ID Future: Reusable, Secure, Real?

ID Future: Reusable, Secure, Real?

Released Wednesday, 9th April 2025
Good episode? Give it some love!
ID Future: Reusable, Secure, Real?

ID Future: Reusable, Secure, Real?

ID Future: Reusable, Secure, Real?

ID Future: Reusable, Secure, Real?

Wednesday, 9th April 2025
Good episode? Give it some love!
Rate Episode

Episode Transcript

Transcripts are displayed as originally observed. Some content, including advertisements may have changed.

Use Ctrl + F to search

0:00

If digital identity is going to

0:02

be the future, it has to

0:04

work for everyone. I would love

0:06

to see us help them skip

0:08

physical identity documents all together. And

0:10

let's just go straight to digital

0:12

identity. Wouldn't that be the perfect

0:15

world though? I feel like consumers

0:17

have become so callous to data

0:19

breaches that they almost don't even

0:21

register anymore. No, I'm really scared.

0:23

I like how positive we've been

0:25

on this podcast episode today. Hello,

0:27

dear audience, and welcome back to

0:30

Series 3 of What the

0:32

Fraud. A podcast by Some

0:34

Sub, where Digital Fraudsters meet

0:36

their match. I'm Thomas Taraniak,

0:38

head of partnerships here at

0:40

Some Sub, the Global Verification

0:43

platform, helping to verify users,

0:45

businesses, and transactions as well.

0:47

Governments worldwide are racing to

0:49

roll out digital identity systems,

0:51

promising greater convenience, security and

0:54

efficiency, of course. From Estonia's

0:56

e-residency program to Singapore's same

0:58

pass, these initiatives are gaining

1:00

momentum. The UK is also launching

1:02

its own digital wallet to store

1:05

official documents this year in 2025,

1:07

but with new technology comes new

1:10

risks. Hackers recently exposed vulnerabilities in

1:12

Germany's digital ID system. affecting over

1:14

10 million users. And in India,

1:17

login credentials were leaked on the

1:19

Dark Web for just $8, as

1:21

per the Adhar database. And in

1:24

this episode today, we will sit

1:26

down with Daniel Flow, head of

1:28

digital identity at the London

1:30

Stock Exchange Group, and

1:32

Eddie Moxon Garcia, product

1:35

marketing lead at Samsung,

1:37

to hear what's being

1:39

developed in the new

1:41

digital ID sector. and

1:43

find out whether there

1:45

really can be a

1:47

reusable identity solution that

1:49

balances privacy, security and

1:51

accessibility as well. Daniel Eddie,

1:53

thank you so much for coming

1:56

on the show with us today.

1:58

I would love to get... straight

2:00

into it if you don't mind.

2:03

So Daniel, if I turn to

2:05

you first, I'd like to address

2:07

digital IDs. It is going absolutely

2:09

global right now and you're right

2:12

at the center of it at

2:14

the London Stock Exchange Group. So

2:16

how did you get into the

2:18

world of digital ID in the

2:21

first place and how has the

2:23

landscape evolved since you started? So

2:25

I got into digital ID, I

2:27

think the way most everybody gets

2:29

into most anything, through personal connections

2:32

and some friends. So I started

2:34

interacting with a startup called Global

2:36

Data Consortium back in the mid-20-10s,

2:38

worked with them on and off

2:41

as an advisor through that period,

2:43

and then came on as a

2:45

full-time employee sometime around 2020. And

2:47

the London Stock Exchange Group bought

2:50

us. in 2022. It has been

2:52

an interesting ride through the space.

2:54

I got involved because it's just

2:56

full of interesting problems. We've got

2:59

eight and a half billion people

3:01

globally. How do we enable them

3:03

all to participate in the digital

3:05

economy to transact? to prove who

3:08

they are, how do we keep

3:10

people safe online, how do we

3:12

protect people from fraud, and it

3:14

seems like there's just never an

3:17

end to the opportunities to learn,

3:19

grow, and hopefully stay ahead of

3:21

the fraudsters. I think the big

3:23

change for us is, you know,

3:26

10 years ago, there was a

3:28

lot of human intervention in identity

3:30

verification. There was a huge focus

3:32

on documents. And many times you

3:35

would see a lot of that

3:37

work really being performed behind the

3:39

scenes by human beings with eyes

3:41

on glass. And the technology for

3:44

fraud detection, the technology for liveness

3:46

has come so far, and the

3:48

adoption of digital IDs has come

3:50

so far. It's like being in

3:53

a whole new space than the

3:55

one I started in. Absolutely, Daniel.

3:57

I mean, that's a big mission.

3:59

I think one that we're all

4:02

a part of, the democratization of

4:04

access to, of course, digital services

4:06

globally for those underserved. But that

4:08

means sort of releasing those moats,

4:11

those barriers to entry for those

4:13

individuals. And of course, having people

4:15

on the back end actually go

4:17

through and do everything manually, an

4:20

over usage of ID documents, etc.

4:22

Can also, sort of kill progress.

4:24

So Eddie, Eddie, great to have

4:26

you on the podcast, finally. forward

4:29

question, what in your opinion are

4:31

the benefits of digital ID compared

4:33

to traditional methodologies? First I have

4:35

to agree with Daniel, but it's

4:38

a fascinating space, but it's just

4:40

riddled with problems every new day

4:42

we come up against new challenges.

4:44

So it does keep us interested,

4:47

I would say. I would say

4:49

the biggest difference and benefit is

4:51

that digital reusable identity aims to

4:53

remove repetitive onboarding steps. And this

4:56

is a major bottleneck for businesses

4:58

and users, so it's not just

5:00

something that... Only companies need to

5:03

worry about. Right now, if you

5:05

want to sign up for a

5:07

new service, open a new bank

5:09

account, access a crypto exchange, maybe

5:12

just join an online marketplace, you

5:14

have to go through a pretty

5:16

much identical process from scratch every

5:18

single time. And that is very

5:21

tedious for you, but it also

5:23

leads to drop-offs and rejections and

5:25

so on. So the premise of

5:28

reasonable identity is that you can

5:30

verify once and then reuse that

5:32

verification across multiple platforms. This does

5:34

mean faster on boarding and lower

5:37

drop-off race, which makes everybody happy.

5:39

But I do think that there

5:41

is an argument to be made

5:44

about financial inclusivity. Our own research,

5:46

which came in the form of

5:48

an initiative called Green Flag, there's

5:50

a fantastic white paper out, I

5:53

encourage everyone to read it. shows

5:55

that there are 627 million people

5:57

across the world that are digitally

5:59

excluded and I can go into

6:02

the reasons a bit later on

6:04

but the point is that that

6:06

627 million people represent 1.75 trillion

6:09

US dollars of missed opportunity for

6:11

businesses. So making identity digital and

6:13

reusable but also universally recognized is

6:15

something that companies should care about

6:18

because it's not about just reducing

6:20

friction. For users it's about expanding

6:22

their market and revenue potential and

6:24

I would say that's a pretty

6:27

big benefit. Definitely, Eddie. And we're

6:29

talking about solving a massive problem

6:31

here. And it's like one step

6:34

at a time, as I'd always

6:36

think. This year, the UK government

6:38

is planning to introduce a new

6:40

digital wallet storing official documents, such

6:43

as driving licenses, which will be

6:45

completely digital. So countries like Germany

6:47

and Estonia have already implemented similar

6:49

systems with mixed results. Daniel, why

6:52

is there such a demand for

6:54

digital IDs right now? I think

6:56

there's always been... demand, especially as

6:59

if you look at the last

7:01

25 years, as we've moved from

7:03

having our digital selves. in our

7:05

digital participation, a complementary element of

7:08

our lives. It's really become how

7:10

we live our lives. You know,

7:12

I like to use this as

7:14

an example. I work from a

7:17

home office. I bank with a

7:19

financial institution that doesn't have a

7:21

physical branch anywhere near me. I

7:24

live in the United States and

7:26

I work for a company based

7:28

in London. So my digital self,

7:30

my my transacting online, the accounts

7:33

of... sign up for and the

7:35

things that I do, they're not

7:37

a complementary element of my life.

7:39

They are my life. And if

7:42

you go back to all the

7:44

protocols that the internet has, there's

7:46

no identity protocol. There never has

7:49

been. And what we have done

7:51

throughout the, you know, especially the

7:53

last 25 to 30 years, is

7:55

we've made it work with... physical

7:58

photographic IDs and user-controlled devices. And

8:00

that fundamentally is a useful and

8:02

purposeful work around. The photo ID

8:04

I always like to point out

8:07

was invented by the British in

8:09

1915 during the Great War because

8:11

they were concerned about German spies

8:14

entering the UK. If you go

8:16

back, you know, let's say 10

8:18

years, if you wanted to verify

8:20

yourself online, you were using a

8:23

100-year-old technology at core to establish

8:25

who you are and gain entry

8:27

into a system or a financial

8:29

institution. that you wanted to. So

8:32

I would argue that for as

8:34

long as people have been transacting

8:36

online, there's been the need for

8:39

a digital identity or a way

8:41

to assert and prove your identity

8:43

that is truly digital. I think

8:45

what we're seeing in the last

8:48

five years, particularly, is our governments.

8:50

Our regulators are catching up to

8:52

that demand and are starting to

8:54

recognize the digital world for what

8:57

it is and the need of

8:59

their constituents and consumers for what

9:01

they are. So not to be

9:04

overly picky, but I would argue

9:06

the demand's always been there. I

9:08

think we're just finally seeing some

9:10

of our older institutions catch up

9:13

to it and offer what people

9:15

have always wanted online. Absolutely. So

9:17

I do agree there as well.

9:19

Eddie, what do you think on

9:22

the matter may ask? I agree

9:24

also. I think the demand has

9:26

always been there, but the high

9:29

demand that we're seeing today is,

9:31

I would say, being driven by

9:33

this perfect storm of regulatory pressure,

9:35

security concerns, and consumer expectations. And

9:38

I think those expectations come from

9:40

the reality of people's lives. Already,

9:42

governments worldwide are recognizing the paper-based

9:44

identification. just doesn't cut it for

9:47

a digital first economy. And if

9:49

we take the UK's digital wallet

9:51

initiative, for example, and Daniel correct

9:54

me if I'm wrong, please keep

9:56

me honest, it's part of a

9:58

wider push towards self-sovereign identity, where

10:00

people can control and reuse their

10:03

digital credentials without needing to repeatedly

10:05

submit sensitive documents. At the same

10:07

time, I think that businesses are.

10:09

Under pressure to improve onboarding while

10:12

staying compliant, and regulators are tightening

10:14

KYC and AML rules, but users

10:16

still expect a seamless digital experience.

10:19

So I think that digital identity

10:21

is the only way to meet

10:23

both of these demands simultaneously. No

10:25

solution should... only focus on efficiency.

10:28

It has to be about security

10:30

and usability as well. There's a

10:32

great example about Germany when they

10:35

rolled out their digital ID system.

10:37

It exposed a bunch of security

10:39

gaps and I think it was

10:41

around 10 million users that were

10:44

affected ultimately. It does highlight why

10:46

we need this balance between security

10:48

and usability. So yes, the demand

10:50

is high, but I would say

10:53

that the real question is, can

10:55

we have these solutions and systems

10:57

designed in a way that is

11:00

truly secure, inclusive, and scalable? Absolutely,

11:02

it needs to be robust at

11:04

the end of the day. The

11:06

idea is to stop fraud at

11:09

us, right? And from our perspective

11:11

as well, we do know, Eddie,

11:13

of course, that the biggest type

11:15

of identity fraud that we've seen,

11:18

making up 50% of cases, is

11:20

indeed ID cards, as the most

11:22

exploited type of document, of course,

11:25

and they're being used in around

11:27

70% of identity document fraud. from

11:29

the other angle, Daniel, what sort

11:31

of benefits can digital ID offer

11:34

people when it comes to protecting

11:36

themselves online compared to, let's say,

11:38

the most, let's say, abused non-digital

11:40

IDs that have been the target

11:43

from Fordsters as well? Yeah, and

11:45

I think you touch on what

11:47

is a really important element in

11:50

this discussion, which is that we

11:52

shouldn't fall in the trap of

11:54

expecting a new technology. to be

11:56

perfect, we should expect it to

11:59

be better. And I see a

12:01

lot of arguments against Digital ID

12:03

pointing out places where there have

12:05

been breaches and there have been

12:08

failures and I don't think there's

12:10

any denying that there have been

12:12

and there will be. privacy security

12:15

issues with digital IDs. But the

12:17

question we need to ask ourselves

12:19

is, are we more private and

12:21

more secure under some of the

12:24

digital ID schemes than we are

12:26

under today's scheme, where if I

12:28

lose my wallet, I've lost my

12:30

identity card, and for about 15

12:33

bucks. I can get a pretty

12:35

convincing digital ID that has my

12:37

face and my signature on it

12:40

and a completely fictitious name and

12:42

address. 15 sounds like quite a

12:44

lot as well, Daniel. I've seen

12:46

them go for four or five

12:49

bucks. I want one of the

12:51

good ones. You're being scambered. I

12:53

think that's the thing that we

12:55

have to get to and you

12:58

guys have some great research on

13:00

how much fraud is undertaken with

13:02

counterfeit identity documents and synthetic IDs.

13:05

That needs to be our initial

13:07

point of comparison when we talk

13:09

about safety security privacy of digital

13:11

IDs, not a sort of fictitious

13:14

perfect world where everything is secure,

13:16

seamless, frictionless, and confidential. Wouldn't that

13:18

be the perfect world though? I

13:20

mean that's what we're sort of

13:23

always going for. So from the

13:25

fraud prevention perspective, do you think

13:27

a digital first approach will reduce

13:30

risks or introduce new ones? And

13:32

what would those risks be if

13:34

that was the case? I mean,

13:36

I think yes is the answer

13:39

to that question. It will both

13:41

reduce risks and introduce them. So

13:43

we'll have new and interesting risks.

13:45

I do think that we should

13:48

really limit our scope to those

13:50

that are doing it well. that

13:52

require active user input on a

13:55

known user-controlled device that cuts out

13:57

a lot of that. I have

13:59

a colleague that is based in

14:01

Sweden, and one of the examples

14:04

he uses is that he can

14:06

easily pull up his tax ID,

14:08

his name and his address, and

14:10

his date of birth. And it's

14:13

public information in Sweden. It's quite

14:15

easy to find, but the way

14:17

they've structured bank ID. And the

14:20

way they've structured a lot of

14:22

security around it, it doesn't matter.

14:24

No one can impersonate him and

14:26

interact with any of his accounts

14:29

because ultimately they have to be

14:31

able to utilize his bank ID

14:33

via a device that he controls.

14:35

So in a lot of ways,

14:38

I think that well executed digital

14:40

ID schemes take the teeth out

14:42

of those data leaks because they

14:45

make that data less useful, not

14:47

more. Definitely the case. Are you

14:49

on the same page as well?

14:51

Definitely. I think, I mean, your

14:54

question was around, are there new

14:56

risks in addition to the old

14:58

ones and 100% I think, it's

15:01

also not that black and white,

15:03

right? I do believe that a

15:05

digital first approach is essential for

15:07

fighting fraud, especially at scale, but

15:10

it has to be intelligent and

15:12

adaptive. Automation, AI and behavioral analysis

15:14

of... already massively improved fraud detection.

15:16

The biggest advantage is that it

15:19

removes reliance on human judgment and

15:21

outdated manual processes. With analog systems,

15:23

the risk was I think more

15:26

apparent because we had to rely

15:28

on how we'll train the person

15:30

was to spot a fake document,

15:32

for example, or how accurate the

15:35

physical scanning equipment was. And these

15:37

mentors were prone to human error

15:39

and efficiencies. The risk now with

15:41

the new technology, I think, comes

15:44

from having for other compensating somehow.

15:46

If you have a really strict

15:48

fraud prevention system, it can exclude

15:51

legitimate users. A really good example

15:53

of this is biometric verification. It's

15:55

a great finding tool, but it's

15:57

not foolproof. Our research again shows

16:00

I think it was around 96

16:02

million people who phase verification challenges

16:04

because they've had changes in their

16:06

physical appearance, because they've aged or

16:09

they've had medical condition, they've had

16:11

hair loss, even gender transitions and

16:13

so on. So a rigid system

16:16

may misclassify people as fraud risks

16:18

and lock them out unfairly. And

16:20

that's something that should be thought

16:22

of when you're trying to implement

16:25

these solutions. And I think another

16:27

big one is country-based restrictions. So

16:29

many companies automatically block users from

16:31

high-risk regions. And there is a

16:34

large subset of the population who

16:36

are affected by a blanket ban

16:38

that doesn't account for... individual legitimacy.

16:41

So in order to sort of

16:43

mitigate this you should be using

16:45

AI powered risk scoring that it

16:47

says is behavior dynamically rather than

16:50

denying access outright. So there isn't

16:52

a silver bullet to say there's

16:54

no risk. Everyone here is legitimate.

16:56

They have all the good intentions.

16:59

There should be a combination of

17:01

all these different tools that we

17:03

have at our disposal today. And

17:06

as Daniel said, it's no solution

17:08

is perfect. We have to keep

17:10

iterating and seeing what works. And

17:12

the nature of the solution. in

17:15

my opinion, should be very much

17:17

dynamic and able to adapt and

17:19

have a different approach for different

17:21

users. Yeah, well said. Yeah, absolutely.

17:24

I mean, iterations, essential innovation is

17:26

painful. So there is going to

17:28

be friction at the start as

17:31

well. But we've talked about why

17:33

governments now, of course, are very

17:35

excited about this. I'm excited about

17:37

it. Financial institutions are as well.

17:40

Specifically in Europe, of course, and

17:42

the new forms of the digital

17:44

ID are going to, well, of

17:46

course, have changes. But what I'd

17:49

love to touch on from both

17:51

of your perspectives, and Eddie, you

17:53

did this quite nicely as well,

17:56

is... What about the public? I

17:58

mean, the FIs are happy, the

18:00

governments are happy, and we're moving

18:02

forward, but is the public... embracing

18:05

this shift, let's say. Is there

18:07

skepticism that we're saying about security

18:09

and privacy? Daniel, would you want

18:11

to take this first? Sure, and

18:14

so many ID schemes, there's so

18:16

many countries that it's really hard

18:18

to give a blanket answer. I

18:21

think you are seeing a few

18:23

things that are really driving that

18:25

user adoption and user trust. So

18:27

there are a few interesting reports

18:30

out there. The Bill and Melinda

18:32

Gates Foundation and the Tata Foundation

18:34

are heavily involved in this. And

18:36

PWC has some interesting reports out.

18:39

But it seems like you start

18:41

to see a tipping point of

18:43

user adoption when a couple of

18:46

things are present. So one is

18:48

that sort of table stakes level

18:50

safety and security. It really comes

18:52

down to does the average citizen

18:55

consumer trust the government with their

18:57

data and believe that it is

18:59

going to be held and maintained

19:01

safely. The second thing that you

19:04

see is a number of services

19:06

available that access the digital ID.

19:08

And we tend to see tipping

19:11

points around 100. services. So if

19:13

you look at a country like

19:15

Estonia, right, there's hundreds and hundreds

19:17

of services that will accept the

19:20

the EID. It's very commonly used.

19:22

Same thing in the Nordics, the

19:24

same thing in Singapore and India.

19:26

Where you tend to run into

19:29

trouble is when you see some

19:31

in some countries where There's a

19:33

fairly small number of services that

19:36

are available to a consumer on

19:38

that digital ID. And you find

19:40

that they'll maybe sign up once

19:42

and then not use it again.

19:45

So we see that. I like

19:47

to use Hong Kong. Their digital

19:49

ID as an example there, where

19:52

there's really only a few things

19:54

you can do with it. Everybody

19:56

signed up for it and then

19:58

stopped using it. And then I

20:01

think the third thing and what

20:03

really seems to move consumer adoption

20:05

forward is frankly, forced usage from

20:07

government services. Your government services or

20:10

your bank require you to use

20:12

that digital ID to access services.

20:14

We see massive spikes in adoption.

20:17

So one of the examples there

20:19

is a service like It's Me

20:21

in Belgium, where for a lot

20:23

of residents in Belgium to access

20:26

government services, they're required to use

20:28

that to use that see massive

20:30

adoption essentially because it's been forced.

20:32

What about you Eddie? What do

20:35

you see? It's such

20:37

an interesting point about forced adoption,

20:39

because I do think there's definitely

20:41

a divide in public perception. On

20:43

one hand, people want faster, easier

20:46

access to services, you know, banking,

20:48

government benefits, whatever it may be.

20:50

But trust is a big challenge.

20:52

Many people worry about data privacy,

20:55

surveillance, and security breaches. And as

20:57

we saw with the example from

20:59

Germany, they have good reason to

21:01

do so. So I think that

21:04

the key here would be... transparency

21:06

and user control. Yes, there is

21:08

enthusiasm, but I think the real

21:10

test is how well these systems

21:12

address the security concerns and ensure

21:15

inclusion so that we are not

21:17

leaving the legitimate users out. But

21:19

ultimately, if people don't feel that

21:21

they can benefit from a digital

21:24

identity scheme, or if a certain

21:26

group is being locked out, I

21:28

don't think it'll gain the mass

21:30

adoption that governments and businesses are

21:33

hoping for. Well, and I think

21:35

you can look at, I like

21:37

to look at Adhar in India

21:39

as a great example of an

21:41

EID that rolled out to a

21:44

massive, right, billion-plus person population. When

21:46

ad hoc was rolled out, I

21:48

think the World Economic Forum said

21:50

like 25% of Indians were living

21:53

in extreme poverty. So you've right,

21:55

you've got a massive population, you've

21:57

got a geographically dispersed. population and

21:59

you've got a high degree of

22:02

impoverished people in that population and

22:04

yet they have been incredibly successful

22:06

at achieving adoption. widespread usage. There

22:08

have been some data security issues,

22:11

but I think on the whole,

22:13

when you look at the Indian

22:15

economy, when you look at the

22:17

declining poverty rates, the increased participation

22:19

in the digital economy, from the

22:22

Indian citizens. I think you see

22:24

that it can be done and

22:26

it can be done well. Absolutely.

22:28

Eddie, correct me if I'm wrong

22:31

there. I think Daniel touched on

22:33

a very good point, but it's

22:35

97% of the adult population between

22:37

16 and 65, right, in India,

22:40

have access to that ad hoc

22:42

scheme, which is amazing. Of course,

22:44

the country has been known for

22:46

very large, very good adopted censuses

22:48

of the population as well, and

22:51

that's super important to understand the

22:53

population and also provide them with

22:55

access to those digital. services which

22:57

they might not already have, but

23:00

you also touched on the security

23:02

sort of side. I mean the

23:04

security debate around digital IDs is

23:06

massive. We touched upon it briefly

23:09

now, but whilst these government schemes

23:11

of course offer or promise, let's

23:13

say convenience, storing sensitive IDs within

23:15

a single digital wallet, I mean

23:17

it creates a clear sort of

23:20

target for hackers, even if there

23:22

are limitations around how they can

23:24

actually gain access to those, there's

23:26

obviously the attraction for them. So

23:29

experts... across the world worry that

23:31

linking passports, drivers license and all

23:33

of these digital services with their

23:35

credentials into one system creates a

23:38

centralized point of failure. So I

23:40

would ask both of you actually,

23:42

how can digital ID systems be

23:44

secured without introducing one single attack

23:46

vector? I mean, what measures other

23:49

than what we've talked about today

23:51

have been put in place? First

23:53

of all, it's a very valid

23:55

concern and point to raise. I

23:58

think anyone would be terrified if

24:00

they knew their whole life was

24:02

contained. in one single place, right?

24:04

So it is about reducing reliance

24:07

on a single point of failure,

24:09

and there is a lot of

24:11

conversation around different topics. I think

24:13

the main one would be decentralization

24:15

and a push for self-sovereign identity.

24:18

So giving users the control of

24:20

their data and so on, I

24:22

think a more practical measure, though,

24:24

is this adaptive risk-based authentication. As

24:27

I said before, instead of treating

24:29

everyone the same and evaluating in

24:31

the same way, there's different prevention

24:33

systems that will analyze behavior, device

24:36

intelligence, location patterns, and so on,

24:38

just looking for anomalies. So if

24:40

a login attempt looks unusual, additional

24:42

verification is triggered. And so I

24:45

think this is a very practical

24:47

way to ensure security. Another one

24:49

is decoupled verification. many systems allow

24:51

for a separate authentication away from

24:53

storage. So when you do biometric

24:56

verification, that can be done locally

24:58

on your device on your mobile

25:00

phone without storing that raw biometric

25:02

data in a central database somewhere

25:05

else. So this alone reduces hacking

25:07

risks and increases users control. It

25:09

also increases that sense of security

25:11

and so on. So those two

25:14

are... former practical in my opinion

25:16

than decentralization because inherently it does

25:18

feel like you're putting all your

25:20

eggs in one basket. Yeah, and

25:22

I mean, absolutely spot-on response. I

25:25

think the only counter I'll offer

25:27

is, I feel like consumers have

25:29

become so callous. two data breaches

25:31

that they almost don't even register

25:34

anymore. Like, you know, how many

25:36

times has T-Mobile's database been breached?

25:38

I've frankly lost count and not

25:40

to pick on them specifically, but

25:43

you know, as you look at

25:45

your digital footprint as a consumer,

25:47

one of the things that I

25:49

always try to explain to people

25:51

is every service you work with.

25:54

is maintaining some version of your

25:56

digital identity behind the scenes that

25:58

you have no control over. So

26:00

Amazon has one set of information

26:03

on me that they maintain in

26:05

a place I don't know with

26:07

security I can't control and have

26:09

absolutely no say over what they

26:12

do with the data. And kind

26:14

of so on and so forth

26:16

across all the services that I

26:18

use. I know I mean to

26:20

diminish the risks and I think

26:23

we have to put things in

26:25

place to minimize them and we

26:27

can do a lot better than

26:29

we are today, but I do

26:32

think we have to come back

26:34

to, it's not like it's secure

26:36

right now, it's not like everyone

26:38

that's listening to this podcast hasn't

26:41

been the victim of a data

26:43

leak or a data breach, probably

26:45

in the last few months. Absolutely

26:47

not. So we talked about this

26:49

a lot on our podcast, right?

26:52

It's a little bit of broken

26:54

records in my own minds in

26:56

my own minds, but. AI, it's

26:58

been used by fraudsters on a

27:01

day-to-day basis, not only for, of

27:03

course, deep fakes, but as Daniel

27:05

has mentioned earlier, for document creation

27:07

and the fraudulent documents which can

27:10

actually bypass systems and of course

27:12

return a very good, let's say,

27:14

ROI for the actual fraudster themselves.

27:16

So as for businesses, what can

27:18

they do to adjust their systems

27:21

to digital IDs whilst protecting themselves

27:23

from possible attacks using AI deep

27:25

fakes or otherwise? Eddie? I think

27:27

my advice is very simple, the

27:30

execution might be a little bit

27:32

more complex, but let's try. I

27:34

would encourage businesses to take a

27:36

very proactive approach when it comes

27:39

to fighting AI fraud, because the

27:41

fraudsters are evolving just as fast

27:43

as the technology. AI-driven attacks, especially

27:45

deep fakes and synthetic identities, have

27:48

become so sophisticated. And as Daniel

27:50

mentioned earlier, most fraud attempts a

27:52

while ago were just based on

27:54

installing documents. Now we have AI-generated

27:56

faces, voice cloning. entire fake persona,

27:59

slipping through the cracks of weak

28:01

verification systems. So in terms of

28:03

what can be done practically, I

28:05

would say, number one, and this

28:08

is something we love to say

28:10

at some service, by AI with

28:12

AI, enlist the power of machine

28:14

learning for fraud detection. Deep Fake

28:17

detection models can analyze subtle facial

28:19

distortions, you know, on natural blinking

28:21

patterns, inconsistencies in skin texture, things

28:23

that the human eye just might

28:25

miss, right? And then behavioral AI

28:28

can become a tool for evaluating

28:30

user interactions like keystrokes, device data

28:32

also might help determine whether an

28:34

identity is real or fake. The

28:37

second point would be a multi-layered

28:39

approach to identity proofing, not relying

28:41

on a single authentication factor. So

28:43

layer. Biometric liveness detection on top

28:46

of device intelligence, on top of

28:48

behavioral analytics, do as much of

28:50

it as you can in a

28:52

mix and match a way depending

28:54

on the use case, depending on

28:57

the user and so on. And

28:59

then the last one would be

29:01

adaptive risk-based authentication, as I've mentioned

29:03

before. trying to look for these

29:06

patterns and only surface additional checks

29:08

when it's absolutely necessary. And I

29:10

think if a company does all

29:12

of this, they're not just improving

29:15

security, it's reducing unnecessary friction for

29:17

those legitimate users. Absolutely. And of

29:19

course on the business side as

29:21

well, I mean, there's a lot

29:23

of security risks, one challenges as

29:26

well in making digital IDs truly

29:28

fraud resistant, of course. I mean,

29:30

Daniel, from your perspective as well,

29:32

are there... key security features being

29:35

prioritized right now for businesses or

29:37

otherwise, would you recommend that businesses

29:39

focus on similar elements as Eddie

29:41

has pointed out? Yeah, I mean,

29:44

I think everything Eddie said is

29:46

excellent. It's a really good answer.

29:48

I would just add in, I

29:50

think that the more that you

29:52

as a business can widen the

29:55

aperture when you're looking at an

29:57

individual. The harder and harder it

29:59

is for someone to have really

30:01

any kind of attack, much less

30:04

a presented content AI attack. And

30:06

I may be overpaying. Apparently I'm

30:08

overpaying for my fake IDs. We'll

30:10

talk about it after the podcast.

30:13

But I can make up an

30:15

identity and an address and a

30:17

date of birth and I can

30:19

have an identity document. for a

30:21

fairly small amount of money. Now,

30:24

if I were to try to

30:26

create a credit record for that

30:28

identity, that's a whole lot harder

30:30

and takes a whole lot more

30:33

time. So the more that organizations

30:35

are able to broaden out and

30:37

not only just look at the

30:39

presented content, but also look to

30:42

verify it with independent authoritative sources,

30:44

that's one of the big ways

30:46

that we see. organizations handle that

30:48

challenge of generated content. And I

30:51

think the second way that we

30:53

see that is really relying heavily

30:55

on things that involve active user

30:57

participation and consent. So, you know,

30:59

I love seeing pass. I love

31:02

the way that they require active

31:04

engagement from the user on a

31:06

known device. much easier for you

31:08

to create a video of me

31:11

that might get past somebody else's

31:13

biometric or liveness scans. It's entirely

31:15

another for someone to control a

31:17

known device that's in my possession

31:20

and give consent on it. Definitely

31:22

is super important as well Daniel's

31:24

just to have a multi-layered approach

31:26

to everything you do around making

31:28

sure the person is who they

31:31

say they are and by all

31:33

means that can stop of course

31:35

the the nefarious actors who are

31:37

trying to bypass systems but with

31:40

the development and also that sort

31:42

of exponential growth of social engineering

31:44

as well people often handing over

31:46

the reins to these. as well,

31:49

which is something that we need

31:51

to bear in mind, right? I

31:53

mean, at some sub, developing the

31:55

some sub ID involved extensive planning

31:57

and also refinements ensure the robust

32:00

security of the network as well.

32:02

And there's a few other things

32:04

that we could touch upon here,

32:06

but Eddie, I'd like to sort

32:09

of pose a question to you

32:11

as well. Would you be able

32:13

to sort of break down exactly

32:15

how that works from our side?

32:18

I have to preface by saying

32:20

that there's an army of people

32:22

behind sums of ID because we

32:24

all deeply care about security privacy

32:26

and user consent and finding that

32:29

balance between making users feel at

32:31

ease but also providing businesses with

32:33

the right verification data and information

32:35

that they need to conduct their

32:38

actual business. So with that in

32:40

mind, sums of ID was very

32:42

much designed. to provide a seamless

32:44

and secure and reusable identity form

32:47

while maintaining high compliance standards. And

32:49

that compliance point is so important.

32:51

and I'll talk about it in

32:53

a second, but instead of having

32:55

users upload documents and input data

32:58

every time they sign up for

33:00

a new service, some sub-id allows

33:02

them to reuse that stored document

33:04

and data across multiple platforms. So

33:07

it's very simple. And then once

33:09

that some sub-id account is created,

33:11

it can then be used across

33:13

different platforms. And the power is

33:16

very much... within the user, they

33:18

can select what data to share,

33:20

and if at all, they're very

33:22

much within their right to not

33:24

give consent, and that's completely okay,

33:27

but we made sure that that

33:29

was a part of the process.

33:31

That user consent is so important.

33:33

At the same time, in order

33:36

to meet that compliance element, I

33:38

mentioned, we really wanted to take

33:40

care of the fact that sometimes

33:42

different companies have... different regulations, different

33:45

guidelines, they have to abide by

33:47

a different KYC or AML framework.

33:49

And so what happens is if

33:51

I've created a sums of ID

33:54

account and I have my story

33:56

documents, my date, and so on.

33:58

And then I go to reuse

34:00

it with another company, and that

34:02

company requires my ID document to

34:05

be valid for at least six

34:07

months, instead of the three that

34:09

I have left on my ID

34:11

card, we will prompt for a

34:14

re-upload of the document. So compliance

34:16

is never really compromised at any

34:18

point. And what's really interesting is

34:20

that across the entire flow and

34:23

process, all of these... steps and

34:25

checks that we have. So for

34:27

the ID check, for the liveness

34:29

check, the fraud prevention is really

34:31

baked in because we don't do

34:34

liveness check without checking for deep

34:36

fakes or a synthetic identity. We

34:38

don't do an ID document check

34:40

without doing an OCR extraction and

34:43

checking against databases. So it's really

34:45

as robust and as a comprehensive

34:47

a solution as we could come

34:49

up with. So

34:54

we've noticed here at some

34:56

sub that one in three

34:58

users have already verified their

35:00

identity with one of our

35:02

clients before So why go

35:05

through the same KYC process

35:07

again and again? That's exactly

35:09

why we've just launched some

35:11

sub ID our new digital

35:13

reusable solution that allows users

35:16

to create a secure reusable

35:18

identity profile, speeding up verification

35:20

across platforms whilst reducing friction

35:22

as well. So, here's how

35:24

it works. One, the user

35:27

logs into some sub-ID ID,

35:29

verifies their email, and selects

35:31

a stored document. Secondly, they

35:33

pass their liveness check, and

35:36

finally, thirdly, once verified, their

35:38

data can be securely shared

35:40

with no more manual document

35:42

up. So, for businesses, this

35:44

means 50% faster verification, 30%

35:47

higher pass rates, GDPR compliance,

35:49

and over 1 million sum

35:51

sub ID users. So, to

35:53

learn more, check out the

35:55

link in the description or

35:58

visit sum sub.com. Daniel,

36:02

you've spoken about Sing Pass, the

36:05

Estonian of course Bank ID, and

36:07

now in the UK, of course,

36:09

well, Helsinki are based, the UK

36:11

government's digital ID program will roll

36:13

out later this summer in 2025,

36:15

which is super exciting, right? I

36:18

mean, what else are we expecting

36:20

Daniel in the coming years and

36:22

months? Are there other projects that

36:24

you're keen to keep an eye

36:26

out on rather than outside of

36:28

the UK as well? Well, I

36:31

mean, I think you've got the

36:33

EU Digital Wallet Initiative, which currently

36:35

requires all member nations to have

36:37

at least one digital identity that

36:39

could be presented in a mobile

36:41

wallet for all residents, citizens, and

36:44

subjects of the EU by January

36:46

1st, 26. So that obviously is

36:48

going to be huge. There are

36:50

some countries where... they're already there

36:52

and it's not really going to

36:54

be a big lift. There's some

36:57

other countries where they've got a

36:59

lot of work to do in

37:01

the, you know, what, nine months

37:03

remaining before that deadline. I also

37:05

think that there are some really

37:07

interesting IDs in like Southeast Asia

37:10

that aren't commercially available. So, you

37:12

know, for example, there's several in

37:14

Indonesia, the Philippines, where... Commercialization is

37:16

limited or not available at all

37:18

and citizens really only use them

37:20

for government services. But given the

37:23

difficulty in verifying identity in some

37:25

of those regions, we're working heavily

37:27

with those identity ministries to broaden

37:29

the scope of those digital IDs

37:31

and make them more easily accessible

37:33

for commercial vendors. They should make

37:36

a huge difference in minimizing fraud

37:38

and improving that user experience in

37:40

Southeast Asia. Daniel, that's a super

37:42

interesting point actually. Much of our

37:44

life is online now, as is

37:46

everyone's right? I mean, internationally as

37:49

well, especially when it comes to

37:51

financial transactions and being included financially.

37:53

I mean, on your side, Eddie,

37:55

how important is getting an international

37:57

agreement when it comes to regulation?

37:59

Are you optimistic of that right

38:02

now? Of course, we have the

38:04

EU coming into play, but beyond

38:06

that, of course, people wanting to

38:08

remit money cross-border and across the

38:10

West East, etc. How important is

38:12

that? How important it is. I

38:15

think going back to Daniel's introduction

38:17

and his depiction of his life,

38:19

living somewhere, working for a company

38:21

based in a different country, doing

38:23

business with another bank, it's crucial

38:25

because this is the way that

38:28

we live now. Interoperability amongst all

38:30

these companies is what's going to

38:32

ensure that I as a user,

38:34

as a citizen, as a normal

38:36

person, adopt this type of solution.

38:38

Because if I move from the

38:41

US to Spain... and then I

38:43

go to Southeast Asia or whatever,

38:45

I want to be able to

38:47

open a bank account seamlessly and

38:49

with very little pain and that

38:51

is not the case right now.

38:54

And this is a very real

38:56

problem and it's linked to all

38:58

sorts of like... immigration debate and

39:00

being able to prove your identity

39:02

when you don't have documents in

39:04

a new country, for example. It's

39:07

very tricky, so I think it's

39:09

incredibly important. I don't know how

39:11

optimistic I am that the nations

39:13

of the world will agree, but

39:15

hopefully, hopefully, the technology is advancing

39:17

really fast. as we said before,

39:20

so I think maybe that will

39:22

give a push for governments and

39:24

institutions to at least pay a

39:26

little bit more attention and then

39:28

just sort of realize these benefits

39:30

that we've been talking about for

39:33

the past hour because it's not

39:35

just about the user and making

39:37

their life easier. There is a

39:39

financial economic advantage to businesses that

39:41

will adopt these technologies. Definitely the

39:43

case. I like how positive we've

39:46

been on this podcast episode today.

39:48

As me again after the podcast.

39:50

Indeed, we'll have the same conversation.

39:52

But of course when we're looking

39:54

at the benefits, it's very clear

39:56

for people like us day to

39:59

day and for business. businesses, of

40:01

course, that we work in or

40:03

that we buy a purchase or

40:05

utilize the services from how important

40:07

a digital identity and also a

40:09

global digital identity or cross multi-border

40:12

or at least interoperable in how

40:14

important it must be. I mean,

40:16

at the end of the day,

40:18

it's going to save businesses a

40:20

lot of time and of time

40:22

and headache as well, but are

40:25

there any other benefits that we

40:27

could talk about and share with

40:29

our audience today? I would argue

40:31

that I think that the biggest

40:33

benefit Eddie touched on this earlier

40:35

is, you know, I think that

40:38

the estimates range from what 600

40:40

million to 800 million people in

40:42

the world don't have an identity

40:44

at all. They can't participate in

40:46

the digital economy, they can't transact

40:48

online, they can't vote, they can't

40:51

bank, and I think that's a

40:53

humanitarian crisis. So I spent a

40:55

lot of time in Africa about

40:57

15 years ago, and one of

40:59

the things that was really interesting

41:01

back then. was that most of

41:04

Africa skipped landlines, and they just

41:06

went straight to mobile phones. So

41:08

everyone had a mobile phone, everyone

41:10

had access to mobile internet, and

41:12

very few people had landlines. They

41:14

just never ran the cables. And

41:17

I think that there's an opportunity

41:19

for us in some of these

41:21

more impoverished or low-income countries. to

41:23

take a similar initiative with identity.

41:25

I would love to see us

41:27

help them skip physical identity documents

41:30

altogether. And let's just go straight

41:32

to digital identity. Let's go straight

41:34

to mobile internet access for people.

41:36

And let's take that number from

41:38

six to eight hundred million down

41:40

to zero in our lifetimes. I

41:43

couldn't agree more. Likewise, I don't

41:45

have anything more optimistic to say

41:47

than that. And I think, like

41:49

for normal people, like reusable or

41:51

digital identity is not something that

41:53

you... think about until you come

41:56

across a problem, until you cannot

41:58

open a bank account. or whatever

42:00

it may be. So for businesses,

42:02

it's just a win-win. You're ensuring

42:04

your users are having a great

42:06

on-boarding experience, you're improving your prevention

42:09

tactics without adding unnecessary barriers for

42:11

the users. I really don't see

42:13

a downside in the adoption of

42:15

this. Absolutely. Not so much the

42:17

adoption, just maybe some of the

42:19

friction that of course we'll see,

42:22

and the adoption of new methods

42:24

or methodologies from fraudster's perspective of

42:26

trying to target these spots. well.

42:28

We're coming towards the end of

42:30

our podcast today. Eddie, Daniel, it's

42:32

been great, but we'd love to

42:35

get to know you more on

42:37

a deeper level as well, a

42:39

more personal level. So would you

42:41

both join me for five quickfire

42:43

questions? No, I'm really scared. Well,

42:45

these are quickfire, so I'm going

42:48

to ask both of you, and

42:50

if you can give me a

42:52

quick answer, we'll move from question

42:54

to question. Are you ready? Sure.

42:56

So when choosing a digital wallet,

42:58

do you go for more features

43:01

or better security? Better security? Better

43:03

security. What's one thing about fraud

43:05

that still surprises you even after

43:07

all of your experience? The social

43:09

engineering element. How many people, regardless

43:11

of the barriers put in place,

43:14

voluntarily give control of their accounts

43:16

to bad actors? It does happen,

43:18

doesn't it? Eddie, are you on

43:20

the same page? What else is

43:22

there? The level of sophistication, I

43:24

like to talk about digital literacy,

43:27

also being a barrier to adopting

43:29

this type of technology, and I

43:31

consider myself a somewhat digital, digitally

43:33

literate person, yet sometimes I come

43:35

across an email or a message

43:37

in my own banking platform where

43:40

I go, hold on a minute,

43:42

I have to double take, I

43:44

have to go, hold on a

43:46

minute, is this genuine? So it's

43:48

so sophisticated that I'm being fooled

43:50

and I'm not... that far behind

43:52

in terms of understanding the differences

43:55

between a scam that my mother

43:57

would be targeted with versus the

43:59

ones that we're targeted with. But

44:01

yeah, that level of sophistication is

44:03

definitely surprising, not in a great

44:05

way. Super scary, and I think

44:08

that feeds into what Daniel was

44:10

saying about the manipulative side of

44:12

social engineering as well, but that

44:14

takes us well into our next

44:16

question. Have you ever actually been

44:18

a victim of fraud yourself? Yes.

44:21

So, well, fraud, I've certainly had

44:23

credit card numbers stolen and abused.

44:25

Yes, yeah. But I will say

44:27

for Eddie, I almost clicked on

44:29

a link, so there's a big

44:31

scam in the states right now

44:34

around tolls, like highway tolls. And

44:36

I had just gotten back from

44:38

a road trip where we drove

44:40

through some states and I got

44:42

a notice that I had unpaid

44:44

tolls. And I mean... My thumb

44:47

was hovering over the link and

44:49

I'm like, how did they get

44:51

my phone number? So yeah, I

44:53

think to Eddie's point, it's probably

44:55

not an if, it's a win.

44:57

I think the most recent digital

45:00

one is, and I think it's

45:02

quite common in Spain, actually, whenever

45:04

you are waiting for a parcel

45:06

to be delivered, you will get

45:08

from the local post office, you'll

45:10

get a tax message that says,

45:13

you need to pay. five cents

45:15

in order for us to unlock

45:17

this thing because whatever but it

45:19

looks legitimate and in the when

45:21

you're waiting for something and you're

45:23

excited to receive it you're not

45:26

really thinking straight and you're like

45:28

okay I just need to get

45:30

my package I'll pay for whatever

45:32

this is and then you go

45:34

on to a website that doesn't

45:36

look incredibly authentic and then you

45:39

realize but I think that's the

45:41

last thing that I almost fell

45:43

for. Okay, well there's always next

45:45

time, so stay safe, Daniel. And

45:47

of course Eddie, I also have

45:49

a question on the back, which

45:52

I think this flows quite nicely

45:54

into. What's one habit now that

45:56

you've been a victim of fraud

45:58

that you rely on? to stay

46:00

safe online. I don't encourage anyone

46:02

to do this. But when I

46:05

get the iPhone message saying your

46:07

password has been compromised or whatever,

46:09

ever since that sort of happening,

46:11

I now every three months do

46:13

a full sweep and I change

46:15

all my passwords and make sure

46:18

everything is as unhackable as possible.

46:20

And I've also consolidated my email

46:22

addresses because I used to have

46:24

about 17 different email addresses. One

46:26

was for serious business. The other

46:28

one for, you know. utilities and

46:31

whatever. Now I only have to.

46:33

My personal one that I don't

46:35

get about very often and then

46:37

the daily use one. So I'm

46:39

also trying to just reduce my

46:41

exposure that I'm willingly just giving

46:43

away email addresses for people to

46:45

contact me and so on. Interesting.

46:47

Perhaps a critical single point of

46:49

failure then as well. I would

46:52

say for my side not to

46:54

end us on a you know

46:56

we've been so optimistic here. But

46:58

I think just a constant paranoia

47:00

and cynicism has served me well.

47:02

That if you believe everyone's out

47:05

to get you, it is certainly

47:07

helpful in avoiding becoming a fraud

47:09

victim. Oh, absolutely. Absolutely. I think

47:11

I'm on the same mindset as

47:14

well. And if we're looking towards

47:16

the end of the quick fire

47:18

questions as well. I'd like to

47:20

ask you both a very interesting

47:23

one. You might be quite pensive

47:25

about it. But if you could

47:27

have any other career other than

47:29

the one you currently have, what

47:32

would it be? I would be

47:34

a photographer. It's the easiest answer

47:36

I can give you. There's no

47:38

risk of being scanned. You're out

47:41

there in nature taking photos and

47:43

that's it. That's what I would

47:45

do. Yeah, I mean, I think, you know,

47:47

no one at five years old

47:49

says... I want to work in

47:51

digital identity product and prevent online

47:54

scams. So I think it's probably

47:56

safe to say that all of

47:58

us in this field had a

48:00

dream of something else at some

48:02

point. But I think I'm with

48:05

Eddie. It would be something outside

48:07

and something in the arts that

48:09

I would want to do. I'm

48:11

not quite sure what. I might need

48:14

to think about that. I think that

48:16

brings us to the end of our

48:18

show today. So I would like to

48:20

thank both of our guests. Eddie, Daniel,

48:22

you've been amazing. We've touched on so

48:24

many important topics today and we've been

48:27

wholly optimistic throughout, which is fantastic. So

48:29

hope the audience has enjoyed and of

48:31

course taken some great pointers back. But

48:33

is there anything you'd like to say

48:35

before we go? Thank you for having

48:37

me. And I'm glad to be working

48:40

alongside and with such smart people

48:42

to keep everyone safe and

48:44

fraud free. Wonderful. Light was.

48:46

Thank you for having me,

48:48

Tom. Thank

48:52

you for joining us on this

48:54

episode of What the Fraud? On

48:56

the next episode, fraud is no

48:58

longer just about crime. It has

49:00

become a global business with software

49:02

at its heart. We will take

49:04

a look at the rise of

49:07

fraud as a service with a

49:09

very special guest, a hacker turned

49:11

security consultant. So calling all listeners,

49:13

we need your support. So please

49:15

hit that follow button on your

49:17

favorite podcast platform. And of course,

49:19

if this episode has left... you

49:21

feeling empowered, drop us a review.

49:23

It helps other individuals and businesses

49:26

out there trying to dodge the

49:28

digital tricksters. So let's cut the

49:30

small talk and get down to

49:32

business. Follow, comment, review. you know

49:34

the drill. And of course if

49:36

you want to hear more about

49:38

what we do here at sum

49:40

sub and how your business can

49:42

actually benefit from our verification services,

49:44

definitely check out our website at

49:47

www. sum sub.com and subscribe to

49:49

our socials. What the fraud is

49:51

a listen production. The producer is

49:53

Adrian Bradley, the executive producer is

49:55

Nick Minter and the producer from

49:58

sum sub sub is Mila. Baravina.

50:00

Stay safe and see you on

50:02

the next one.

Unlock more with Podchaser Pro

  • Audience Insights
  • Contact Information
  • Demographics
  • Charts
  • Sponsor History
  • and More!
Pro Features