How reservation apps can put fraudsters in a to-go box

A restaurant reservation can make or break someone’s evening, even someone’s week if they identify as a “foodie.” Fraudsters, of course, are well aware and have found a way to juke reservation apps and naive consumers who mistakenly believe they’re in for the Michelin Star treatment at that hard-to-get-into restaurant.

Sit-down eateries have long been fertile ground for fraud (dine-and-dashing, running the card twice in the back, hacking users through malicious QR codes), but restaurant reservation fraud—akin to ticket scalping—uniquely impacts reservation platforms, restaurants, and their would-be patrons.

Let’s take a closer look at reservation fraud and how to stop bad actors from feasting on reservation apps.

A maître d’s worst nightmare

After scammers land a restaurant reservation—typically at a ritzier establishment—they attempt to sell it on Craigslist, Facebook Marketplace, and other classifieds. The poster withholds vital information from unsuspecting buyers: other folks have purchased the same reservation.

Imagine showing up for your anniversary dinner only to find four other parties have the same reservation—a party of ten with no table and no backup plan.

Craigslist ad for restaurant reservation
A recent Craigslist ad for a restaurant reservation

Duped customers are left with hurt feelings and empty stomachs, but restaurants, many still finding their footing amid the pandemic, suffer lost revenue and the likelihood that neither of these customers will return in the future. In turn, the restaurant blames the reservation app and may seek out a similar platform that isn’t so easily manipulated.

Does such a platform exist? How can reservation apps (and restaurants) turn the tables on bad actors?

Tonight’s special: preemptive fraud detection

Deduce recently partnered with a global restaurant reservation platform to solve its reservation fraud issue. The intelligence, scalability, and preemptive nature of Deduce’s solution was precisely what the app needed to put fraudsters in a doggy bag.

Malleability played a crucial role as well. Deduce created custom risk signals and provided a continuous authentication solution for the app, Improbable Travel, to neutralize phony reservation bookers. If someone in Kansas makes reservations at restaurants in New York, Los Angeles, and New Orleans for the same day, chances are it’s a ruse, doubly so for new accounts. By flagging such cases based on geolocation and account status, and referring them to the reservation app for manual review, Deduce’s tailor-made approach reserved restaurant tables for legitimate customers only.

A recipe for success

Deduce owes its flexibility and real-time fraud detection to its Identity Network comprising 500 million anonymized user profiles, gleaned from over 150,000 websites and apps, and over 1.4 billion daily activities. In fact, Deduce sees the majority of the transactional online U.S. population multiple times per week. It verifies users through risk signals, like Impossible Travel, and trust signals such as familiar device, familiar network, familiar activity, and familiar time of day.

These real-time risk and trust signals work in tandem to spot bad actors long before any malicious behavior can take place. In the case of a restaurant reservation platform, preemptively intercepting fraud is the way to a restaurant and app user’s heart: full tables, satiated appetites, less churn.

Are you starving for an effective first line of defense against account creation fraud and to prevent ATO attacks while reducing friction for legitimate customers? Contact us today and get set up in just a few hours.

Fraudsters are a virtual nightmare for metaverse users (and companies)

Skepticism aside, the metaverse is primed to be the next phase of the internet.

You may not enlist a metaverse real estate agent to buy virtual property next to Snoop Dogg, but there’s a fair chance you’ll have your own 3D avatar within the next few years. After all, the metaverse market could be worth $800 billion by 2024.

As with any new technology, the danger of fraud increases as more users and brands hop aboard the metaverse wagon. It behooves companies to hatch a plan of defense against bad actors in the metaverse while it’s still early.

More data, more problems

If you thought the flat-screen world collected an extreme amount of data from its users, the metaverse would like a word. Thanks to wearable NFTs, virtual avatars and headsets, an online AR/VR playground gathers behavioral data that goes beyond location and search engine queries. Even eye movement can be tracked and analyzed.

More data going in means more data going out — to marketers, and to fraudsters. Brands can tailor customer experiences like never before and perfect their go-to-market strategies; meanwhile, bad actors can attack the metaverse from an inordinate number of touchpoints.

The metaversal landscape and types of data extracted from users may be new (and subject to privacy and compliance concerns), but the fraudster schemes are all too familiar.

What does metaverse fraud look like?

Because the metaverse incorporates online gaming elements into its user experience — digital avatars, achievements, in-game currency — both share similar cybersecurity concerns.

Like other verticals, account takeover (ATO) remains the biggest threat. Hijacking an account allows fraudsters to drain crypto funds, but they can also assume that person’s identity — to the chagrin of the victim who may have spent countless hours building up their metaverse cachet — or sell the account on a third-party marketplace.

The trafficking of crypto in the metaverse opens it up to scams like rug pulls and innovative phishing attacks. There is also the danger of account creation fraud, which leads to money laundering and promotional abuse, as well as friendly fraud and chargebacks that can arise from metaverse transactions.

Bundle up!

Preventing fraud in the metaverse isn’t all that different from surviving a blizzard: both require layering up. This is especially true at the account creation and login stages, where credential stuffing is a breeze thanks to fleets of automated bots.

The essential part of any layered anti-fraud approach, reality or virtual reality, is dynamic data — real-time insights that plug the holes in account verification tactics such as 2FA, MFA, and device fingerprinting. The Deduce Identity Network does just that, tapping more than 450 million anonymized user profiles and 1.4 billion daily user activities to verify accounts faster and more securely. Device fingerprinting, for example, will produce false positives as the metaverse is accessible on multiple devices. Add the intelligence of a Deduce platform, and more legitimate users will get in, stress- and friction-free.

The metaverse may be a relatively new phenomenon, but fraudsters are already a step ahead. Last year, metaverse companies saw an 80% increase in bot attacks and 40% increase in human-driven attacks. The best way to catch up and preempt these attacks is to fortify defenses at registration and login, which significantly improves user experience, curbs churn and reputational damage. Neglect to install a real-time intelligence layer, though, and it could cause a virtual nightmare.

Decentralization doesn’t equal invulnerability

It seems like every day there’s a new kid on the blockchain, a new cryptocurrency, a new crop of crypto-curious consumers hankering for a taste.

Trafficking in crypto requires choosing from a plethora of crypto wallets — what consumers use to buy crypto and store their private keys — but those, even with the decentralization of Web3, have proven vulnerable to fraud.

We took a closer look at five crypto wallets to study these limitations ourselves, as well as their impact on the user experience. Here is what we found.

Seed phrase malaise

A common way in which users gain access to their wallets is the almighty seed phrase. This randomized combination of 12–24 words, automatically generated by the wallet, acts as a master password that unlocks the private keys used to buy and sell crypto.

We were assigned seed phrases of our own on wallets imToken and Trust (the latter offers the option to use a passcode instead and only utilize your seed phrase as a backup). Your seed phrase is sacred; if someone else knows it, they can steal all of your crypto. Screenshotting it or storing it in the cloud is a no-no. That only leaves one option: writing it down.

A seed phrase example from the Trust wallet

Some people go the extra mile to protect their seed phrase — storing it across multiple safety deposit boxes, engraving it in steel — and for good reason: if they lose it, or if it’s compromised, game over. Given the added friction of both storing and entering a seed phrase upon each transaction, and the potentially life-altering ramifications of losing it, it behooves wallets to find a safer and more secure alternative.

The problem with biometrics

ArgentMyCrypto, and MyEtherWallet all enabled us to log in via Touch ID. From a friction perspective, this is preferable to 2FA solutions texting users a one-time passcode that can be hacked through sim-swapping. But, while the passwordless convenience is nice, Touch ID and similar biometric tools aren’t as secure as you think.

Per a 2021 report from Kraken, it costs bad actors no more than $5 to spoof a fingerprint. Sure, Touch ID will soon give way to Face ID, but facial recognition can be bypassed just as easily. Silicone masks, pulling pictures from social media, and other workarounds aren’t tall tasks for fraudsters eyeing hundreds, thousands, millions of dollars worth of crypto.

Creating a pin on MyEtherWallet

Argent and MyEtherWallet provide a six-digit passcode alternative to Touch ID. This is problematic as well. What if you forget your pin code and (gulp) the seed phrase needed to reset it? Not to mention the credential-stuffing risk posed by folks who reuse pin codes across different wallets and/or websites.

No time like the present

A recent survey from NordVPN found that 32% of respondents who were aware of cryptocurrency hardly knew about the dangers of crypto-related fraud. As the popularity of crypto and decentralized apps on Web3 continue to rise, this could lead to lots of friction-averse users and compromised wallets if the existing verification methods aren’t tweaked to create an experience that is both seamless and secure.

A new wave of phishing attacks hit the Web3 landscape just last week. If fraudsters aren’t stealing users’ pin codes by impersonating wallets or deploying malware, they’re typosquatting to attract users to dummy websites and seizing their tokens via misleading smart contracts.

If there’s one silver lining, it’s that the transparent nature of Web3 allows for measuring financial impact and identifying opportunities for improvement. Nevertheless, the time to beef up Web3’s security is now, while still early in its development.

Sunny, with a chance of ATO

New year, new resolutions. For some, that means a Planet Fitness membership or Dry January; for us, it means continuing to neutralize bad actors and innovate for a fraud prevention industry saddled by hindered data access and outmoded tactics.

What changes does the Deduce team want to see happen in 2022? Here are a few predictions from our resident soothsayers.

Ari Jacoby, Founder/CEO

Ari believes “coopetition” among cybersecurity firms will help close the data poverty gap in 2022.

From 2019 to 2020, we saw a 300 percent jump in (ATO) account takeover fraud alone. This year, unfortunately, that figure is likely to get worse. Most will attribute this to the uptick in online usage amid the pandemic, which is certainly valid, but data poverty plays a role as well.

Data is the new currency. Most of the valuable data — specifically real-time behavioral data — is confined within the walled gardens of the MANGA Gang. This makes ‘coopetition’ between cybersecurity firms imperative.

Competing companies in the financial, adtech, and healthcare industries often exchange actionable data without any problems. Until fraud prevention companies follow suit, predictive algorithms won’t reach their full potential and ATO will continue to keep execs up at night. I’d love to see the data poverty gap close in 2022, but I’m afraid the worst possible outcome from this issue — another massive data breach — could happen again this year if cybersecurity leaders don’t put their heads together.

Robert Panasiuk, CTO

Robert anticipates a growing, albeit insufficient, number of legacy software solutions changing the way in which they deploy their apps.

This year, we’ll see more companies shift to a devops deployment model that gets new customers up and running in hours instead of months. However, even with the devops model’s ability to fasttrack go-to-market and deployment — an absolute must in today’s landscape — some enterprise businesses will stick to their legacy guns.

Other legacy holdouts will struggle to pass up the efficiency of the devops model, particularly those needing a fraud prevention solution that outraces fleet-footed fraudsters. Rapid deployment, unshackled by the months of development and testing required by legacy systems, delivers a first-class customer experience. The devops approach also enables best-of-breed solutions to be easily integrated. Case in point: the Deduce MFA Intelligence solution will be available in the Auth0 marketplace, which will reduce false positive MFA challenges by more than 50%.

A mass migration to the devops model? Probably not in 2022. But I’m guessing more execs at the C-suite level will finally part ways with unmaintained, outdated legacy technology and prioritize devops-style fraud tools that update seamlessly and can keep up with fraudsters and user demands. Similar to last year’s Okta-Auth0 acquisition, we may see another major legacy company buy a devops-based solution outright.

Adish Kasi — VP Sales

Adish expects to see a significant jump in passwordless adoption this year.

Passwordless login solutions are already on the rise. In 2022, I believe we’ll see a significant jump in passwordless adoption and user buy-in.

Modern app users are growing more and more tired of keying in username/password combos upon each visit, and companies loathe the friction — and subsequent churn — this causes. In 2021, Experian’s Global Identity & Fraud Report polled more than 2,700 businesses and 9,000 consumers about their preferred login approach. Passwords landed outside the top three, beat out by physical and behavioral biometrics and SMS pin codes.

This year, I see a larger contingent of users (and companies) prioritizing a seamless customer journey accompanied by a transition to passwordless solutions. However, the barrier to entry, and the achilles heel, for mass adoption in this space entails designing an intelligent solution for device enrollment and account recovery. What happens if your primary device is lost or stolen? How does an organization curtail risk at the moment of device enrollment?

Identity intelligence, as a new categorical solution, will emerge as a vehicle for helping organizations through the transition to passwordless solutions.

That concludes our resolutions. If your resolutions have fallen by the wayside, here’s a free one from Deduce: leverage real-time insights to protect your users (and user experience) from identity fraud.

The Deduce Identity Network is just the ticket. Learn how our coalition of 150,000 websites and apps and over 450 million anonymized profiles can mitigate account takeover, account creation fraud, and other cyberthreats.

Online gaming fraud is soaring. Here’s what to do about it.

The global gaming market is expected to reach $287 billion by 2026, a significant jump from $168 billion in 2020.

More gamers click-clacking their controllers and keyboards means more fraudsters gnawing at the bit, taking advantage of vulnerable online gaming platforms with exploitable security defenses. In fact, bad actors accounted for more than a third of gaming traffic in 2020.

Perhaps more than any other vertical, the schemes cooked up by fraudsters in the gaming sphere are both multitudinous and exceptionally cunning. The end result, however, is the same for gaming companies: defrauded users, lost revenue, and churn.

Here is a closer look at why online gaming fraud isn’t a game, and how video game publishers and services can hit the reset button and protect players from malicious (and costly) online attacks.

A formidable ATO arsenal

As we speak, gaming fraudsters are running a variety of account takeover (ATO) scams targeting naive players. Much of this is happening in the PC gaming world, specifically on gaming distribution service Steam, which controls about 75% of the PC market.

One scam that’s made the rounds as of late starts off like many others do: with a seemingly innocuous DM. “I accidentally reported your Steam account,” says the bad actor, intimating to the unsuspecting user that they should contact a Steam admin to avoid getting banned. The problem is that said “Steam admin” is in on the heist, so once the player sends screenshots and other sensitive information to the fake admin, it’s game over for their account.

Other common Steam schemes hack players through legitimate-looking third-party websites or item inventory pages. One fraudster, messaging from a compromised friend’s account, might ask a player to visit a website and vote for them to participate in an upcoming tournament. Another fraudster will share a link to a bogus marketplace selling skins (visual enhancements to a character’s appearance or weapon). Login credentials are entered and subsequently phished; accounts are taken over and drained, then used to bait the next batch of players.

When you factor in the classic forms of online fraud — transaction fraud, promotion abuse, friendly fraud — the bag of tricks for gaming fraudsters runs quite deep. And the in-game assets they’re stealing are more valuable than one might think.

No time to play around

For consumers, in this case video game players, having their accounts seized is costly and painful. Aside from losing the money in their digital wallets, players can be stripped of in-game assets (collectively valued at $50 billion) they either purchased or earned through hours and hours of gameplay. Imagine spending potentially weeks or months stacking achievements and stats only to lose it all in a few minutes.

For gaming companies, ATO fraud represents the worst possible version of Space Invaders: measly defense lasers outmanned by endless rows of fraudsters and fake accounts. Revenue is lost; in-game economies are thrown out of whack; users churn away due to a lack of trust; and don’t forget the possibility of a large-scale breach.

Beefing up security at the account creation and verification stages is the right idea, but more friction won’t help matters. Gaming companies must protect their players — and their revenue — but avoid scaring them away with sluggish MFA solutions.

Game on, fraudsters

Protecting online gamers from ATO is comparable to fighting fraud in any other vertical that requires account creation and logging in. Authentication methods like 2FA and MFA can help, but they add unnecessary friction and rely on flawed static data. The panacea lies in real-time insights, dynamic data that can effectively combat ATO schemes like credential stuffing and synthetic identity fraud.

Deduce realizes that ATO is not a game. Our real-time Identity Network taps more than 450 million anonymized user profiles and 1.4 billion daily user activities across participating 150,000 websites and apps to prevent account creation fraud that leads to ATO downstream. Faster and more accurate authentication makes for happier players and robust revenue.

Want to make your user experience seamless and secure? Give us a shout today and see how our Collective Intelligence Platform can keep the good people in and the bad people out.

Once crypto is gone…it’s gone

Crypto fraud taking off

Crypto.com, one of the most popular crypto exchange marketplaces, made a big splash last Christmas when it usurped Staples Center as the home of the Los Angeles Lakers.

Recently, the company made another splash: a $34 million security breach.

The Crypto.com hack exemplifies the rise in crypto fraud over the past year, which jumped 79% in 2021 due in large part to synthetic identities. Per Pew Research, 86% of Americans are knowledgeable about cryptocurrency, and the amount of crypto users currently sits at around 300 million. With this number expected to go up, crypto apps face a herculean task in protecting their platforms from ATO (account takeover), money laundering, and other fraudster schemes.

Cryptic crypto

Balancing security with a seamless customer experience is a tough balance for companies employing traditional fraud prevention approaches. Unfortunately, most crypto apps lean into seamlessness and are too loosey-goosey at the account creation stage.

The real culprit here is static data — what crypto apps use to verify customer identity — social security numbers, dates of birth, names and addresses that can be purchased on the dark web for peanuts and cobbled into a synthetic identity. IP addresses? Those can be spoofed. And fraudsters can even pay a real person to verify their own identity through legitimate documents, such as a photo ID.

Glaring vulnerability at the account creation stage isn’t the worst part of the crypto fraud problem; it’s the fleeting nature of crypto itself. Cryptocurrency is not insured by the FDIC, so once it’s gone…it’s gone. Victims of the common “rugpull” scam know this all too well: a bad actor convinces them to invest in the newest (fraudulent) coin on the blockchain, only to vanish along with everyone’s funds and the bogus cryptocurrency that never was.

Multi-factor is hardly a factor

Complex passwords, OTPs, 2FA, and MFA can be effective in stopping fraud. But, as with Crypto.com’s 2FA approach, effective isn’t good enough.

For the advanced fraudster and their legion of bots, creating a synthetic identity or credential-stuffing or sim-swapping their way into ATO and money laundering is light work. The security protocols above are a decent start; however, they must be paired with dynamic, real-time insights to be truly impactful.

At Deduce, we are all about living in the here and now. There’s no time like real time when it comes to preventing crypto fraud or identity fraud at large, which is why we’ve built our real-time Identity Network that cross-references more than 450 million anonymized user profiles and 1.4 billion daily user activities across 150,000 websites and apps. It’s an added layer of real-time intelligence that identifies fraudsters and legitimate users with better accuracy and efficiency. It’s a winning trifecta of less fraud, less false positives, and less churn — users will login safely and seamlessly, and crypto apps can avoid a front-page breach.

Want to see how Deduce can fortify your app’s defenses? Drop us a line today and get started in no time.

Static data alone can’t ward off synthetic fraudsters

The synthetic ascension

In 2021, identity fraud targeting US-based e-tailers made up 30% of all fraud losses. Within that troubling percentage lies an uptick in synthetic identity fraud, in which bad actors fuse stolen data (phone numbers, emails) with fake data to create a bogus identity.

Post-pandemic, fraudsters have feasted on users’ anxiety and increased online activity, phishing login information with very little effort. Given this trend, experts foresee another rise in synthetic identity fraud in 2022, especially in the financial services arena and on platforms that utilize seamless signup and other quick decisions.

With factors like social security number randomization making synthetic “Frankenstein identities” more prevalent, stopping this mish-mashed form of identity fraud is imperative before it festers into a costly and potentially years-long disaster.

Not your average identity fraud

The challenge of preventing synthetic identity fraud lies in its patchwork composition. A synthetic identity pulls together fake and legit info from multiple sources instead of targeting a single consumer victim, making it much more difficult to detect. With no defrauded person to tip off companies, accounts created via synthetic identity can remain active indefinitely like clandestine, money-sucking leeches only to vanish once the on-file credit card maxes out.

Again, there’s no real-life person to trace the account back to, which complicates the identification of synthetic identity fraud, much less the calculation of losses (assuming fraud is circled as the culprit). Unfortunately, differing interpretations of synthetic identity fraud among enterprises can often chalk cases up to credit-related issues, leaving credit lenders and related providers to carry the financial burden.

If need be, synthetic fraudsters can bypass defenses with more than a fake SSN and stolen email. Forget Frankenstein identities — the craftiest of synthetic fraudsters are combining facial features from multiple people with AI to create realistic “Frankenstein faces.” Yet another wire-crossing maneuver that throws traditional fraud prevention solutions off the scent.

The synthetic antiseptic

Old school fraud prevention tools rely on static data such as physical address and device fingerprinting to detect bad actors. This won’t cut it for synthetic identity fraud.

The only way to effectively root out stealthy synthetic fraudsters is to combine static data with live and historical real-time user activity data. By adding this extra layer of real-time intelligence —behavioral biometrics, time of day, location, etc. — there are too many holes for fraudsters to cover up or build an authentic digital “legend” and more than enough information to help companies spot a fraudulent identity.

This is precisely the extra punch Deduce provides. We pack more than 450 million anonymized US profiles and 1.4 billion daily user activities (logins, account creations, checkouts, etc.) from over 150,000 websites and apps into our real-time Identity Network, protecting organizations from financial losses and the other nightmarish side effects of synthetic identity fraud. For example, a solution that’s solely reliant on static data will fall victim to false positives and ultimately turn good customers away, while the Deduce approach is able to contextualize scenarios where a new device or other factor may not be consistent with identity fraud.

Fraudsters can fake a number of different attributes, but nothing they spoof can outsmart the collective intelligence and profile history of the Deduce Network. The breadth and diversity of our data (transactions, social media activity, etc.) is too gargantuan — and too expensive for the average fraudster to circumvent.

Tap into the Deduce Identity Network today and bolster your defense against synthetic identity fraud. Contact us here to get started.

Deepfakes are coming for the identity fraud crown

To no one’s surprise, cybercrime ballooned last year. Ransomware alone saw an 11x increase from July 2020 to June 2021. Adding to the excitement — for fraudsters, at least — is the burgeoning threat of deepfakes: synthetic media that uses AI to mimic a person’s face, voice, or movement with stunning accuracy.

With more companies incorporating biometrics, fingerprinting, and video/voice verification into their authentication processes, a growing interest in deepfake technology across the dark web doesn’t bode well for preventing identity fraud. Educating employees of deepfake warning signs helps, but ultimately companies will need to stave off the threat with AI technology of their own (and then some).

Truly, madly, deeply fake

Most of the general public still considers deepfakes a novelty item. People have used the technology to alter political videos and insert Nicholas Cage’s face into Indiana Jones and James Bond movies. Last year, Roadrunner, a documentary about the late chef Anthony Bourdain, stirred up controversy for using synthetic audio snippets of Bourdain’s voice.

But more nefarious examples of deepfakes illustrate the threat of identity fraud and companies potentially losing millions of dollars. In 2019, a man impersonated the French Defense Minister over Skype and scammed his way to $93 million. The same year, an AI-generated voice cheated a Hong Kong bank manager out of $35 million.

Manipulating audio is a layup for fraudsters — they can turn a short speech from a corporate executive or government official into a cloned voice sample using one of many readily available machine learning apps. Voice deepfakes are harder to spot than video due to the lack of visual evidence. Voice deepfakes delivered over the phone are even more difficult because of the reduced audio quality.

Image- and video-based deepfakes employ tactics reminiscent of Face/Off, fraudsters wearing silicone masks to fool facial biometrics (“face spoofing”), or using social pictures to bypass face verification. Fraudsters often circumvent authentication protocols using pre-recorded deepfake videos, or, again, by wearing hyper-realistic silicone masks. Liveness tools can help detect videos with silicone masks, but only tools that account for facial actions and traits: blood circulation, skin texture, blinking, etc.

Adopting AI-based software that detects deepfakes isn’t enough; fraudsters have AI tools of their own. Synthetic identity fraud is rising fast, as is the sophistication of the technology available on the dark web. Is it possible for businesses to beef up their biometrics authentication and stay a step ahead of bad actors?

Biometrics’ best friend: real-time insights

In the ’80s, no one defended the universe like Voltron. But the Voltron robot without its head? Not as formidable.

Not to say biometrics verification tools — specifically those designed to stop deepfakes — lack intelligence, but without another layer of AI-powered smarts, more identity thieves will slip through the cracks. This will open the door to synthetic identity fraud, account creation fraud, account takeover, and churn.

Why not buttress biometrics and other authentication techniques with an additional layer of real-time insights to thwart identity fraudsters? For example, a facial recognition solution coupled with trust signals such as time of day, IP address, or device ID could boost the certainty that a voice, image, or video is the real McCoy — and be the difference between stopping a deepfake and falling victim to a multimillion-dollar heist. Static, or historic, data can’t compete with real-time data. Relying upon names, dates of birth, addresses, and maiden names as another factor of authentication is futile because much of this information is available on the dark web.

At Deduce, we’ve built a product that pairs nicely with existing AI solutions like aged cheddar to a cabernet sauvignon, harnessing real-time, dynamic data to bolster account verification and help prevent identity fraud. Our real-time insights assist in preempting attacks by adapting to the latest fraudster schemes and behaviors — precisely the malleability needed to strengthen image, video, and voice authentication against deepfakes.

Our not-so-secret sauce? A real-time Identity Network that boasts more than 450 million anonymized US profiles (multiple devices and accounts per user) and 1.4 billion daily activities (logins, checkouts, registrations, etc.) captured from in-page collection methods on 150,000 websites and apps.

Want to see how Deduce’s real-time insights can fortify the castle walls of your identity authentication? Contact us today.