Skip to main content
Didit Raises $2M and Joins Y Combinator (W26)
Didit
From the team

Latest from the Didit blog.

Identity, fraud, and the math behind public per-module pricing. Product launches, research, and standards (eIDAS 2.0, MiCA, AMLD6).
cost-of-identity-verification.png
Mar 25, 2026

Identity Verification Costs: A 2024 Breakdown

Understanding the true cost of identity verification is crucial for businesses. This guide breaks down direct expenses, hidden costs like manual reviews, and how to optimize your identity strategy for ROI.

Read post
remote-identity-verification-minimal-risk-architecture.png
Mar 25, 2026

Remote Identity Verification: A Minimal Risk Architecture

Building a secure remote identity verification system requires a layered approach. This guide explores a minimal risk architecture leveraging zero-knowledge proofs, biometric authentication, and fraud detection to minimize data.

Read post
age-verification-can-spam-compliance.png
Mar 25, 2026

Age Verification & CAN-SPAM: A Compliance Guide

Navigating age verification and CAN-SPAM regulations is crucial for responsible email marketing. This guide explores best practices, legal requirements, and how to maintain compliance.

Read post
automated-sanctions-list-updates.png
Mar 25, 2026

Sanctions Screening: Staying Compliant with Automated Updates

Maintaining accurate sanctions screening is crucial for AML compliance. Learn how automated updates can help your business navigate OFAC and global watchlists effectively, reducing risk and avoiding penalties.

Read post
open-source-idv-databases.png
Mar 25, 2026

Open Source IDV Databases: A Strategic Guide

Exploring the benefits and challenges of leveraging open source identity verification (IDV) databases versus proprietary solutions. Learn about apt data infrastructure & finding the right tax DB provider.

Read post
biometric-patches-device-security.png
Mar 25, 2026

Biometric Patches: Securing Identities in a Risky Device Landscape

Biometric authentication is becoming increasingly vital, but device-level vulnerabilities can undermine its security. Learn about biometric patches, common risks, and how to mitigate them for robust identity verification.

Read post
Ask an AI to summarise this page