Proxy Network: Use Cases and Identity Verification Tips

There’s an ultimate feature that describes all cybercriminals accurately. Spoiler alert – it’s the fact that they want to stay anonymous. For years, proxy servers supported malicious actors, helping them blend in and conduct dangerous crimes. But can identity verification end this era?

Gabija Stankevičiūtė
The guide to decentralized identity

The Guide to Decentralized Identity in 2023

The internet has been turned into a gold mine for data. Users have filled up their storage banks with millions of data pieces, defining who they are both digitally and IRL. But now Web3 has birthed a new idea by which humans can safely engage with their data through digital identity.

Security in Web3

Understanding Web3 and its Security Measures

The static, the responsive, and the semantic are seen as how the internet has evolved. The evolution of web3 might be slow with current trends, but positive adoption is being noticed. The ultimate question that still gives headaches to some critics is the security factor. Tag along to find out more.

Adomas. Product owner.

iDenfy Through Adomas’ Eyes: Motivation, Challenges, and All That Jazz

If you’re not up to speed with iDenfy’s tech environment, now’s the chance to catch up. This time, we’re presenting our Product Owner, Adomas Vitkauskas!

Cryptocurrency crimes and identity verification.

How Identity Verification is Helping Combat Cryptocurrency Crimes

While the use of cryptocurrency for payment is gradually getting into the mainstream and inviting more users to experience what the fuss is about, regulators seek to implement more robust security measures to tackle the ongoing issue of crypto crimes.

AML policies in USA and compliance guide.

AML Regulations in the USA: Everything You Should Know as a Business Owner

Since 2002, more than 38 institutions in USA have reached settlements or pled guilty due to non-compliance with AML regulatory requirements and paid substantial fines in settlements.

Non-fungible tokens (NFTs). How to build KYC compliance?

Frauds in NFTs And The Need For KYC

NFTs are believed to be the web3 technological tool that would change the internet economy. While web3 believers have high hope for what NFTs will become, the fraudsters of the internet are making moves in every way to outsmart creators, collectors, and investors.

Proof of address

How to Verify Proof of Address in 2025? Here’s the Complete Guide

How exactly does the proof of address process look like? Our step-by-step guide will answer all questions related to Address Verification.

Business verification in the EU

AML Guidelines in the European Union. What Should Financial Companies Know When Applying Business Verification?

Over the past decade, the EU has been considering how to combat the potential illicit flows through banks and other financial institutions. It’s clear that stricter financial processes call for a more robust action plan from all financial players. This time, we’ll review the EU and its standards by providing all the necessary guidelines.

Ugne. Data review specialists' team lead.

Ugnė Explains What it Means to be a Team Lead

Hello, September! While the weather is getting colder, we advise you to grab a cup of coffee, sit back and relax while you learn more about another wonderful member of the team – Ugnė – our Data Review Specialists’ Team Lead.

Viktas. Mobile application developer.

How Viktas Got Interested in Technology as a Kid

Meet Viktas, iDenfy’s Mobile Application Developer, who’s passionate about technology and a bunch of other fascinating things.

Identity verification mobile SDK

Top 3 Things to Look for in an Identity Verification Mobile SDK

When choosing an identity verification SDK, it’s important to know the key features to look for. Find out which ones are best suited for your needs.

Face authentication

Face Authentication: Why It Completes Your Identity Verification

KYC is a perfect choice for onboarding your customer. It is quick to do and provides all the required information the business needs to know. Coupled with the AML compliance tool, it might seem that your current onboarding process is complete. However, a missing piece here is customer re-authentication after the initial onboarding. This blog […]

X