Hi HN,
I’m Emil, here with our team at XIX.ai (https://getxix.com/). We are building “Entry” - a biometric identity provider that enables secure authentication in web apps by face on desktops using web cameras. It supports SAML 2.0, OIDC Connect, and OAuth 2.0 standards and can be easily integrated into existing app or infrastructure.
Users can securely authenticate in web apps by face, using regular web cameras without compromising privacy and security.
Entry helps organizations prevent phishing, insider threats, and account takeovers by adding Entry as a biometric factor to their workforce SSO. Companies that employ many contractors or vendors to access sensitive information can prevent fraud by verifying biometric identity during authentication.
Developers can use Entry to verify their customers (password resets), strong-authenticate users during high-value transactions (pushing code in master; deleting data, etc.), or streamline the login experience. (documentation and self-serve are coming soon. Please reach out if you'd like to try it now)
We came to the world of identity and access management somewhat unexpectedly. In the early days, we tested different product ideas and frequently pivoted while focusing on problems that could be solved with our core expertise, computer vision.
During our trial and error period, we were lucky enough to work with the team at DeliverFund, a non-profit organization fighting the problem of human trafficking and child exploitation.
More often than not, the only clue an analyst has is a photograph of a missing juvenile. With that photo, they need to search through the web to find any ad or other indications that may lead to the child. To locate a missing child or a victim of human trafficking, they had to manually scroll through thousands of online ads to find a potential match.
To solve this, we built a set of scrapers that capture online ads, indexes them, and makes them searchable. We took all images and ran them through face recognition and object detection models. This enabled analysts to drag and drop a child's photo and see if they are being trafficked from ads online.
With internal expertise, we were able to build the tool back in 2018. And this experience got us thinking: a malicious actor will make a wide-scale surveillance system with enough resources. It’s not a question of “if,” rather “when.” While brainstorming a potential solution, we’ve realized that, fundamentally, this is an information asymmetry problem. A feasible solution must be market-based, user-privacy-centered, and optimized for perfect information.
Such a solution must satisfy a few criteria: a) has to use a face as a biometric modality b) must be valuable enough for a large number of people to use it c) biometrics must be securely stored and 100% controlled and managed by the end-user d) And it has to deliver an order of magnitude improvement in overall security and usability in comparison to existing solutions. This brings us to the world of identity and access management.
Passwords can be easily compromised. Additional factor authentication is either convenient but phishable (SMS/Voice/Backup Codes/TOTP/Mobile Push) or phishing-resistant, but inconvenient, expensive, and not widely adopted (FIDO-keys, Webauthn).
Biometrics is a perfect solution but by no means a new idea. After all, we are using it already on our mobile phones (fingerprints, FaceID), specific Microsoft devices with Windows Hello, and other desktop devices with fingerprint sensors.
However, four key challenges prevented biometrics from being widely adopted: a) the need for a specialized sensor - depth perception for cameras or fingerprint sensors b) 2D webcams are easy to spoof with replay attacks, printed attacks, and mask attacks. c) Scalability, reliability, and cost-effectiveness. Products with ML at the core are notoriously computationally expensive and result in low margins. Accuracy also decays with data growth (more faces = higher chance of false positives), regressing the security over time. d) Privacy. How to avoid having a copy of my face on every website/SSO I login?
We’ve spent the last two years solving those challenges, and we’re happy to present to you Entry. It works with a regular desktop webcam and doesn’t require installing additional software. We’ve developed several anti-spoofing layers to make sure the system is secure. Entry is compliant with CCPA/GDPR and supports users from the state of Illinois ( arguably, the strictest biometric legislation in the USA)
Please give it a try https://getxix.com/. We’ve rolled out a public Okta instance with Entry set up as a factor to showcase it. We support Okta SSO out of the gate. Others (or working with OpenID Connect) require talking to support.
If you’d like to add Entry into your SSO, use it for your customers, or secure high-value transactions, let us know. Documentation is coming soon, but we can help now.
I don't believe this vague blanket claim. How much are you paying somebody who proves you wrong? A million dollars? No? Then I should assume anybody who can spoof this and would like a million dollars might do so unless the total value secured is assured to be less than one million dollars (in which case I expect this project will be gone by summer).
XIX ends up capturing a huge amount of facial recognition data and then storing it somewhere indefinitely in "the cloud" to inevitably get stolen and then no doubt we can expect a PR crafted apology and an insistence you've learned your lesson.
Every single time a person authenticates, video of their face is transmitted over the network. I have no doubt you'll say it's ephemeral and you don't store that video, but of course the users have no way to assure themselves of that, they just know they sent it.
Overall my impression is that this delivers markedly worse real world security than WebAuthn and has terrible privacy issues that can't be fixed.