Artwork

Вміст надано Chris Parker. Весь вміст подкастів, включаючи епізоди, графіку та описи подкастів, завантажується та надається безпосередньо компанією Chris Parker або його партнером по платформі подкастів. Якщо ви вважаєте, що хтось використовує ваш захищений авторським правом твір без вашого дозволу, ви можете виконати процедуру, описану тут https://uk.player.fm/legal.
Player FM - додаток Podcast
Переходьте в офлайн за допомогою програми Player FM !

5 Common Uses of Synthetic IDs with Stuart Wells

42:57
 
Поширити
 

Manage episode 417110643 series 2774802
Вміст надано Chris Parker. Весь вміст подкастів, включаючи епізоди, графіку та описи подкастів, завантажується та надається безпосередньо компанією Chris Parker або його партнером по платформі подкастів. Якщо ви вважаєте, що хтось використовує ваш захищений авторським правом твір без вашого дозволу, ви можете виконати процедуру, описану тут https://uk.player.fm/legal.

There are entire communities set up to fight fraud that use synthetic IDs as well as scammer gangs that are advancing their creative ways to use these documents. This is changing regularly as biometric authentication advances continue.

Today’s guest is Stuart Wells. Stuart is the CTO of Jumio and is responsible for all aspects of Jumio’s innovation, machine learning, and engineering. He is an industry veteran with more than 30 years of tech experience. He was previously the Chief Product and Technology Officer at FICO, and held executive positions at Avaya and Sun Microsystems.

Show Notes:
  • [1:18] - Stuart shares his background and what he does at Jumio as the Chief Technology Officer.
  • [3:20] - The science behind document protection is literally decades old.
  • [5:06] - Stuart describes the process of verifying a document at Jumio.
  • [5:57] - What are the practical uses of synthetic IDs?
  • [7:39] - There are large volumes of both fraudulent and honest individuals creating and using synthetic IDs.
  • [9:25] - A lot of businesses are seeking verification from places like Jumio to protect themselves and their reputation.
  • [11:49] - Biometrics as a tool to use against fraudsters has grown globally.
  • [13:54] - Biometrics are very useful, but there are challenges.
  • [15:31] - Stuart shares a recent story about a fake video interaction that cost the victim millions of dollars.
  • [17:37] - At this point in the technology’s development, there are some signs of deep fakes that we can spot.
  • [19:03] - How can this negatively impact an individual?
  • [20:18] - Listen to your inner voice and check with another source before sending money.
  • [22:52] - You don’t have to be a programmer to use these tools. The creators have made them easy to use and people are using them to do harm.
  • [25:46] - The early versions of deep fake technology had a lot of easy-to-see abnormalities, but they are getting tougher to spot.
  • [27:26] - Although these negative impacts are concerning, there is some excitement about the positive uses of these advances.
  • [32:07] - What direction is verification headed when it comes to biometrics?
  • [33:54] - Documents have anatomy and security measures in place.
  • [36:43] - Most security systems are layered.
  • [40:00] - This landscape is continuously changing.

Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

Links and Resources:
  continue reading

243 епізодів

Artwork
iconПоширити
 
Manage episode 417110643 series 2774802
Вміст надано Chris Parker. Весь вміст подкастів, включаючи епізоди, графіку та описи подкастів, завантажується та надається безпосередньо компанією Chris Parker або його партнером по платформі подкастів. Якщо ви вважаєте, що хтось використовує ваш захищений авторським правом твір без вашого дозволу, ви можете виконати процедуру, описану тут https://uk.player.fm/legal.

There are entire communities set up to fight fraud that use synthetic IDs as well as scammer gangs that are advancing their creative ways to use these documents. This is changing regularly as biometric authentication advances continue.

Today’s guest is Stuart Wells. Stuart is the CTO of Jumio and is responsible for all aspects of Jumio’s innovation, machine learning, and engineering. He is an industry veteran with more than 30 years of tech experience. He was previously the Chief Product and Technology Officer at FICO, and held executive positions at Avaya and Sun Microsystems.

Show Notes:
  • [1:18] - Stuart shares his background and what he does at Jumio as the Chief Technology Officer.
  • [3:20] - The science behind document protection is literally decades old.
  • [5:06] - Stuart describes the process of verifying a document at Jumio.
  • [5:57] - What are the practical uses of synthetic IDs?
  • [7:39] - There are large volumes of both fraudulent and honest individuals creating and using synthetic IDs.
  • [9:25] - A lot of businesses are seeking verification from places like Jumio to protect themselves and their reputation.
  • [11:49] - Biometrics as a tool to use against fraudsters has grown globally.
  • [13:54] - Biometrics are very useful, but there are challenges.
  • [15:31] - Stuart shares a recent story about a fake video interaction that cost the victim millions of dollars.
  • [17:37] - At this point in the technology’s development, there are some signs of deep fakes that we can spot.
  • [19:03] - How can this negatively impact an individual?
  • [20:18] - Listen to your inner voice and check with another source before sending money.
  • [22:52] - You don’t have to be a programmer to use these tools. The creators have made them easy to use and people are using them to do harm.
  • [25:46] - The early versions of deep fake technology had a lot of easy-to-see abnormalities, but they are getting tougher to spot.
  • [27:26] - Although these negative impacts are concerning, there is some excitement about the positive uses of these advances.
  • [32:07] - What direction is verification headed when it comes to biometrics?
  • [33:54] - Documents have anatomy and security measures in place.
  • [36:43] - Most security systems are layered.
  • [40:00] - This landscape is continuously changing.

Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

Links and Resources:
  continue reading

243 епізодів

Alle episoder

×
 
Loading …

Ласкаво просимо до Player FM!

Player FM сканує Інтернет для отримання високоякісних подкастів, щоб ви могли насолоджуватися ними зараз. Це найкращий додаток для подкастів, який працює на Android, iPhone і веб-сторінці. Реєстрація для синхронізації підписок між пристроями.

 

Короткий довідник