Skip to main content
Didit Raises $2M and Joins Y Combinator (W26)
Didit
From the team

Latest from the Didit blog.

Identity, fraud, and the math behind public per-module pricing. Product launches, research, and standards (eIDAS 2.0, MiCA, AMLD6).
loan-fraud-stolen-identity.png
May 21, 2026

Loan Fraud with Stolen and Synthetic Identities: How It Works and How to Stop It

Fraudsters apply for loans using stolen IDs and synthetic identities — real SSNs stitched to fake profiles — and lenders often don't notice until the bust-out. Here's the full lifecycle and how to stop it at the application stage.

Read post
suspicious-financial-activity-red-flags.png
May 21, 2026

How to Identify Suspicious Financial Activity: Key Red Flags

A practical guide to AML red flags — from structuring and velocity spikes to mismatched profiles and geographic risk — and how to build a detection layer that files SARs before the damage is done.

Read post
ubo-50-percent-rule.png
May 21, 2026

The UBO Ownership Threshold Rule: 25%, 50%, and How to Trace Indirect Control

Most jurisdictions require identifying any person who owns or controls 25% or more of a company. But the real compliance risk is indirect ownership — layered holding structures designed to keep the true beneficial owner below that

Read post
what-an-email-address-reveals.png
May 21, 2026

What an Email Address Reveals About a User

An email address carries far more than a delivery inbox — domain age, provider type, breach history, and deliverability are all fraud signals. Here's how fraud teams use email intelligence as a low-friction first filter before ful

Read post
highest-fraud-risk-payment-methods.png
May 21, 2026

Which Online Payment Methods Carry the Highest Fraud Risk?

A comparison of fraud risk across card payments, ACH/bank transfers, instant payments, digital wallets, BNPL, and crypto — covering dominant fraud vectors and how Transaction Monitoring and Wallet Screening help.

Read post
how-fraudsters-open-bank-accounts.png
May 21, 2026

How Fraudsters Open Bank Accounts — and How to Stop Them

Stolen IDs, synthetic identities, deepfake liveness attacks, money-mule recruitment, device obfuscation — here's the exact playbook fraudsters use to open bank accounts, and the controls that stop each step.

Read post
Ask an AI to summarise this page