FB pixel

Jumio biometrics to secure Klever crypto wallets

IRS seeks crypto wallet hacking capability
 

selfie biometric authentication

Jumio has been chosen by cryptocurrency wallet Klever to provide biometric identity verification for fast, automated user onboarding compliant with know your customer (KYC) and anti money-laundering (AML) regulations.

The forthcoming Klever Exchange is designed to provide users with a simple cryptocurrency trading experience with market-leading speed, robust security, and low fees, according to the announcement. It uses a proprietary security software architecture based on state of the art encryption techniques to keep its wallet highly secure.

Jumio’s biometric technology will be used in KYC registration, and also user authentication.

“Our partnership with Jumio is a major strategic move for Klever,” says Bruno Campos, CTO of Klever. “We are proud to work with the most accurate and comprehensive identity verification solution company on the market to make the Klever Exchange user registration experience as accessible and seamless as technically possible.”

Jumio supports more than 3,500 different ID documents from more than 200 countries and regions, giving Klever Exchange global coverage.

Klever now has more than 3 million users worldwide, who can either store their crypto assets in the company’s digital wallet, or the Klever Exchange for faster trading.

Jumio recently announced that its identity verification platform is performing more than a million face biometric verifications per day.

IRS seeks crypto wallet hacking capability

The United States Internal Revenue Service’s (IRS’s) Digital Forensics Unit is seeking a way to crack cryptocurrency wallets, meanwhile.

A request for information (RFI) into ‘Development Techniques of Exploitation Against Cryptowallets’ asks for information and insights about the services available in the marketplace for breaking into crypto wallets.

The goal of the project is to direct cybersecurity research towards systematic digital forensics processes to develop exploits, reverse engineering and other techniques the agency wants to use on both the hardware and software systems of seized property.

“Though a few known cyber penetration testers have published vulnerabilities on specific devices, the process of decrypting the hardware devices to gain access to the wallets has been challenging,” the RFI explains.

Article Topics

 |   |   |   |   |   |   |   | 

Latest Biometrics News

 

New digital identity verification market report forecasts dramatic change and growth

The latest report from Biometric Update and Goode Intelligence, the 2025 Digital Identity Verification Market Report & Buyers Guide, projects…

 

Live facial recognition vans spread across seven additional UK cities

UK police authorities are expanding their live facial recognition (LFR) surveillance program, which uses cameras on top of vans to…

 

Biometrics ease airport and online journeys, national digital ID expansion

Biometrics advances are culminating in new kinds of experiences for crossing international borders and getting through online age gates in…

 

Agentic AI working groups ask what happens when we ‘give identity the power to act’

The pitch behind agentic AI is that large language models and algorithms can be harnessed to deploy bots on behalf…

 

Nothin’ like a G-Knot: finger vein crypto wallet mixes hard science with soft lines

Let’s be frank: most biometric security hardware is not especially handsome. Facial scanners and fingerprint readers tend to skew toward…

 

Idemia Smart Identity negotiates with Nepal, nears ID document issuance in Armenia

A pair of deals for Idemia Smart Identity to supply biometric ID documents, one in Nepal and one in Armenia,…

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Biometric Market Analysis

Most Viewed This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events