Articles
-
The Exciting Evolution of Browser Fingerprinting
Browser fingerprinting goes well beyond cookies. This article tracks how methods evolved from basic browser identifiers to canvas, WebGL, and device-based fingerprinting, and why each step changed the tradeoff between detection, privacy, and fraud prevention.
Published on:: 2024-08-10 18:29:56
-
Antifraud articles
This collection maps the core techniques, signals, and control points behind antifraud work. It covers device and browser fingerprinting, IP and email checks, rule engines, case management, and detection patterns for account takeover, synthetic identity fraud, merchant fraud, and bot activity.
Published on:: 2024-08-10 18:29:56
-
Media Device Fingerprinting: A Modern Method for Online Tracking
Media Device Fingerprinting uses browser APIs to collect details about a user’s audio and video devices and turn that data into a tracking signal. This article explains how it works, why it matters for online fingerprinting, where it falls short, and what can reduce its effectiveness.
Published on:: 2024-08-10 18:29:56
-
Evercookie: A Persistent Tracking Mechanism
Evercookie is a JavaScript technique that writes the same identifier across multiple browser storage locations to resist deletion. If one store is cleared, it rebuilds from the others, which enables persistent, cross-session tracking. This article explains how it works, its technical and legal limits, and practical steps users can take to reduce exposure.
Published on:: 2024-08-10 18:29:56
-
Using a Rule Engine to Tailor Your Antifraud Strategy
A rule engine gives you control over antifraud logic. Instead of relying on generic checks, you can combine third-party data, IP block lists, and your own transaction signals to define rules that fit your risk profile. This article shows how to tailor antifraud rules for ecommerce, including IP address checks, velocity analysis, and custom conditions that help flag suspicious activity before it becomes a loss.
Published on:: 2024-08-10 18:29:56
-
Improving Login Security with a Rule Engine
This article explains how a rule engine uses decision logic to detect account takeover and bot attacks. It covers escalating authentication, including OTP and other challenges, PST integration, and practical rule examples you can deploy to block suspicious logins fast.
Published on:: 2024-08-10 18:29:56
-
Stopping Synthetic Identity Fraud with SEON and Decisimo - Decisimo
Synthetic identity fraud exploits small gaps in identity data. This article explains how SEON adds digital footprint and address analysis to registration checks, and why that mix helps businesses spot suspicious identities before they open an account or complete a purchase.
Published on:: 2024-08-10 18:29:56
-
Using distance calculation with the spherical law of cosines to detect fraud in ecommerce
This article explains how to use the Spherical Law of Cosines to calculate great-circle distances from latitude and longitude, and apply that decision logic in a decision engine for customer verification, geo-fencing, and ecommerce fraud detection. It compares the formula with Haversine, shows the exact equation and implementation steps, and explains the accuracy trade-offs at different distance ranges.
Published on:: 2024-08-10 18:29:56
-
Tools Used in Online Fraud Prevention
Online fraud prevention uses gateway checks, data enrichment, ML models, chargeback controls, transaction monitoring, and case management to reduce e-commerce fraud. This article outlines these methods and shows how to encode them into auditable decision logic for repeatable fraud screening.
Published on:: 2024-08-10 18:29:56
-
ETags: a quiet web tracking mechanism
ETags are a standard part of HTTP, built mainly for web cache optimization. They do more than improve performance. They can also be used as a hidden tracking mechanism. This article explains how ETags work, how they are used in web caching, how they can be misused to track users, and what steps can reduce those privacy risks.
Published on:: 2024-08-10 18:29:56