FB pixel

Deepfakes are a threat to age assurance, and injection attack detection is the answer

Yoti breaks down need to ensure secure image capture in world of advanced GenAI
Deepfakes are a threat to age assurance, and injection attack detection is the answer
 

Everyone knows deepfakes are a massive problem for financial services. The 2024 case of the deepfake video call that cost a company in Hong Kong 25 million dollars is approaching the status of legend. But does the deepfake era present the same kind of threat to age assurance systems?

In a joint presentation at the 2026 Global Age Assurance Standards Summit, Yoti CEO Robin Tombs and Chief Product Engineer Omari Rodney say no – if you know where to look. And, as generative AI makes deepfakes ever-harder to distinguish from reality, that means looking at the media source.

Liveness detection is now table stakes for competitive age assurance providers, but it is typically applied at authentication. That leaves organizations vulnerable to attacks that plug in after the initial authentication phase – in other words, injection attacks. Ensuring image capture is secure adds an additional layer of defense against deepfakes deployed in indirect attacks (versus direct presentation attacks attempted with masks or screens). Tombs says it’s now easier than ever for any digitally literate teenager to work out how to stage a simple injection attack to bypass biometric age assurance.

Detect the source, rather than the image

Yoti’s argument would seem to imply that robust deepfake detection for age assurance providers now necessitates injection attack detection. The ability to authenticate a capture device or feed is as critical as being able to spot an AI generated face. And, as deepfake generators continue to improve, blurring the line between GenAI and reality, it may soon be the only reliable way to tell if any given face belongs to a real person.

The discussion points toward a multi-layered approach that Yoti calls the “Tower of London” model. GenAI is a problem across the digital security and online safety spectrum, and, if forecasts are correct, it will increasingly infiltrate any transaction conducted on a screen. That means understanding not just what you’re looking at, but how the image came to be.

Related Posts

Article Topics

 |   |   |   |   |   |   |   | 

Latest Biometrics News

 

Face biometrics use cases outnumbered only by important considerations

With face biometrics now used regularly in many different sectors and areas of life, stakeholders are asking questions about a…

 

Biometric Update Podcast explores identification at scale using browser fingerprinting

“Browser fingerprinting is this idea that modern browsers are so complex.” So says Valentin Vasilyev, Chief Technology Officer of Fingerprint,…

 

Passkeys now pervasive but passwords persist in enterprise authentication

Passkeys are here; now about those passwords. Specifically, passkeys are now prevalent in the enterprise, the FIDO Alliance says, with…

 

Pornhub returns to UK, but only for iOS users who verify age with Apple

In the UK, “wanker” is not typically a term of endearment. However, the case may be different for Pornhub, which…

 

Europol operated ‘shadow’ IT systems without data safeguards: Report

Europol has operated secret data analysis platforms containing large amounts of personal information, such as identity documents, without the security…

 

EU pushes AI Act deadlines for high-risk systems, including biometrics

The EU has reached a provisional agreement on changes to the AI Act that postpone rules on high-risk AI systems,…

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Biometric Market Analysis and Buyer's Guides

Most Viewed This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events