image

Qualified Electronic Signatures

In an increasingly paperless and digitized world, qualified ...
image

Identity Theft

The threat of identity theft continues to grow every day. As digital ...
image

Document Cropping and Field Detection Algorithms

At the heart of the identity verification process there are two ...
image

Protect your Data with Two-Factor Authentication

Two-factor authentication, or 2FA in short, serves as an ...
image

Deepfakes and Identity Theft

Deepfake technologies make it easier than ever for criminals to steal ...
image

Identity Verification using NFC

NFC technology has established itself as a promising solution for ...
image

Swiss eID and European eID

The EU and Switzerland are pushing ahead with the introduction of ...
image

What is a Digital Identity?

Digital identity is still a relatively recent development. Because of ...
image

eID: A Comprehensive Guide

In response to the ongoing digitization in our modern world, you now ...