Skip to main content
Didit Raises $2M and Joins Y Combinator (W26)
Didit
From the team

Latest from the Didit blog.

Identity, fraud, and the math behind public per-module pricing. Product launches, research, and standards (eIDAS 2.0, MiCA, AMLD6).
remote-id-proofing.png
Mar 25, 2026

Remote ID Proofing: Secure & Scalable Solutions

Remote ID proofing is essential for modern businesses. Learn how biometrics, automation, and robust security techniques combat fraud and ensure compliance. Discover cost-effective solutions with Didit.

Read post
marketing-filter-optimization.png
Mar 25, 2026

Boost Campaign ROI: Marketing Filter Optimization

Marketing filter optimization is crucial for maximizing campaign performance. Learn how to refine volumes, leverage optimizetool verification blacklists, and improve Campaign ROI through smart filtering strategies.

Read post
frankenstein-identities-network-analysis.png
Mar 25, 2026

Frankenstein Identities & Network Analysis

Learn how 'Frankenstein identities' – synthetic identities built from fragments of real data – are fueling identity fraud and how network analysis with graph databases can combat them.

Read post
future-verification-evolving-digital-id.png
Mar 25, 2026

Future Verification: The Evolution of Digital ID

Explore how digital identity verification is evolving beyond passwords, embracing multi-bio security, and modular identification for a more secure and user-friendly future.

Read post
open-banking-identity-api-kyc.png
Mar 25, 2026

Open Banking Identity: Secure Access with API & KYC

Open banking relies on secure identity verification. This guide explores how to leverage APIs for resilient KYC, mitigate fraud, and ensure compliance in open banking ecosystems. Learn how to integrate accounts securely.

Read post
regex-for-email-validation.png
Mar 25, 2026

Regex for Email Validation: Best Practices & Fraud Prevention

Learn how to effectively validate email addresses using regular expressions to prevent fraud and improve data quality. Explore best practices, common pitfalls, and security app integration strategies.

Read post
Ask an AI to summarise this page