<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Fitzwilliam Anderson</title>
    <description>The latest articles on DEV Community by Fitzwilliam Anderson (@fitzwilliamprove).</description>
    <link>https://dev.to/fitzwilliamprove</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1058237%2F430b8874-72a3-45b2-829f-51bdd13115e9.jpg</url>
      <title>DEV Community: Fitzwilliam Anderson</title>
      <link>https://dev.to/fitzwilliamprove</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/fitzwilliamprove"/>
    <language>en</language>
    <item>
      <title>Should Twitter Charge for SMS 2FA If a Better Option Already Exists?</title>
      <dc:creator>Fitzwilliam Anderson</dc:creator>
      <pubDate>Fri, 07 Apr 2023 16:00:00 +0000</pubDate>
      <link>https://dev.to/prove/should-twitter-charge-for-sms-2fa-if-a-better-option-already-exists-1mnh</link>
      <guid>https://dev.to/prove/should-twitter-charge-for-sms-2fa-if-a-better-option-already-exists-1mnh</guid>
      <description>&lt;p&gt;&lt;em&gt;Can you put a price tag on security?&lt;/em&gt; According to Twitter executives, you can. For $8 a month, the cost of Twitter’s premium service Twitter Blue, customers can continue to enjoy the added security benefits of &lt;a href="https://www.prove.com/blog/how-to-prevent-scammers-from-bypassing-2fa"&gt;2-factor authentication&lt;/a&gt;. Users who do not subscribe to &lt;a href="https://help.twitter.com/en/using-twitter/twitter-blue"&gt;Twitter Blue&lt;/a&gt; will be booted from phone-number based 2FA, a service that was previously free, in 30 days. The &lt;a href="https://blog.twitter.com/en_us/topics/product/2023/an-update-on-two-factor-authentication-using-sms-on-twitter"&gt;product announcement&lt;/a&gt; has caused controversy for the social media giant, raising concerns from privacy advocates, eliciting mixed reviews from the cybersecurity community, and causing widespread confusion among Twitter users. &lt;/p&gt;

&lt;h2&gt;
  
  
  Here’s an excerpt from Twitter’s official announcement:
&lt;/h2&gt;

&lt;blockquote&gt;
&lt;p&gt;“While historically a popular form of 2FA, unfortunately we have seen phone-number based 2FA be used - and abused - by bad actors. So starting today, we will no longer allow accounts to enroll in the text message/SMS method of 2FA unless they are Twitter Blue subscribers.”&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;When announcing its plan to make SMS-based 2FA a paid feature, Twitter took the unorthodox approach of highlighting the very legitimate limitations of phone-number based 2FA rather than highlighting its benefits. In this brief excerpt, Twitter (1) describes 2FA as popular, (2) admits that 2FA can be “used and abused by bad actors,” and (3) announces a plan to limit 2FA to paying customers only. No wonder why folks are confused! &lt;/p&gt;

&lt;p&gt;Is there a method to the madness? To find out, we’ll dive into both the strengths and weaknesses of SMS-based 2FA, take a look at the macroeconomic pressures informing Twitter’s decision to begin charging for the service, and finally study the potential implications of this bold move on the digital authentication landscape at large.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why has phone-number based 2FA been “historically popular”?
&lt;/h2&gt;

&lt;p&gt;Two-factor authentication is a common subset of &lt;a href="https://www.prove.com/blog/what-is-multi-factor-authentication-mfa-and-how-does-it-work"&gt;Multi-Factor Authentication&lt;/a&gt; (MFA). In Twitter’s case, the user’s first credential is their username and password. If they have 2FA activated, the user’s second credential is a unique string of numbers known as a one-time passcode that is sent to their registered phone via SMS.  At Prove, we call this &lt;a href="https://www.prove.com/blog/what-is-phone-centric-identity"&gt;‘running a possession check.’&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;Phone-number based 2FA is popular because it doesn’t require the user to download an authentication app. It’s as simple as receiving an SMS. Unfortunately, as the Twitter statement rightly pointed out, 2FA also has some major security vulnerabilities.&lt;/p&gt;

&lt;h2&gt;
  
  
  What are the limitations of SMS-based 2FA?
&lt;/h2&gt;

&lt;p&gt;Despite their popularity, SMS-based 2FA has security vulnerabilities that are worth noting as fraudsters have developed a playbook to steal a victim’s OTP via a &lt;a href="https://www.prove.com/blog/sim-swap-fraud-is-preventable-why-arent-more-companies-doing-something-about-it"&gt;SIM swap fraud&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;With SIM swap attacks, fraudsters can surreptitiously take over a victim’s phone, intercept the OTP, and successfully enter into a victim’s account in just minutes. There are multiple &lt;strong&gt;reports&lt;/strong&gt; outlining the devastating effects of SIM swap fraud on a victim’s life. &lt;/p&gt;

&lt;p&gt;SIM swap attacks are a common way for fraudsters to bypass many MFA flows by intercepting OTPs. A &lt;a href="https://f.hubspotusercontent10.net/hubfs/5085163/Trust%20Score%20Transaction%20Vulnerability%20Analysis.pdf?utm_source=Medici&amp;amp;utm_medium=editorial&amp;amp;utm_campaign=trustscorereport2020"&gt;study&lt;/a&gt; by Prove, which analyzed over 385,000 SMS and voice OTP-based transactions across industries, found that 5% of them had low SIM tenure, indicating a high possibility of a recent SIM swap or an account takeover. Another recent study on the top five US prepaid carriers highlighted that 80% of SIM swap attacks were successful because of authentication vulnerabilities. &lt;/p&gt;

&lt;h2&gt;
  
  
  If SMS-based 2FA is vulnerable to attack, why is Twitter turning it into a paid feature?
&lt;/h2&gt;

&lt;p&gt;For the money, of course. As their old model of ad revenue implodes, the social media giants are searching for new ways to cut costs and boost revenue. Charging users for 2FA achieves both these goals.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cutting Costs:&lt;/strong&gt; The cost of generating these OTPs and sending them via SMS can be significant. &lt;a href="https://commsrisk.com/elon-musk-says-twitter-lost-60mn-a-year-because-390-telcos-used-bot-accounts-to-pump-a2p-sms/"&gt;In December, Musk aired his grievances against the telcos and the fees they impose on Twitter Spaces:&lt;/a&gt; &lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;“…I discovered this, basically, about 10 days ago, that Twitter was being scammed to the tune of 60 million dollars a year for SMS texts, not counting North America… Basically, there are telcos who are not being super honest out there, in other parts of the world, who were basically gaming the system and running, like, two-factor authentication SMS texts over and over again, and just creating a zillion bot accounts to literally run up the tab so that Twitter would SMS text them, and Twitter would pay them millions of dollars, without even asking about it.”&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;If bots outside of North America were costing Twitter $60 million annually, imagine how expensive the entire 2FA program is overall. Although most companies consider MFA simply the cost of doing business in the modern age, the difficult economic environment for tech companies is causing many CEOs to search for savings everywhere. It’s no coincidence that the shift toward &lt;a href="https://www.prove.com/blog/passwordless-login-step-closer-to-streamlined-online-experience"&gt;passwordless technology&lt;/a&gt; has accelerated in the past year across industries, resulting in many companies achieving savings by eliminating pricey OTPs, bolstering security, and improving user experience. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Boosting Revenue:&lt;/strong&gt; By folding SMS-based 2FA into Twitter Blue rather than phasing it out entirely, Twitter is betting that the added security benefits will entice new customers to pay for its premium service. While charging customers for services that were previously free is never going to win you any popularity contests, Twitter charging users for 2FA is a bit like General Motors charging drivers for seat belts. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--AnWVtfHR--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/s0fo10ts2kk0cqko35z2.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--AnWVtfHR--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/s0fo10ts2kk0cqko35z2.PNG" alt="Image description" width="684" height="348"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Of course, Twitter is far from the only company searching for ways to monetize digital identity. &lt;a href="https://www.theguardian.com/technology/2023/feb/20/facebook-instagram-paid-meta-verification-twitter-charge-2fa-two-factor-authentication-via-sms"&gt;Meta is now selling verified blue checks on Facebook and Instagram for $11.99 a month on the web or US$14.99 on iOS and Android.&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Closing Thought
&lt;/h2&gt;

&lt;p&gt;Twitter's decision to charge consumers for SMS-based 2FA is a great example of doing the right thing for the wrong reason. By disabling 2FA for the vast majority of their customers who do not pay for the premium service, Twitter is phasing out a security service that has long had major security vulnerabilities. This should be celebrated. That being said, removing 2FA is easy compared to what happens next. To improve security, Twitter should go &lt;a href="https://www.pymnts.com/authentication/2023/biometrics-and-smartphones-make-life-without-passwords-a-reality/"&gt;passwordless&lt;/a&gt; and replace OTPs with a more sophisticated, more powerful solution like Prove Auth. Ultimately, removing even an imperfect solution like SMS-based 2FA without a plan to replace it with better technology is irresponsible and could result in a bonanza for fraudsters. If the phasing out of SMS-based 2FA results in increased fraud, the resulting PR nightmare will far outweigh the cost of sending out OTPs.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--VLC_54YZ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/0jxlkjaj0ikh3jc18npv.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--VLC_54YZ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/0jxlkjaj0ikh3jc18npv.PNG" alt="Image description" width="677" height="223"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>What is Cryptographic Authentication and Why Are Leading Companies Moving Away from Risk-Based Authentication?</title>
      <dc:creator>Fitzwilliam Anderson</dc:creator>
      <pubDate>Tue, 04 Apr 2023 16:00:00 +0000</pubDate>
      <link>https://dev.to/prove/what-is-cryptographic-authentication-and-why-are-leading-companies-moving-away-from-risk-based-authentication-2mh8</link>
      <guid>https://dev.to/prove/what-is-cryptographic-authentication-and-why-are-leading-companies-moving-away-from-risk-based-authentication-2mh8</guid>
      <description>&lt;p&gt;As fraud continues to rise and customer expectations for frictionless experiences continue to increase, more and more companies are upgrading outdated risk-based identity authentication technology to more advanced methods such as cryptographic authentication. In this blog post, we’ll explain what cryptographic authentication is and how it is making customer experiences faster and easier while also mitigating more fraud. If you are already familiar with the basics of cryptographic authentication, feel free to skip ahead to the “What is Risk-Based Authentication and Why is Cryptographic Authentication Better?” section or the proof points section at the end of this post.&lt;/p&gt;

&lt;h2&gt;
  
  
  What is Cryptographic Authentication?
&lt;/h2&gt;

&lt;p&gt;Cryptographic authentication (AKA key-based authentication) allows relying parties (financial institutions, companies, and governments) to trust that the data asserted by users during authentication and verification events is actually true by leveraging &lt;a href="https://en.wikipedia.org/wiki/Cryptography"&gt;cryptography&lt;/a&gt; as the source of truth.&lt;/p&gt;

&lt;p&gt;Cryptography refers to the science of writing or solving codes. Encryption, “&lt;a href="https://www.tutorialspoint.com/what-is-the-difference-between-encryption-and-cryptography#:~:text=It%20is%20the%20process%20of,methods%20of%20encryption%20and%20decryption."&gt;the application of cryptography&lt;/a&gt;,” is “the process of converting plain text into a cipher, which can’t be figured out without a key.” Think of the phone number (more specifically, the unique serial number found on every SIM card) as the key used to unlock the encrypted data contained in Prove’s &lt;a href="https://www.prove.com/blog/what-is-tokenization"&gt;tokens&lt;/a&gt;. &lt;/p&gt;

&lt;h2&gt;
  
  
  What is Risk-Based Authentication and Why is Cryptographic Authentication Better?
&lt;/h2&gt;

&lt;p&gt;Risk-based authentication (RBA) utilizes machine learning techniques and data to assess the level of risk behind a particular transaction. In short, it uses data from past behavior to predict future behavior. Today, risk-based authentication is the predominant way companies determine whether or not an authentication event or transaction is legitimate or should be flagged. &lt;/p&gt;

&lt;p&gt;‍While RBA has grown more sophisticated by incorporating more advanced machine learning techniques to analyze new types of data (IP addresses, historical transaction velocities, and consumer spend profile), it suffers from a fatal flaw: &lt;strong&gt;regardless of how sophisticated the machine learning tools are, they are susceptible to inaccurate data sources which can lead to inaccurate predictions.&lt;/strong&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  If Risk-Based Authentication (RBA) has grown more sophisticated, why is fraud increasing?
&lt;/h2&gt;

&lt;p&gt;First, some context. &lt;strong&gt;As more transactions become digital, there will be both a greater volume of transactions and a larger pool of money in aggregate that is at risk of fraud.&lt;/strong&gt; The shift toward digital transactions as the primary way of conducting business gives bad actors both more opportunities and greater incentives. After congress raced to make hundreds of billions of dollars’ worth of Pandemic Unemployment Assistance payments available, for example, fraudsters quickly followed suit and siphoned off an estimated $87 billion.&lt;/p&gt;

&lt;p&gt;‍That being said, the limitations of risk-based authentication are also contributing significantly to the rising rates of fraud. The Achilles heel of RBA can best be summarized by an old computer science adage: &lt;a href="https://en.wikipedia.org/wiki/Garbage_in,_garbage_out"&gt;garbage in, garbage out&lt;/a&gt;. &lt;/p&gt;

&lt;p&gt;‍Imagine you are pulling your credit score. In order to pull a credit score, you need to present personally identifiable information (PII) that, in theory, only you should know (your SSN, for example). Unfortunately, we live in a digital environment where PII is easy to access as a result of large and frequent data breaches. Once a fraudster has your data, they can pull your credit report and even add fake data to your various online credit profiles, creating a &lt;a href="https://www.prove.com/blog/how-fintechs-banks-can-battle-synthetic-identity-fraud-bot-attacks-and-fake-accounts"&gt;synthetic identity&lt;/a&gt; without your knowledge. RBAs will then analyze these synthetic identities (garbage in) and make inaccurate risk-based assessments (garbage out).&lt;/p&gt;

&lt;h2&gt;
  
  
  Why is Cryptographic Authentication Better?
&lt;/h2&gt;

&lt;p&gt;Cryptographic authentication is needed to ensure that the data fed into machine-learning systems is tied to the consumer and not a bad actor.&lt;/p&gt;

&lt;p&gt;‍Prove accomplishes this by ensuring that the identity of the consumer is cryptographically authenticated prior to trusting the information that is submitted. We do this using a variety of methods – for example, by requiring the consumer to prove possession of a known phone number. By running a &lt;a href="https://www.prove.com/blog/what-is-phone-centric-identity"&gt;possession check&lt;/a&gt;, Prove implicitly links the consumer’s SIM card’s authentication to the cellular network to ensure the company is talking to the right person. &lt;/p&gt;

&lt;p&gt;‍To use the credit score example again, Prove can easily stop the bad actor from pulling a victim's credit score even if the bad actor knows all the relevant information about the victim. This is achieved by forcing an authentication to a known cryptographic key (such as a phone number) into the transaction flow. This is the reason Prove has focused significantly on phones and phone numbers as a means of authentication. However, this overall approach is not limited to phones or phone numbers but rather the usage of a cryptographic key tied to a person.&lt;/p&gt;

&lt;h2&gt;
  
  
  What are the benefits of leveraging the mobile phone to conduct cryptographic authentication?
&lt;/h2&gt;

&lt;p&gt;Phone-Centric Identity™, also known as Mobile Identity, Device Intelligence, or Phone Intelligence, refers to technology that leverages and analyzes mobile, telecom, and other signals for the purposes of identity verification, identity authentication, and fraud prevention. It’s key to conducting cryptographic authentication. &lt;/p&gt;

&lt;p&gt;‍‍Phone-Centric Identity™ relies on billions of signals from authoritative sources pulled in real-time, making it a powerful proxy for digital identity and trust. If you think about how many people have mobile phones, how long they have had them, and how often they use them, it’s clear why Phone-Centric Identity signals are highly correlated with identity and trustworthiness.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--d_1PUyFr--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/ma81834mw8ayvmbx92w6.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--d_1PUyFr--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/ma81834mw8ayvmbx92w6.PNG" alt="Image description" width="409" height="400"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The above chart from a McKinsey report entitled “Fighting Back Against Synthetic Identity Fraud” shows that profiles with higher depth (how far back the data goes) and consistency (how often the same data is seen) had a lower risk of being fraudulent. Phone-Centric Identity™ signals—which include phone line tenure; phone behavior such as calls, texts, logins, and ad views; phone line change events as ports, snap-backs, true disconnects, and phone number changes; phone number account takeovers such as SIM swaps; and velocity and behavior of change events—are both high-depth and high-consistency.&lt;/p&gt;

&lt;p&gt;‍For example, Phone-Centric Identity™ signals for a given consumer typically go back many years (high-depth), given that most consumers now open phone accounts at a relatively young age. In fact, 50% of 11-year-olds now have a phone number (&lt;a href="https://www.commonsensemedia.org/research/the-common-sense-census-media-use-by-tweens-and-teens-2019"&gt;Source: The Common Sense Census: Media Use by Tweens and Teens&lt;/a&gt;). In terms of consistency, Phone-Centric Identity™ signals provide one of the best views into whether a consumer’s activity is inconsistent with their regular activity, signaling potentially suspicious behavior.&lt;/p&gt;

&lt;p&gt;‍This stands in stark contrast to social security numbers or passwords, which can be easily purchased on the dark web by hackers and used to break into a consumer’s account. In order to break Phone-Centric Identity™-based verification and authentication, a fraudster would need to buy a phone in the victim’s name, pay for it for years, and use it to make calls and log into apps every day to mimic the victim’s behavior. While this is possible, it certainly isn’t scalable or worth most criminals’ time.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Unique "Possession" Factor
&lt;/h2&gt;

&lt;p&gt;Phone-Centric Identity™ also uniquely utilizes the mobile device as a “what you have” factor that companies can use to deterministically say whether they are interacting with their customer or not. This check, often referred to as a “possession” check, returns a binary result as opposed to a probabilistic score. By understanding whether a consumer is in physical possession of their mobile device or not, Phone-Centric Identity™ technology can return a yes or no answer about whether a company is interacting with their customer or someone else.&lt;/p&gt;

&lt;h2&gt;
  
  
  Enhanced Customer Experience and Privacy
&lt;/h2&gt;

&lt;p&gt;Phones also have built-in, passive authentication, encryption, and privacy. By applying Phone-Centric Identity™ technology to web, app, mobile, chat, call center, and even in-person interactions, companies can give their customers a safer, easier, and faster experience. The consumer does not need to download a separate app or purchase a physical hardware token to authenticate themselves, and the process can often take place invisibly and seamlessly through their existing mobile device.&lt;/p&gt;

&lt;p&gt;‍Opening new accounts, logging in, resetting passwords, moving money, or calling a contact center for support can all feel as effortless as sending a text or making a phone call. Contrast that feeling to the one your customers experience when they need to answer security questions or fumble with easy-to-forget passwords, and it’s easy to see why Phone-Centric Identity™/Mobile Identity is becoming the modern and preferred way to prove identity.&lt;/p&gt;

&lt;h2&gt;
  
  
  Proof Points: How Prove’s cryptographic authentication model enabled a leading card issuer to significant uplift in revenue, reduced fraud, and a streamlined experience.
&lt;/h2&gt;

&lt;p&gt;When companies adopt Prove’s cryptographic authentication, pass rates for legitimate customers increase while fraud decreases significantly. &lt;/p&gt;

&lt;p&gt;The graphs that follow are based on the analysis of nearly 200,000 customer transactions from January to April 2021 and 1,000+ fraudulent transactions from June 2019 to June 2021.&lt;/p&gt;

&lt;p&gt;When holding the acceptable fraud rate at 3.3 basis points (bps) or 3.3 fraud occurrences out of 10,000 transactions, Prove’s combination of cryptography and Machine Learning is expected to provide an 92% pass rate versus the 77% achieved by RBA alone. One financial services company that implemented Prove’s cryptographic authentication model commented:&lt;/p&gt;

&lt;p&gt;‍"With the help of Prove's cryptographic authentication model, Synchrony has achieved a substantial increase in approved accounts, through higher completion and approval rates, with only a fraction of the fraud, when compared to our legacy approach. Importantly, Prove has contributed to a more streamlined customer experience, reduced fraud and provided a significant uplift in revenue."&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Mylene Pedone, SVP of Digital Credit &amp;amp; Authentication at Synchrony&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--eVf1dLBY--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/47is8k5vzn8e7sgwal95.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--eVf1dLBY--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/47is8k5vzn8e7sgwal95.PNG" alt="Image description" width="641" height="589"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The next graph shows the fraud capture rate versus the review rate as an alternative way of illustrating the power of adding machine learning to cryptography. It shows that within the 10% riskiest portion of the population, Prove’s model can capture 57% of the fraud versus the RBA’s 45%.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--tkluKjkQ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/f1kyre7w152z70qrfsin.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--tkluKjkQ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/f1kyre7w152z70qrfsin.PNG" alt="Image description" width="642" height="619"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;As illustrated by the graphs, cryptographic authentication provides companies with a smarter way to calculate risk and prevent fraud. &lt;/p&gt;

&lt;p&gt;‍Interested in learning more about how cryptographic authentication can help you reduce your company’s fraud rates while boosting pass rates? Contact us to speak with an expert.&lt;/p&gt;

</description>
    </item>
  </channel>
</rss>
