Tagged articles
15 articles
Page 1 of 1
Machine Heart
Machine Heart
Apr 16, 2026 · Industry Insights

Why Foreign Developers Rush to China’s GLM Coding Plan While Claude Demands Face Verification

Anthropic now forces Claude users to complete a five‑minute identity check with a government‑issued photo ID and live selfie, sparking backlash, while the cheaper Chinese GLM Coding Plan—priced far below overseas subscriptions—has foreign developers scrambling to buy it, highlighting stark market and pricing contrasts.

AIAnthropicClaude
0 likes · 6 min read
Why Foreign Developers Rush to China’s GLM Coding Plan While Claude Demands Face Verification
Node.js Tech Stack
Node.js Tech Stack
Apr 16, 2026 · Artificial Intelligence

Opus 4.7 Expected This Week While Claude Introduces Identity Verification—What It Means for Users

Anthropic is poised to launch Opus 4.7 and a new AI design tool that can generate websites, landing pages, and PPTs from natural language, while simultaneously rolling out a mandatory identity‑verification step for Claude users—targeting high‑usage accounts and potentially cutting off those without government‑issued IDs.

AI competitionAI design toolAnthropic
0 likes · 9 min read
Opus 4.7 Expected This Week While Claude Introduces Identity Verification—What It Means for Users
AI Insight Log
AI Insight Log
Apr 15, 2026 · Artificial Intelligence

Claude Now Requires Passport or ID Verification – Anthropic Confirms

Anthropic’s Claude service has introduced a mandatory KYC process using Persona Identities, requiring users to present a government‑issued passport, driver’s license, or national ID and a live selfie, with verification triggered randomly or by policy checks, raising concerns for users without overseas documents.

AI SafetyAnthropicClaude
0 likes · 6 min read
Claude Now Requires Passport or ID Verification – Anthropic Confirms
Black & White Path
Black & White Path
Mar 27, 2026 · Information Security

When Deepfakes Cost $25 Million: The End of Video‑Call Authentication

A 2025‑2026 deep‑fake attack on Arup’s finance team used publicly gathered intelligence to create a real‑time, AI‑generated video of the CFO and colleagues, resulting in a $25 million transfer and exposing the economic asymmetry that makes video‑call authentication unreliable, prompting a shift to multi‑channel, zero‑trust verification.

Identity verificationSecurityZero Trust
0 likes · 28 min read
When Deepfakes Cost $25 Million: The End of Video‑Call Authentication
Tech Musings
Tech Musings
Jan 11, 2026 · Mobile Development

What I Learned Building a WeChat Mini Program as an Indie Developer

A solo developer recounts the surprising hurdles of creating a WeChat mini‑program—from domain registration and residence‑permit verification to platform account splits, framework choices between Taro and Uni‑app, and the unexpected smoothness of the final review.

Identity verificationTaroWeChat Mini Program
0 likes · 6 min read
What I Learned Building a WeChat Mini Program as an Indie Developer
HyperAI Super Neural
HyperAI Super Neural
Dec 5, 2025 · Industry Insights

Sam Altman's Billion‑User Identity Goal Hits 2% as Global Regulators Push Back

Sam Altman and Alex Blania's Worldcoin project, which aims to create a global human‑identity infrastructure with iris‑scanning Orb devices, has attracted only about 1.75 million verified users—roughly 2% of its billion‑user target—while facing regulatory bans in the Philippines and scrutiny in multiple other countries over privacy and data‑handling concerns.

BiometricsIdentity verificationSam Altman
0 likes · 11 min read
Sam Altman's Billion‑User Identity Goal Hits 2% as Global Regulators Push Back
21CTO
21CTO
Dec 16, 2024 · Information Security

Pick the Best Identity Verification Framework: Clerk, Supabase Auth, or Better Auth

This article introduces three top‑tier authentication solutions—Clerk, Supabase Auth, and Better Auth—detailing their key features, supported strategies, customization options, and integration benefits, helping developers decide which framework best fits their user management and security needs.

AuthenticationBackendIdentity verification
0 likes · 4 min read
Pick the Best Identity Verification Framework: Clerk, Supabase Auth, or Better Auth
Architecture Breakthrough
Architecture Breakthrough
Dec 4, 2024 · Industry Insights

Decoding Chinese, HK, Macau, and Taiwan ID Formats for Banking KYC

This article provides a comprehensive technical guide on the structure, coding rules, and verification considerations of personal and corporate identity documents—including mainland Chinese IDs, Hong Kong, Macau, and Taiwan permits—as well as business licenses and passports, to help fintech developers implement accurate KYC workflows.

Business LicenseChinese IDHKID
0 likes · 17 min read
Decoding Chinese, HK, Macau, and Taiwan ID Formats for Banking KYC
AntTech
AntTech
Jun 6, 2024 · Information Security

AIGC Era Trends in Next‑Generation Identity Recognition: DeepFake Risks, AIGC as a New Production Force, and Cross‑Terminal Interaction

The talk at the 18th Security Identification Technology Expo and Summit outlines three emerging trends for identity verification in the AIGC era: the surge of deep‑fake attacks, the use of generative AI as a new data‑production engine, and the shift toward cross‑device, agent‑based authentication paradigms.

AIGCBiometricsIdentity verification
0 likes · 10 min read
AIGC Era Trends in Next‑Generation Identity Recognition: DeepFake Risks, AIGC as a New Production Force, and Cross‑Terminal Interaction
AntTech
AntTech
Oct 20, 2023 · Information Security

Digital Accessible Online Movie Service for the Visually Impaired: Privacy Computing, Blockchain, and Secure Identity Verification

The article describes how Ant Group and partners created an accessible online movie platform for visually impaired users in China, employing innovative privacy‑computing, blockchain, and terminal‑security technologies to enable secure, minimal‑disclosure identity verification and protect intellectual‑property rights.

Identity verificationPrivacy Computingaccessible media
0 likes · 6 min read
Digital Accessible Online Movie Service for the Visually Impaired: Privacy Computing, Blockchain, and Secure Identity Verification
ITFLY8 Architecture Home
ITFLY8 Architecture Home
Nov 29, 2020 · Information Security

Designing a Multi‑Layer Token Authentication System for Secure Multi‑Client Apps

This article examines the classification, security attributes, and hierarchical design of various authentication tokens for multi‑client systems, offering a layered approach that balances usage cost, change cost, and privacy while outlining practical scenarios and implementation principles.

Identity verificationSecuritySession Management
0 likes · 16 min read
Designing a Multi‑Layer Token Authentication System for Secure Multi‑Client Apps
Tencent Cloud Developer
Tencent Cloud Developer
Apr 25, 2020 · Artificial Intelligence

Tencent Cloud Huiyan High-Availability Architecture Design for Face Identity Verification

Tencent Cloud Huiyan delivers a high‑availability, multi‑layered face‑identity verification service—combining document OCR, four advanced liveness‑detection methods, and multi‑factor checks—that powered COVID‑19 health‑code verification across Chinese provinces, handling billions of visits through scalable, fault‑tolerant architecture with horizontal expansion, load balancing, and dynamic resource isolation.

AI EngineIdentity verificationTencent-Cloud
0 likes · 19 min read
Tencent Cloud Huiyan High-Availability Architecture Design for Face Identity Verification
ITFLY8 Architecture Home
ITFLY8 Architecture Home
Jun 12, 2018 · Blockchain

Why Banks Should Adopt Blockchain Systems: Principles and Architecture

This article explains why banks should adopt blockchain systems, outlines three guiding principles, describes typical integration architectures, examines changes to reconciliation and transaction consistency, and offers practical solutions for identity verification, key management, and high‑availability deployment.

BankingBlockchainIdentity verification
0 likes · 12 min read
Why Banks Should Adopt Blockchain Systems: Principles and Architecture
Qunar Tech Salon
Qunar Tech Salon
May 2, 2017 · Information Security

Design and Function of the Internal Application Center for Token‑Based Authentication and Resource Access

The internal Application Center, created in 2013, provides a unified system for naming applications, managing permissions, issuing encrypted tokens, and authenticating app identity to securely control access to configuration data and other resources, replacing fragile IP‑based restrictions with logical app‑based authorization.

Configuration ManagementIdentity verificationapplication center
0 likes · 7 min read
Design and Function of the Internal Application Center for Token‑Based Authentication and Resource Access