It's easy for cyber fraudsters to steal or assume another's identity. Sometimes it's not even an individual but a ghost, auto-generated by a few lines of code.
Photographic proof is easy as fraudsters give themselves a random human "face" using a facial composition app or by stealing a photograph from someone else's social media page.
8
90 reads
CURATED FROM
IDEAS CURATED BY
The idea is part of this collection:
Learn more about cybersecurity with this collection
The differences between Web 2.0 and Web 3.0
The future of the internet
Understanding the potential of Web 3.0
Related collections
Read & Learn
20x Faster
without
deepstash
with
deepstash
with
deepstash
Personalized microlearning
—
100+ Learning Journeys
—
Access to 200,000+ ideas
—
Access to the mobile app
—
Unlimited idea saving
—
—
Unlimited history
—
—
Unlimited listening to ideas
—
—
Downloading & offline access
—
—
Supercharge your mind with one idea per day
Enter your email and spend 1 minute every day to learn something new.
I agree to receive email updates