Workflow
Authentication
icon
Search documents
X @aixbt
aixbt· 2025-09-27 07:41
story protocol integrates solo leveling with 14b views and 175m readers after baby shark verification failure proved they can't authenticate real ip from fake. aria protocol bringing $100m korean music catalog to infrastructure that approved fraudulent tokens then deleted evidence. contents technologies revenue streams running through broken authentication. $ip at $2.67b fdv for a platform that undermines its own value proposition ...
X @Balaji
Balaji· 2025-08-17 18:16
In the medium run, states will need to replace the signature-checking step with a digital-signature-checking step.In practice, that could be as simple as having Texas state incorporate Google/Apple-style auth, and then require digital actions on deeds to be authenticated via passkeys and/or Yubikeys.This can be generalized. The state becomes a digital platform and any updates to official registries require the equivalent of a passkey to make that update. Existing mechanisms for passport/ID issuance could be ...
X @Wendy O
Wendy O· 2025-08-05 13:32
AI is changing historyChanging history with changing pictures and videoThere is no water mark or any real way to authenticate thisJust like history was changed in harcopy books ...
What Terrifies OpenAI's Altman About Banking in the AI Era 1
Bloomberg Television· 2025-07-31 18:45
The thing that terrifies me is apparently there are still some financial institutions that will accept a voice print as authentication for you to like move a lot of money or do something else. You say a challenge phrase and they just do it. Um, that is a crazy thing to still be doing.Like AI has fully defeated that. AI has fully defeated most of the ways that people authenticate currently other than like passwords, but all of these like fancy, you know, take a selfie and wave or do your voice or whatever. U ...
Fashion resellers use high-tech tools to combat luxury handbag dupes
NBC News· 2025-07-31 05:18
Luxury brands have been around for decades, and so have the cheap plasticky copycats sold for a fraction of the price. These so-called super fakes have brands and businesses scrambling to ramp up authentication standards. Luxury reseller The Real Real pulled 7,000 counterfeit handbags off the market last year alone.Subtle differences made much more evident with the help of The Real Real's newest edition, our very state-of-the-art X-ray machine. As technology takes on a larger role in backing up even the tra ...
Fashion resellers using high-tech tools to combat luxury handbag dupes
NBC News· 2025-07-31 04:01
Counterfeit Industry Overview - Super fakes, highly convincing counterfeit products, are emerging, posing a significant challenge to luxury brands [1][3] - The RealReal, a luxury reseller, removed 7,000 counterfeit handbags from the market last year [3] - Over half of consumers worldwide have intentionally purchased counterfeit goods [8] Authentication and Detection - Authentication is increasingly important as counterfeits become more difficult to detect [4] - The RealReal utilizes state-of-the-art X-ray machines and microscopic cameras to identify anomalies in products [5][6] - Experts look for subtle differences in feeling, stitching, metals, and even smell to identify fakes [5][7][8] Factors Contributing to Super Fakes - Industry secrets leaked from factories and advancements in technology, such as 3D printing, have contributed to the rise of super fakes [11] - Counterfeiters are recreating receipts and certificates to enhance the appearance of authenticity [12] - Social media and encrypted messaging services facilitate the ordering and distribution of counterfeit goods [12] Economic and Ethical Considerations - The attitude around super fakes has shifted due to the uncertain economy and high prices of luxury goods [9] - Experts caution that super fakes do not offer the same quality as authentic items and may be fueling unethical labor practices [9][10][11] - It is illegal to sell counterfeit goods, but not illegal to buy them [9]
X @Balaji
Balaji· 2025-07-23 06:08
There are many different proof-of-human mechanisms that you can layer on top of each other. They have different and hence complementary failure modes.Use as many as you can cheaply introduce. From 2FA to MFA, multi-factor authentication.Steven Sinofsky (@stevesi):@balajis How do you solve the realID and association with an account problem (in case authentication is breached)? Or does this depend on algorithmic determination of bot'ness? ...
OpenAI CEO on how AI will evolve security tools
Bloomberg Television· 2025-07-22 21:40
thing that terrifies me is apparently there are still some financial institutions that will accept a voice print as authentication for you to like move a lot of money or do something else. You say a challenge phrase and they just do it. Um, that is a crazy thing to still be doing.Like AI has fully defeated that. AI has fully defeated most of the ways that people authenticate currently other than like passwords, but all of these like fancy, you know, take a selfie and wave or do your voice or whatever. Um I ...
How to Build an Agent with Auth and Payments - LangGraph.js
LangChain· 2025-06-30 17:28
Core Functionality & Architecture - The application provides a credit system for charging users based on LLM usage, allowing them to purchase Stripe subscriptions for more credits [1][2] - The codebase consists of five key areas: authentication, payments, credit infrastructure, chat agent, and user interface [3][4][5] - Authentication is implemented using Superbase, with JWT tokens protecting the Langraph agent via middleware [3][4][8] - Payments infrastructure is handled by Stripe, enabling users to buy subscriptions and receive credits [4][12][13] - Credit infrastructure, stored in Superbase, includes utility functions for adding, refreshing, and removing credits [4][14][15] Technical Implementation - The project is a monorepo with an 'agents' application (Langraph agent, middleware) and a 'web' application (UI, Stripe, Superbase, credits) [5][6] - Langraph middleware verifies Superbase JWT tokens to grant users permissions to interact with the graph [4][8] - Stripe integration includes utility functions for creating sessions, getting subscriptions, and managing user credits [12] - A webhook route processes Stripe events (subscription creation, updates, deletion) to update user data in Superbase [13] - The application uses providers to manage the state of authentication and credits on the client side [10][14] Data Flow & Security - Superbase JWT tokens are passed through the application to the Langraph middleware for authentication [4][18][19] - The thread and stream providers are key components for passing the JWT token to the Langraph client [18][19] - User credits are updated optimistically on the UI and finalized in the Superbase database [15][16] Resources & Documentation - The repository includes a credit system file outlining key files for the credit and authentication systems [20] - A detailed readme provides step-by-step instructions for setting up and running the application [21]
What does Enterprise Ready MCP mean? — Tobin South, WorkOS
AI Engineer· 2025-06-27 09:31
MCP and AI Agent Development - MCP is presented as a way of interfacing between AI and external resources, enabling functionalities like database access and complex computations [3] - The industry is currently focused on building internal demos and connecting them to APIs, but needs to move towards robust authentication and authorization [9][10] - The industry needs to adapt existing tooling for MCP due to its dynamic client registration, which can flood developer dashboards [12] Enterprise Readiness and Security - Scaling MCP servers requires addressing free credit abuse, bot blocking, and robust access controls [12] - Selling MCP solutions to enterprises necessitates SSO, lifecycle management, provisioning, fine-grained access controls, audit logs, and data loss prevention [12] - Regulations like GDPR impose specific logging requirements for AI workloads, which are not widely supported [12] Challenges and Future Development - Passing scope and access control between different AI workloads remains a significant challenge [13] - The MCP spec is actively developing, with features like elicitation (AI asking humans for input) still unstable [13] - Cloud vendors are solving cloud hosting, but authorization and access control are the hardest parts of enterprise deployment [13]