TruSources to show off its on-device identity-checking tech at TechCrunch Disrupt 2025 Age verification laws are a privacy and security nightmare. This Battlefield startup performs age checks on-device, without users having to upload their IDs to the internet. https://lnkd.in/g_G8cK4N
TruSources showcases on-device age verification at TechCrunch Disrupt
More Relevant Posts
-
As more countries tighten rules on age and identity verification, companies face a tough trade-off: compliance vs. user privacy. Emerging solutions are proving that we don’t need to sacrifice one for the other. On-device checks, deepfake detection, and privacy-preserving verification methods are paving the way for safer, more trusted digital interactions.
Age verification laws are a privacy and security nightmare. This Battlefield startup performs age checks on-device, without users having to upload their IDs to the internet.
To view or add a comment, sign in
-
🔐 From privacy laws to online safety regulations, the rules shaping our digital world affect everyone, but communities already vulnerable to surveillance and breaches face the highest risks when encryption is weakened. That’s why we’re revisiting a roundtable conversation with Graham Dufault (ACT | The App Association), Denise Tayloe (PRIVO), and Heather E. West (Venable) to cut through the noise and get to the heart of how policymakers can protect consumers and preserve the tools that keep them safe. The discussion breaks down how encryption underpins many of today’s most pressing and intersectional privacy issues, from child safety to digital equity, and why protecting it is essential for a trustworthy, inclusive app economy. Catch the full conversation here ➡️ https://loom.ly/saHfJ4k #Encryption #Privacy #CybersecurityAwarenessMonth #WorldEncryptionDay #DigitalEquity #ConsumerProtection #InnovationPolicy #DevelopersKeepYouSafe
To view or add a comment, sign in
-
-
For my newsletter, I wrote about how AI-created front companies are likely being run by hostile nations, and what the means for data privacy. Spoiler: catastrophe! https://lnkd.in/gBzXaAyc
To view or add a comment, sign in
-
Ever wondered just how much personal data you're leaking to the world without even realizing it? The answer might surprise and disturb you. In today's digital age, the collection and sale of personal data have become a multi-billion-dollar industry. Companies and governments are gathering vast amounts of information about individuals, often without their knowledge or consent. - Location data can reveal intimate details about a person's life, from the places they visit to the people they meet. - Data brokers collect and sell this information to third parties, who use it for targeted advertising, surveillance, and more. - The consequences can be severe, from identity theft to reputational damage. The issue is not just about having something to hide; it's about the fundamental right to privacy and dignity. The collection and misuse of personal data can have far-reaching implications for individuals and society as a whole. To protect yourself, it's essential to be aware of the ways in which your data is being collected and used. Simple steps, such as using encryption and being cautious with app permissions, can help safeguard your personal information. The conversation around data privacy is ongoing, and it's crucial that individuals, organizations, and governments work together to establish robust protections for personal data. #DataPrivacyMatters #SurveillanceState #DigitalRights
To view or add a comment, sign in
-
Here’s a sobering reminder — it’s not always your systems directly under threat, but often the touchpoints you rely on. Discord recently disclosed that hackers infiltrated one of its customer service providers, leading to a leak of user data. What was exposed? Names, email addresses, usernames Partial billing info: payment type, last 4 digits of card, purchase history IP addresses & messages exchanged with support agents In some cases: government ID images for age verification (passport, driver’s license) Important to note: Discord says full credit card numbers, CVVs, passwords, authentication data, and general user activity outside support channels were not compromised. They’ve already acted — revoked access, launched forensic investigations, notified affected users, and are working with authorities. #DataPrivacy #DataProtection #Compliance #GDPR #DPDPA #PDPL #RiskManagement #ThirdPartyRisk #BreachPrevention #InfosecMindset #Zedroit
To view or add a comment, sign in
-
-
In 2025, fraudsters don’t just hack systems — they hack belief. AI-generated faces and voices, fake online personas, and disinformation campaigns are being used in romance scams, business fraud, and even targeted harassment. Open-Source Intelligence (OSINT) techniques offer a powerful defense to help investigators and everyday users verify identities, trace digital footprints, and expose synthetic lies before it’s too late. https://lnkd.in/gJ52jUUy
To view or add a comment, sign in
-
Today deep fakes are being used across a broad spectrum from teen schoolyard bullying to romance scams taking thousands from lonely seniors. There are even instances where nation states have used deep fakes for strategic deception. Basic open-source methods can help to uncover these scams, but the knowledge and understanding to do this are beyond the reach of many. Online trust is an increasingly scarce commodity. Validation and Verification of online content is increasingly important. Cc James Patrick MBCS Craig Rice
In 2025, fraudsters don’t just hack systems — they hack belief. AI-generated faces and voices, fake online personas, and disinformation campaigns are being used in romance scams, business fraud, and even targeted harassment. Open-Source Intelligence (OSINT) techniques offer a powerful defense to help investigators and everyday users verify identities, trace digital footprints, and expose synthetic lies before it’s too late. https://lnkd.in/gJ52jUUy
To view or add a comment, sign in
-
Digital identity is quickly becoming essential infrastructure and a foundation for trust, privacy, and security. In the second post of our new series, The Future of Digital Identity in America, we explore how policy shapes adoption across states, federal agencies, and international standards. From California’s large-scale rollout to Utah’s privacy-by-design approach, governments are proving that thoughtful frameworks can both accelerate adoption and protect civil liberties. With AI-driven fraud on the rise and public trust on the line, there is no better time for verifiable digital credentials. Read more on why the policy frontier matters, and what’s at stake: https://lnkd.in/gc9MHPyj
To view or add a comment, sign in
-
🚨 Google hit with a €325 million fine by France’s CNIL for violating user consent rules. The breaches? Ads disguised as emails in Gmail inboxes and cookies placed during account creation without valid consent. CNIL ruled that these practices amounted to direct marketing messages, requiring prior user consent. This landmark case underscores the rising scrutiny around digital privacy, transparency, and accountability. These are exactly the conversations taking place at the Future Identity Festival, 10th –11th November at The Brewery, London. Expect bold discussions on trust, and the evolving regulatory landscape across identity, fraud prevention, and access management. Will you be in the room? 👉 Register now: https://bit.ly/4pHOY2n #FID #digitalidentity | Victor Cruz | Alexandra Green | Lisa Moyle | Malcolm O'Reilly | Alicia Condon | Anna Kochanova | Anna Smart | Raffaella Patmore | Emma Sharp
To view or add a comment, sign in
-
-
Europol shut down a SIM-farm service that powered 49 million fake accounts. A SIM farm is a setup of many SIM cards and devices that gives its operator lots of phone numbers. Criminals rent these numbers to create fake accounts, receive verification SMS, spoof identities, or run mass scams. Think of it as phone numbers-as-a-service for fraud. ----> The service created tens of millions of fake accounts. That makes account fraud, fake marketplaces, and social engineering easy to scale. ---->SMS-based proofs of identity and one-time codes become unreliable when attackers control large pools of numbers. I often tell to companies and my students: Replace SMS 2FA with app-based 2FA or hardware tokens where possible. Don’t rely on SMS alone in anywhere. Resource: https://lnkd.in/dBntrMHv
To view or add a comment, sign in
-
Explore related topics
Explore content categories
- Career
- Productivity
- Finance
- Soft Skills & Emotional Intelligence
- Project Management
- Education
- Technology
- Leadership
- Ecommerce
- User Experience
- Recruitment & HR
- Customer Experience
- Real Estate
- Marketing
- Sales
- Retail & Merchandising
- Science
- Supply Chain Management
- Future Of Work
- Consulting
- Writing
- Economics
- Artificial Intelligence
- Employee Experience
- Workplace Trends
- Fundraising
- Networking
- Corporate Social Responsibility
- Negotiation
- Communication
- Engineering
- Hospitality & Tourism
- Business Strategy
- Change Management
- Organizational Culture
- Design
- Innovation
- Event Planning
- Training & Development