{"id":3109,"date":"2021-06-02T06:00:18","date_gmt":"2021-06-02T13:00:18","guid":{"rendered":"https:\/\/www.trulioo.com\/?p=3109"},"modified":"2023-08-01T16:23:58","modified_gmt":"2023-08-01T16:23:58","slug":"identity-proofing","status":"publish","type":"post","link":"https:\/\/www.trulioo.com\/blog\/identity-verification\/identity-proofing","title":{"rendered":"Identity proofing \u2013 how to verify and authenticate online"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-combining-identity-verification-and-authentication-procedures-identity-proofing-helps-establish-that-someone-is-who-they-say-they-are\">Combining identity verification and authentication procedures, identity proofing helps establish that someone is who they say they are.<\/h2>\n\n\n\n<figure class=\"wp-block-image alignright\"><img decoding=\"async\" src=\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2022\/08\/STEINERinternetdogs-396x400-1.jpg\" alt=\"steinerinternetdogs\" class=\"wp-image-3110\"\/><\/figure>\n\n\n\n<p>As the cartoon suggests, on the internet, you never really know who the other person is. They could be a fraudster, schemer, money launderer, terrorist or a bully. These nefarious individuals are a significant impediment to creating trust and hinder the advancement of transacting with businesses online. There is a strong need to verify identity online to mitigate risk.<\/p>\n\n\n\n<p>Luckily for the future of digital transactions, there are ways to&nbsp;<a href=\"https:\/\/www.eweek.com\/c\/a\/Security\/What-Is-Online-Identity-Proofing-and-How-Does-it-Work\" target=\"_blank\" rel=\"noopener\">accurately assess an individual<\/a>&nbsp;and determine if they truly are who they say they are. So, what steps should businesses take? Each organization needs to decide on their level of risk tolerance, match rate accuracy, and what standards and technology they will need to adopt.<\/p>\n\n\n\n<p>There are two steps involved in identity proofing: a public aspect and a private aspect. The public aspect, identity verification, relies on data in the public sphere. For example, details like name, address and date of birth are all on record and provide information to match against. The private aspect is a layer of data that authenticates a person based on information that (theoretically) only they can provide.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-i-am-someone-proving-you-exist\">I am someone \u2014 proving you exist<\/h2>\n\n\n\n<p>Identity verification takes the information somebody provides, then compares it to records from government agencies, utilities or various other sources to see if that identity information is accurate. The more data that is collected and the more data sources that information is matched against, and the higher the verification accuracy.<\/p>\n\n\n\n<p>Increasing the likelihood of a positive ID verification is a matter of gathering more data from the person and increasing available data sources. Fortunately, in today\u2019s data-rich world, there are many more sources of identity information. For example, mobile data, social media information and geolocation all provide additional parameters to match against.<\/p>\n\n\n\n<p>While increasing the match rate reduces risk, it can cause extra friction for the user and increase the costs of acquiring and checking the data. Therefore, the organization has to balance the risk against the costs and user considerations.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-i-am-who-i-say-i-am-proving-you-are-that-person\">I am who I say I am \u2014 proving you are that person<\/h2>\n\n\n\n<p>Identity verification validates that the individual does indeed exist. However, there remains the question, is that person really who they say they are? This question requires private information, which only that person should know. This process of analyzing confidential information for identity proofing is known as identity authentication.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-knowledge-based-authentication-what-you-know\">Knowledge-based authentication \u2014 what you know<\/h2>\n\n\n\n<p>If you\u2019ve ever signed up for an online account that has high security requirements, you\u2019ve no doubt come across this. For example, when you sign up for a bank account, they\u2019ll ask for security questions: What brand was your first car? What was the name of your first pet? What is your favorite sports team? Later, if the bank wants to authenticate you, they can ask that question and check that you know the answer.<\/p>\n\n\n\n<p>A security question is a static KBA technique; it relies on specific, stored questions. While static KBA provides an extra layer of security, a hacker can still bypass it if they can answer that question. A more advanced technique, dynamic KBA, employs security questions created on the fly. For example, if a bank asks, \u201cWhat was your last bank transaction?\u201d the person will be able to recall, but a hacker would have a difficult time researching or accessing that specific detail.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-out-of-band-proofing-what-you-have\">Out-of-band proofing \u2014 what you have<\/h2>\n\n\n\n<p>Another authentication technique relies on out-of-band (OOB) proofing. OOB relies on another channel, besides online, to authenticate the individual, for example, an online form asking for a code sent by text message. OOB is an example of two-factor authentication, and it increases security as it requires the person to have possession of the authentication device.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-biometrics-what-you-are\">Biometrics \u2014 what you are<\/h2>\n\n\n\n<p>One authentication method that is rapidly gaining traction is biometrics. Biometrics rely on individual physical traits that are difficult to fake in order to authenticate an individual. For example, fingerprints, a voiceprint or a retina scan are all biometric techniques. Long in use by the sectors with the most stringent security requirements, these techniques are now also included in the latest smartphones. Biometrics provides another identity layer to draw upon when considering an effective identity proofing solution.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"900\" height=\"300\" src=\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2019\/10\/New-approaches-to-identity-proofing.jpg\" alt=\"New approaches to identity proofing\" class=\"wp-image-18471\" srcset=\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2019\/10\/New-approaches-to-identity-proofing.jpg 900w, https:\/\/www.trulioo.com\/wp-content\/uploads\/2019\/10\/New-approaches-to-identity-proofing-740x247.jpg 740w, https:\/\/www.trulioo.com\/wp-content\/uploads\/2019\/10\/New-approaches-to-identity-proofing-96x32.jpg 96w\" sizes=\"(max-width: 900px) 100vw, 900px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-new-threats-to-identity\">New threats to identity<\/h2>\n\n\n\n<p>Unfortunately, the sophistication and scalability of identity theft and fraud techniques are increasing. Widespread data breaches and other methods provide ammunition for fraudsters to create&nbsp;<a href=\"\/blog\/fraud-prevention\/synthetic-identity-fraud\">synthetic identities<\/a>. Artificial intelligence (AI) capabilities can produce&nbsp;<a href=\"\/blog\/identity-verification\/fighting-fake-news\">deep fakes<\/a>&nbsp;for these identities, making them appear that much more real, both in appearance and in action.<\/p>\n\n\n\n<p>The threat is staggering; in 2020&nbsp;<a href=\"https:\/\/www.javelinstrategy.com\/content\/2021-identity-fraud-report-shifting-angles-identity-fraud\" target=\"_blank\" rel=\"noopener\">identity-related fraud<\/a>&nbsp;accounted for $56 billion in losses. Beyond fraud, there\u2019s the risk of compliance failures and fines, as criminal organizations use fraudulent identity techniques to launder money and circumvent financial controls.<\/p>\n\n\n\n<p>New approaches to identity proofing are becoming available to protect consumers, businesses and governments.&nbsp;Web Authentication&nbsp;(WebAuthn) is a new internet protocol designed to help deploy simpler yet more robust web authentication methods worldwide. New consumer&nbsp;<a href=\"\/blog\/trust-and-safety\/california-consumer-privacy-act\">data protection laws<\/a>&nbsp;are clarifying data use standards and enabling consumers more control over their information.&nbsp;<a href=\"\/blog\/identity-verification\/digital-identity\">Digital identity initiatives<\/a>&nbsp;aim to increase security while offering ease of use and widespread adoption.<\/p>\n\n\n\n<p>The critical element is to have effective identity verification in the first place. According to Jeremy Grant, managing director of technology business strategy at Venable:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote\">\n<p>Authentication is getting easier, and&nbsp;identity proving is getting harder&nbsp;\u2026 the real frontier these days, in terms of where more work is needed, is on identity proving.<\/p>\n<\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-remote-id-proofing\">Remote ID proofing<\/h2>\n\n\n\n<p>In the EU, electronic identification is seen as a key lever for the development of a singe digital market across member states. The EU has enacted <a href=\"\/blog\/identity-verification\/id-eidas\">eIDAS<\/a> (Electronic Identification, Authentication and Trust Services). The European Union Agency for Cybersecurity has provided guidance for implementing compliant <a href=\"https:\/\/www.enisa.europa.eu\/publications\/enisa-report-remote-id-proofing\" target=\"_blank\" rel=\"noopener\">remote ID proofing<\/a> and a practical approach to apply risk management.<\/p>\n\n\n\n<p>The guidance notes several trends and state-of-the-art approaches:<\/p>\n\n\n\n<p><strong>Best of breed method<\/strong><br>This practice is based on the combination of different actors, components or techniques, where each offers its advantages to the different parts of the identity proofing process; at the same time, fellow actors, components or techniques compensate for its weaknesses.<\/p>\n\n\n\n<p><strong>Mix-and-match approach<\/strong><br>This practice is based on building the technological, organizational and human resources which will allow several implementations targeted for the needs, circumstances and regulatory requirements of customers in different sectors or countries.<\/p>\n\n\n\n<p>Using a <a href=\"\/blog\/identity-verification\/digital-identity-network\">digital identity network<\/a> reflects these approaches to online identity proofing. There\u2019s no one best approach as there are multiple use cases, regulatory requirements, and risk scenarios. Instead, a layered approach addresses the gap that individual digital identity services can\u2019t fulfill. The network is a marketplace of hundreds of data sources, verification processes and tools that work together to identify who a person is \u2014 no matter their unique set of identity attributes or risk profile.<\/p>\n\n\n\n<p>The identity industry is making rapid progress. Rather than relying on one technique, a multi-layered approach to identity verification maximizes security and increases confidence. Organizations can vary their approaches depending on individual risk levels and circumstances. With the addition of sophisticated data profiling, which can help gauge specific risk situations, identity proofing can reduce risk, smooth the user experience, and enable effective implementation of online and mobile transactions. New identity proofing models and technologies are at the center of building trust for the ongoing, dizzying expansion of the digital economy.<\/p>\n\n\n\n<p><em>This post was originally published September 20, 2016, updated to reflect the latest industry news, trends and insights.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"Combining identity verification and authentication procedures, identity proofing helps establish that someone is who they&#8230;","protected":false},"author":8,"featured_media":33161,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"footnotes":""},"categories":[334],"post-types":[148],"post-topics":[131],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.1 (Yoast SEO v22.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Identity proofing \u2013 how to verify and authenticate online<\/title>\n<meta name=\"description\" content=\"Identity proofing helps establish trust online, combining identity verification and authentication techniques to assess an individual.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.trulioo.com\/blog\/identity-verification\/identity-proofing\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Identity proofing \u2013 how to verify and authenticate online\" \/>\n<meta property=\"og:description\" content=\"Identity proofing helps establish trust online, combining identity verification and authentication techniques to assess an individual.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.trulioo.com\/blog\/identity-verification\/identity-proofing\" \/>\n<meta property=\"og:site_name\" content=\"Trulioo\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/trulioo\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-02T13:00:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-01T16:23:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2021\/06\/identity-proofing.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"1370\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Paul Valkama\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@trulioo\" \/>\n<meta name=\"twitter:site\" content=\"@trulioo\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Paul Valkama\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.trulioo.com\/blog\/identity-verification\/identity-proofing#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.trulioo.com\/blog\/identity-verification\/identity-proofing\"},\"author\":{\"name\":\"Paul Valkama\",\"@id\":\"https:\/\/www.trulioo.com\/#\/schema\/person\/4dedbd41574b6b5754919a490ed4d5ae\"},\"headline\":\"Identity proofing \u2013 how to verify and authenticate online\",\"datePublished\":\"2021-06-02T13:00:18+00:00\",\"dateModified\":\"2023-08-01T16:23:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.trulioo.com\/blog\/identity-verification\/identity-proofing\"},\"wordCount\":1277,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.trulioo.com\/#organization\"},\"articleSection\":[\"Identity Verification\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.trulioo.com\/blog\/identity-verification\/identity-proofing#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.trulioo.com\/blog\/identity-verification\/identity-proofing\",\"url\":\"https:\/\/www.trulioo.com\/blog\/identity-verification\/identity-proofing\",\"name\":\"Identity proofing \u2013 how to verify and authenticate online\",\"isPartOf\":{\"@id\":\"https:\/\/www.trulioo.com\/#website\"},\"datePublished\":\"2021-06-02T13:00:18+00:00\",\"dateModified\":\"2023-08-01T16:23:58+00:00\",\"description\":\"Identity proofing helps establish trust online, combining identity verification and authentication techniques to assess an individual.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.trulioo.com\/blog\/identity-verification\/identity-proofing#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.trulioo.com\/blog\/identity-verification\/identity-proofing\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.trulioo.com\/blog\/identity-verification\/identity-proofing#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.trulioo.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Identity Verification\",\"item\":\"https:\/\/www.trulioo.com\/post-topics\/identity-verification\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Identity proofing \u2013 how to verify and authenticate online\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.trulioo.com\/#website\",\"url\":\"https:\/\/www.trulioo.com\/\",\"name\":\"Trulioo\",\"description\":\"Building trust online (online identity verification services)\",\"publisher\":{\"@id\":\"https:\/\/www.trulioo.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.trulioo.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.trulioo.com\/#organization\",\"name\":\"Trulioo\",\"url\":\"https:\/\/www.trulioo.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.trulioo.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/Trulioo-Wordmark-Dark-Green.png\",\"contentUrl\":\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/Trulioo-Wordmark-Dark-Green.png\",\"width\":2784,\"height\":1464,\"caption\":\"Trulioo\"},\"image\":{\"@id\":\"https:\/\/www.trulioo.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/trulioo\",\"https:\/\/twitter.com\/trulioo\",\"https:\/\/www.linkedin.com\/company\/trulioo\",\"https:\/\/www.instagram.com\/trulioo_global\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.trulioo.com\/#\/schema\/person\/4dedbd41574b6b5754919a490ed4d5ae\",\"name\":\"Paul Valkama\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.trulioo.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ae0ad041b53eb878badb2c5744ad4691?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ae0ad041b53eb878badb2c5744ad4691?s=96&d=mm&r=g\",\"caption\":\"Paul Valkama\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Identity proofing \u2013 how to verify and authenticate online","description":"Identity proofing helps establish trust online, combining identity verification and authentication techniques to assess an individual.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.trulioo.com\/blog\/identity-verification\/identity-proofing","og_locale":"en_US","og_type":"article","og_title":"Identity proofing \u2013 how to verify and authenticate online","og_description":"Identity proofing helps establish trust online, combining identity verification and authentication techniques to assess an individual.","og_url":"https:\/\/www.trulioo.com\/blog\/identity-verification\/identity-proofing","og_site_name":"Trulioo","article_publisher":"https:\/\/www.facebook.com\/trulioo","article_published_time":"2021-06-02T13:00:18+00:00","article_modified_time":"2023-08-01T16:23:58+00:00","og_image":[{"width":2400,"height":1370,"url":"https:\/\/www.trulioo.com\/wp-content\/uploads\/2021\/06\/identity-proofing.jpeg","type":"image\/jpeg"}],"author":"Paul Valkama","twitter_card":"summary_large_image","twitter_creator":"@trulioo","twitter_site":"@trulioo","twitter_misc":{"Written by":"Paul Valkama","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.trulioo.com\/blog\/identity-verification\/identity-proofing#article","isPartOf":{"@id":"https:\/\/www.trulioo.com\/blog\/identity-verification\/identity-proofing"},"author":{"name":"Paul Valkama","@id":"https:\/\/www.trulioo.com\/#\/schema\/person\/4dedbd41574b6b5754919a490ed4d5ae"},"headline":"Identity proofing \u2013 how to verify and authenticate online","datePublished":"2021-06-02T13:00:18+00:00","dateModified":"2023-08-01T16:23:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.trulioo.com\/blog\/identity-verification\/identity-proofing"},"wordCount":1277,"commentCount":0,"publisher":{"@id":"https:\/\/www.trulioo.com\/#organization"},"articleSection":["Identity Verification"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.trulioo.com\/blog\/identity-verification\/identity-proofing#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.trulioo.com\/blog\/identity-verification\/identity-proofing","url":"https:\/\/www.trulioo.com\/blog\/identity-verification\/identity-proofing","name":"Identity proofing \u2013 how to verify and authenticate online","isPartOf":{"@id":"https:\/\/www.trulioo.com\/#website"},"datePublished":"2021-06-02T13:00:18+00:00","dateModified":"2023-08-01T16:23:58+00:00","description":"Identity proofing helps establish trust online, combining identity verification and authentication techniques to assess an individual.","breadcrumb":{"@id":"https:\/\/www.trulioo.com\/blog\/identity-verification\/identity-proofing#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.trulioo.com\/blog\/identity-verification\/identity-proofing"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.trulioo.com\/blog\/identity-verification\/identity-proofing#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.trulioo.com\/"},{"@type":"ListItem","position":2,"name":"Identity Verification","item":"https:\/\/www.trulioo.com\/post-topics\/identity-verification"},{"@type":"ListItem","position":3,"name":"Identity proofing \u2013 how to verify and authenticate online"}]},{"@type":"WebSite","@id":"https:\/\/www.trulioo.com\/#website","url":"https:\/\/www.trulioo.com\/","name":"Trulioo","description":"Building trust online (online identity verification services)","publisher":{"@id":"https:\/\/www.trulioo.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.trulioo.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.trulioo.com\/#organization","name":"Trulioo","url":"https:\/\/www.trulioo.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.trulioo.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/Trulioo-Wordmark-Dark-Green.png","contentUrl":"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/Trulioo-Wordmark-Dark-Green.png","width":2784,"height":1464,"caption":"Trulioo"},"image":{"@id":"https:\/\/www.trulioo.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/trulioo","https:\/\/twitter.com\/trulioo","https:\/\/www.linkedin.com\/company\/trulioo","https:\/\/www.instagram.com\/trulioo_global\/"]},{"@type":"Person","@id":"https:\/\/www.trulioo.com\/#\/schema\/person\/4dedbd41574b6b5754919a490ed4d5ae","name":"Paul Valkama","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.trulioo.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ae0ad041b53eb878badb2c5744ad4691?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ae0ad041b53eb878badb2c5744ad4691?s=96&d=mm&r=g","caption":"Paul Valkama"}}]}},"_links":{"self":[{"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/posts\/3109"}],"collection":[{"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/comments?post=3109"}],"version-history":[{"count":1,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/posts\/3109\/revisions"}],"predecessor-version":[{"id":36369,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/posts\/3109\/revisions\/36369"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/media\/33161"}],"wp:attachment":[{"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/media?parent=3109"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/categories?post=3109"},{"taxonomy":"post-types","embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/post-types?post=3109"},{"taxonomy":"post-topics","embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/post-topics?post=3109"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}