A Definitive Guide on KYC for Crypto [Updated]

It’s an open secret that cryptocurrencies were introduced to tackle the problems of centralization and lack of authority in finance after the 2008 financial crisis. Though they have been used in illegal activities, they have ended up causing billions of dollars in damage. Read more.

Viktor Vostrikov
Karolis. QA tester.

5 Must-Have Skills to Look for in a QA Tester by Karolis

Curious about the role of a QA Tester and what it takes to succeed in this field? Well, you’ve come to the right place. Get an inside look at the day-to-day responsibilities and life in iDenfy from Karolis Kurelaitis, our QA Tester’s viewpoint.

Proxy security 101

Proxy Network: Use Cases and Identity Verification Tips

There’s an ultimate feature that describes all cybercriminals accurately. Spoiler alert – it’s the fact that they want to stay anonymous. For years, proxy servers supported malicious actors, helping them blend in and conduct dangerous crimes. But can identity verification end this era?

The guide to decentralized identity

The Guide to Decentralized Identity in 2023

The internet has been turned into a gold mine for data. Users have filled up their storage banks with millions of data pieces, defining who they are both digitally and IRL. But now Web3 has birthed a new idea by which humans can safely engage with their data through digital identity.

Security in Web3

Understanding Web3 and its Security Measures

The static, the responsive, and the semantic are seen as how the internet has evolved. The evolution of web3 might be slow with current trends, but positive adoption is being noticed. The ultimate question that still gives headaches to some critics is the security factor. Tag along to find out more.

Adomas. Product owner.

iDenfy Through Adomas’ Eyes: Motivation, Challenges, and All That Jazz

If you’re not up to speed with iDenfy’s tech environment, now’s the chance to catch up. This time, we’re presenting our Product Owner, Adomas Vitkauskas!

Cryptocurrency crimes and identity verification.

How Identity Verification is Helping Combat Cryptocurrency Crimes

While the use of cryptocurrency for payment is gradually getting into the mainstream and inviting more users to experience what the fuss is about, regulators seek to implement more robust security measures to tackle the ongoing issue of crypto crimes.

AML policies in USA and compliance guide.

AML Regulations in the USA: Everything You Should Know as a Business Owner

Since 2002, more than 38 institutions in USA have reached settlements or pled guilty due to non-compliance with AML regulatory requirements and paid substantial fines in settlements.

Non-fungible tokens (NFTs). How to build KYC compliance?

Frauds in NFTs And The Need For KYC

NFTs are believed to be the web3 technological tool that would change the internet economy. While web3 believers have high hope for what NFTs will become, the fraudsters of the internet are making moves in every way to outsmart creators, collectors, and investors.

Business verification in the EU

AML Guidelines in the European Union. What Should Financial Companies Know When Applying Business Verification?

Over the past decade, the EU has been considering how to combat the potential illicit flows through banks and other financial institutions. It’s clear that stricter financial processes call for a more robust action plan from all financial players. This time, we’ll review the EU and its standards by providing all the necessary guidelines.

Ugne. Data review specialists' team lead.

Ugnė Explains What it Means to be a Team Lead

Hello, September! While the weather is getting colder, we advise you to grab a cup of coffee, sit back and relax while you learn more about another wonderful member of the team – Ugnė – our Data Review Specialists’ Team Lead.

Viktas. Mobile application developer.

How Viktas Got Interested in Technology as a Kid

Meet Viktas, iDenfy’s Mobile Application Developer, who’s passionate about technology and a bunch of other fascinating things.

Identity verification mobile SDK

Top 3 Things to Look for in an Identity Verification Mobile SDK

When choosing an identity verification SDK, it’s important to know the key features to look for. Find out which ones are best suited for your needs.