RMost traditional defenses rely on static validation, evaluating each identity as an isolated event. Techniques like biometric scans, liveness detection, and ID checks often miss the broader picture. Because these synthetic identities are only submitted a few times per platform and appear unique, conventional tools struggle to detect the repetition. To counter this threat, AU10TIX therefore introduces “consortium validation”. Unlike siloed systems, this method allows multiple organizations to share identity signals across a real-time network, just like the best endpoint protection platforms. If an identity, or even a slightly modified version, appears at more than one member organization, the system flags it immediately.
Source: www.techradar.com