<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>ADN Archives - Oneytrust</title>
	<atom:link href="https://www.oneytrust.com/tag/adn/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.oneytrust.com/tag/adn/</link>
	<description>Only Trusted Customers. Oneytrust provides fraud detection and identity validation for merchants and banks. Unique consortia data, unbeatable fraud scoring.</description>
	<lastBuildDate>Wed, 01 Oct 2025 15:13:37 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.oneytrust.com/wp-content/uploads/2025/06/cropped-Oneytrust_Symbol_Purple_Square-32x32.png</url>
	<title>ADN Archives - Oneytrust</title>
	<link>https://www.oneytrust.com/tag/adn/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Digital identity: the new identity card for the digital age &#8211; Part 2</title>
		<link>https://www.oneytrust.com/digital-identity-the-new-identity-card-for-the-digital-age-part-2/</link>
		
		<dc:creator><![CDATA[Julie Breton]]></dc:creator>
		<pubDate>Wed, 01 Oct 2025 15:13:36 +0000</pubDate>
				<category><![CDATA[Expertise]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[ADN]]></category>
		<category><![CDATA[ecommerce]]></category>
		<category><![CDATA[FRAUDE]]></category>
		<category><![CDATA[IA]]></category>
		<category><![CDATA[luttecontrelafraude]]></category>
		<category><![CDATA[sécurité]]></category>
		<category><![CDATA[technologie]]></category>
		<guid isPermaLink="false">https://www.oneytrust.com/?p=2529</guid>

					<description><![CDATA[<p>a) Security and protection of citizens The primary purpose of digital identity is protection. Users whose identities are stolen suffer dramatic consequences: loans taken out in their name, administrative disputes, damaged online reputations. Having a robust digital identity based on reliable technical and behavioural signals helps limit these risks. b) Trust and fluidity of exchanges...</p>
<p>The post <a href="https://www.oneytrust.com/digital-identity-the-new-identity-card-for-the-digital-age-part-2/">Digital identity: the new identity card for the digital age &#8211; Part 2</a> appeared first on <a href="https://www.oneytrust.com">Oneytrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<ol class="wp-block-list">
<li><strong>Multiple challenges</strong></li>
</ol>



<p><strong>a) Security and protection of citizens</strong></p>



<p><strong>The primary purpose of digital identity is protection</strong>. Users whose identities are stolen suffer dramatic consequences: loans taken out in their name, administrative disputes, damaged online reputations. Having a robust digital identity based on reliable technical and behavioural signals helps limit these risks.</p>



<p><strong>b) Trust and fluidity of exchanges</strong></p>



<p>For a company, <strong>accepting a new customer involves a risk</strong>. Digital identity provides the necessary elements to establish a trust score: is this a real, consistent person who has been active for a long time? This trust then facilitates exchanges, reduces friction (simplified KYC, smooth user journey) and improves the customer experience.</p>



<p><strong>c) Sovereignty and independence</strong></p>



<p>Today, proving one&#8217;s identity online often involves major private players (connection via Google, Apple or Facebook). However, <strong>delegating this strategic function to a few companies poses a problem of sovereignty</strong>. European states are seeking to regain control in order to avoid excessive dependence and guarantee data protection.</p>



<p><strong>d) Inclusion and equal access</strong></p>



<p><strong>Digital identity must not become a factor of exclusion</strong>. People who are digitally excluded (the elderly, rural areas, vulnerable populations) must have access to simple and accessible solutions. Equity requires an inclusive design of these tools.</p>



<ol start="2" class="wp-block-list">
<li><strong>Future prospects</strong></li>
</ol>



<p>By 2030, digital identity could undergo three major developments:</p>



<p><strong>Increased standardisation</strong>: adoption of international standards enabling seamless recognition between countries and services.</p>



<p><strong>Biometric integration</strong>: enhanced association with biometric fingerprints (voice, face, fingerprint) to further secure access.</p>



<p><strong>Enhanced user control</strong>: emergence of solutions where users decide which elements of their identity to share, depending on the context (e.g. proving they are of legal age without revealing their date of birth).</p>



<p><strong>In a nutshell…</strong></p>



<p>Digital identity is no longer a technical curiosity. It has become the beating heart of digital societies. It protects, streamlines and empowers, but also raises questions about surveillance and sovereignty.</p>



<p>By understanding it, decision-makers and citizens have an essential lever for navigating a world where the virtual and the real are inseparable. Ultimately, <strong>digital identity is the identity card of the digital age: intangible but decisive, invisible but unavoidable</strong>.</p>



<p></p>
<p>The post <a href="https://www.oneytrust.com/digital-identity-the-new-identity-card-for-the-digital-age-part-2/">Digital identity: the new identity card for the digital age &#8211; Part 2</a> appeared first on <a href="https://www.oneytrust.com">Oneytrust</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Digital identity: the new identity card for the digital age &#8211; Part 1</title>
		<link>https://www.oneytrust.com/digital-identity-the-new-identity-card-for-the-digital-age/</link>
		
		<dc:creator><![CDATA[Julie Breton]]></dc:creator>
		<pubDate>Wed, 24 Sep 2025 12:38:47 +0000</pubDate>
				<category><![CDATA[Expertise]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[ADN]]></category>
		<category><![CDATA[ecommerce]]></category>
		<category><![CDATA[FRAUDE]]></category>
		<category><![CDATA[IA]]></category>
		<category><![CDATA[luttecontrelafraude]]></category>
		<category><![CDATA[sécurité]]></category>
		<category><![CDATA[technologie]]></category>
		<guid isPermaLink="false">https://www.oneytrust.com/?p=2518</guid>

					<description><![CDATA[<p>Digital identity is therefore becoming the backbone of the connected world. It condenses our personal data, our ‘technical’ fingerprints (device fingerprinting), our behaviours and our interactions. It is at once a recognition tool, a shield against fraud and a key to accessing services. 1 . Defining digital identity: Unlike civil identity, which is established and...</p>
<p>The post <a href="https://www.oneytrust.com/digital-identity-the-new-identity-card-for-the-digital-age/">Digital identity: the new identity card for the digital age &#8211; Part 1</a> appeared first on <a href="https://www.oneytrust.com">Oneytrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Digital identity is therefore becoming the backbone of the connected world. It condenses our personal data, our ‘technical’ fingerprints (device fingerprinting), our behaviours and our interactions. It is at once a recognition tool, a shield against fraud and a key to accessing services.</p>



<p><strong>1 . Defining digital identity</strong>:</p>



<p>Unlike civil identity, which is established and certified by the state, digital identity takes many forms. It is based on four main dimensions:</p>



<ul class="wp-block-list">
<li><strong>Declarative data</strong>: surname, first name, email address, telephone number, address. This information is provided voluntarily, but can be misused/“imitated”.</li>



<li><strong>Technical fingerprints</strong>: each connected device generates a unique signature (IP address, configuration, sensors, time zones, cookies). These signals, invisible to the naked eye, become valuable clues for recognising a user.</li>



<li><strong>Behaviour</strong>: typing speed, connection times, location, frequency of service use. These elements are more difficult to falsify and constitute a behavioural signature that is almost biometric.</li>



<li><strong>Social and economic interactions</strong>: history of contact, payment and browsing data use. This data builds a coherent narrative… or, conversely, reveals inconsistencies typical of fraudulent events.</li>
</ul>



<ol start="2" class="wp-block-list">
<li><strong>An identity in flux</strong></li>
</ol>



<p>Unlike a national identity card, which is fixed at the time of issue, digital identity is dynamic. Every connection, every payment, every interaction enriches this digital portrait. This dynamic provides robustness – it is difficult to simulate a consistent digital life over time – but also raises ethical questions:</p>



<p>How much data should be collected without infringing on privacy?</p>



<p>How can we ensure that users retain control over their digital identity?</p>



<p>What safeguards should be put in place to prevent widespread surveillance?</p>



<p>The GDPR in Europe and the concept of ‘self-sovereign identity’ attempt to provide answers. But the balance between security, fluidity and respect for individual freedoms remains fragile.</p>



<ol start="3" class="wp-block-list">
<li><strong>Why has this concept become so important?</strong></li>
</ol>



<p>Two major trends explain its growing importance. .</p>



<ul class="wp-block-list">
<li><strong>Widespread digitalisation</strong>: smartphones have become our universal access point. From public services to healthcare, everything is now digital. Initiatives such as France Identité and the European eIDAS 2.0 regulation aim to create digital identities that are recognised at national and supranational level.</li>



<li><strong>A boom in 100% web-based crime</strong>: identity fraud is skyrocketing. The concept of ‘synthetic identity’ illustrates this trend. Fraudsters assemble pieces of real and invented data to create fake profiles capable of fooling traditional controls.</li>
</ul>



<p>In this context, the ability to assess the credibility of a digital identity is becoming strategic for banks, insurers, retailers and also for governments.</p>



<p><strong>In a nutshell…</strong></p>



<p>Digital identity is constantly evolving: shaped by our usage, regulated by legislation, scrutinised for its security and commercial value. But this dynamic is not without its challenges. In the second part, we will address the multiple issues it raises – security, trust, sovereignty, inclusion – and the prospects that could redefine our relationship with identity by 2030.</p>



<p></p>
<p>The post <a href="https://www.oneytrust.com/digital-identity-the-new-identity-card-for-the-digital-age/">Digital identity: the new identity card for the digital age &#8211; Part 1</a> appeared first on <a href="https://www.oneytrust.com">Oneytrust</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>MERLIN network: anatomy of a triangular fraud</title>
		<link>https://www.oneytrust.com/merlin-network-anatomy-of-a-triangular-fraud-2/</link>
		
		<dc:creator><![CDATA[Julie Breton]]></dc:creator>
		<pubDate>Thu, 18 Sep 2025 16:06:27 +0000</pubDate>
				<category><![CDATA[Expertise]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[ADN]]></category>
		<category><![CDATA[ecommerce]]></category>
		<category><![CDATA[FRAUDE]]></category>
		<category><![CDATA[IA]]></category>
		<category><![CDATA[luttecontrelafraude]]></category>
		<category><![CDATA[sécurité]]></category>
		<category><![CDATA[technologie]]></category>
		<guid isPermaLink="false">https://www.oneytrust.com/?p=2454</guid>

					<description><![CDATA[<p>What is triangular fraud? Triangular fraud is a complex and ingenious method of fraud that combines elements of real and synthetic identities to create a network of fraudulent transactions. This type of fraud relies on the interaction between three parties: the fraudster, the legitimate seller and the unwitting consumer, in order to divert resources discreetly...</p>
<p>The post <a href="https://www.oneytrust.com/merlin-network-anatomy-of-a-triangular-fraud-2/">MERLIN network: anatomy of a triangular fraud</a> appeared first on <a href="https://www.oneytrust.com">Oneytrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h3 class="wp-block-heading">What is triangular fraud?</h3>



<figure class="wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex">
<figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="427" height="426" data-id="1702" src="https://www.oneytrust.com/wp-content/uploads/2025/09/MERLIN.jpg" alt="" class="wp-image-1702" srcset="https://www.oneytrust.com/wp-content/uploads/2025/09/MERLIN.jpg 427w, https://www.oneytrust.com/wp-content/uploads/2025/09/MERLIN-400x399.jpg 400w, https://www.oneytrust.com/wp-content/uploads/2025/09/MERLIN-12x12.jpg 12w" sizes="(max-width: 427px) 100vw, 427px" /></figure>
</figure>



<p>Triangular fraud is a complex and ingenious method of fraud that combines elements of real and synthetic identities to create a network of fraudulent transactions. This type of fraud relies on the interaction between three parties: the fraudster, the legitimate seller and the unwitting consumer, in order to divert resources discreetly and effectively.</p>



<p><strong>How triangular fraud works:</strong></p>



<p>The triangular fraud process can generally be broken down into four steps:</p>



<ol class="wp-block-list">
<li><strong>Creation of multiple identities</strong>: fraudsters begin by creating synthetic identities by combining real and fictitious information from real customer information received during purchases on their website. This allows them to generate credible buyer profiles that can interact with sellers without arousing suspicion.</li>



<li><strong>Ordering products</strong>: using these identities, fraudsters place orders with legitimate sellers. Payment is often made with stolen or misused credit cards.</li>



<li><strong>Reshipping products</strong>: the purchased products are shipped to intermediate addresses or directly to the ‘real customer’ depending on the method used. At this stage, fraudsters may also sell the stolen products to real buyers via online platforms at a reduced price.</li>



<li><strong>Cash-out</strong>: Fraudsters cash out payments from genuine buyers, while the original seller remains unpaid or faces a chargeback.</li>
</ol>



<p><strong>Why is triangular fraud effective?</strong></p>



<p>Triangular fraud is particularly effective because of its networked approach, which allows fraudsters to separate the elements of the transaction. The initial seller believes they are interacting with a legitimate buyer, while the final buyer thinks they are getting a product at a bargain price. This separation makes detection difficult, as individual transactions may appear legitimate because the information used is real, long-standing and sometimes even shows healthy activity. Traditional security rules are unable to detect these weak signals of fraud.</p>



<p><strong>The MERLIN network</strong></p>



<p>At Oneytrust, we are constantly detecting new fraudulent schemes. One of the most telling recent cases is that of a network we have named ‘Merlin’ because it used products from this brand to carry out its attacks. Detected in June 2024, this network perfectly illustrates the complexity and evolution of today&#8217;s threats.</p>



<p>It all started with <strong>an alert about unusual purchases</strong>: a sharp increase in orders for Merlin educational games, worth less than £100, from a partner specialising in childcare products. This sudden spike immediately caught our attention.</p>



<p>Our experts quickly spotted <strong>similarities between the orders</strong>, suggesting the existence of an organised network. However, certain elements were puzzling: the digital identities appeared reliable, and some profiles even belonged to real customers – but with a different email address. This was a clear sign of <strong>identity theft</strong>, which is rare for such small amounts.</p>



<p>To remove any doubt, we contacted the customers concerned. All confirmed their identity… but denied having made these purchases. The fraud was now certain. A thorough discussion with one of them revealed the key: he had indeed purchased the product, but on an online marketplace, not from our partner. The evidence provided enabled us to identify the fraudulent shop and understand the modus operandi: <strong>a triangular fraud</strong>.</p>



<p>Once the pattern had been established, our analysts listed <strong>the common signals associated with suspicious orders</strong> and created specific security rules. Thanks to these targeted actions, reinforced by direct checks with customers, we were able to block transactions linked to this network. <strong>The result: in less than 12 hours, the ‘Merlin’ network was neutralised.</strong></p>



<p>This case shows how essential <strong>the responsiveness and expertise of our teams are in stopping new fraud networks as soon as they emerge</strong>. And the story of ‘Merlin’ is only just beginning… we will tell you more very soon.</p>
<p>The post <a href="https://www.oneytrust.com/merlin-network-anatomy-of-a-triangular-fraud-2/">MERLIN network: anatomy of a triangular fraud</a> appeared first on <a href="https://www.oneytrust.com">Oneytrust</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>AI at Oneytrust: technology at the heart of our DNA!</title>
		<link>https://www.oneytrust.com/ai-at-oneytrust-technology-at-the-heart-of-our-dna/</link>
		
		<dc:creator><![CDATA[Julie Breton]]></dc:creator>
		<pubDate>Fri, 22 Aug 2025 07:02:41 +0000</pubDate>
				<category><![CDATA[Expertise]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[ADN]]></category>
		<category><![CDATA[ecommerce]]></category>
		<category><![CDATA[FRAUDE]]></category>
		<category><![CDATA[IA]]></category>
		<category><![CDATA[luttecontrelafraude]]></category>
		<category><![CDATA[sécurité]]></category>
		<category><![CDATA[technologie]]></category>
		<guid isPermaLink="false">https://www.oneytrust.com/?p=1692</guid>

					<description><![CDATA[<p>1) Why AI has become essential in the fight against fraud The boom in language models and content generation tools has lowered the barriers to fraud: flawless phishing emails, carefully crafted fake profiles, synthetic identities that are more difficult to detect, industrialisation of fraud scenarios, reusable attack scripts. Static controls are no longer sufficient. We...</p>
<p>The post <a href="https://www.oneytrust.com/ai-at-oneytrust-technology-at-the-heart-of-our-dna/">AI at Oneytrust: technology at the heart of our DNA!</a> appeared first on <a href="https://www.oneytrust.com">Oneytrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h3 class="wp-block-heading"></h3>



<p><strong>1) Why AI has become essential in the fight against fraud</strong></p>



<p><br>The boom in language models and content generation tools has lowered the barriers to fraud: flawless phishing emails, carefully crafted fake profiles, synthetic identities that are more difficult to detect, industrialisation of fraud scenarios, reusable attack scripts. Static controls are no longer sufficient. <strong>We need systems that are capable of learning, detecting weak signals, and continuously evolving.</strong> AI is not a gadget: it is essential for detecting anomalies, linking scattered events, and responding in real time without hindering legitimate processes.</p>



<p><strong>2) Oneytrust&#8217;s AI toolkit</strong></p>



<p><br>Over the years, <strong>Oneytrust has built a range of scores to analyse digital events, identify fraud patterns and prioritise actions. Our scores aggregate more than 200 signals and are based on a shared database covering more than 15 million consumers, authorised by the CNIL (French Data Protection Authority) in 2013 — well before the GDPR.</strong><br>Beyond fraud at a given moment, we observe velocity: how a user, payment method, device (phone, PC, etc.) or email address behaves over time. This intelligent memory makes it possible to streamline the journey of good customers (controlled reuse of acquired trust) and tighten the noose on risks (accumulation of clues, inconsistencies, anomalies). Our rule engines remain adaptive: we add, adjust and remove rules as trends evolve, to keep pace with changing attacks without compromising the customer experience.</p>



<p><strong>3) Humans + AI: augmented expertise, not automated</strong></p>



<p><br><strong>AI identifies, humans understand.</strong> Our investigators and fraud experts play a particularly crucial role in challenging alerts, contextualising cases, and revealing emerging patterns that models have not yet learned (low volumes, ambiguous signals, attacker innovations). This feedback loop feeds the models, improves the rules, and ensures an explainable decision. In particularly sensitive situations, human arbitration protects the customer relationship, avoids false positives, and maintains trust.</p>



<p><strong>4) A strategy to acculturate our employees to Generative AI</strong></p>



<p><br>As soon as ChatGPT was released in 2022, we quickly decided <strong>to train our teams in the use of generative AI to increase speed, operational efficiency and quality on non-sensitive tasks</strong>: writing, summarising, analysis assistance, preparing deliverables, etc. As part of the BPCE Group, we have access to the secure MAIA portal, which allows our employees to access reference models (e.g. GPT-4o, Mistral, Gemini) in a safe and ethical environment. In our training courses and with the help of our Generative AI Ambassadors, we emphasise the importance of maintaining a critical perspective on the results generated by AI (systematic verification, non-disclosure of sensitive information, traceability of uses): the aim is to accelerate useful production, not to automate indiscriminately.</p>



<p><strong>5) Governance &amp; compliance: already prepared for the AI Act!</strong></p>



<p><br>Because many of our customers are regulated (banks, fintechs, e-merchants), we have long since implemented the safeguards expected by sector regulators: <strong>model documentation, decision logging and auditability, data quality, continuous monitoring, and human supervision.</strong> The AI Act, which has just come into force, reinforces these requirements: we anticipated this framework and are aligning our work with the BPCE Group&#8217;s compliance approach. In concrete terms, this means: system mapping, model risk management, periodic controls, proportionate explainability and team acculturation. Our ambition is to meet deadlines without slowing down useful innovation.</p>



<p><br>In conclusion, let us consider that the fight against fraud is a movement, not something static. AI enables earlier detection, better explanation and faster action — provided it is governed, complemented by humans and integrated without disrupting the user experience. At Oneytrust, it is this winning trio — <strong>high-performance models, committed experts and solid compliance</strong> — that transforms a shifting threat into a sustainable competitive advantage.</p>



<p><strong>Would you like to learn more about the expertise of our models, which combine more than 200 types of data and velocities, and benefit from Oneytrust&#8217;s Data Consortium with more than 15 million digital identities to secure your customer journeys without losing conversions?</strong> <a href="https://www.oneytrust.com/fr/contact/">Contact us.</a></p>



<p></p>
<p>The post <a href="https://www.oneytrust.com/ai-at-oneytrust-technology-at-the-heart-of-our-dna/">AI at Oneytrust: technology at the heart of our DNA!</a> appeared first on <a href="https://www.oneytrust.com">Oneytrust</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
