Skip to Main Content

Blog: Uncategorized

Reducing the Scope of Compliance with Journey
18 | Jun

The compliance landscape for businesses has been steadily becoming more complex, costly, and fraught with risk over the past few years. Not ...

Read Post
Feedback Loop
29 | Oct

I often receive feedback from my online editing tool that analyzes my prose.  It tells me that 2 of 20 sentences is hard to read or 3 of 20...

Read Post
Face/Off Versus Face Map
28 | Oct

Could Journey 3D face mapping and liveness detection technology foil the complete face swap in the movie Face/Off? A 3D face map is a topogr...

Read Post
2FA (SMS + OTP) — THBBBBT!
22 | Oct

Thanks for a great 30 years SMS protocol, but your hippy-dippy, free-wheeling, network needs an upgrade. From a recent Forbes’ article...

Read Post
Identity, the Universe and Everything!
21 | Oct

Legend has it that in the beginning there was Adam. He was all alone and the concept of identity was meaningless. Because Adam was lonely, h...

Read Post
Over the Counter Oversharing
20 | Aug

Journey can’t cure a headache but it can treat the sting of silly questions....

Read Post
Invasion of the Data Snatchers 
12 | Aug

Journey uses asymmetric encryption. The solution is to use symmetric keys to encrypt personal information instead of inputting it or showing...

Read Post
TMI When All I Want Is to Refi
24 | Jul

Journey has developed an innovative approach to enabling consumers and businesses to exchange and verify information without actually exposi...

Read Post
Verified Identity in Conferencing
23 | Jul

The advent of Covid has created a tectonic shift in the importance of conferencing. At its simplest level, it allows people to work together...

Read Post