|
|
|||
|
||||
OverviewBuild identity systems that still work when deepfakes and synthetic media make faces and voices impossible to trust. Deepfake audio and video now slip through selfie checks, document uploads, and video calls that older KYC and onboarding flows were built around. Many teams are discovering that their strongest signals of trust were actually based on media that attackers can now fabricate at scale. Defeating AI Deepfakes with SpruceID Digital Credentials shows how to rebuild identity verification on cryptographic foundations using verifiable credentials, decentralized identifiers, mobile IDs, and standards such as W3C VCs and OpenID based protocols. With clear architecture patterns, real threat models, and concrete tooling, you learn how to ship systems that stand up to modern fraud tactics. Understand how deepfakes break visual checks, liveness tests, and legacy document based KYC flows Learn the fundamentals of verifiable credentials, DIDs, DID documents, proofs, keys, and status lists Model issuers, holders, and verifiers using the SpruceID stack including Credible, DIDKit, and SpruceKit Design and implement mobile ID and mDL credentials that replace document uploads with wallet based flows Use OpenID for Verifiable Credential Issuance and Presentations to connect wallets, APIs, and verification gateways Build deepfake resistant onboarding and step up verification journeys for finance and payments Authenticate clinicians, bind patients to records, and secure telehealth sessions against impersonation Issue and verify permits, certifications, and benefits credentials for public services including offline checks in the field Develop detailed threat models, simulate attacks on legacy journeys, and redesign them with SpruceID credentials Apply privacy preserving techniques such as selective disclosure, revocation at scale, and careful logging and audit Plan a production grade SpruceID deployment with reference architectures, incident response, and standards aligned roadmaps This is a code heavy, implementation focused guide, with working JSON, CLI, and application level examples that show how to issue, hold, and verify real credentials in production style flows. Grab your copy today and start upgrading your identity systems for the deepfake era. Full Product DetailsAuthor: Sveva RossiPublisher: Independently Published Imprint: Independently Published Dimensions: Width: 17.80cm , Height: 1.50cm , Length: 25.40cm Weight: 0.494kg ISBN: 9798278862567Pages: 284 Publication Date: 15 December 2025 Audience: General/trade , General Format: Paperback Publisher's Status: Active Availability: Available To Order We have confirmation that this item is in stock with the supplier. It will be ordered in for you and dispatched immediately. Table of ContentsReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |
||||