Deepfakes Slipping Through the Silos

(Imagen 4)

Sometimes common sense isn’t enough to stop deepfake fraud. Marc Ricker of iValt asserrts that a unified response helps also.

“Too often, network teams focus on availability, while security teams chase threats after the fact. That separation creates gaps — gaps that attackers exploit.”

Ricker’s solution:

“iVALT unifies remote access and identity security through:

Instant, passwordless biometric authentication

AI-resistant technology that stops deepfake and synthetic identity fraud”

iVALT trumpets the use of 5 factors: device ID, biometrics, geolocation, time window, and “app code.” 

  • I was curious which biometric modalities and vendors iVALT supported, so I looked it up. 
  • iVALT appears to use PingOne DaVinci, which orchestrates everything. 
  • The only biometrics specifically mentioned by iVALT are those captured on a mobile phone.
  • But it’s unclear to me whether these are the biometrics captured by the phone’s operating system (for example, TouchID or FaceID on iOS), third party biometrics, or all of the above.

Of course, most people don’t care about the minutiae of supported biometric modalities. 

But some do…because all biometric algorithms do NOT provide the same accuracy or performance.

Ubiquity Via Focus…On Where?

So Bredemarket’s talking about “ubiquity via focus”?

Focus on where?

On the Bredemarket blog, your source for the latest identity/biometric and technology news.

And your source for the most up-to-date information on Bredemarket’s content-proposal-analysis services.

Be sure to visit https://bredemarket.com/blog/

Or better yet, subscribe at https://bredemarket.com/subscribe-to-bredemarket/

Ubiquity Via Focus

Well, that’s done and over with.

So let’s move forward with the third year of the revived Bredemarket.

In case you missed it, Bredemarket provides content-proposal-analysis services for identity/biometric and technology firms by means of standard writing offerings.

And Bredemarket will improve its capabilities to serve you…by the means of ubiquity via focus.

No, Bredemarket isn’t ready to reveal what “ubiquity via focus” is yet…but I think you’ll figure it out.

Ubiquity Via Focus.

Two Years

On May 30, 2023 I wrote a post in the Bredemarket blog, announcing an increase in Bredemarket’s business hours to full time.

I also announced a change in scope.

“If you need a consultant for marketing or proposal work, and your company is involved in the identification of individuals, Bredemarket can accept the work.”

Because…I learned at 7:30 that morning that my individual identification employer was no longer my employer. Several of us lost our jobs that day.

As it turns out, my view of my employment future was overly optimistic.

“Maybe I’ll find a new full-time position in a couple of weeks, and I’ll again have to reduce hours and scope.”

As it ended up, I didn’t…and I haven’t.

Your credentials are too impressive, so we are moving in a different direction.

And I’m paying full price for my healthcare—no employer subsidy.

Your opportunity remains.

Bredemarket has openings.

(Pictures not from Craiyon, but from Imagen 4.)

Your Product Marketing Audience is Small

Product and service marketing is deceptively easy…because there’s no need to market to everyone.

I just calculated the numbers. Of the world’s population (not counting non-person entities) a generous (!) maximum of 8,000 people are hungry and interested in buying the services Bredemarket provides. 

The true number is probably more like 800, but let me fantasize for a moment.

Unreal fantasy.

Or to put it another way, 99.9999% of people have absolutely no interest in Bredemarket.

(Not) Spreading the word about my guest post 

This affects how I market things.

For example, when I wrote my guest post on May 6, I spread the word via my own blog and social channels. Including all the repurposing.

But I didn’t privately contact people and gloat about my byline.

Well, with two exceptions. Because I wrote briefly (one sentence) about third-party risk management, I privately alerted two TPRM professionals who wouldn’t have seen it otherwise.

“Employ third-party risk management (TPRM) to minimize the risk when biometric data is stored with cloud providers, application partners, and companies in the supply chain.”

Pearls and ice

Other than that, I engaged in no private messaging, even to long-standing biometric professionals.

  • Some of the biometric professionals saw my blog or social mentions of the guest post and were duly impressed.
  • Others likely saw my blog or social mentions and didn’t care one bit.
  • The rest never saw my blog or social mentions, which meant that they didn’t actively follow Bredemarket, which again meant that they didn’t care at all.

The whole pearls before swine story plays here. 

Or selling ice makers to Eskimos. 

A lost cause.

Whatever example you prefer, there’s no need to market your product to those who don’t give a REDACTED about it. 

You can’t overcome indifference.

(All pictures from Imagen 4)

Consider the Ethical Ramifications (7/7)

This is the last of seven vendor suggestions I made in my Biometric Update guest post.

“Consider the ethical ramifications. Sometimes we as an industry are so intent on getting things done that we don’t pause to consider the ramifications of our actions. Those companies that address the ethical ramifications of biometrics, artificial intelligence, machine learning, and other technologies are well-positioned for future challenges.”

Ideally ethical considerations should happen in the executive suite, not in some superfluous subcommittee that could get axed any day. As a positive example, Tony Porter OBE QPM LLB has served as Chief Privacy Officer of Corsight AI since January 2021.

(Imagen 3)

Employ Security (6/7)

This is the sixth of seven vendor suggestions I made in my Biometric Update guest post.

“Employ comprehensive security measures. Ensure protection for the data on your systems, your customer systems, and the systems integrated with those systems. Employ third-party risk management (TPRM) to minimize the risk when biometric data is stored with cloud providers, application partners, and companies in the supply chain.”

If you don’t already know this, whenever you read a Bredemarket-authored article, always click the links. This includes the articles I write for others…such as Biometric Update. If you clicked a particular link at the end of my guest post, you found out which third party behaved badly with Customs and Border Protection (CBP) data:

“Facial images of travelers and license plate data have been stolen from a U.S. Customs and Border Protection (CBP) subcontractor….While the agency did not identify the subcontractor to the Post, it did provide a statement titled “CBP Perceptics Public Statement.”…Perceptics was hacked in May, and The Register reported thousands of files…were available on the dark web.”

As I concluded my guest post,

“Do not let this happen to your business.”

But here’s a positive example:

“ID.me will transfer your Biometric Information to our third party partners only when required by a subpoena, warrant, or other court ordered legal action.”

(Imagen 3)

Disclose Data Uses (5/7)

This is the fifth of seven vendor suggestions I made in my Biometric Update guest post.

“Disclose the specific uses for all biometric data you control and/or collect. The law often requires this anyway, but even if it isn’t, educate your customers and their users regarding why you collect what you do.”

As an example, Built In notes that Illinois’ Biometric Information Privacy Act (BIPA) has strict consent requirements, including the following:

“Informing the individual of the company’s purpose for collecting, storing, and using the biometric information.”

(Imagen 3)