Articles
Updates from the field – Subhashish's diary entry January 2020
This is the second field diary entry from Subhashish, one of our Digital Identity Fellows. His year-long research project is focused on the challenges and opportunities within marginalised groups most affected by Aadhaar, India’s national digital ID system. *** India’s ambitious biometric-based identity — Unique Identity (UID) — has been the focus of the State of Aadhaar report recently published by Dalberg Global Development Advisors, a global consulting firm. The study — made possible with funding from Omidyar Network — includes a sample size of 167,000 Indian residents and sheds some light on many facets of Aadhaar. While the report
Overcoming the drone accountability challenge with identity-linked drones
80 percent of UK citizens would support more widespread adoption of drones if there was a mechanism to provide increased safety, security and monitoring. These are the findings from The Cellular-connected Drones report, written by WPI Economics for Vodafone, which calls for commercial and public sector drones to be fitted with SIM cards to give them cellular network connectivity. This would mean drones could be flown beyond the “visual line of sight” of their operators, which is stipulated by current rules. Drones have significant positive use cases for hard-to-reach areas, such as delivering time-critical medical supplies, inspecting infrastructure, responding to
Updates from the field – Tshepo’s diary entry January 2020
This is the second field diary entry from Tshepo, one of our Yoti Digital Identity Fellows. His year-long research project is looking at the digital identity landscape in South Africa, with a specific focus on the national smart ID identity programme from a human rights perspective. ***** My research on digital identity and fraud in South Africa has, so far, been incredibly interesting, with most people keen to share their opinions. Encouragingly, many were also eager to share their insights on a variety of issues around the subject of digital identity in particular. My research kicked off in Gauteng, focusing
The Fifth EU Money Laundering Directive is arriving in the UK - here are a few things you need to know.
The Government’s amendments to the Money Laundering and Terrorist Financing Regulations (MLR) are coming into force. This is the result of the transposition of the EU’s Fifth Money Laundering Directive, as well as a set of standards set by the Financial Action Task Force (FATF). These amendments extend the obligations to meet the MLR requirements to other sectors, which means that they will be obliged to perform ‘Know your Customer’ (KYC) checks and potentially monitor certain transactions. For example, cryptoasset activities will now fall under the scope. Furthermore, businesses will also need to consider new high-risk factors when determining whether
Yoti and native are tackling the touts with digital ID and great music
For those of you who are tired of touts beating you to the best shows and pushing up the prices of resale tickets, our latest partnership will be like music to your ears. We’ve partnered with native to deliver a nationwide tour featuring the drum and bass duo Sigma. We’ll be showcasing our revolutionary ticketing technology to prove events can be untoutable and put you, the fans, in control. And the best part? You can enter our ballot for free tickets before earlybirds go on sale for just £5 – and you can bet all your pennies that you
Our approach to security and privacy
Just as the right to identity is a fundamental human right, privacy is too. We created Yoti to give everybody a secure, privacy-friendly way of proving their identity, online and in person. Privacy and security, therefore, aren’t just our priority but our raison d’etre. Our free Yoti app is built with privacy and security at its core and harnesses data minimisation techniques that enable you to share less data. We have a rigorous approach to security and have built an innovative database architecture designed to protect against data breaches or cybersecurity attacks. To ensure that we are held accountable, we