<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Co-Founder of Identy.io</title>
	<atom:link href="https://www.identy.io/author/antony-vendhan/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.identy.io/author/antony-vendhan/</link>
	<description>Biometric authentication on mobile phones, for secure and user-friendly identity verification</description>
	<lastBuildDate>Tue, 17 Mar 2026 12:32:32 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.identy.io/wp-content/uploads/2025/08/cropped-Favicon-Identy-32x32.webp</url>
	<title>Co-Founder of Identy.io</title>
	<link>https://www.identy.io/author/antony-vendhan/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Best Deepfake Detection Software</title>
		<link>https://www.identy.io/best-deepfake-detection-software/</link>
		
		<dc:creator><![CDATA[Antony Vendhan]]></dc:creator>
		<pubDate>Thu, 12 Mar 2026 19:35:45 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[biometrics]]></category>
		<category><![CDATA[digital identity]]></category>
		<guid isPermaLink="false">https://www.identy.io/?p=5713</guid>

					<description><![CDATA[<p>Deepfakes, AI-generated images, video or audio mimicking real people, threaten digital trust across fintech, banking, government and insurance sectors. Sophisticated [&#8230;]</p>
<p>La entrada <a href="https://www.identy.io/best-deepfake-detection-software/">Best Deepfake Detection Software</a> se publicó primero en <a href="https://www.identy.io">identy.io</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="5713" class="elementor elementor-5713" data-elementor-post-type="post">
				<div class="elementor-element elementor-element-6d79d180 e-flex e-con-boxed e-con e-parent" data-id="6d79d180" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-45534d00 elementor-widget elementor-widget-text-editor" data-id="45534d00" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									
<p>Deepfakes, AI-generated images, video or audio mimicking real people, threaten digital trust across fintech, banking, government and insurance sectors. Sophisticated fraudsters <strong>use deepfakes for voice or video phishing, <a href="https://www.identy.io/identity-theft-prevention-and-protection/">identity theft</a> and impersonation</strong>, undermining user confidence and business credibility. Organizations must deploy real-time detection tools and employee training to mitigate these risks. Leading solutions combine advanced AI liveness checks with smooth user experience, meet regulatory standards and scale to millions of transactions. For example, the Identy.io <strong>mobile biometric platform</strong> integrates on-device deepfake detection alongside passive liveness checks. Certified identity frameworks like the <a href="https://fidoalliance.org/certification/identity-verification/face-verification/">FIDO Alliance Face Verification program</a> now explicitly evaluate deepfake resistance. This report analyzes threat trends and technology options, focusing on business impact, compliance and selecting “<strong>best deepfake detection software</strong>” for enterprise-grade identity security.</p>
								</div>
				</div>
		<div class="elementor-element elementor-element-e011d59 e-con-full e-flex e-con e-child" data-id="e011d59" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;gradient&quot;}">
				<div class="elementor-element elementor-element-e5ad36f elementor-widget elementor-widget-heading" data-id="e5ad36f" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<span class="elementor-heading-title elementor-size-default">Detect Deepfakes before they become a Threat</span>				</div>
				</div>
				<div class="elementor-element elementor-element-a899954 elementor-widget elementor-widget-text-editor" data-id="a899954" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Deepfakes are becoming more sophisticated, increasing the risk of fraud and identity manipulation in digital environments. Download our 10-step guide to learn how to detect threats early and protect your organization with proven best practices.</p>								</div>
				</div>
				<div class="elementor-element elementor-element-b6a7083 elementor-align-center elementor-widget elementor-widget-button" data-id="b6a7083" data-element_type="widget" data-e-type="widget" data-widget_type="button.default">
				<div class="elementor-widget-container">
									<div class="elementor-button-wrapper">
					<a class="elementor-button elementor-button-link elementor-size-sm" href="#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6IjU0OTciLCJ0b2dnbGUiOmZhbHNlfQ%3D%3D" target="_blank" rel="nofollow" id="Success Case 1">
						<span class="elementor-button-content-wrapper">
						<span class="elementor-button-icon">
				<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>			</span>
									<span class="elementor-button-text">Download our guide now</span>
					</span>
					</a>
				</div>
								</div>
				</div>
				</div>
				<div class="elementor-element elementor-element-06c327e elementor-widget elementor-widget-heading" data-id="06c327e" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Business risks of Deepfake fraud</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-6793a13 elementor-widget elementor-widget-text-editor" data-id="6793a13" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									
<p>Generative AI has dramatically expanded the scale and realism of identity fraud. Recent industry research warns that deepfakes have “dramatically undermined trust in digital media and <strong>digital identity verification</strong>, with profound implications for fraud”. Synthetic identity attacks ,for example, a fake CEO video call authorizing a bogus wire transfer, can cost firms millions. Consumers also express growing unease: a FIDO study found over half of surveyed users worry about deepfakes in online identity checks, even as many prefer <strong>face biometrics for sensitive transactions</strong>. In regulated fields like finance, weak identity verification exposes firms to compliance violations (e.g. KYC/AML rules) and reputational damage. In short, deepfakes threaten business continuity, brand trust and regulatory standing. To protect these assets, enterprises must layer defense-in-depth: not only detecting manipulation but also training staff to recognize AI-augmented social engineering.</p>
								</div>
				</div>
				<div class="elementor-element elementor-element-070a096 elementor-widget elementor-widget-image" data-id="070a096" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
															<img fetchpriority="high" decoding="async" width="1024" height="576" src="https://www.identy.io/wp-content/uploads/2026/03/deepfake-software-solution_converted-1024x576.webp" class="attachment-large size-large wp-image-6146" alt="" srcset="https://www.identy.io/wp-content/uploads/2026/03/deepfake-software-solution_converted-1024x576.webp 1024w, https://www.identy.io/wp-content/uploads/2026/03/deepfake-software-solution_converted-300x169.webp 300w, https://www.identy.io/wp-content/uploads/2026/03/deepfake-software-solution_converted-768x432.webp 768w, https://www.identy.io/wp-content/uploads/2026/03/deepfake-software-solution_converted-1536x864.webp 1536w, https://www.identy.io/wp-content/uploads/2026/03/deepfake-software-solution_converted.webp 1920w" sizes="(max-width: 1024px) 100vw, 1024px" />															</div>
				</div>
				<div class="elementor-element elementor-element-ca873e0 elementor-widget elementor-widget-heading" data-id="ca873e0" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Real-Time Deepfake detection and protection</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-585c638 elementor-widget elementor-widget-text-editor" data-id="585c638" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									
<p>Cutting-edge solutions use AI to scan live audio/video streams and flag fakes on the fly. For instance, some tools apply <strong>real-time deepfake protection software</strong> that analyzes video calls frame-by-frame to spot inconsistencies (blinks out of sync, audio lip-sync errors, etc.). One provider describes its tool as instantly verifying “whether you’re speaking with a real person or a deepfake – in real time, with just one click”. In practice, detection may involve multi-layer analysis (visual, temporal and even blockchain-based provenance). The goal is seamless integration: security runs passively in the background so genuine users aren’t disrupted, while attackers are blocked.</p>
<p>Today’s mobile identity platforms illustrate this approach. For example, Identy.io’s <a href="https://www.identy.io/products/biometric-solutions/"><strong>mobile biometric software includes a deepfake detection layer</strong></a> that performs visual and temporal analysis on-device to identify AI-generated content. It even detects “injection” attacks (where fake media is inserted into the video stream) and combines this with <strong>passive liveness checks</strong>. By processing everything on the user’s device, Identy.io minimizes delays and data exposure, demonstrating that robust protection and good user experience can coexist. Any evaluation of <strong>best deepfake detection software</strong> should therefore consider factors like detection accuracy, latency and impact on legitimate users, alongside threat coverage (e.g. face, voice, and video channels).</p>
								</div>
				</div>
		<div class="elementor-element elementor-element-f7a9fd6 e-con-full e-flex e-con e-child" data-id="f7a9fd6" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;gradient&quot;}">
				<div class="elementor-element elementor-element-18e0db7 elementor-widget elementor-widget-heading" data-id="18e0db7" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<span class="elementor-heading-title elementor-size-default">Experience Identy.io in action</span>				</div>
				</div>
				<div class="elementor-element elementor-element-d9ac50e elementor-widget elementor-widget-text-editor" data-id="d9ac50e" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Get a tailored demo of our contactless biometric platform and see how it fits your specific use case.</p>								</div>
				</div>
				<div class="elementor-element elementor-element-4095def elementor-align-center elementor-widget elementor-widget-button" data-id="4095def" data-element_type="widget" data-e-type="widget" data-widget_type="button.default">
				<div class="elementor-widget-container">
									<div class="elementor-button-wrapper">
					<a class="elementor-button elementor-button-link elementor-size-sm" href="https://www.identy.io/contact/" target="_blank" rel="nofollow" id="Success Case 1">
						<span class="elementor-button-content-wrapper">
						<span class="elementor-button-icon">
				<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>			</span>
									<span class="elementor-button-text">Schedule a demo</span>
					</span>
					</a>
				</div>
								</div>
				</div>
				</div>
				<div class="elementor-element elementor-element-fd01a64 elementor-widget elementor-widget-heading" data-id="fd01a64" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Deepfake phishing simulation training</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-30fa3e7 elementor-widget elementor-widget-text-editor" data-id="30fa3e7" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									
<p>In parallel with technical detection, firms are proactively training employees. <strong>Deepfake phishing simulation software</strong> lets security teams safely rehearse AI-powered voice/video attacks. For example, a simulated workflow might deliver a phishing email directing an employee into a fake video call, where a cloned-voice avatar urges an urgent action. Users who fall for it get immediate micro-training to recognize such scams in the future. As one industry guide notes, this specialized training “safely rehearses AI-generated voice and video social-engineering attacks”. By integrating these simulations into broader security awareness programs, organizations build human resilience to deepfake lures. While these tools don’t detect live fraud, they are an important part of risk management, transforming employees into an informed last line of defense.</p>
								</div>
				</div>
				<div class="elementor-element elementor-element-48639ac elementor-widget elementor-widget-image" data-id="48639ac" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
															<img decoding="async" width="1024" height="576" src="https://www.identy.io/wp-content/uploads/2026/03/prevent-deepfake-software-solution_converted-1024x576.webp" class="attachment-large size-large wp-image-6147" alt="" srcset="https://www.identy.io/wp-content/uploads/2026/03/prevent-deepfake-software-solution_converted-1024x576.webp 1024w, https://www.identy.io/wp-content/uploads/2026/03/prevent-deepfake-software-solution_converted-300x169.webp 300w, https://www.identy.io/wp-content/uploads/2026/03/prevent-deepfake-software-solution_converted-768x432.webp 768w, https://www.identy.io/wp-content/uploads/2026/03/prevent-deepfake-software-solution_converted-1536x864.webp 1536w, https://www.identy.io/wp-content/uploads/2026/03/prevent-deepfake-software-solution_converted.webp 1920w" sizes="(max-width: 1024px) 100vw, 1024px" />															</div>
				</div>
				<div class="elementor-element elementor-element-d71d691 elementor-widget elementor-widget-heading" data-id="d71d691" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h3 class="elementor-heading-title elementor-size-default">Compliance and industry standards</h3>				</div>
				</div>
				<div class="elementor-element elementor-element-79e3b93 elementor-widget elementor-widget-text-editor" data-id="79e3b93" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									
<p>Given regulatory scrutiny of <strong>biometric ID</strong>, deepfake defenses must align with standards. Bodies like the EU Agency for Cybersecurity (ENISA) already report rising deepfake “injection attacks” in remote identity proofing. The <strong>FIDO Alliance</strong> has launched a Face Verification certification that explicitly tests for deepfake/spoof resilience. Certified solutions must meet ISO standards (e.g. ISO/IEC 30107 for liveness) and demonstrate low false acceptance even under adversarial AI attacks. This gives assurance to CMOs and CTOs that vendor claims are independently validated. For example, Identy.io designs its products around these criteria, boasting “on-device AI for detecting spoofing, deepfakes, and injection attacks and compliance with NIST and ISO guidelines.</p>
<p>Moreover, data protection and <strong>KYC regulations</strong> (GDPR, PSD2, etc.) favor solutions that minimize personal data use. On-device processing, as Identy.io emphasizes, means raw biometric data never leaves the user’s device. This architecture both reduces breach risk and often meets privacy-by-design expectations. When selecting a system, security leaders should verify alignment with relevant standards: e.g. <strong>NIST 800-63-3 for digital ID, ISO 30107 for presentation attack detection</strong>, and FIDO2/WebAuthn for passwordless flows. Compliance-ready architectures avoid future rework as rules evolve.</p>
<p>The <strong>best deepfake detection solutions</strong> strike the right balance between security, trust and usability. They use a layered defense, combining passive liveness and spoof checks, AI analysis of media streams, and employee training, to address sophisticated impersonations. They scale to millions of transactions without adding latency or false alerts that frustrate users. Critically, they are built on open standards and certifications, assuring regulators and customers alike.</p>
<p>Business leaders should compare options on these dimensions, not by brand name. As an example, Identy.io’s platform shows how deepfake countermeasures can be built into a smooth onboarding flow. A <a href="https://www.identy.io/products/digital-identity-wallet/">digital wallet</a> or banking app using such a solution can verify identities in seconds while flagging fake videos in real time. Ultimately, investing in advanced detection software protects revenue and reputation. Enterprises that proactively adopt these technologies demonstrate commitment to digital trust and prepare for an AI-driven threat landscape.</p>
								</div>
				</div>
		<div class="elementor-element elementor-element-39a52a6 e-con-full e-flex e-con e-child" data-id="39a52a6" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;gradient&quot;}">
				<div class="elementor-element elementor-element-c4ae2ec elementor-widget elementor-widget-heading" data-id="c4ae2ec" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<span class="elementor-heading-title elementor-size-default">Experience Identy.io in action</span>				</div>
				</div>
				<div class="elementor-element elementor-element-73dd062 elementor-widget elementor-widget-text-editor" data-id="73dd062" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Get a tailored demo of our contactless biometric platform and see how it fits your specific use case.</p>								</div>
				</div>
				<div class="elementor-element elementor-element-db5e8ca elementor-align-center elementor-widget elementor-widget-button" data-id="db5e8ca" data-element_type="widget" data-e-type="widget" data-widget_type="button.default">
				<div class="elementor-widget-container">
									<div class="elementor-button-wrapper">
					<a class="elementor-button elementor-button-link elementor-size-sm" href="https://www.identy.io/contact/" target="_blank" rel="nofollow" id="Success Case 1">
						<span class="elementor-button-content-wrapper">
						<span class="elementor-button-icon">
				<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>			</span>
									<span class="elementor-button-text">Schedule a demo</span>
					</span>
					</a>
				</div>
								</div>
				</div>
				</div>
				<div class="elementor-element elementor-element-acc5b6a elementor-widget elementor-widget-text-editor" data-id="acc5b6a" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									
<p><strong>Bibliography</strong></p>
<ul>
<li><span style="font-weight: 400;">FIDO Alliance</span></li>
<li><span style="font-weight: 400;">European Union Agency for Cybersecurity (ENISA)</span></li>
<li><span style="font-weight: 400;">National Institute of Standards and Technology (NIST)</span></li>
<li><span style="font-weight: 400;">ISO/IEC 30107 standards</span></li>
<li><span style="font-weight: 400;">BiometricUpdate news</span></li>
<li><span style="font-weight: 400;">MIT Technology</span></li>
</ul>
								</div>
				</div>
					</div>
				</div>
				</div>
		<p>La entrada <a href="https://www.identy.io/best-deepfake-detection-software/">Best Deepfake Detection Software</a> se publicó primero en <a href="https://www.identy.io">identy.io</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>FIDO authentication for secure mobile access</title>
		<link>https://www.identy.io/fido-authentication-for-secure-mobile-access/</link>
		
		<dc:creator><![CDATA[Antony Vendhan]]></dc:creator>
		<pubDate>Thu, 19 Feb 2026 14:13:49 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[biometrics]]></category>
		<category><![CDATA[digital identity]]></category>
		<guid isPermaLink="false">https://www.identy.io/?p=5375</guid>

					<description><![CDATA[<p>In today’s fintech, banking, and government services, mobile channels carry high stakes. Account breaches and fraud not only incur financial [&#8230;]</p>
<p>La entrada <a href="https://www.identy.io/fido-authentication-for-secure-mobile-access/">FIDO authentication for secure mobile access</a> se publicó primero en <a href="https://www.identy.io">identy.io</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="5375" class="elementor elementor-5375" data-elementor-post-type="post">
				<div class="elementor-element elementor-element-6d79d180 e-flex e-con-boxed e-con e-parent" data-id="6d79d180" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-45534d00 elementor-widget elementor-widget-text-editor" data-id="45534d00" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									
<p><span style="font-weight: 400;">In today’s fintech, banking, and government services, </span><b>mobile channels carry high stakes</b><span style="font-weight: 400;">. Account breaches and fraud not only incur financial losses but erode customer trust. Unfortunately, traditional passwords and OTPs are falling short. Credential theft remains rampant, IBM’s threat intelligence reports that stolen passwords are the leading cause of breaches, with nearly one-third of cyberattacks involving hijacked user accounts.</span></p>
<p><span style="font-weight: 400;">This risk is amplified by emerging threats like AI-driven deepfakes. </span><b>The World Economic Forum’s Cybercrime Atlas</b><span style="font-weight: 400;"> initiative warns that sophisticated deepfake tools now enable criminals to bypass </span><a href="https://www.identy.io/products/facial-recognition-software/"><span style="font-weight: 400;">facial verification</span></a><span style="font-weight: 400;"> and KYC processes, undermining digital trust and creating systemic risks for institutions. Likewise, Europe’s cybersecurity agency, ENISA, notes that deepfake presentation and injection attacks have quickly become some of the hardest biometric threats to mitigate. These trends highlight a clear business imperative: organizations must strengthen </span><b>authentication or face escalating fraud, compliance failures, and reputational damage</b><span style="font-weight: 400;">.</span></p>
								</div>
				</div>
		<div class="elementor-element elementor-element-c6a9193 e-con-full e-flex e-con e-child" data-id="c6a9193" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;gradient&quot;}">
				<div class="elementor-element elementor-element-38717b1 elementor-widget elementor-widget-heading" data-id="38717b1" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<span class="elementor-heading-title elementor-size-default">Banco Popular Dominicano Success Case</span>				</div>
				</div>
				<div class="elementor-element elementor-element-1fe0f5e elementor-widget elementor-widget-text-editor" data-id="1fe0f5e" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Learn how Identy.io strengthened mobile security in the banking sector with advanced fingerprint biometrics and seamless user experience.</p>								</div>
				</div>
				<div class="elementor-element elementor-element-4ab88cb elementor-align-center elementor-widget elementor-widget-button" data-id="4ab88cb" data-element_type="widget" data-e-type="widget" data-widget_type="button.default">
				<div class="elementor-widget-container">
									<div class="elementor-button-wrapper">
					<a class="elementor-button elementor-button-link elementor-size-sm" href="#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6IjQ0MzAiLCJ0b2dnbGUiOmZhbHNlfQ%3D%3D" target="_blank" rel="nofollow" id="Success Case 1">
						<span class="elementor-button-content-wrapper">
						<span class="elementor-button-icon">
				<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>			</span>
									<span class="elementor-button-text">Download the case study</span>
					</span>
					</a>
				</div>
								</div>
				</div>
				</div>
				<div class="elementor-element elementor-element-00ef837 elementor-widget elementor-widget-heading" data-id="00ef837" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">What is FIDO?</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-eef512f elementor-widget elementor-widget-text-editor" data-id="eef512f" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									
<p><b>FIDO-compliant authentication</b><span style="font-weight: 400;"> offers a path to regain security and user confidence. FIDO (Fast IDentity Online) is an open standard that replaces passwords with cryptographic credentials and biometrics. It uses the combination of something the user has (a secure device-bound key) and something the user knows (like a fingerprint, face, or PIN) to verify identity. This approach is inherently phishing-resistant and fraud-proof. There’s no static password to steal or phish, authentication is local and tied to the user’s device. In fact, one of FIDO’s greatest strengths is that it isn’t susceptible to phishing or man-in-the-middle attacks that target user credentials. </span></p>
<p><span style="font-weight: 400;">An attacker can’t trick a user out of a passkey the way they could a password. To compromise a FIDO login, a fraudster would need to physically obtain the user’s device and somehow replicate their biometric or PIN, an exponentially higher bar than guessing or stealing a password.</span></p>
<p><b>This significantly reduces the risk of account hijacking and raises the level of digital trust in each login transaction</b><span style="font-weight: 400;">. FIDO biometrics also bolster trust by protecting privacy. In FIDO implementations, biometric data (such as facial or fingerprint templates) never leaves the user’s device. </span></p>
<p><span style="font-weight: 400;">Authentication is performed via a cryptographic challenge–response, and only a confirmation is sent to the server, not the biometric itself. This design means users don’t have to worry about their </span><a href="https://www.identy.io/products/finger-identification-software/"><span style="font-weight: 400;">fingerprints</span></a><span style="font-weight: 400;"> or face scans being exposed in a central database breach. It also ensures compliance with strict data regulations. For example, under EU GDPR, biometrics are classified as sensitive personal data and generally cannot be processed or stored off-device without special justification. FIDO aligns perfectly with these requirements: it keeps biometric info local on a user’s phone, transmitting only a yes/no authentication token, thereby meeting privacy mandates by design. Security standards bodies have taken note; FIDO’s approach of local biometric validation meets high-assurance guidelines like NIST SP 800-63 for multi-factor authentication, since the biometric factor remains bound to the device and isn’t shared over the network. By deploying </span><b>FIDO-compliant biometrics</b><span style="font-weight: 400;">, organizations can enhance security and user privacy concurrently, a foundational element of digital trust.</span></p>
								</div>
				</div>
		<div class="elementor-element elementor-element-dc58af6 e-con-full e-flex e-con e-child" data-id="dc58af6" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;gradient&quot;}">
				<div class="elementor-element elementor-element-e0f75ca elementor-widget elementor-widget-heading" data-id="e0f75ca" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<span class="elementor-heading-title elementor-size-default">Explore Identy’s Biometric SDK</span>				</div>
				</div>
				<div class="elementor-element elementor-element-7b94030 elementor-widget elementor-widget-text-editor" data-id="7b94030" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p data-start="93" data-end="255">Integrate secure, on-device biometric authentication and advanced liveness detection into your mobile app with a scalable, enterprise-ready SDK.</p>								</div>
				</div>
				<div class="elementor-element elementor-element-a665bbf elementor-align-center elementor-widget elementor-widget-button" data-id="a665bbf" data-element_type="widget" data-e-type="widget" data-widget_type="button.default">
				<div class="elementor-widget-container">
									<div class="elementor-button-wrapper">
					<a class="elementor-button elementor-button-link elementor-size-sm" href="https://www.identy.io/finger-biometric-sdk/" id="Success Case 1">
						<span class="elementor-button-content-wrapper">
						<span class="elementor-button-icon">
				<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>			</span>
									<span class="elementor-button-text">Explore biometric SDK</span>
					</span>
					</a>
				</div>
								</div>
				</div>
				</div>
				<div class="elementor-element elementor-element-070a096 elementor-widget elementor-widget-image" data-id="070a096" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
															<img decoding="async" width="1024" height="576" src="https://www.identy.io/wp-content/uploads/2026/02/what-is-fido_converted-1024x576.webp" class="attachment-large size-large wp-image-6112" alt="" srcset="https://www.identy.io/wp-content/uploads/2026/02/what-is-fido_converted-1024x576.webp 1024w, https://www.identy.io/wp-content/uploads/2026/02/what-is-fido_converted-300x169.webp 300w, https://www.identy.io/wp-content/uploads/2026/02/what-is-fido_converted-768x432.webp 768w, https://www.identy.io/wp-content/uploads/2026/02/what-is-fido_converted-1536x864.webp 1536w, https://www.identy.io/wp-content/uploads/2026/02/what-is-fido_converted.webp 1920w" sizes="(max-width: 1024px) 100vw, 1024px" />															</div>
				</div>
				<div class="elementor-element elementor-element-cb42e18 elementor-widget elementor-widget-heading" data-id="cb42e18" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">What is FIDO?</p>				</div>
				</div>
				<div class="elementor-element elementor-element-483cb88 elementor-widget elementor-widget-heading" data-id="483cb88" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">How to use FIDO?</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-26fe630 elementor-widget elementor-widget-text-editor" data-id="26fe630" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									
<p><span style="font-weight: 400;">Beyond security, FIDO authentication delivers a superior user experience that technology leaders (CMOs, CTOs, Heads of Security) can leverage for competitive advantage. Passwordless, </span><b>biometric logins are fast and frictionless</b><span style="font-weight: 400;">, a customer can unlock an app with a face scan or fingerprint tap in a split second, instead of laboriously typing passwords or waiting for SMS codes. This convenience directly impacts adoption and engagement. A real-world example comes from a major government agency in Australia that rolled out FIDO-based passkeys to millions of users. The result was striking: up to an 80% user activation rate on mobile within weeks of launch, as citizens embraced the simpler login experience. </span></p>
<p><span style="font-weight: 400;">This high adoption not only improved user satisfaction but also translated into operational savings, this agency saw a significant drop in authentication support calls and a reduction in one-time password delivery costs.</span></p>
<p><span style="font-weight: 400;">In the private sector, banks and fintech firms report similar wins. Leading banks like Wells Fargo and HSBC now allow customers to access mobile banking via built-in device biometrics, eliminating passwords and reset calls. This shift aligns with regulations such as PSD2’s Strong Customer Authentication in the EU, which recognizes biometrics as a compliant factor for secure logins. Fintech challengers, too, have capitalized on biometrics for seamless onboarding and payments.</span></p>
<p><span style="font-weight: 400;">FIDO biometrics not only streamline the customer journey but also build confidence, users feel safer knowing their account is protected by something as unique as their fingerprint or face, rather than a memorized string of characters. Scalability is another critical benefit. As organizations grow their user base into the millions, a FIDO-compliant solution scales gracefully. The FIDO standards are universal and interoperable across devices and platforms. The FIDO Alliance, a coalition of tech companies, banks, government agencies, and security providers, has ensured that FIDO authentication is built into virtually all modern smartphones, laptops, and web browsers.</span></p>
<p><span style="font-weight: 400;">This means a bank or government agency can enable passwordless login for users on iOS, Android, Windows, and other systems with minimal fuss. There’s no need for proprietary tokens or special reader devices; users leverage the hardware they already own (e.g. their phone’s secure enclave and biometric sensor). By being FIDO compliant, an authentication solution like Identy’s platform (a FIDO Alliance member) adheres to these global standards out-of-the-box.</span></p>
<p><span style="font-weight: 400;">This interoperability not only future-proofs the deployment but also eases regulatory compliance, many regulators explicitly favor standards-based approaches to security. Organizations can demonstrate that their mobile authentication meets industry best practices and certifications, which is reassuring for auditors and customers alike.</span></p>
								</div>
				</div>
		<div class="elementor-element elementor-element-3e59269 e-con-full e-flex e-con e-child" data-id="3e59269" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;gradient&quot;}">
				<div class="elementor-element elementor-element-f4f5781 elementor-widget elementor-widget-heading" data-id="f4f5781" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<span class="elementor-heading-title elementor-size-default">Experience Identy.io in action</span>				</div>
				</div>
				<div class="elementor-element elementor-element-7fb8c2a elementor-widget elementor-widget-text-editor" data-id="7fb8c2a" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Get a tailored demo of our contactless biometric platform and see how it fits your specific use case.</p>								</div>
				</div>
				<div class="elementor-element elementor-element-d127537 elementor-align-center elementor-widget elementor-widget-button" data-id="d127537" data-element_type="widget" data-e-type="widget" data-widget_type="button.default">
				<div class="elementor-widget-container">
									<div class="elementor-button-wrapper">
					<a class="elementor-button elementor-button-link elementor-size-sm" href="https://www.identy.io/contact/" target="_blank" rel="nofollow" id="Success Case 1">
						<span class="elementor-button-content-wrapper">
						<span class="elementor-button-icon">
				<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>			</span>
									<span class="elementor-button-text">Schedule a demo</span>
					</span>
					</a>
				</div>
								</div>
				</div>
				</div>
				<div class="elementor-element elementor-element-f5a1db9 elementor-widget elementor-widget-heading" data-id="f5a1db9" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<span class="elementor-heading-title elementor-size-default">Regulatory compliance and Future-readiness</span>				</div>
				</div>
				<div class="elementor-element elementor-element-77601b8 elementor-widget elementor-widget-text-editor" data-id="77601b8" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									
<p><span style="font-weight: 400;">Navigating the web of security regulations is a top concern for CIOs and digital identity leaders. Implementing FIDO-compliant authentication helps check many compliance boxes in one stroke. Regulations across fintech and government consistently call for strong customer authentication and protection of personal data. </span></p>
<p><span style="font-weight: 400;">For instance, the European Banking Authority’s guidelines and PSD2 mandate multi-factor authentication for payments, where factors must include something like biometrics or hardware tokens. A FIDO biometric login inherently fulfills this by combining a user’s trusted device (possession factor) with a biometric (inherence factor) in a passwordless flow. It’s a user-friendly way to meet “strong customer authentication” requirements without resorting to clunky methods that hurt conversion rates. </span></p>
<p><span style="font-weight: 400;">On the data protection side, as discussed, FIDO’s local processing of biometric data addresses GDPR and even emerging AI risk regulations by minimizing sensitive data exposure. In the United States, agencies are encouraged by NIST and OMB guidance to adopt phishing-resistant authenticators for citizen services, FIDO is explicitly cited as a solution that meets high assurance levels for government login use cases. By choosing authentication systems built on FIDO standards, organizations position themselves to comply with not only today’s laws but also tomorrow’s.</span></p>
<p><span style="font-weight: 400;">The security landscape is evolving (consider how deepfake fraud wasn’t on any regulator’s radar until recently). Open standards like FIDO, backed by an alliance of industry and government experts, tend to adapt faster to new threats than closed, legacy systems. This means adopting FIDO is a strategic bet on staying ahead of evolving security requirements. It’s telling that forward-looking institutions are already on board, from tech giants and banks to government bodies worldwide, signaling that FIDO’s approach is becoming the baseline for trustworthy digital identity.</span></p>
								</div>
				</div>
				<div class="elementor-element elementor-element-566a8a5 elementor-widget elementor-widget-image" data-id="566a8a5" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
															<img loading="lazy" decoding="async" width="1024" height="576" src="https://www.identy.io/wp-content/uploads/2026/02/problems-with-traditionals-apps_converted-1024x576.webp" class="attachment-large size-large wp-image-6113" alt="" srcset="https://www.identy.io/wp-content/uploads/2026/02/problems-with-traditionals-apps_converted-1024x576.webp 1024w, https://www.identy.io/wp-content/uploads/2026/02/problems-with-traditionals-apps_converted-300x169.webp 300w, https://www.identy.io/wp-content/uploads/2026/02/problems-with-traditionals-apps_converted-768x432.webp 768w, https://www.identy.io/wp-content/uploads/2026/02/problems-with-traditionals-apps_converted-1536x864.webp 1536w, https://www.identy.io/wp-content/uploads/2026/02/problems-with-traditionals-apps_converted.webp 1920w" sizes="(max-width: 1024px) 100vw, 1024px" />															</div>
				</div>
				<div class="elementor-element elementor-element-b31ba1e elementor-widget elementor-widget-heading" data-id="b31ba1e" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">Problems with traditional mobile access</p>				</div>
				</div>
				<div class="elementor-element elementor-element-e9e2261 elementor-widget elementor-widget-heading" data-id="e9e2261" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Real-World Impact and Strategic Outlook</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-1c5ef9d elementor-widget elementor-widget-text-editor" data-id="1c5ef9d" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									
<p><span style="font-weight: 400;">FIDO-compliant authentication isn’t just theory; it’s proving its value in the field. We’ve seen government agencies achieve both security and efficiency gains with passkeys, setting a model for public services. In the financial sector, institutions are reporting reductions in fraud and smoother customer interactions after going passwordless. Banco Popular Dominicano, for example, implemented </span><a href="https://www.identy.io/products/biometric-identity-verification/"><span style="font-weight: 400;">biometric identity verification</span></a><span style="font-weight: 400;"> for high-risk mobile transactions to safeguard customers, a move that reflects wider industry efforts to combat fraud with stronger methods.</span></p>
								</div>
				</div>
		<div class="elementor-element elementor-element-a67a9c9 e-con-full e-flex e-con e-child" data-id="a67a9c9" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;gradient&quot;}">
				<div class="elementor-element elementor-element-46a4e4d elementor-widget elementor-widget-heading" data-id="46a4e4d" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<span class="elementor-heading-title elementor-size-default">Banco Popular Dominicano Success Case</span>				</div>
				</div>
				<div class="elementor-element elementor-element-22e8310 elementor-widget elementor-widget-text-editor" data-id="22e8310" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Learn how Identy.io strengthened mobile security in the banking sector with advanced fingerprint biometrics and seamless user experience.</p>								</div>
				</div>
				<div class="elementor-element elementor-element-63e1b6e elementor-align-center elementor-widget elementor-widget-button" data-id="63e1b6e" data-element_type="widget" data-e-type="widget" data-widget_type="button.default">
				<div class="elementor-widget-container">
									<div class="elementor-button-wrapper">
					<a class="elementor-button elementor-button-link elementor-size-sm" href="#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6IjQ0MzAiLCJ0b2dnbGUiOmZhbHNlfQ%3D%3D" target="_blank" rel="nofollow" id="Success Case 1">
						<span class="elementor-button-content-wrapper">
						<span class="elementor-button-icon">
				<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>			</span>
									<span class="elementor-button-text">Download the case study</span>
					</span>
					</a>
				</div>
								</div>
				</div>
				</div>
				<div class="elementor-element elementor-element-1f376a8 elementor-widget elementor-widget-text-editor" data-id="1f376a8" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									
<p><span style="font-weight: 400;">By deploying standards-based biometrics, they and others have strengthened digital trust: clients feel confident that their accounts and data are protected by cutting-edge security, which in turn encourages greater use of digital channels. From a strategic perspective, adopting FIDO authentication is more than a security upgrade; it’s a business enabler. It allows organizations to confidently roll out new mobile services (digital banking, e-government apps, fintech innovations) knowing that users can access them securely and conveniently. It also future-proofs the business against emerging threats like deepfakes and credential stuffing, which are on the rise globally. Companies like Identy, as members of the FIDO Alliance, are helping lead this charge by delivering authentication solutions that are FIDO certified and interoperable, so that fintechs, banks, and governments can focus on their core mission rather than the minutiae of authentication tech. </span></p>
<p><span style="font-weight: 400;">In conclusion, FIDO-compliant authentication marries strong security with elegant user experience, directly addressing the business risks of our digital era. </span><b>It reduces fraud and regulatory risk by leveraging phishing-proof, privacy-preserving methods</b><span style="font-weight: 400;">. It enhances user satisfaction through seamless logins, which drives adoption of digital services. And it scales to meet both the technological and compliance demands of large enterprises and government programs. For CMOs and CTOs championing digital transformation, FIDO biometrics offer a compelling proposition: a way to build digital trust at scale. Embracing these standards now is a strategic investment in a safer, more user-centric digital future, one where customers and citizens can access mobile services with confidence that their identity is secure.</span></p>
								</div>
				</div>
				<div class="elementor-element elementor-element-acc5b6a elementor-widget elementor-widget-text-editor" data-id="acc5b6a" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									
<p><strong>Bibliography</strong></p>
<p><span style="font-weight: 400;">Fido Alliance: https://fidoalliance.org/company/identy/</span></p>
<p><span style="font-weight: 400;">NIST, Digital Identity Guidelines (SP 800-63B), Official U.S. guidelines for authentication, recommending phishing-resistant, multi-factor approaches: https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-63b.pdf</span></p>
<p><span style="font-weight: 400;">ENISA, Remote ID Proofing Good Practices (2024), European cybersecurity agency report highlighting deepfake and biometric attack trends, and countermeasure frameworks: https://www.enisa.europa.eu/sites/default/files/2024-11/Remote%20ID%20Proofing%20Good%20Practices_en_0.pdf</span></p>
<p><span style="font-weight: 400;">World Economic Forum, Unmasking Cybercrime: Strengthening Digital Identity Verification against Deepfakes (2026), WEF Cybercrime Atlas report on how AI deepfakes threaten identity systems, calling for robust biometric authentication and liveness detection: https://reports.weforum.org/docs/WEF_Unmasking_Cybercrime_Strengthening_Digital_Identity_Verification_against_Deepfakes_2026.pdf</span></p>
<p><span style="font-weight: 400;">Banco Popular Dominicano: Digitalising Dominican finance | World Finance : https://www.worldfinance.com/banking/banco-popular-dominicano-digitalising-dominican-finance</span></p>
								</div>
				</div>
					</div>
				</div>
				</div>
		<p>La entrada <a href="https://www.identy.io/fido-authentication-for-secure-mobile-access/">FIDO authentication for secure mobile access</a> se publicó primero en <a href="https://www.identy.io">identy.io</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
