(no title)
jmaker | 20 days ago
Sometimes it works with the front camera on one smartphone but doesn’t with another (iPhone 17’s distortion), sometimes it recognizes your face on one day, but desperately fails to recognize you on another. I had to repeatedly record videos for it only to fail over and over again. Anything their system flags as suspicious, anything, will trigger the same video identification flow again, which effectively blocks your money in the account.
I’m closing my accounts with a couple of banks with these video id flows. Simply because it’s way too easy to lose access to my money in the account with them. If their QA is not good enough for this vital requirement, I don’t want to know how they treat other requirements. They simply outsourced the id verification to some third parties that are way too unreliable.
jbmsf|20 days ago
If you don't take these measures, you will lose money to fraud. You may also lose your business because you aren't meeting your AML/anti-terror obligations. (I also just had to take my annual training course).
There are a bunch of mitigations, of which identity verification is just one, and all of them are lousy for our good customers. I wish the banking systems were better and we didn't need to do any of it.
mihaaly|20 days ago
jmaker|20 days ago
Another banking app has failed to identify me a couple of times (I attribute it to iPhone 17’s front camera distortion) and fell back to the snail mail id code as a 2nd factor. It arrived only several business days later. Instead of just letting me use my own 2nd factor such as a TOTP device or a physical security key. But maybe there are some legal requirements for that flow, I’m out of the loop.
So there’s a whole range between passkey-is-enough on one end and outsourced video id or snail mail for 2nd factor on the other. The latter can of course be misused to siphon as much personal information as possible out of you, even linking and scraping your other banking accounts for consumer profiling - designed as a requisite part of the authentication/authorization flow.
tintor|20 days ago
lossyalgo|20 days ago
bmitch3020|20 days ago