Workflow
Authentication
icon
Search documents
X @Wendy O
Wendy O· 2025-08-05 13:32
AI is changing historyChanging history with changing pictures and videoThere is no water mark or any real way to authenticate thisJust like history was changed in harcopy books ...
What Terrifies OpenAI's Altman About Banking in the AI Era 1
Bloomberg Television· 2025-07-31 18:45
The thing that terrifies me is apparently there are still some financial institutions that will accept a voice print as authentication for you to like move a lot of money or do something else. You say a challenge phrase and they just do it. Um, that is a crazy thing to still be doing.Like AI has fully defeated that. AI has fully defeated most of the ways that people authenticate currently other than like passwords, but all of these like fancy, you know, take a selfie and wave or do your voice or whatever. U ...
Fashion resellers use high-tech tools to combat luxury handbag dupes
NBC News· 2025-07-31 05:18
Luxury brands have been around for decades, and so have the cheap plasticky copycats sold for a fraction of the price. These so-called super fakes have brands and businesses scrambling to ramp up authentication standards. Luxury reseller The Real Real pulled 7,000 counterfeit handbags off the market last year alone.Subtle differences made much more evident with the help of The Real Real's newest edition, our very state-of-the-art X-ray machine. As technology takes on a larger role in backing up even the tra ...
Fashion resellers using high-tech tools to combat luxury handbag dupes
NBC News· 2025-07-31 04:01
Hermes, Bayga, Veneta, Louis Vuitton. Luxury brands have been around for decades and so have the cheap plasticky copycats sold for a fraction of the price. It is the Bayga Hop.Is this fake. But a new generation of dupes, far more convincing, is emerging. I felt this leather before on this exact model, and it does not feel like this.Fashion influencer Jonathan Guo says he was stunned by just how realistic this knockoff he purchased for more than $1,000 secondhand was. Fortunately, he did get a full refund. I ...
X @Balaji
Balaji· 2025-07-23 06:08
There are many different proof-of-human mechanisms that you can layer on top of each other. They have different and hence complementary failure modes.Use as many as you can cheaply introduce. From 2FA to MFA, multi-factor authentication.Steven Sinofsky (@stevesi):@balajis How do you solve the realID and association with an account problem (in case authentication is breached)? Or does this depend on algorithmic determination of bot'ness? ...
OpenAI CEO on how AI will evolve security tools
Bloomberg Television· 2025-07-22 21:40
thing that terrifies me is apparently there are still some financial institutions that will accept a voice print as authentication for you to like move a lot of money or do something else. You say a challenge phrase and they just do it. Um, that is a crazy thing to still be doing.Like AI has fully defeated that. AI has fully defeated most of the ways that people authenticate currently other than like passwords, but all of these like fancy, you know, take a selfie and wave or do your voice or whatever. Um I ...
How to Build an Agent with Auth and Payments - LangGraph.js
LangChain· 2025-06-30 17:28
Core Functionality & Architecture - The application provides a credit system for charging users based on LLM usage, allowing them to purchase Stripe subscriptions for more credits [1][2] - The codebase consists of five key areas: authentication, payments, credit infrastructure, chat agent, and user interface [3][4][5] - Authentication is implemented using Superbase, with JWT tokens protecting the Langraph agent via middleware [3][4][8] - Payments infrastructure is handled by Stripe, enabling users to buy subscriptions and receive credits [4][12][13] - Credit infrastructure, stored in Superbase, includes utility functions for adding, refreshing, and removing credits [4][14][15] Technical Implementation - The project is a monorepo with an 'agents' application (Langraph agent, middleware) and a 'web' application (UI, Stripe, Superbase, credits) [5][6] - Langraph middleware verifies Superbase JWT tokens to grant users permissions to interact with the graph [4][8] - Stripe integration includes utility functions for creating sessions, getting subscriptions, and managing user credits [12] - A webhook route processes Stripe events (subscription creation, updates, deletion) to update user data in Superbase [13] - The application uses providers to manage the state of authentication and credits on the client side [10][14] Data Flow & Security - Superbase JWT tokens are passed through the application to the Langraph middleware for authentication [4][18][19] - The thread and stream providers are key components for passing the JWT token to the Langraph client [18][19] - User credits are updated optimistically on the UI and finalized in the Superbase database [15][16] Resources & Documentation - The repository includes a credit system file outlining key files for the credit and authentication systems [20] - A detailed readme provides step-by-step instructions for setting up and running the application [21]
What does Enterprise Ready MCP mean? — Tobin South, WorkOS
AI Engineer· 2025-06-27 09:31
MCP and AI Agent Development - MCP is presented as a way of interfacing between AI and external resources, enabling functionalities like database access and complex computations [3] - The industry is currently focused on building internal demos and connecting them to APIs, but needs to move towards robust authentication and authorization [9][10] - The industry needs to adapt existing tooling for MCP due to its dynamic client registration, which can flood developer dashboards [12] Enterprise Readiness and Security - Scaling MCP servers requires addressing free credit abuse, bot blocking, and robust access controls [12] - Selling MCP solutions to enterprises necessitates SSO, lifecycle management, provisioning, fine-grained access controls, audit logs, and data loss prevention [12] - Regulations like GDPR impose specific logging requirements for AI workloads, which are not widely supported [12] Challenges and Future Development - Passing scope and access control between different AI workloads remains a significant challenge [13] - The MCP spec is actively developing, with features like elicitation (AI asking humans for input) still unstable [13] - Cloud vendors are solving cloud hosting, but authorization and access control are the hardest parts of enterprise deployment [13]
Can We Build Technology We Actually Trust? | Nia Luckey | TEDxSugar Creek Women
TEDx Talks· 2025-06-16 16:54
[Music] It's 1:00 a. m. in New York City.You've been driving for over 12 hours and your GPS, well, it glitches and it decides it's time for you to get off the highway. only to find yourself sitting at a random street corner. When this happened to me three years ago, I was directed to turn left down a dark alleyway.Panic set in. Tears welling in utter exhaustion. And you all know that pit that we all get in our stomachs.Yeah, that one. screaming, "Don't do it." While the technology insisted, "Turn left." Who ...