Reliable Digital Identity Verification: Crucial in the Age of AI and Deepfakes
amsterdam, vrijdag, 20 juni 2025.
The rise of AI and deepfakes increases the need for reliable verification methods of digital identities. This development is crucial to prevent fraud and misuse, particularly in the financial sector. The recent Cybersecurity Landscape Netherlands report shows that the digital threat remains significant, making reliable verification essential for secure transactions and interactions online.
Reliable Digital Identity Verification: Crucial in the Age of AI and Deepfakes
The rise of AI and deepfakes increases the need for reliable verification methods of digital identities. This development is crucial to prevent fraud and misuse, particularly in the financial sector. The recent Cybersecurity Landscape Netherlands report shows that the digital threat remains significant, making reliable verification essential for secure transactions and interactions online [2].
New Methods and Tools for Detection
Several new methods and tools have been developed to detect AI-generated content. One of the most advanced technologies is the European Digital Identity Wallet (EUDI Wallet), an app that helps users securely prove their identity and manage digital data [2]. This app is designed with privacy and security as top priorities, allowing users to control which data they share. Additionally, the revised eIDAS2 regulation strengthens the role of Qualified Trust Service Providers (QTSPs), which provide qualified electronic signatures, seals, timestamps, and electronic attribute certifications [2].
Functionality and Effectiveness of the Technologies
The EUDI Wallet uses advanced encryption and verification techniques to confirm user identities. This technology is designed to meet the strictest security standards and helps organisations comply with stricter requirements and benefit from a more efficient digital chain [2]. According to research by INNOPAY, the use of qualified signatures and attributes will significantly increase with the introduction of the EUDI Wallet [2].
Humanity Protocol: A New Approach
In addition to traditional methods, the Humanity Protocol introduces a new approach to digital identity verification. This protocol, founded by Terence Kwok in collaboration with the Human Institute, Animoca Brands, and Polygon Labs, uses palm recognition technology and zero-knowledge proofs to provide secure and privacy-friendly verification [3]. Palm recognition technology offers a non-invasive alternative to iris scanning and works with smartphones for basic verification, while specialised hardware using palm vein scanning provides enhanced security [3].
Challenges in the Arms Race
Despite ongoing innovations, challenges persist in the ‘arms race’ between AI creation and detection. Deepfakes are becoming increasingly realistic, making it harder to distinguish fake content from real content [2]. Organisations must therefore critically assess their current handling of digital identities and utilise qualified trust services to meet stricter requirements and benefit from a more efficient digital chain [2].
Biometric Access Control Systems
Biometric access control systems also play a crucial role in verifying digital identities. Companies like Bosch offer advanced access control solutions that balance open access with high security. These systems can integrate with other security domains such as video surveillance and intrusion alarm systems, and provide a wide range of biometric readers and facial recognition software [4]. Biometric verification offers a higher level of security because biometric characteristics cannot be forged or stolen [4].
Secure Email Communication
In addition to physical access control, secure email communication is equally important. Zivver provides email encryption software that combines security, compliance, and convenience. The software prevents more than 7 million data breaches per year and sends more than 20 million emails annually [5]. Zivver supports compliance with regulations such as GDPR, DPA, NIS2, DORA, and HIPAA, and offers zero-knowledge encryption, ensuring that no one can access the data without permission [5].
Compliance and Oversight
Stricter requirements for digital identities and verification are also supported by new legislation. The WWFT (Anti-Money Laundering and Counter-Terrorism Financing Act) is being enforced more strictly, with higher fines and sharper oversight. Organisations must critically assess their compliance strategies and use smart software to meet the new requirements [1]. The annual accounting process for accountants remains stressful and time-intensive, but smart software offers opportunities for improvement [1].