduced administrative overhead with face detection attendance systems.

These systems require minimal hardware, making them cost-effective while still accurate.

Hospitals Medical facilities adopt AI-based face recognition attendance systems to track doctors, nurses, and staff shifts accurately.

Contactless verification also reduces infection risks in sensitive environments.

Banks and Financial Institutions Banks use facial recognition attendance systems to secure entry points and monitor staff presence efficiently.

Integrating attendance data with HR systems ensures compliance and improves operational reporting.

Across all these industries, facial recognition attendance systems provide a reliable, secure, and efficient method for managing workforce attendance while reducing errors and administrative work.

Case Study: Efficiency Gains from AI Attendance Systems

A mid-sized tech company in the US replaced their fingerprint-based attendance system with an AI attendance system. Within three months:

Attendance errors dropped by 85%.

Payroll processing time reduced by 50%.

Employee satisfaction improved due to reduced waiting times and contactless check-ins.

This shows how integrating a facial recognition system for attendance directly impacts operational efficiency.

 

Common Challenges and Solutions

Even with advanced technology, some challenges may arise:

Lighting Variations: Use cameras with wide dynamic range or adjust indoor lighting.

Mask or Accessories: AI algorithms trained with partial face data can still recognize employees.

Data Privacy: Store data securely, follow local regulations, and inform employees about usage.

By addressing these challenges proactively, organizations can fully leverage the benefits of a modern AI-based face recognition attendance system.

 

Conclusion

A facial recognition attendance system is more than a convenience; it’s a strategic investment that improves accuracy, efficiency, and security in workforce management. From face detection attendance systems to face recognition time attendance, integrating AI transforms how organizations track attendance.

For organizations looking to adopt cutting-edge solutions, learning from NIST FRVT evaluations can guide technology selection. Recognito offers solutions that combine advanced AI with user-friendly implementation, making it easier for businesses to adopt modern facial recognition attendance systems without hassle.

Explore more at Recognito GitHub for tools and resources related to AI attendance management.

 

Frequently Asked Questions

 

1. How accurate are facial recognition attendance systems?

Modern AI-based systems can achieve over 99% accuracy. Accuracy may vary slightly depending on lighting, camera quality, and employee positioning.

2. Can facial recognition systems work with masks or glasses?

Yes. Advanced algorithms recognize partial faces, so verification works even when employees wear masks, glasses, or hats.

3. Are facial recognition attendance systems safe and secure?

Yes. Data is encrypted, access is restricted to authorized personnel, and AI prevents spoofing or fraud attempts.

4. How do facial recognition systems compare to traditional methods?

They are faster, contactless, more accurate, and prevent buddy punching. Integration with payroll and HR systems also saves time and reduces errors.

5. Which industries benefit most from facial recognition attendance systems?

Schools, colleges, corporate offices, banks, hospitals, and small businesses use these systems to improve attendance tracking, security, and operational efficiency.


iComply Investor Services Inc.

AML for Insurers: Global Regulatory Pressures and Smart Automation Solutions

Insurers face growing global AML scrutiny. This guide shows how to simplify compliance, monitor brokers, and meet multi-jurisdictional requirements using iComply.

Insurance firms face increasing AML scrutiny across jurisdictions—from onboarding to broker due diligence. This article explores key KYB, KYC, and AML obligations in Australia, Canada, the U.S., UK, and Singapore—and how iComply simplifies compliance workflows with edge-secure automation.

Insurers are no longer flying under the AML radar. Regulatory bodies from AUSTRAC to the FCA are sharpening expectations for identity verification, beneficial ownership checks, transaction monitoring, and third-party oversight—particularly for insurers operating across regions or managing delegated broker networks.

In this increasingly complex environment, manual compliance approaches can’t scale. The solution? Intelligent, flexible, and automated AML tools tailored to insurance workflows.

Global AML Standards for Insurers Australia Regulator: AUSTRAC Requirements: AML/CTF program, CDD/EDD on policyholders and beneficiaries, broker monitoring, and suspicious matter reporting Canada Regulator: FINTRAC + OSFI Requirements: Identification of policyholders, UBO checks for corporate accounts, source of funds verification, and transaction monitoring United States Regulators: State DOIs, FinCEN, NAIC guidance Requirements: Customer identification programs (CIP), sanctions/PEP screening, and STRs for high-value or suspicious policies United Kingdom Regulator: FCA Requirements: CDD for life insurance clients, ongoing monitoring of brokers, sanctions screening, and AML risk assessments under MLR 2017 Singapore Regulator: MAS Requirements: AML/CFT policyholder and intermediary due diligence, transaction reviews, and suspicious transaction reporting (STR) Unique Insurance-Specific Risks

1. Broker and MGA Delegation
Insurers rely on brokers and MGAs to onboard and service clients—creating compliance gaps without centralized oversight.

2. Long-Term Policies and Beneficiaries
Life insurance, annuities, and trusts require deeper due diligence due to multiple parties and beneficiary changes over time.

3. Geographic Expansion
Insurers expanding across jurisdictions must manage overlapping and conflicting compliance frameworks.

4. High-Value Transactions
Single-premium life insurance or corporate policies may attract financial crime risk, especially when funded through offshore accounts or third parties.

How iComply Helps Insurance Firms Stay Ahead

iComply provides modular tools designed for real-world insurance compliance—covering policyholder, broker, and partner workflows with full auditability.

1. KYC + KYB for Policyholders and Brokers Onboard individuals and legal entities via branded portals Edge-based identity checks support secure document and biometric verification Automate UBO discovery and documentation 2. AML Monitoring + Screening Screen policyholders, brokers, and payees against sanctions, PEP, and adverse media Monitor payments and claim patterns using configurable risk models Trigger alerts based on policy type, geography, or source of funds 3. Broker Oversight Tools Centralized broker verification and periodic review cycles Assign compliance ownership and flag issues within shared dashboards 4. Privacy-First Architecture Deploy on-prem or in region to support data residency needs Encrypt personal data before transit; manage user consent 5. Audit-Ready Case Management Maintain logs of onboarding decisions, escalations, and communications Generate compliance reports for internal audits or regulator reviews Case Insight: Commercial Insurer in Australia

A national property and casualty insurer used iComply to centralize onboarding and screening for commercial policyholders and their brokers. Key results:

50% reduction in business client onboarding time Improved detection of shell companies and nominee directors Passed AUSTRAC inspection with full audit traceability and no findings Final Take

Insurers that rely on outdated compliance processes are exposed—not just to enforcement, but to inefficiencies and missed risk signals.

Connect with iComply to learn how our platform helps insurance providers simplify AML tasks, reduce broker risk, and stay compliant—across borders and business lines.

Thursday, 28. August 2025

HYPR

The CBUAE's SMS and OTP Ban is a Golden Opportunity

The Central Bank of the UAE has drawn a line in the sand. By March 2026, the era of the SMS and One-Time Passwords will be over for the nation's financial institutions. This is not a minor policy tweak. It's a seismic shift. For years, the SMS/OTP has been the default security blanket for digital banking. A familiar, but flawed, solution. But the CBUAE's directive acknowledges a h

The Central Bank of the UAE has drawn a line in the sand. By March 2026, the era of the SMS and One-Time Passwords will be over for the nation's financial institutions.

This is not a minor policy tweak. It's a seismic shift.

For years, the SMS/OTP has been the default security blanket for digital banking. A familiar, but flawed, solution. But the CBUAE's directive acknowledges a harsh reality: in the face of sophisticated phishing, SIM-swapping, and social engineering attacks, this legacy method has become a critical liability. It creates unacceptable financial and reputational risk.

For the C-suite in the UAE's banking sector, it's easy to view this as another compliance burden. Another costly, complex project to manage. But that’s a limited view. The leaders who will win the next decade of digital banking will see this mandate for what it truly is: a strategic inflection point. This is your opportunity to leapfrog the competition by building a digital experience that is not only radically more secure, but also profoundly simpler for your customers.

Phishing-Resistant Passkeys: The Secure Alternative to SMS OTP

The CBUAE recommends a move toward robust, risk-based authentication. The golden standard that unequivocally answers this call is passkeys.

Passkeys are not just an incremental improvement. They represent a fundamental change in authentication technology, offering a rare combination of superior security and a user experience that is genuinely effortless. Built on FIDO standards, passkeys replace passwords and OTPs entirely. They use the biometrics already built into your customers' devices, like Face ID or a fingerprint, to create a login experience that is fast, familiar, and frictionless.

So, why are passkeys the definitive solution to the CBUAE mandate?

They are Inherently Phishing-Resistant. A passkey is cryptographically bound to your bank's specific website or app. There is no password to steal, no code to intercept. The primary attack vector for financial fraud is neutralized at its source, directly protecting your customers and your firm’s bottom line. They Create a World-Class Customer Experience. No more waiting for delayed SMS messages. No more frustrated calls to the help desk. A frictionless, biometric login increases digital channel adoption, boosts customer satisfaction, and builds loyalty in a fiercely competitive market. They Lower Your Operational Costs. The business case is undeniable. You can immediately eradicate the significant and rising costs of SMS delivery. More importantly, passwordless authentication slashes password-related help desk inquiries, lowering your total cost of ownership (TCO) and freeing up valuable IT resources to focus on innovation, not resets. From Onboarding to Transactions: A CIAM Approach to Customer Identity

True digital leadership isn't just about a secure login. It’s about securing the entire customer relationship. This is where HYPR’s Customer Identity and Access Management (CIAM) solution extends the power of passkeys across the entire user journey.

Our unified framework allows you to:

Onboard Customers with Trust: Securely register new customers and establish confidence from the very first interaction, accelerating their transition into high-value digital clients. Deliver Effortless Authentication: Provide a consistent, best-in-class login experience across all your digital properties, reinforcing your brand’s commitment to innovation and security. Protect High-Value Transactions: Implement seamless, biometric step-up authentication for sensitive actions, preventing fraud without adding frustrating friction for your legitimate customers. The HYPR Advantage: Proven Results and Accelerated Time-to-Market

Navigating this transition requires more than just new technology; it requires a proven, globally-deployed partner.

HYPR is not a startup testing a new theory. We are the trusted identity partner to the world's most demanding financial institutions, including two of the four largest US banks. Our FIDO-certified solutions are architected for the scale, reliability, and security your institution demands. And with our flexible SDKs and APIs, we enable rapid integration with your existing infrastructure, ensuring you lead the market in this transition, not follow it.

Conclusion

The CBUAE’s SMS OTP ban is far more than a compliance requirement — it’s a turning point for the UAE’s financial sector. Institutions that treat it as a checkbox exercise will fall behind, while those that embrace phishing-resistant passkeys will gain a lasting competitive edge.

Now is the time to act. With the March 2026 deadline fast approaching, early movers will be the ones to set the standard for secure, passwordless digital banking in the region.

Related Resources Preventing Social Engineering Attacks on the Helpdesk Best Practices for Identity Proofing in the Workplace NIST SP 800-63-3 Review: Digital Identity Guidelines Overview Passwordless MFA Security Evaluation Guide


1Kosmos BlockID

Addressing AI-Enabled Hiring Fraud: The Remote Work Identity Challenge

Hiring fraud is in the news. Google recently announced it’s bringing back in-person job interviews, citing concerns about AI cheating during technical assessments. But there’s a bigger issue lurking beneath the surface: how do companies verify that the identity of the person who applied, interviewed remotely, and got hired is actually the same and is … Continued The post Addressing AI-Enabled Hi

Hiring fraud is in the news. Google recently announced it’s bringing back in-person job interviews, citing concerns about AI cheating during technical assessments. But there’s a bigger issue lurking beneath the surface: how do companies verify that the identity of the person who applied, interviewed remotely, and got hired is actually the same and is who they claim to be?

This identity verification challenge has created an opening that sophisticated fraud networks and state-sponsored actors are actively exploiting. The US government has recognized the serious issue of North Korean operatives successfully impersonating American tech workers, securing remote positions and gaining access to sensitive corporate systems.

The Scale of the Problem

According to the Federal Trade Commission, financial losses from job and employment scams have exploded from $90 million in 2020 to more than $501 million in 2024, a staggering 456% increase that signals the emergence of hiring fraud as a major profit center for organized criminal networks.

These financial losses, while significant, represent only the measurable impact. The broader concern is operational disruption, intellectual property theft, and potential access to sensitive systems that could compromise business operations or customer data.

How Modern Hiring Fraud Works

Today’s hiring fraud has evolved beyond simple resume padding. We’re witnessing the emergence of “synthetic identities,” completely fabricated personas backed by AI-generated credentials, deepfake technology, and sophisticated social engineering.

AI-Powered Identity Fabrication

Modern fraud networks deploy AI tools that can generate convincing resumes and cover letters in minutes. More concerning, they’re using deepfake technology to mask fraudsters’ appearances and voices during video interviews, creating personas that can pass human scrutiny while bypassing traditional verification methods.

These aren’t isolated incidents. According to Google’s Mandiant threat intelligence team, one American facilitator working with North Korean IT workers “compromised more than 60 identities of U.S. persons, impacted more than 300 U.S. companies, and resulted in at least $6.8 million of revenue” over just three years. The report notes it’s “not uncommon for a DPRK IT worker to be working multiple jobs at once, pulling in multiple salaries on a monthly basis.”

The Challenges with Current Hiring Processes

The very technologies designed to streamline hiring (automated applicant screening, virtual interviews, and rapid onboarding) have become tools that sophisticated adversaries exploit at unprecedented scale.

The traditional hiring trust model, built on static documents, phone interviews, and the assumption that remote workers are who they claim to be, has proven insufficient in an era of AI-enabled deception.

Moving Beyond Point Solutions: The Identity Assurance Approach

Most cybersecurity vendors are approaching hiring fraud with the same mindset they apply to email phishing or malware detection as a point-in-time problem requiring better filters. But hiring fraud isn’t just a detection problem; it’s an identity assurance challenge.

Current solutions fall into two categories: applicant filters that optimize recruitment by culling suspicious applications, and breach prevention tools that try to catch infiltrators before they access sensitive systems. Both approaches treat symptoms while ignoring the root cause: the absence of a verifiable, persistent digital identity foundation.

How 1Kosmos Addresses Identity Assurance

1Kosmos has developed a different approach to this challenge, one that establishes verified identity proofing at the very first interaction and maintains that assurance throughout the entire employee lifecycle.

Our platform’s LiveID technology performs real-time liveness detection while cross-referencing live biometrics with verified government-issued credentials from issuing authorities. This creates a triangulation of identity claims that is exponentially more difficult for synthetic identities or deepfakes to spoof than traditional document-plus-selfie verification methods.

Continuous Identity Assurance Beyond Hiring

The value of true identity assurance extends beyond initial hiring decisions. Once an employee’s digital identity is established through the 1Kosmos platform, it becomes the foundation for every subsequent authentication, access request, and sensitive transaction throughout their tenure.

While point solutions focus exclusively on the hiring moment, 1Kosmos provides continuous identity-backed security. This addresses an important gap in most security strategies: the reality that threats don’t end once someone is hired. Account takeovers, insider threats, and credential compromise can still occur unless there’s a persistent, biometrically-backed identity foundation preventing them.

Building the Identity Foundation for Modern Workforce Security

The hiring fraud challenge represents more than a cybersecurity issue. It’s a trust challenge that requires organizations to rethink how they establish and maintain confidence in their workforce’s identity.

Companies can no longer afford to treat identity as a point-in-time checkbox in their security strategy. In an environment where sophisticated adversaries can manufacture convincing digital personas and nation-state actors are actively infiltrating American businesses through fraudulent hiring, identity assurance must become the foundational layer upon which all other security measures are built.

1Kosmos addresses hiring fraud by:

Establishing Trust on First Use: Securely onboarding new hires with high-assurance, government-verified identity proofing Maintaining Trust Continuously: Providing continuous monitoring and persistent identity assurance for every login, access request, and sensitive operation Empowering User Control: Making employees partners in their own security by giving them control over their identity data Future-Proofing the Enterprise: Creating a zero-trust foundation that protects against the full spectrum of identity-based threats Looking Forward: Evolution in Identity Security

As AI-powered deception capabilities continue to advance and organized fraud networks become increasingly sophisticated, companies face an important choice: evolve their identity assurance strategies or remain vulnerable to an escalating threat.

The companies that recognize identity as the new security perimeter and invest in platforms that provide verified identity assurance rather than point-in-time fraud detection will gain a significant advantage in both security and talent acquisition.
The question isn’t whether your organization will encounter hiring fraud. The question is whether you’ll detect it before it impacts your business, or better yet, prevent it entirely by building your workforce on a foundation of verified, persistent digital identity.

Is your organization prepared for the next wave of AI-enabled hiring fraud? Discover how 1Kosmos provides the identity foundation your workforce security strategy needs. Watch a Demo

The post Addressing AI-Enabled Hiring Fraud: The Remote Work Identity Challenge appeared first on 1Kosmos.