The importance of anti-spoofing for facial age estimation
It has been claimed that facial age estimation technology can be easily spoofed. The proliferation of news on generative AI and deepfakes has added to the conversation, and there is doubt and concern over the security of online safety systems. Suffice to say, we’ve thought of that. We have developed a suite of anti-spoofing tools to ensure your check is real, valid and accurate. Our experience working with organisations to implement age verification has enabled us to identify and cover risks and vulnerabilities. When we perform an age estimation check, we are actually performing a number of security checks simultaneously.
Yoti releases a new Digital ID app with Lloyds Bank
This follows the £10 million Lloyds Banking Group invested in Yoti to support the development of a new, reusable digital identity proposition London, UK, 2nd October 2023: Yoti has released a new Digital ID app with Lloyds Bank – Lloyds Bank Smart ID. The app gives people a more private, secure and convenient way to prove their age or identity from their phone. This follows the £10 million investment Lloyds Banking Group made in Yoti earlier this year. The investment supported the development of a new, reusable digital identity app to help combat the growing risks of identity fraud,
Yoti Foundation supports RIVET, funding and amplifying social change projects
Yoti, via the Yoti Foundation, are delighted to announce our support of RIVET, a nonprofit organisation funding and amplifying social change projects led by young people all over the world. RIVET brings together young people, NGOs and influencers to finance projects led by young people tackling everything from food insecurity in rural areas to systemic gender bias in their communities. RIVET support projects in 5 key areas: Environmental Sustainability Poverty Reduction Education Health and Wellbeing Inclusion To date, RIVET has funded over 1,000 projects in 66 countries, impacting over 260,000 people. They are an organisation that align closely with our
Yoti MyFace liveness white paper
Learn how Yoti’s liveness solution can help you defeat spoof attacks Liveness is an essential part of any verification or authentication process. It gives you reassurance that you are dealing with a real human. Read our latest white paper on liveness to learn how Yoti’s MyFace liveness solution can help defeat presentation attacks including: Paper image Mask Screen image Video imagery Deep fake video Injection attacks Bot attacks Key takeaways from the report Yoti’s MyFace solution is NIST Level 2 approved with 100% attack detection. Why liveness is important for verification and authentication. The difference between active and
Yoti featured on Liminal’s list of Companies to Watch in 2023
Today, Yoti has featured on Liminal’s list of Companies to Watch in 2023. Each year Liminal, a strategy advisory firm serving the digital identity, cybersecurity and fintech markets, recognises ten standout companies with the potential to make significant impact in the coming year. Liminal’s research team, led by Travis Jarae, independently chooses all the companies on the list based on how well their products fit the market, their company momentum, and the current state of the ecosystem. Liminal has been tracking emerging trends, technologies, and business leaders in the rapidly evolving ecosystem of digital identity, cybersecurity, and fintech solution providers
How Yoti can help combat digital injection attacks
As use of online verification grows, there inevitably follows increasing temptation for bad actors to develop ways to exploit the process. As a provider of verification services we must show businesses, regulators and governments that we have robust anti-spoofing technology, checks and processes. An emerging but rapidly growing threat for verification services are digital injection attacks. What are injection attacks? Injection attacks are a form of attack on remote verification services. Direct attacks are the most common attempt to spoof systems. Examples of direct attacks are: Paper image 2D and 3D masks Screen image Video imagery Direct attacks are