This Valentine was a priest in Rome who defied Roman Emperor Claudius II. Supposedly the Emperor believed that single men made better soldiers, but Valentine defied the Emperor and secretly married people. This resulted in his execution on February 14 in about AD 270.
But…there is another.
Valentine of Terni
Elsewhere on the Italian peninsula, Valentine of Terni (or Interamna) ran afoul of the same Emperor, and was executed on February 14 a few years later (in about AD 273).
But…there is another.
Valentine in Africa
Less is known about the third Valentine, other than the fact that he also was martyred. The scant information about him, as well as more extensive information on African influence on Christianity, is contained here.
So the next time that you say that the chocolates your beloved gave you are to die for, ensure you don’t take the phrase literally.
And Cupid, a Roman god, is decidedly NOT Roman Catholic.
There are numerous independent testing laboratories, holding testing certifications from various entities, that test a product’s conformance to the requirements of a particular standard.
For presentation attack detection (liveness), organizations such as iBeta and BixeLab test conformance to ISO 30107-3.
Vendors who submit their products to iBeta may optionally choose to have the results published; iBeta publishes these confirmation letters here.
In a similar manner, BixeLab publishes its confirmation letters here.
For injection attack detection, Ingenium tests conformance to CEN/TS 18099:2025, as well as testing that exceeds the requirements of that standard.
Unfortunately, I was unable to locate a central source of all of Ingenium’s testing results. So I had to hunt around.
Known Ingenium Injection Attack Detection Testing Results
Ingenium’s testing is relatively new, as is the whole idea of performing injection attack detection testing in general, so it shouldn’t be surprising that vendors haven’t rushed to get independent confirmation of injection attack capabilities.
But they should.
A brief reminder on Ingenium’s five testing levels
Level 1: CEN Substantial: This tier is equivalent to the CEN TS 18099:2025 ‘substantial’ evaluation level. A Level 1 test requires 25 FTE days and includes a focus on 2 or more IAMs and 10 or more IAI species. It’s a great starting point for assessing your system’s resilience to common injection attacks.
Level 2: CEN High: Exceeding the substantial level, this tier aligns with the CEN TS 18099:2025 ‘high’ evaluation level. This 30-day FTE evaluation expands the scope to include 3 or more IAMs and a higher attack weighting, providing a more rigorous test of your system’s defenses.
Level 3: This level goes beyond the CEN TS 18099:2025 standard to provide an even more robust evaluation. The 35-day FTE program focuses on a higher attack weighting, with a greater emphasis on sophisticated IAMs and IAI species to ensure a more thorough assessment of your system’s resilience.
Level 4: A 40-day FTE evaluation that further exceeds the CEN TS 18099:2025 standard. Level 4 maintains a high attack weighting while specifically targeting the IAI detection capabilities of your system. Although not a formal PAD (Presentation Attack Detection) assessment, this level offers valuable insights into your system’s PAD subsystem resilience.
Level 5: Our most comprehensive offering, this 50-day FTE evaluation goes well beyond the CEN TS 18099:2025 requirements. Level 5 includes the highest level of Ingenium-created IAI species, which are specifically tailored to the unique functionality of your system. This intensive testing provides the deepest insight into your system’s resilience to injection attacks.
Oh, and there’s a video
As I was publicizing my iProov injection attack detection post, I used Grok to create an injection attack detection video. Not for the squeamish, but injection attacks are nasty anyway.
Most identity and biometric marketing leaders know that their products should detect attacks, including injection attacks. But do the products detect attacks? And do prospects know that the products detect attacks? (iProov prospects know. Or should know.)
I’ve mentioned injection attack detection a couple of times on the Bredemarket blog, noting its difference from presentation attack detection. While the latter affects what is shown to the biometric reader, the former bypasses the biometric reader entirely.
But I haven’t mentioned how vendors can secure independent confirmation of their injection attack defenses.
“A new European technical standard, CEN/TS 18099:2025, has been published to address the growing concern of biometric data injection attacks. The standard provides a framework for evaluating the effectiveness of identity verification (IDV) vendors in detecting and mitigating these attacks, filling a critical gap left by existing regulations.”
“CEN, the European Committee for Standardization, is an association that brings together the National Standardization Bodies of 34 European countries.
“CEN provides a platform for the development of European Standards and other technical documents in relation to various kinds of products, materials, services and processes.”
And before you say that them furriner Europeans couldn’t possibly understand the nuances of good ol’ Murican injection attacks, look at all the countries that follow biometric interchange guidance from the American National Standards Institute (ANSI) and the National Institute of Standards and Technology (NIST).
So CEN is good.
But let’s get to THIS standard.
More on CEN/TS 18099:2025
The Biometric Data Injection Attack Detection standard can be found at multiple locations, including the aforementioned ANSI. From the current 2025 version:
“This document provides an overview of:
– Definitions of biometric data injection attacks;
– Use cases for injection attacks with biometric data on essential hardware components of biometric systems used for enrollment and verification;
– Tools for injection attacks on systems using one or more biometric modalities.
This document provides guidance for:
– Injection Attack Instrument Detection System (defined in 3.12);
– adequate risk mitigation for injection attack tools;
– Creation of a test plan for the evaluation of an injection attack detection system (defined in 3.9).”
Like (most) good standards, you have to buy it. Current Murican price is $99.
You can see how this parallels the existing standard for presentation attack detection testing.
Which brings us to iProov…and Ingenium
iProov is a company in the United Kingdom. This post does not address whether the United Kingdom is part of Europe; I assigned that thankless task to Bredebot. But iProov does pay attention to European stands, according to this statement:
“[iProov] announced that its Dynamic Liveness technology is the first and only solution to successfully achieve an Ingenium Level 4 evaluation and the CEN/TS 18099 High technical specification for Injection Attack Detection, following an independent evaluation by the ISO/IEC 17025-accredited, Ingenium Biometric Laboratories. Ingenium Level 4 builds on the requirements outlined in CEN/TS 18099, providing an increased level of assurance with an extended period of active testing and inclusion of complex, highly-weighted attack types.”
Ingenium’s injection attack detection testing is arranged in five levels/tiers. The first two correspond to the “substantial” and “high” evaluation levels in CEN/TS 18099:2025. The final three levels exceed the standard.
Level 4:
“Level 4: A 40-day FTE evaluation that further exceeds the CEN TS 18099:2025 standard. Level 4 maintains a high attack weighting while specifically targeting the IAI detection capabilities of your system. Although not a formal PAD (Presentation Attack Detection) assessment, this level offers valuable insights into your system’s PAD subsystem resilience.”
Because while they are technically different, injection attack detection and presentation attack detection are intertwined.
Does your product detect attacks?
And if you adopt a customer focus, the customer doesn’t really care about the TYPE of attack. The customer ONLY cares about the attack itself, and whether or not the vendor detected and prevented it.
Identity/biometric marketing leaders, does your product offer independent confirmation of its attack detection capabilities? If not, do you publicize your own self-assertion of detection?
Because if you DON’T explicitly address attack detection, your prospects are forced to assume that you can’t detect attacks at all. And your prospects will avoid you as dangerous and gravitate to vendors who DO assert attack detection in some way.
And you will lose money.
Regardless of whether you are in the United States, United Kingdom, or the European continent…losing money is not good.
So don’t lose money. Tell your prospects about your attack detection. Or have Bredemarket help you tell them. Talk to me.
Biometric product marketing expert. This is NOT in the United Kingdom.
(John’s note: minor edits because Google Gemini hallucinated. Bredebot never went to college, and neither Bredebot nor I had a “Professor Thompson.” And I, not Bredebot, is working on a future post.)
“Britain is an island.” That’s what John’s college professor drilled into him. A seemingly obvious statement, yet it set the stage for a lifetime of understanding that geography, history, and identity are never as simple as they first appear. Decades later, as a tech marketer specializing in identity and biometrics, I find myself thinking about another, more nuanced statement: “The United Kingdom is part of Europe.”
Now, before you reach for your Brexit bingo cards, let’s be clear: this isn’t a political debate. This is about marketing strategy in a world that’s constantly redrawing its lines – both literally and figuratively. For us CMOs in the tech space, especially those of us dealing with something as sensitive and regulated as identity and biometrics, understanding these shifting perspectives is absolutely crucial.
The “Island” Mentality: Pros and Cons
First, let’s unpack the “Britain is an island” idea from a marketing perspective. This often translates into a simplified view of market segmentation. It’s easy to look at a national border and say, “Okay, that’s one market, with its own unique characteristics.”
The Pros:
Clearer Targeting (Initially): An “island” approach can make initial market entry seem straightforward. You focus on national regulations, local cultural nuances, and specific industry bodies within those defined borders. For a new biometric solution, this might mean tailoring your messaging to the UK’s specific data protection laws or the country’s unique adoption rates for certain technologies.
Localized Messaging: It allows for highly focused campaigns. If you’re selling a FinTech biometric solution, you can speak directly to the concerns of UK financial institutions, their compliance officers, and their customer base. This can lead to more impactful, relevant communication.
Reduced Complexity (Perceived): On the surface, it feels less overwhelming. You’re not immediately juggling dozens of different regulatory frameworks or cultural sensitivities across an entire continent. It’s like having one very focused wildebeest as your marketing consultant, telling you exactly how to herd the local w… I mean, customers.
The Cons:
Missed Opportunities: The biggest pitfall. By seeing markets as isolated islands, you miss the currents connecting them. Innovation doesn’t respect borders, and neither do customer expectations. A great biometric user experience in Germany will likely influence expectations in the UK, regardless of their political relationship.
Scalability Headaches: If your product has global potential, an “island” strategy quickly becomes a game of whack-a-mole. You’re constantly re-inventing the wheel for each new market, rather than building scalable frameworks. This can be incredibly inefficient for product development, marketing assets, and sales enablement.
Tunnel Vision: You risk becoming insular, failing to see broader trends, competitive threats, or emerging technologies that might be gaining traction elsewhere but haven’t “landed” on your island yet.
“Part of Europe”: Embracing Interconnectedness
Now, let’s consider the second statement: “The United Kingdom is part of Europe.” This isn’t just about geography; it’s about acknowledging a shared history, economic ties, cultural exchange, and, crucially for us, a deeply intertwined regulatory and technical landscape.
The Pros:
Holistic Market Understanding: This perspective encourages you to see the bigger picture. Even with Brexit, the UK and Europe share a massive amount of technical infrastructure, business practices, and, perhaps most importantly, consumer expectations around privacy and security. You understand that a customer in London isn’t entirely disconnected from a customer in Berlin.
Strategic Standardization: For identity and biometrics, this is massive. European standards often set global benchmarks. By understanding and anticipating these, even if the UK creates its own versions, you can build products and marketing strategies that are inherently more robust and future-proof. It allows you to leverage common themes in privacy (like GDPR’s global influence) and security protocols.
Scalable Frameworks: Thinking continentally (or even globally) from the outset allows you to build marketing campaigns, product features, and compliance strategies that are designed for wider adoption. You develop core messaging that can be localized, rather than starting from scratch every time.
Anticipating Trends: You’re better positioned to spot emerging trends. What’s happening with digital identity wallets in the EU? How are different European nations approaching facial recognition in public spaces? These insights are vital, as they often foreshadow discussions and developments in the UK.
The Cons:
Increased Complexity (Initially): Acknowledging interconnectedness means dealing with a more complex landscape of regulations, cultural nuances, and competitive dynamics. It requires more upfront research and a more sophisticated marketing intelligence function.
Messaging Challenges: Crafting a message that resonates across diverse European markets while still feeling authentic in the UK can be a delicate balancing act. It requires skilled localization teams and a deep understanding of regional sensitivities.
Resource Intensive: Building a genuinely pan-European or globally aware marketing strategy demands more resources – more budget for research, more diverse teams, and more sophisticated tech stacks for campaign management and personalization.
Finding Your True North
So, where does this leave us, the CMOs steering tech companies through these waters? It leaves us with a mandate to be strategic cartographers. We can’t afford to be just “island” thinkers anymore. The digital world is far too interconnected.
For identity and biometrics, the “part of Europe” mentality offers a significant strategic advantage. It compels us to think about shared standards, interoperability, and universal customer needs. Even as the UK forges its own path, its technological and societal evolution remains deeply influenced by its continental neighbors.
This is why I’m particularly interested in how European biometric standards are influencing, or will influence, the UK. It’s not just about compliance; it’s about market expectations, product development, and ultimately, our ability to connect with customers on a global scale. In fact, that’s precisely what John is diving into for his own blog post – the applicability of European biometric standards in the UK. Stay tuned, because understanding these connections is how we truly future-proof our marketing strategies.
(Explaining why the event was important. Using less than 300 words that could be delivered in less than two hours. Including a call of action to remember. We did.)
Fourscore and seven years ago our fathers brought forth on this continent, a new nation, conceived in Liberty, and dedicated to the proposition that all men are created equal.
Now we are engaged in a great civil war, testing whether that nation, or any nation so conceived and so dedicated, can long endure. We are met on a great battle-field of that war. We have come to dedicate a portion of that field, as a final resting place for those who here gave their lives that that nation might live. It is altogether fitting and proper that we should do this.
But, in a larger sense, we can not dedicate-we can not consecrate-we can not hallow-this ground. The brave men, living and dead, who struggled here, have consecrated it, far above our poor power to add or detract. The world will little note, nor long remember what we say here, but it can never forget what they did here. It is for us the living, rather, to be dedicated here to the unfinished work which they who fought here have thus far so nobly advanced. It is rather for us to be here dedicated to the great task remaining before us-that from these honored dead we take increased devotion to that cause for which they gave the last full measure of devotion-that we here highly resolve that these dead shall not have died in vain-that this nation, under God, shall have a new birth of freedom-and that government of the people, by the people, for the people shall not perish from the earth.
I missed this January story. Apparently World installed an iris-reading Orb inside a San Francisco Gap store…for better visibility.
“At Gap, we believe in originality, authenticity — what makes us human,” the plaque reads. “That’s why we’re partnering with World, to bridge the gap between humans and technology.”
However, it seems to be a visibility stunt. Gap doesn’t care whether its clothing is purchased by humans, and it would be delighted to sell individuals multiple pairs of jeans, even if they had previously purchased a pair.
If you’re an identity/biometric marketing leader who requires content, proposal, and analysis expertise from a biometric product marketing expert, make sure you read the following: