{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/141","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"Last week, we had a great time participating in Vancouver Startup Week's Community Crawl.   The Community Crawl is like a pub crawl except…","fields":{"slug":"/growth/how-to-throw-a-tiki-tech-party/"},"html":"<p>Last week, we had a great time participating in Vancouver Startup Week's Community Crawl. </p>\n<p><img src=\"/ad398328e6f05daa397b204ed6ac0089/VWS-V01.03_LinkedIn-1-1200x627-1-1024x536.webp\"></p>\n<p>The Community Crawl is like a pub crawl except you hop from startup offices to startup offices. It’s an engaging open house event where guests can check out different startups. Over a dozen startups opened their doors, so <strong>thanks to everyone who took the time to check us out!</strong> </p>\n<p>Those who attended immediately noticed our new spacious office space, complete with a custom-made tiki bar! Because, why not, right?</p>\n<p>To celebrate our move and christen our new space and tiki bar, we hosted a tiki party, replete with festive Hawaiian leis and shirts. </p>\n<p><img src=\"/38bd962387da7229ac069b2077ca84ca/IMG_1257a-1-1024x658.webp\"></p>\n<p><em>LoginRadius founder &#x26; CEO, Rakesh Soni, enjoying our new custom-made tiki bar.</em> </p>\n<p>Our “Tiki Tech” party was a great way to bring our team together and mingle with the Vancouver Startup community. Want to know how to throw a tiki party? Here’s an easy guide…</p>\n<h2 id=\"create-a-tiki-tastic-atmosphere\" style=\"position:relative;\"><a href=\"#create-a-tiki-tastic-atmosphere\" aria-label=\"create a tiki tastic atmosphere permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Create a tiki-tastic atmosphere</h2>\n<p>What’s a tiki-tastic atmosphere? You’ll know it when it feels like summer at your office despite the Raincouver weather. Here are some fun motifs you can buy for <em>cheap!</em></p>\n<h3 id=\"start-with-fun-decorations\" style=\"position:relative;\"><a href=\"#start-with-fun-decorations\" aria-label=\"start with fun decorations permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Start with fun decorations</h3>\n<p>Being a startup with a modest budget, we had to be creative with the DIY decor. </p>\n<p>We painted colourful signs on cardboard and made little pineapple lanterns which we strung across the room. Then, to brighten the room, we added flamingo-pink dangling paper tissue balls from the ceiling. Hanging decorations from the ceiling are better than sticking them on walls. It makes a room look full and festive with very little material.</p>\n<p><img src=\"/4f4588ebb9cdc97bf7255caca3d3bd73/IMG_1132a-1024x658.webp\"></p>\n<p><em>We bought yellow lanterns and turned them into pineapples.</em> </p>\n<p><img src=\"/4026e9c920c4de425dacdc92d630da68/IMG_1215a-1-1024x658.webp\"></p>\n<p><em>We placed hand-painted signs, including our drinks menu, all over the room.</em></p>\n<h3 id=\"provide-ambiance-with-music\" style=\"position:relative;\"><a href=\"#provide-ambiance-with-music\" aria-label=\"provide ambiance with music permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Provide ambiance with music</h3>\n<p>Another easy way to add more tiki into a room is by playing music. We found a pre-made tiki playlist on a streaming app and let it loop throughout the night. There wasn’t any official dancing at our party, but we had lots of people bobbing their heads or tapping their feet to the beat. </p>\n<p><img src=\"/32754e8bb1e5edd4e19beafc3928abd8/IMG_1178a-1024x658.webp\"></p>\n<p><em>Our team members and guests having fun at our tiki tech party.</em> </p>\n<h2 id=\"decorate-your-glorious-tiki-bar\" style=\"position:relative;\"><a href=\"#decorate-your-glorious-tiki-bar\" aria-label=\"decorate your glorious tiki bar permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Decorate your glorious tiki bar</h2>\n<p>The tiki bar was made by a local carpenter. He came by our office to look at the space where the tiki bar will be housed, take measurements, and listen to vision for this piece of resistance. </p>\n<p>What he built was better than what we expected! The frame is made of durable wood and lined with the bamboo-like exterior. On the inside, we have a fridge for the keg and another fridge for other drinks. On the surface of the bar is the tap for the beer. The front was lined with LED lights that changed colours. Everything is covered by a thatched roof, completing the tiki look. </p>\n<p><img src=\"/099cbebdd61365685c3b669d948e8d0d/IMG_1238-1a-1024x658.webp\"></p>\n<p><em>To the left is Mark from Torlay, our local carpenter, who designed and built our lovely tiki bar!</em></p>\n<h2 id=\"provide-delicious-tropical-cocktails\" style=\"position:relative;\"><a href=\"#provide-delicious-tropical-cocktails\" aria-label=\"provide delicious tropical cocktails permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Provide delicious tropical cocktails </h2>\n<p>No tiki party is complete without tropical cocktails…especially on a Friday afternoon after a long workweek. Luckily for us, we had an impressive tiki bar where we served endless drinks to our team members and guests. </p>\n<p>So that you’re prepared for guests, it’s wise to plan a drink menu a few days or weeks ahead of time. This gives you time to get cool ingredients or tiki-themed cups, umbrellas—whatever moves you!</p>\n<p>To ensure a fun relaxing night for everyone, we hired a bartender. His lime margaritas were to die for—and the sound of a cocktail in a shaker just adds to the festive vibe.</p>\n<p>The tap beer on the tiki bar was also a celebration on its own. Plus, right before the event, one of our team members whipped up some killer tropical sangria.</p>\n<p><img src=\"/f69d2fe7ff4bdb8eaae79ec8707e40ff/IMG_1149a-1024x658.webp\"></p>\n<p><em>Our bartender, Sam, making amazing tropical drinks for us all night long.</em> </p>\n<p>Whether you do or don’t have a tiki bar, you can create the vibe around your cocktail table. Just use festive decorations or painted signs, plus fun tropical cups. And of course, use some tropical beverage ingredients, if you can! Then lean back and watch your guests get into tiki mood. </p>\n<h2 id=\"lei-on-a-warm-welcome-to-your-guests\" style=\"position:relative;\"><a href=\"#lei-on-a-warm-welcome-to-your-guests\" aria-label=\"lei on a warm welcome to your guests permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Lei on a warm welcome to your guests</h2>\n<p>The first impression is everything. Each guest who came through our doors received a flower lei over their heads. It’s a great way to create that instant tiki environment. We went a step further and created little tags for each lei with our company logo and a QR code that took them to our <a href=\"https://www.loginradius.com/careers/\">Careers page</a> for those who are interested in joining us for more than just a tiki party. </p>\n<p><img src=\"/ddd44bd77ec702aff50b924c5ecab937/IMG_1244a-1024x658.webp\"></p>\n<p><em>Lovely volunteers from Vancouver Startup Week helped us give leis to our guests.</em> </p>\n<h2 id=\"include-an-engaging-tech-activity\" style=\"position:relative;\"><a href=\"#include-an-engaging-tech-activity\" aria-label=\"include an engaging tech activity permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Include an engaging tech activity</h2>\n<p>On our TV, we displayed a one-minute online survey that can be taken on mobile phones. Since LoginRadius secures digital identities, we asked our guests to check all the different digital identities they used in the past week. This included emails, online banking, various video games, social media, and more. </p>\n<p><img src=\"/04bf3c2c8728980b314e4d3374017365/IMG_1159a-1024x658.webp\"></p>\n<p><em>Individuals scanned the QR code on our TV to take our one-minute digital identity survey.</em> </p>\n<p>We had close to 90 guests and team member join our party. Based on our study, the most popular digital identity was work and personal emails. Nearly 100% of respondents used these two digital identities in the past week! </p>\n<p>Work and personal emails are closely followed by LinkedIn. Our survey states that 91.3% of respondents used LinkedIn in the past week. This is interesting because according to Hootsuite, Facebook is the most popular social media website. Yet, Facebook/Instagram fell behind LinkedIn at 82.6%. This data may be influenced by Vancouver Startup Week. In preparing for this networking event, individuals might have recently checked and updated their professional profile on LinkedIn. </p>\n<p>On average, respondents used about 13 different digital identities that week. This not only raised awareness for our guests as consumers, but it also encouraged us as an identity management platform to continue creating stronger security and easier login authentication methods that organizations can use for their customers. </p>\n<h2 id=\"be-open-to-a-spontaneous-after-party\" style=\"position:relative;\"><a href=\"#be-open-to-a-spontaneous-after-party\" aria-label=\"be open to a spontaneous after party permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Be open to a spontaneous after party</h2>\n<p>On a weekend night, what better way to end a party than with an after-party? We had a group of people who were interested in continuing the fun after the predestined party time. This included both the CEO and CTO. Originally, they were going to move locations. However, since our office space was available for further into the night, everyone decided to stay there. Instead, we ordered pizza and took advantage of the overabundant storage of drinks supplied for the original party. </p>\n<p>Planning fun parties can be exhausting. Allowing spontaneous after parties can help you feel free and serve as a reminder that an enjoyable event doesn’t always have to be stringently planned. </p>\n<p><img src=\"/cc58dad758e514f55c332675e7308158/IMG_20190913_200408a-1024x659.webp\"></p>\n<p><em>The after-party selfie—no party is complete without it!</em></p>\n<h3 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h3>\n<p>Sharing our tiki bar with the community led to lots of memorable meetings. Thanks to everyone who enjoyed our tropical drinks, embraced our leis, basked in our tiki atmosphere, and participated in our survey. We loved having the Vancouver Startup Community visit our office and we hope to see you at our future tiki events!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"September 20, 2019","updated_date":null,"description":"Except that you hop from start-up offices to start-up offices, Neighborhood Crawl is like a pub crawl. It's an interesting open house event where tourists can check out various start-ups. More than a dozen startups have opened their doors, so thank you to anyone who has taken the time to check us out!","title":"How To Throw A Tiki Tech Party","tags":null,"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.550387596899225,"src":"/static/d8e58222783279e1030beb7197d352d9/58556/how-to-throw-a-tiki-tech-party.webp","srcSet":"/static/d8e58222783279e1030beb7197d352d9/61e93/how-to-throw-a-tiki-tech-party.webp 200w,\n/static/d8e58222783279e1030beb7197d352d9/1f5c5/how-to-throw-a-tiki-tech-party.webp 400w,\n/static/d8e58222783279e1030beb7197d352d9/58556/how-to-throw-a-tiki-tech-party.webp 800w,\n/static/d8e58222783279e1030beb7197d352d9/99238/how-to-throw-a-tiki-tech-party.webp 1200w,\n/static/d8e58222783279e1030beb7197d352d9/7c22d/how-to-throw-a-tiki-tech-party.webp 1600w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Karl Wittig","github":null,"avatar":null}}}},{"node":{"excerpt":"In a world where data is the most valuable resource, it’s logical that there will be new regulations to protect consumer data. With media…","fields":{"slug":"/identity/ccpa-vs-gdpr-the-compliance-war/"},"html":"<p>In a world where data is the <strong>most valuable resource,</strong> it’s logical that there will be new regulations to protect consumer data. With media outlets covering more data scandal stories than ever, consumers are increasingly more aware of data collection and how it affects them. With this in mind, global compliance regulations support consumer rights to data privacy and consent.</p>\n<p>Two such regulations are the EU’s GDPR (General Data Protection Regulation, in effect May 25, 2018) and the CCPA (California Consumer Privacy Act, in effect January 1, 2020). These are two of the first regulations that directly impact data collection, use, and storage on a widespread scale. </p>\n<p>Understanding the impact of GDPR and <a href=\"https://www.loginradius.com/blog/identity/ccpa-introduction/\">CCPA regulations is crucial for global compliance</a> today—and in the future. In fact, these regulations foreshadow a certain trend toward data collection and management: More governing bodies will implement privacy and consent regulations with heftier repercussions for noncompliance.</p>\n<p>To help you understand <a href=\"https://www.loginradius.com/blog/identity/2020/03/how-loginradius-helps-enterprises-stay-ccpa-compliant-in-2020/\">how these regulations can affect you</a>, here’s an overview of GDPR vs CCPA.</p>\n<h2 id=\"similarities-and-differences-ccpa-vs-gdpr\" style=\"position:relative;\"><a href=\"#similarities-and-differences-ccpa-vs-gdpr\" aria-label=\"similarities and differences ccpa vs gdpr permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Similarities and Differences: CCPA vs GDPR </h2>\n<p><strong>Here are the most notable <em>similarities</em></strong> <strong>between the CCPA and the GDPR:</strong> </p>\n<ul>\n<li><strong>Where are these in effect?</strong> Anywhere within the government’s jurisdiction.</li>\n<li><strong>Who do the laws protect?</strong> Any residents of this jurisdiction.</li>\n<li><strong>When is a business responsible?</strong> Anytime they interact with the data of a resident.</li>\n<li><strong>What rights do customers have over their data?</strong> Both CCPA and GDPR compliance rules allow users the right to access, correct, stop the processing of, and delete their data.</li>\n</ul>\n<p><a href=\"https://www.loginradius.com/resource/the-ccpa-and-customer-identity\"><img src=\"/c62fbeba5c65dddf6f32bbac3af59099/WP-The-CCPA-and-Customer-Identity-Reaping-the-Benefits-of-Compliance-1024x310.webp\"></a></p>\n<p><strong>For more info on CCPA compliance, check out our white paper.</strong></p>\n<p><strong>Here are the most notable <em>differences</em></strong> <strong>between CCPA and GDPR compliance:</strong></p>\n<ul>\n<li><strong>Who do the laws affect?</strong> Any business that collects data from these residents, <em>regardless of where the business is based</em>. The GDPR does not look at the size of the business when implementing its regulations. The CCPA, however, requires businesses to be a certain size or possess a certain amount of data before the law will be enforced.</li>\n<li><strong>How are compliance violations punished?</strong> Directly through fines and indirectly through the media and public relations. Fines accrued via the GDPR are linked to and capped based on a company’s annual revenue, whereas CCPA fines have no ceiling and are assessed on a per violation basis.</li>\n<li><strong>How do consumers opt-in/out?</strong> Prior to collecting data, the GDPR requires that businesses ask consumers to opt-in. The CCPA takes a slightly less intensive approach, requiring that businesses allow users to opt-out of collection.</li>\n<li><strong>How are third-party transfers affected?</strong> The CCPA requires that you give a customer notice before the sale and transfer of their data, so that they may stop it. The GDPR requires explicit consent from customers before third-party processing or transfers occur.</li>\n</ul>\n<p>For more tips on CCPA and GDPR compliance, check out the infographic by LoginRadius.</p>\n<p><img src=\"/6c193eb15bf28fc8f7cc9c78f13beb76/new_CCPA-VS-GDPR-V01.06-PNG-01-1-2.webp\"></p>\n<p>Want to get your company compliance-ready and keep it up-to-date, automatically? Contact a LoginRadius expert to learn how.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=ccpa-vs-gdpr-the-compliance-war\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-free-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"September 18, 2019","updated_date":null,"description":"It's natural that there will be new legislation to protect customer data in a world where data is the most important resource. With more data scandal storeys than ever before reported by media outlets, users are constantly aware of data collection and how it impacts them. With this in mind, enforcement laws foster data protection and consent rights for users.","title":"CCPA vs GDPR: Global Compliance Guide [Infographic]","tags":["data privacy","compliance","data security"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5267175572519085,"src":"/static/19b671e1d4113d48d7fa1cdc7661bedd/7f8e9/ccpa-vs-gdpr.webp","srcSet":"/static/19b671e1d4113d48d7fa1cdc7661bedd/61e93/ccpa-vs-gdpr.webp 200w,\n/static/19b671e1d4113d48d7fa1cdc7661bedd/1f5c5/ccpa-vs-gdpr.webp 400w,\n/static/19b671e1d4113d48d7fa1cdc7661bedd/7f8e9/ccpa-vs-gdpr.webp 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"excerpt":"If you have been operating a web application where consumers need to authenticate themselves, the term 'credential stuffing' shouldn't be…","fields":{"slug":"/identity/prevent-credential-stuffing-attacks/"},"html":"<p>If you have been operating a web application where consumers need to authenticate themselves, the term 'credential stuffing' shouldn't be new to you. </p>\n<p>In case you haven’t heard it before, credential stuffing is a cybersecurity threat where hackers use stolen credentials to attack web infrastructures and take over user accounts. </p>\n<p>Someone or the other is always out there freely distributing breached databases on hacker forums and torrents to help criminals evolve their velocity of attack. </p>\n<p>Their strategy is pretty straightforward.</p>\n<p>Hackers use automated bots to stuff those credentials into the login pages across multiple sites to unlock multiple accounts. Also, since people do not change their passwords often, even older credential lists record relative success. </p>\n<p>The threat gets further elevated when hackers use credentials from organizations to login and hijack consumer accounts. Not only the company suffers revenue loss and brand damage, consumers feel the blow too. </p>\n<p>In this blog, we will walk you through the credential stuffing attack lifecycle and discuss the best ways to respond to attacks and <a href=\"https://www.loginradius.com/blog/2020/05/cyber-threats-business-risk-covid-19/\">mitigate damage to your business</a>. </p>\n<h2 id=\"examples-of-recent-credential-stuffing-attacks\" style=\"position:relative;\"><a href=\"#examples-of-recent-credential-stuffing-attacks\" aria-label=\"examples of recent credential stuffing attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Examples of Recent Credential Stuffing Attacks</h2>\n<p>As new vulnerabilities and exploits are discovered every day, various instances demonstrate that each attack is more sophisticated than the last. Let's look at a few recent examples: </p>\n<ul>\n<li>According to a <a href=\"https://www.cbc.ca/news/politics/canada-revenue-agency-cra-cyberattack-1.5688163\">report by CBC Canada</a>, the Canada Revenue Agency has confirmed that out of roughly 12 million active GCKey accounts, 9,041 user credentials were acquired fraudulently through credential stuffing. They have temporarily shut down their online services.</li>\n<li>According to an <a href=\"https://www.documentcloud.org/documents/7208239-FBI-PIN-on-credential-stuffing-attacks.html\">FBI security advisory</a> obtained by ZDNet, between January and August 2020, hackers used a bulk load of credential pairs to conduct more than <a href=\"https://www.zdnet.com/article/fbi-says-credential-stuffing-attacks-are-behind-some-recent-bank-hacks/\">$3.5 million fraudulent check withdrawals</a> and ACH transfers from a mid-sized financial institution in the US. </li>\n<li>Another NY-based investment firm reported experiencing credential stuffing attacks between June 2019 and January 2020 against their mobile APIs. Although no fraud was reported, it could have resulted in nearly $2 million in revenue.</li>\n</ul>\n<h2 id=\"what-is-credential-stuffing\" style=\"position:relative;\"><a href=\"#what-is-credential-stuffing\" aria-label=\"what is credential stuffing permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Credential Stuffing</h2>\n<p>Credential stuffing is a kind of identity theft where hackers automatically inject breached username and password credentials to access numerous sites. </p>\n<p>Think of it as a brute force attack that focuses on infiltrating accounts. Once the hacker acquires access into the web application, they crack open a company's database that carries millions of personally identifiable information and exploits them for their own purpose.</p>\n<h2 id=\"how-credential-stuffing-works\" style=\"position:relative;\"><a href=\"#how-credential-stuffing-works\" aria-label=\"how credential stuffing works permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Credential Stuffing Works</h2>\n<p>Want to know the methods behind the screen? In a nutshell, here's the hacker's process:</p>\n<ul>\n<li><strong>Hacker gets stolen data</strong>: Criminals share or sell data on public websites and the Dark Web.</li>\n<li><strong>Hacker utilizes data</strong>: Using stolen passwords and usernames, hackers attempt website logins.</li>\n<li><strong>Hacker achieves goal</strong>: After gaining access to a victim's site, hackers get more valuable <a href=\"https://www.loginradius.com/blog/2019/10/cybersecurity-attacks-business/\">information for more attacks</a> or to sell.</li>\n</ul>\n<h2 id=\"effects-of-credential-stuffing\" style=\"position:relative;\"><a href=\"#effects-of-credential-stuffing\" aria-label=\"effects of credential stuffing permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Effects of Credential Stuffing</h2>\n<p>As you can see, when a business suffers from stolen credentials, it can cost them dearly. In fact, it's been reported that in the USA, 75% of credential stuffing attacks are programmed at financial institutions. So what happens when you aren't prepared for an attack? </p>\n<ul>\n<li>It strains the security budget leading to an increase in security cost. </li>\n<li>There is a noticeable loss of revenue from downtime, alongside losing customers to the competition.</li>\n<li>The cleanup costs can cripple businesses to the core. </li>\n<li>Customers do not trust businesses that cannot protect their data leading to customers discontinuing their loyalty.  </li>\n</ul>\n<p><img src=\"/f37806b24f8fcfa2daf90f46af2fb182/icons_security.webp\"></p>\n<h2 id=\"how-to-detect-credential-stuffing-attacks\" style=\"position:relative;\"><a href=\"#how-to-detect-credential-stuffing-attacks\" aria-label=\"how to detect credential stuffing attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Detect Credential Stuffing Attacks</h2>\n<p>Hackers send armies of bots to conduct thousands of commands, resulting in millions of stolen data. But it gets worse. In what is called \"the biggest collection of breaches\" to date, billions of stolen records are compiled and shared for free on hacker forums. </p>\n<p>So, how can you detect bot attacks? Here are the warning signs. </p>\n<ul>\n<li>Check for changes in site traffic like multiple login attempts on multiple accounts, within a limited timeframe. </li>\n<li>Never overlook use cases where you witness a higher-than-usual login failure rate. </li>\n<li>Be aware of any recorded downtime caused by an increase in site traffic. </li>\n</ul>\n<p>But beware: These credential stuffing bot detection techniques aren't 100% effective. You'll need extra protection—called bot screening—to stop these bots. It is a sophisticated screening technology for detecting malware on your devices. </p>\n<p>It's built to monitor the telltale signs of bot activity such as the number of attempts, the number of failures, access attempts from unusual locations, unusual traffic patterns, and unusual speed. </p>\n<p>Luckily, you'll find bot detection in robust <a href=\"https://www.loginradius.com/blog/2019/06/customer-identity-and-access-management/\">customer identity and access management solutions</a>. A CIAM platform will also provide device authentication and customer data protection.</p>\n<p><img src=\"/859c9a3643c4a235273a08d466c658a7/How-Credential-Stuffing-Threatens-Your-Company-V01.01-02-1024x576.webp\"></p>\n<h2 id=\"a-hackers-toolbox\" style=\"position:relative;\"><a href=\"#a-hackers-toolbox\" aria-label=\"a hackers toolbox permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Hacker’s Toolbox</h2>\n<p>Let's find out how hackers process their share of credential stuffing attacks.</p>\n<h3 id=\"step-1-download-a-combo-list\" style=\"position:relative;\"><a href=\"#step-1-download-a-combo-list\" aria-label=\"step 1 download a combo list permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Step 1: Download a combo list. </h3>\n<p>A combo list is a combined list of leaked credentials obtained from corporate data breaches conducted in the past. These are often available for free within hacking communities or listed for sale in underground markets (Darkweb). </p>\n<h3 id=\"step-2-upload-a-credential-stuffing-tool\" style=\"position:relative;\"><a href=\"#step-2-upload-a-credential-stuffing-tool\" aria-label=\"step 2 upload a credential stuffing tool permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Step 2: Upload a credential stuffing tool.</h3>\n<p>Sophisticated hackers develop plugins or tools called account checker tools. These contain custom configurations that can test the lists of username/password pairs (i.e., \"credentials\") against a target website. Hackers can attack sites either one by one or via tools that hit hundreds of sites at once.</p>\n<h3 id=\"step-3-analyze-and-access-accounts\" style=\"position:relative;\"><a href=\"#step-3-analyze-and-access-accounts\" aria-label=\"step 3 analyze and access accounts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Step 3: Analyze and access accounts</h3>\n<p>Hackers use account-checking software to log into financial accounts successfully. </p>\n<h3 id=\"step-4-export-results-from-accounts\" style=\"position:relative;\"><a href=\"#step-4-export-results-from-accounts\" aria-label=\"step 4 export results from accounts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Step 4: Export results from accounts.</h3>\n<p>Match found. What's next? When a match is found, they can easily view a victim's account balance and gain access to cash, reward points, or virtual currencies. </p>\n<h3 id=\"step-5-steal-funds-and-resell-access\" style=\"position:relative;\"><a href=\"#step-5-steal-funds-and-resell-access\" aria-label=\"step 5 steal funds and resell access permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Step 5: Steal funds and resell access.</h3>\n<p>Because hackers use genuine user credentials, they gain undetected access. What follows is a full-fledged <a href=\"https://www.loginradius.com/blog/2020/04/corporate-account-takeover-attacks/\">account takeover</a>. Next, the attacker can drain the account in seconds or resell access to other cybercriminals.  </p>\n<p><img src=\"/38de8a09999b24b913fbd655be3ff161/How-Credential-Stuffing-Threatens-Your-Company-V01.01-08-1024x577.webp\"></p>\n<h2 id=\"how-to-prevent-credential-stuffing-attacks\" style=\"position:relative;\"><a href=\"#how-to-prevent-credential-stuffing-attacks\" aria-label=\"how to prevent credential stuffing attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Prevent Credential Stuffing Attacks</h2>\n<p>But then, there is good news after all. Preventing these attacks is possible, and you can keep your business and customer safe by following the tips below:</p>\n<h3 id=\"1-bot-detection\" style=\"position:relative;\"><a href=\"#1-bot-detection\" aria-label=\"1 bot detection permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Bot detection</h3>\n<p>One of the most effective ways to differentiate real users from <a href=\"https://www.loginradius.com/engineering/blog/a-bot-protection-overview/\">bots is with captcha</a>. It can provide defense against basic attacks. </p>\n<p>But beware: Solving captcha can also be automated. There are businesses out there that pay people to solve captchas by clicking on those traffic light pictures. To counter, there is reCAPTCHA that is available in three versions:</p>\n<ul>\n<li> The classic \"I'm not a robot\" checkbox.</li>\n<li> An \"invisible\" box, displayed only for suspicious users.</li>\n<li> A \"V3\" that evaluates users on reputation and behavior.</li>\n</ul>\n<h3 id=\"2-adopt-a-strong-password-guide\" style=\"position:relative;\"><a href=\"#2-adopt-a-strong-password-guide\" aria-label=\"2 adopt a strong password guide permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Adopt a strong password guide</h3>\n<p>Set strict <a href=\"https://www.loginradius.com/blog/2019/12/worst-passwords-list-2019/\">password complexity rules</a> for all your password input fields like length, character, or special character validation. If a customer's password resembles that of a data breach, they should be asked to create new passwords and provide customers with tips on building stronger passwords during their password-creation process.</p>\n<h3 id=\"3-implement-multi-factor-authentication\" style=\"position:relative;\"><a href=\"#3-implement-multi-factor-authentication\" aria-label=\"3 implement multi factor authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Implement multi-factor authentication</h3>\n<p><a href=\"https://www.loginradius.com/multi-factor-authentication/\">Multi-factor authentication</a> (2FA or MFA) is the new-age method to block hackers using multiple security layers. MFA makes it extremely difficult for hackers to execute credential stuffing attacks. The more obstacles you give a hacker to verify user identities, the safer your site will be.</p>\n<h3 id=\"4-set-up-risk-based-authentication\" style=\"position:relative;\"><a href=\"#4-set-up-risk-based-authentication\" aria-label=\"4 set up risk based authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Set up risk-based authentication</h3>\n<p>Risk-based authentication (RBA) calculates a risk score based on a predefined set of rules. For instance, it can be anything related to a login device, IP reputation, user identity details, geolocation, geo velocity, personal characteristics, data sensitivity, or preset amount of failed attempts. RBA comes handy in case of high-risk scenarios where you want your customers to use customizable password security.</p>\n<h3 id=\"5-set-up-passwordless-login\" style=\"position:relative;\"><a href=\"#5-set-up-passwordless-login\" aria-label=\"5 set up passwordless login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Set up passwordless login</h3>\n<p>Hackers can also deny access to customers' own resources once they break-in. Having passwords as a factor of authentication can leave corporate and business accounts vulnerable to credential stuffing. So, why not remove them altogether? Use <a href=\"https://www.loginradius.com/blog/2019/10/passwordless-authentication-the-future-of-identity-and-security/\">passwordless authentication</a> as a safer way to authenticate users for more confined access into their accounts.</p>\n<p><a href=\"https://www.loginradius.com/resource/understanding-credential-stuffing-attacks-whitepaper\"><img src=\"/0211bcf38d1a0a60f9930324cfba56e0/credential-stuffing.webp\" alt=\"credential-stuffing\"></a></p>\n<h2 id=\"preventing-credential-stuffing-with-loginradius-identity-management\" style=\"position:relative;\"><a href=\"#preventing-credential-stuffing-with-loginradius-identity-management\" aria-label=\"preventing credential stuffing with loginradius identity management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Preventing Credential Stuffing With LoginRadius Identity Management</h2>\n<p>LoginRadius advocates a number of alternative authentication methods to mitigate the risk of credential stuffing. The identity and access management solution provider promotes passwordless practices like social login, single sign-on, email-based passwordless login to address the <a href=\"https://www.loginradius.com/blog/2019/10/cybersecurity-attacks-business/\">vulnerabilities of businesses</a>. </p>\n<p><strong>Social Login</strong>: Social login is an authentication method that allows users to log in to a third-party platform using their existing social media login credentials. This eliminates the need to create a new account or enter credentials altogether.   </p>\n<p><strong>Single Sign-On</strong>: <a href=\"https://www.loginradius.com/blog/2019/05/what-is-single-sign-on/\">Single sign on</a> (SSO) minimizes the number of credential stuffing attacks because users need to login once using just one set of credentials, and subsequently logged into other accounts as well. This provides a more robust protective layer to user accounts. </p>\n<p><strong>Email-Based Passwordless Authentication</strong>: The user is required to enter the associated email address. Upon which a unique code or magic link is created and sent to the email ID. It is valid for a predefined time frame. As soon as the server verifies the code, the user is let in. </p>\n<p><strong>Multi-factor Authentication</strong>: MFA offers better security by providing additional protection to traditional credentials through multiple layers. They are mostly implemented through security questions, ReCaptcha, and others. Due to extra security checks, LoginRadius assures businesses that customers' data is safe.  </p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Credential stuffing is easy to perform, so its popularity with criminals will increase with time. Even if your business isn't affected yet, you must <a href=\"https://www.loginradius.com/blog/identity/digital-privacy-best-practices/\">protect your website</a> and watch for all the red flags listed in this blog. </p>\n<p>If you're looking for a solution to help prevent credential stuffing, LoginRadius is easy to deploy. It  provides robust security with bot detection and multi-factor authentication, among other safeguards.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=prevent-credential-stuffing-attacks\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-free-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"September 12, 2019","updated_date":null,"description":"Credential stuffing is a cybersecurity vulnerability in which hackers target web infrastructures and take over user accounts using stolen credentials. When hackers use organisational credentials to login and hijack user accounts, the threat gets further elevated. Not only does the business experience loss of sales and brand harm, the blow is also felt by customers.","title":"Credential Stuffing: How To Detect And Prevent It","tags":["data security","mfa","ciam solution"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5384615384615385,"src":"/static/225abc42eb575e94c0398db1df49673f/7f8e9/credential-stuffing-attacks.webp","srcSet":"/static/225abc42eb575e94c0398db1df49673f/61e93/credential-stuffing-attacks.webp 200w,\n/static/225abc42eb575e94c0398db1df49673f/1f5c5/credential-stuffing-attacks.webp 400w,\n/static/225abc42eb575e94c0398db1df49673f/7f8e9/credential-stuffing-attacks.webp 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"excerpt":"Sketch of a Māori chief by Sydney Parkinson (1784)  Source - MaoriChief1784 In Part II of the History of Human Identity, we showed examples…","fields":{"slug":"/identity/history-human-identity-part-3/"},"html":"<p><img src=\"/16d08b92f1eb74d4d4d8f5f1bef262dc/454px-MaoriChief1784.webp\"> Sketch of a Māori chief by <a href=\"https://en.wikipedia.org/wiki/Sydney_Parkinson\">Sydney Parkinson</a> (1784) </p>\n<p>Source - <a href=\"https://commons.wikimedia.org/wiki/File:MaoriChief1784.webp\">MaoriChief1784</a></p>\n<p>In Part II of the History of Human Identity, we showed examples of identity verification such as names and unique markings. This blog is the final instalment of our 3-part series. In it, we'll focus on cultural identifiers—their use <em>and</em> their abuse.</p>\n<p>One of the oldest forms of cultural identifiers is still alive today: physical alterations. In fact, the Maori of New Zealand use <a href=\"https://brewminate.com/the-ancient-and-mysterious-history-of-tattoos/\">tattoos</a> in part as a marker of identity; the earliest recording of this dates back to the 1700s. Maori facial decorations include tattoos with detailed and stylized designs called <em>moko.</em> Moko is used to communicate information about an individual’s heritage and rank in society. </p>\n<p>In fact, the <a href=\"https://www.smithsonianmag.com/history/tattoos-144038580/\">Smithsonian.com</a> notes that the Maori use of tattoos “has accurately been described as a form of id card or passport, a kind of aesthetic bar code for the face.”</p>\n<h2 id=\"personal-identification-documents\" style=\"position:relative;\"><a href=\"#personal-identification-documents\" aria-label=\"personal identification documents permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Personal identification documents</h2>\n<p>The earliest documented account of something resembling a passport can be found in the Hebrew Bible, in the book of Nehemiah, which refers to “<a href=\"https://www.theguardian.com/travel/2006/nov/17/travelnews\">safe passage</a>” to Judah. </p>\n<p>In 1540, the granting of “<a href=\"https://www.theguardian.com/travel/2006/nov/17/travelnews\">travelling papers</a>” became the business of Britain’s Privy Council. The actual term <em>passport</em> was also recognized at that point. Some say that the term reflects the act of passing through maritime ports, although that is up for debate.</p>\n<p><strong>Charles de Saint-Mémin’s United States passport, June 30, 1810</strong></p>\n<p><img src=\"/a35460ca5646f3468ec9d5dcf374f9dd/image-2.webp\" alt=\"human identity \"> Charles de Saint-Mémin’s United States passport, June 30, 1810 </p>\n<p>Source - <a href=\"https://www.metmuseum.org/art/collection/search/656327\">metmuseum</a></p>\n<p>A passport is also a form of personal identification that indicates national identity.</p>\n<p>Around 100 countries now have compulsory <a href=\"https://en.wikipedia.org/wiki/List_of_national_identity_card_policies_by_country\">national identity cards</a>. Another 28 countries have optional national identity cards, but their citizens often use other forms of ID such as passports or driving licenses. </p>\n<p><a href=\"https://en.wikipedia.org/wiki/West_Germany\"><strong>West German</strong></a> <strong>identity card issued between 1 January 1951 and 31 March 1987</strong></p>\n<p><img src=\"/c797e76a085fb3e7e3420d86a5147b48/image-3.webp\" alt=\"human identity\"> <a href=\"https://en.wikipedia.org/wiki/West_Germany\">West German</a> identity card issued between 1 January 1951 and 31 March 1987 </p>\n<p>Source - <a href=\"https://commons.wikimedia.org/wiki/File:1979_identity_card_of_West_Germany_original_size.webp\">West German Identity Card</a></p>\n<p>A Social Security number (SSN) is another unique identifier. The US  government assigned this for taxation and benefits. Issued by the US Social Security Administration in November 1935, SSN numbers were part of the New Deal Social Security program. Today, US citizens still use SSNs to access benefits, pay taxes, receive wages, and show one’s identity.</p>\n<p><strong>A Social Security card issued by the</strong> <a href=\"https://en.wikipedia.org/wiki/Railroad_Retirement_Board\"><strong>Railroad Retirement Board</strong></a> <strong>in 1943 to a now-deceased person.</strong></p>\n<p><img src=\"/68a2496348bc67706bf652806fe5cb4a/image-4.webp\" alt=\"human identity\"> A Social Security card issued by the <a href=\"https://en.wikipedia.org/wiki/Railroad_Retirement_Board\">Railroad Retirement Board</a> in 1943 to a now deceased person. </p>\n<p>Source - <a href=\"https://commons.wikimedia.org/wiki/File:PD_social_security_card.webp\">Social Security Card</a></p>\n<p>A Social Insurance Number (SIN) is a 9-digit form of identification that every individual residing and/or working in Canada must have in order to access government benefits, file income taxes, and legally receive payment. <a href=\"https://blog.wagepoint.com/all-content/the-complete-history-of-the-social-insurance-number\">SIN cards were first issued in 1964</a> but have not been printed as cards since 2014 due to the risk of theft. Today, Canadian citizens do not carry SIN cards on their person.</p>\n<h2 id=\"name-changes\" style=\"position:relative;\"><a href=\"#name-changes\" aria-label=\"name changes permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Name changes</h2>\n<p>Many countries have a process for officially changing one’s legal name. </p>\n<p>In Western society, some marriage partners decide to change their surnames. However, taking a new surname is not as commonplace as it once was. In fact, sometimes men and women change both of their surnames to a hyphenated or a combined version of the two. </p>\n<p>A name change can pose issues for your personal identity, including <a href=\"https://www.healthyway.com/content/heres-why-changing-your-name-when-you-get-married-can-actually-be-a-terrible-idea/\">losing your professional identity or brand.</a> </p>\n<p>As a rule, US citizens who wish to change their surnames after marriage must endure a lengthy process. Here's what they must do:</p>\n<ul>\n<li>After you get a copy of your marriage license, you must visit the Social Security Administration online or in person.</li>\n<li>From there, you fill out the necessary paperwork and show proof of your US citizenship (for example, a birth certificate, passport, or a photo ID like a driver’s license). </li>\n<li>Once you receive your new social security card (new name, same number), you can change your driver’s license. This change also requires two forms of identification, proof of address, and a certified copy of your marriage license.</li>\n<li>With your new official identification in hand, you can change your name on your banking information, utility bills, and credit cards.</li>\n</ul>\n<h2 id=\"personal-vs-legal-identification\" style=\"position:relative;\"><a href=\"#personal-vs-legal-identification\" aria-label=\"personal vs legal identification permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Personal vs. legal identification</h2>\n<p>As governments began to regulate identity verification, conflicts arose between personal and legal identification. The ways that people identify themselves sometimes clash with the ways that governments want to identify them.</p>\n<p>For example, Canada has a controversial history when it comes to identifying Inuit communities. In the 1930s, a personal identification program in the Canadian Arctic <a href=\"https://www.thecanadianencyclopedia.ca/en/article/project-surname\">required Inuit fingerprints</a> to identify and document Inuit communities. Shortly after, missionaries and federal agents successfully halted the program, due to the association of fingerprinting with criminal activity. </p>\n<p>It took roughly 10 years for the Canadian government to approve and implement a substitute identification system for Canada’s Northern Territories. This was known as the <a href=\"https://www.vice.com/en_ca/article/xd7ka4/the-little-known-history-of-how-the-canadian-government-made-inuit-wear-eskimo-tags\">personal identification disk system</a>. The government required Inuit people to wear these small, numbered disks at all times. As a result, many complained that these looked and felt like dog tags. Due to public outcry, the government ceased the program in the 1970s (1980s in Quebec). And in its place, they created a new program called Project Surname.</p>\n<p><strong>Public domain photo: Inupiat family, 1929</strong></p>\n<p><img src=\"/2a39730a34121f10a8204ce8a2ca6735/image-5.webp\" alt=\"human identity\"> Public domain photo: Inupiat family, 1929 </p>\n<p>Source - <a href=\"https://commons.wikimedia.org/wiki/File:Inupiat_Family_from_Noatak,_Alaska,_1929,_Edward_S._Curtis_(restored).webp\">Inupiat Family</a></p>\n<h2 id=\"project-surname\" style=\"position:relative;\"><a href=\"#project-surname\" aria-label=\"project surname permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Project Surname</h2>\n<p>In the 1940s the Canadian government created Project Surname as a way to identify the Inuit population. Instead of a number, Project Surname assigned Anglicized last names to Inuit peoples in northern Canada. </p>\n<p>While some Inuit and non-Inuit peoples viewed Project Surname as an effective new identification system, others saw it as a demeaning act of paternalism. </p>\n<p>In essence, it stripped people of a meaningful and spiritual tradition. </p>\n<p>Before the arrival of Europeans, the <a href=\"https://www.thecanadianencyclopedia.ca/en/article/inuit/\">Inuit</a> used a complex naming tradition that reflected their culture, environment, animals, family, and spirits. Today, Inuit surnames may contain both Euro-Canadian and traditional Inuit names. However, <a href=\"https://acresofsnow.ca/canadas-mandatory-eskimo-identification-tags/\">the sting of Project Surname remains</a>, demonstrating what happens when legal identification gets <em>too</em> personal.</p>\n<p>As cofounder and CTO of LoginRadius, a customer identity and access management solution, I enjoy researching and writing about cultural identifiers. Likewise, I hope that you enjoyed this History of Human Identity series and will return to read our next series.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=history-human-identity-part-3\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"September 04, 2019","updated_date":null,"description":"We showed examples of identity authentication in Part II of the History of Human Identity, such as names and distinctive markings. The final instalment of our 3-part series is this blog. In it, we will concentrate on cultural markers, their usage and violence.","title":"A History of Human Identity in Pictures Part 3","tags":["public-sector"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/27a047d3678bcbcd5a2ddaf7c6594e38/c0524/history-human-identity-part-3.webp","srcSet":"/static/27a047d3678bcbcd5a2ddaf7c6594e38/61e93/history-human-identity-part-3.webp 200w,\n/static/27a047d3678bcbcd5a2ddaf7c6594e38/1f5c5/history-human-identity-part-3.webp 400w,\n/static/27a047d3678bcbcd5a2ddaf7c6594e38/c0524/history-human-identity-part-3.webp 769w","sizes":"(max-width: 769px) 100vw, 769px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"excerpt":"In Part I of The History of Identity, we covered how identity began in ancient times. For Part II, we focus on current times, where personal…","fields":{"slug":"/identity/history-identity-part-2/"},"html":"<p>In Part I of The History of Identity, we covered how identity began in ancient times. For Part II, we focus on current times, where personal names are now considered fundamental to identity and dignity. </p>\n<h2 id=\"the-emergence-of-family-names\" style=\"position:relative;\"><a href=\"#the-emergence-of-family-names\" aria-label=\"the emergence of family names permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The emergence of family names</h2>\n<p>The United Nations Convention on the Rights of the Child declares that every child “shall be registered immediately after birth and shall have the right from birth to a name.” Family names or surnames identify a person’s origins. Family names appear to have developed first in China, originally among the nobility, and then spread to commoners.</p>\n<p>Clan names that seem to indicate matrilineal heritage, called <em>xìng</em> (姓), emerged in China around 4000–3000 BC. Many of these names include the character for woman (女), and the character for <em>xìng</em> reads as “born of a woman.” People with the same <em>xìng</em> were not allowed to marry each other.</p>\n<p><a href=\"https://commons.wikimedia.org/wiki/File:Lacquer_painting_from_Ch%27u_State.webp\"><img src=\"/63c709cafb2a20c7ea84755f7b9c6cf7/image-1.webp\" alt=\"Human Identity\"></a></p>\n<p><strong>Lacquer painting from State of Ch'u (704–223 BC)</strong></p>\n<p>Another type of clan name appeared during the Zhou dynasty from 1046–256 BC. As society became more complex and patrilineal, the <em>shì</em> name (氏) allowed people to differentiate themselves from others with the same <em>xìng</em>.</p>\n<p>A person’s <em>shì</em> name might be derived from their state or fiefdom, their position within their family, or their profession.</p>\n<p>Chinese surnames were standardized in 221 BC under the first emperor of the Qin dynasty. The <em>xìng</em> and <em>shì</em> names, which people had been using interchangeably, were merged into the single concept of a family name.</p>\n<p><a href=\"https://www.metmuseum.org/art/collection/search/248783\"><img src=\"/b9a5e9d1e68049de984bd849b828464e/image-2.webp\" alt=\"Human Identity\"></a></p>\n<p><strong>Marble portrait of the co-emperor Lucius Verus (130 - 169 AD).</strong> <strong>His name at birth was Lucius Ceionius Commodus, changed to Lucius Aelius Aurelius Commodus when he was adopted.</strong></p>\n<p>Family names first evolved in the Western world during the time of the Roman Empire, 750 BC to 500 AD. Romans developed <a href=\"https://heraldry.sca.org/names/roman.html\">a system of <em>tria</em> <em>nomina</em></a> (“three names”):</p>\n<ul>\n<li><em>Praenomen</em> (given name)—a personal name chosen by a child’s parents. Praenomen had standard abbreviations. i.e. Tiberius, abbreviated as Ti.</li>\n<li><em>Nomen</em> (clan name)—a public name that indicated social status, i.e. Valerius.</li>\n<li><em>Cognomen</em> (nickname)—a name describing physical or moral characteristic, i.e. Rufus, meaning “red-haired.”</li>\n</ul>\n<p>The Roman three-name system started with the aristocracy and spread to the general citizenry as the population grew and people needed more names to distinguish among themselves.</p>\n<p><a href=\"https://commons.wikimedia.org/wiki/File:Jon_Ogmundsson_Icelandic_bishop.webp\"><img src=\"/ea78db67537cc7169d7830c6894b2afe/image-3.webp\" alt=\"Human Identity\"></a></p>\n<p><strong>Bishop</strong> <a href=\"https://commons.wikimedia.org/w/index.php?title=J%C3%B3n_%C3%96gmundsson&#x26;action=edit&#x26;redlink=1\"><strong>Jón Ögmundsson</strong></a> <strong>of Hólar, from the 19th century Icelandic manuscript JS 629 4to, now in the care of the Icelandic National Library</strong></p>\n<p>Surnames developed in the rest of Europe starting in the 11th century. Norman barons brought them to England after the invasion of 1066. Most of these surnames grew organically from one of the following characteristics.</p>\n<p><strong>Lineage</strong>: <em>Patronymic</em> and <em>matronymic</em> surnames originate from a father or mother’s name.</p>\n<p>Iceland developed a system where children receive a new surname based on their father’s name (or occasionally mother’s name). For example, Iceland's current prime minister is Jóhanna Sigurðardóttir. Her father’s name is Sigurður, so her surname becomes Sigurðardóttir, meaning “daughter of Sigurður.”</p>\n<p><a href=\"https://www.english-heritage.org.uk/learn/story-of-england/early-medieval/architecture/\"><img src=\"/85b92d739394b1f811948efc986a962e/image-4.webp\" alt=\"Human Identity\"></a></p>\n<p><strong>Part of Offa’s Dyke, an 8th-century earthwork boundary in Britain.</strong></p>\n<p><strong>Location</strong>: Many Anglophone names come from the names of towns or regions (Hamilton, Murray), local topology (Landon means “long hill”), or features (Dyke, Wood, Fields).</p>\n<p><a href=\"https://hausbuecher.nuernberg.de/75-Amb-2-279-81-v/data\"><img src=\"/dd2cb534a0c60e5956d4babb28e75e51/image-5.webp\" alt=\"Human Identity\"></a></p>\n<p><strong>A German tailor pictured in die Nürnberger Hausbücher, 1612.</strong></p>\n<p><strong>Profession</strong>: <a href=\"https://en.wikipedia.org/wiki/Surname#Occupational_surname\">Occupational names</a> are based on the work performed by that family. The German name Eisenhauer means “iron hewer,” Schneider means “tailor,” and Schmidt refers to a blacksmith. Occupational names were also taken by servants of masters in certain professions. There is speculation, for example, that the English surname Vickers would have been adopted by the servant of a vicar.</p>\n<h2 id=\"additional-names\" style=\"position:relative;\"><a href=\"#additional-names\" aria-label=\"additional names permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Additional names</h2>\n<p><a href=\"https://www.rd.com/culture/why-do-we-have-middle-names/\">Middle names</a> have their origins in social class and religion. As mentioned earlier, more names indicated more respect during Roman times. Men had three names; women had two; their slaves had one. </p>\n<p>Aristocrats considered long names a show of their high place in society. Spanish and Arabic families would give their children paternal or maternal names from previous generations. This practice allowed them to keep track of the child’s family tree. </p>\n<p><a href=\"https://www.metmuseum.org/art/collection/search/451286?&#x26;searchField=All&#x26;sortBy=Relevance&#x26;when=A.D.+1600-1800&#x26;ft=royal+name&#x26;offset=0&#x26;rpp=20&#x26;pos=1\"><img src=\"/1d753d9933dc937e91f1857dda850c1e/image-6.webp\" alt=\"Human Identity\"></a></p>\n<p><strong>\"Rosette Bearing the Names and Titles of Shah Jahan,\" ca. 1645. The central inscription reads, “His Majesty Shihab al-Din Muhammad Shah Jahan, the king, the vanquisher, may God perpetuate his dominion and sovereignty.”</strong></p>\n<p>This tradition of middle names spread across Western cultures in the 1700s. But this time, three names were not exclusive to men. When faced with choosing between a family name and a saint name for their children, Europeans decided to go with both: given name first, baptismal (saint) name second, and surname third. The practice then spread to America through immigration.</p>\n<p>Today, many cultures use a beloved relative’s name for a child’s middle name. And some families may even have two middle names to reflect both maternal and paternal relatives. Practically speaking, middle names can help differentiate people who share common first and last names. For this reason, <a href=\"https://www.businessinsider.com/why-you-cant-board-flights-if-your-middle-name-isnt-on-your-ticket-2018-4\">middle names may be required</a> on important documents, such as flight tickets.</p>\n<h2 id=\"the-order-of-names\" style=\"position:relative;\"><a href=\"#the-order-of-names\" aria-label=\"the order of names permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The order of names</h2>\n<p>The <a href=\"https://en.wikipedia.org/wiki/Personal_name#Name_order\">placement of surnames</a>, or family names, varies by country. </p>\n<p>Eastern name order is typical in East Asia, South Asia, Southeast Asia, and parts of India.</p>\n<p>The convention in China is to have the family name appear first, followed by the given name. For example, Gāo Xíngjiàn (高行健), who won the Nobel Prize for Literature in 2000, has the family name Gāo and the given name Xíngjiàn.</p>\n<p>Western name order is common throughout Europe, the Americas, Australia, and New Zealand. The given name comes first, and then the family name, although for alphabetized lists, the names are reversed and separated by a comma. </p>\n<p>When Eastern names are used in the West and vice versa, there can be some confusion about whether they are following their traditional name order or not. The cellist known as Yo-Yo Ma uses the Western ordering, even though his Chinese name is Ma Youyou (马友友). </p>\n<h2 id=\"identity-verification\" style=\"position:relative;\"><a href=\"#identity-verification\" aria-label=\"identity verification permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Identity verification</h2>\n<p>The need to confirm someone’s identity also goes back to ancient times. As society grew larger and political and financial systems developed, humans created ways to verify that a person’s identity was valid.</p>\n<p>Some civilizations developed stamps and seals that represented a person’s identity. </p>\n<p><a href=\"https://www.metmuseum.org/art/collection/search/321391?&#x26;searchField=All&#x26;sortBy=Relevance&#x26;ft=cylinder+seal&#x26;offset=0&#x26;rpp=20&#x26;pos=14\"><img src=\"/541e015d2aa0f00219ab27bc579f2746/image-7.webp\" alt=\"Human Identity\"></a></p>\n<p><strong>Modern impression of a Cypriot cylinder seal: female figure, ibex, lion, ca. 14th–13th century B.C.</strong></p>\n<p>Cylinder seals go back to the fourth millennium BC in Mesopotamia. These <a href=\"https://www.historyonthenet.com/mesopotamian-cylinder-seals\">carved cylinders</a> were rolled across wet clay to create an impression that signified ownership or identity. The seals were sometimes crafted from semi-precious stone such as carnelian or lapis lazuli and worn as jewellery. They were used by people from all strata of society to sign business deals, treaties, and marriage contracts.</p>\n<p>The earliest seals in China originated during the Shang Dynasty, 1600 to 1046 BC. Chinese seals known as <a href=\"https://www.thoughtco.com/chinese-chops-seals-2278409\">chops</a> were carved from jade, stone, or ivory and dipped in red paste to stamp a unique symbol on documents, letters, and artwork.</p>\n<p><a href=\"https://nl.wikipedia.org/wiki/Bestand:Chinese_seal_(Han_Dynasty).webp#/media/Bestand:Chinese_seal_(Han_Dynasty).webp\"><img src=\"/6d7ce49f9f8c9c52baf9b7b172dc95a6/Chinese_seal_Han_Dynasty.webp\" alt=\"Human Identity\"></a></p>\n<p><strong>Chinese seal with Han and Manchu characters</strong> </p>\n<p>Other types of signature seals can also be found across East Asia. In Japan, signature ink stamps are called <a href=\"https://www.nippon.com/en/features/jg00077/hanko-and-inkan-japanese-stamps-and-personal-seals.html\"><em>hanko</em></a>. These are commonly accepted as a signature when validating documents and official forms. Hanko stamps can be made from wood, plastic, and other materials and again, the ink, is generally red.</p>\n<p>In the 5th century BC, the Romans started to write sentences and names at the bottom of documents, in addition to creating wax seals with <a href=\"https://www.thehistorypress.co.uk/articles/a-brief-history-of-signet-rings/\">signet rings</a>. The earliest surviving signature from a famous historical figure is that of Rodrigo Díaz de Vivar, a medieval Spanish nobleman known as El Cid, dated to 1098. </p>\n<p><a href=\"https://commons.wikimedia.org/wiki/File:Signature_of_El_Cid.webp\"><img src=\"223px-Signature_of_El_Cid.webp_.webp\"></a></p>\n<p><strong>Autograph signature of Rodrigo Díaz, [also] called El Cid, Archive of the Cathedral of Salamanca.</strong> <strong>It reads in Latin: ego ruderico, \"I, Rodrigo\".</strong></p>\n<p>To see how modern society uses and abuses identity, be sure to read Part III of our History of Human Identity series next week.</p>\n<p>Learn how to create a unified digital identity for all of your customers. <a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=history-identity-part-2\">Book a demo</a> today with LoginRadius.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=history-identity-part-2\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"August 20, 2019","updated_date":null,"description":"We covered how identity started in ancient times in Part I of The History of Identity. We concentrate on present times for Part II, where personal names are now considered central to identification and integrity.","title":"A History of Human Identity in Pictures  Part 2","tags":["public-sector"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/4bab77ebce2317c97b81926bfdde93a6/c0524/history-identity-part-2.webp","srcSet":"/static/4bab77ebce2317c97b81926bfdde93a6/61e93/history-identity-part-2.webp 200w,\n/static/4bab77ebce2317c97b81926bfdde93a6/1f5c5/history-identity-part-2.webp 400w,\n/static/4bab77ebce2317c97b81926bfdde93a6/c0524/history-identity-part-2.webp 769w","sizes":"(max-width: 769px) 100vw, 769px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"excerpt":"human identity Portrait of Thakur Utham Ram, ca. 1760  Source - metmuseum The concept of human identity stretches back thousands of years…","fields":{"slug":"/identity/history-identity-part-1/"},"html":"<p><img src=\"/499c0cfb01fff9f826629127fc04da46/image-1.webp\" alt=\"human identity\"> Portrait of Thakur Utham Ram, ca. 1760 </p>\n<p>Source - <a href=\"https://www.metmuseum.org/art/collection/search/37876\">metmuseum</a></p>\n<p>The concept of human identity stretches back thousands of years into unrecorded history. </p>\n<p>Long before our identities were digitized and stored in databases, we used language, objects, and documents to represent and confirm our individuality.</p>\n<p>This pictorial history in 3 parts explores all the creative ways that we’ve developed to identify ourselves and each other over the millennia. </p>\n<h2 id=\"prehistoric-identity\" style=\"position:relative;\"><a href=\"#prehistoric-identity\" aria-label=\"prehistoric identity permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Prehistoric identity</h2>\n<p>It’s impossible to know when humans first recognized that they had individual identities.</p>\n<p>We assume that early hominins knew each other by sight, sound, smell, and touch, as animals do. </p>\n<p><img src=\"/7479ec6c6f774efbcd8508d42ebfe9c9/image-2.webp\" alt=\"human identity\"> High school students in Binghamton NY, USA, holding replicas of hominin skulls. Photo by Carolyn WIlczynski </p>\n<p><a href=\"https://commons.wikimedia.org/wiki/File:Students_explore_hominid_evolution.webp\">Students explore hominid evolution</a></p>\n<p>Presumably they could tell one Neanderthal from another by their faces, the noises they made, and the way they moved. </p>\n<p>There is even <a href=\"https://www.nature.com/articles/ncomms5800\">research</a> showing that human faces evolved in ways that made it easier for humans to recognize each other. The fact that facial recognition was supported by natural selection implies that it’s very important for social interaction and the success of the species. </p>\n<p><img src=\"/038c61e7148e2d901d3706d730a71c3f/image-3.webp\" alt=\"human identity \"> Hands, ca. 7300 BC, at the Cuevas de las Manos upon Río Pinturas, Argentina. Photo by Mariano Cecowski </p>\n<p><a href=\"https://commons.wikimedia.org/wiki/File:SantaCruz-CuevaManos-P2210651b.webp\">SantaCruz-CuevaManos-P2210651b</a></p>\n<p>For an example of written identity in prehistory, we can look at cave markings showing stencilled handprints. Archeologists disagree on the meaning behind cave handprints—they could be warning messages or part of shamanic practice—but to our modern eyes they look like signatures or graffiti tags, a way of saying, “I was here.” </p>\n<p><img src=\"/d4ab7373de245ee439788583b118900d/image-4.webp\" alt=\"human identity\"> Forensic reconstruction of Oase 2 skull dating to 35,000 BC </p>\n<p><a href=\"https://commons.wikimedia.org/wiki/File:Neanderthaler,_Oase,_Rum%C3%A4nien_(Daniela_Hitzemann).webp\">Homo sapiens sapiens, Oase, Rumänien (Daniela Hitzemann)</a></p>\n<p>Spoken language emerged 100,000 years ago. In fact, the structure of the brain and the size of the spinal cord of Cro-Magnon people suggests that they would have been capable of producing the <a href=\"https://australianmuseum.net.au/learn/science/human-evolution/how-do-we-know-if-they-could-speak/\">same sounds that we use in speech today</a>.</p>\n<p>But since we’ve only been writing for the last 6,000 years, we’ll never know if Cro-Magnons  developed names for one another, or if so, how these were chosen. </p>\n<h2 id=\"the-first-recorded-names\" style=\"position:relative;\"><a href=\"#the-first-recorded-names\" aria-label=\"the first recorded names permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The first recorded names</h2>\n<p>The earliest known names go back to the dawn of ancient history, around 3000 BC. These were the names of royalty passed down through oral history and written down much later: <a href=\"https://en.wikipedia.org/wiki/Alulim\">Alulim, first king of Sumer</a>, and <a href=\"https://en.wikipedia.org/wiki/Narmer\">Narmer, an ancient Egyptian pharaoh</a>.</p>\n<p>The oldest artifacts with written names have more everyday origins. </p>\n<p>There are several candidates for the distinction of first recorded name. </p>\n<p><img src=\"/825deb1a4626c7afea9d1c7841665640/image-5.webp\" alt=\"human identity\"> A photo of the Kushim Tablet. © <a href=\"https://www.schoyencollection.com/24-smaller-collections/wine-beer/ms-1717-beer-inanna-uruk\">The Schøyen Collection, Oslo and London</a> </p>\n<p><a href=\"https://www.ancient-origins.net/artifacts-ancient-writings/leaving-mark-history-oldest-known-named-person-007882\">Leaving A Mark in History: The Oldest Known Named Person</a></p>\n<p>One is a Mesopotamian clay tablet, ca. 3100 BC, found in Iran that appears to document a business transaction. The receipt for barley delivery to the brewery at Inanna Temple is presumably signed with the name of Kushim, an accountant or record keeper.</p>\n<p>[caption id=\"attachment_5348\" align=\"aligncenter\" width=\"1684\"]<img src=\"https://www.loginradius.com/blog/wp-content/uploads/sites/4/2019/08/pic5.webp\" alt=\"human identity\"> Jamdat Nasr administrative tablet, ca. 3100-2900 BC. Image copyright © The Metropolitan Museum of Art <a href=\"https://www.metmuseum.org/toah/works-of-art/1988.433.1/\">metmuseum</a></p>\n<p>The second is another Mesopotamian tablet from the same era that bears the name of a slaveholder, Gal-Sal, and two slaves, En-pap X and Sukkalgir.</p>\n<h2 id=\"the-origins-of-personal-names\" style=\"position:relative;\"><a href=\"#the-origins-of-personal-names\" aria-label=\"the origins of personal names permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The origins of personal names</h2>\n<p><img src=\"/eca137243e6c8edab906e998bf53de49/image-6.webp\" alt=\"human identity\"> A Machiguenga woman dressed in traditional garb <a href=\"https://commons.wikimedia.org/wiki/File:Machiguenga_woman.webp\">Machiguenga woman</a></p>\n<p>Almost every known society refers to individuals by a fixed personal name, but there are some exceptions. One is the Machiguenga of the Amazon, a small tribe that refers to others by their kin relationship, such as “sister.”</p>\n<p>Ancient cultures generally used single names, what we might now consider a first name or given name. Single names are also called <em>mononyms</em>. </p>\n<p><img src=\"/e04146471a786da84dca8e6f6f68133f/image-7.webp\" alt=\"human identity\"> Dead Sea Scroll, part of Isaiah Scroll (Isa 57:17 - 59:9), ca. 100 BC <a href=\"https://commons.wikimedia.org/wiki/File:1QIsa_b.webp\">Dead Sea Scroll</a></p>\n<p>Most Biblical names are mononyms, for example. This fragment of the Hebrew Bible contains the name יַעֲקֹב (Jacob). </p>\n<p>Both the Hebrew and Christian scriptures give great significance to names within the narrative. The meanings of names are often described in the text: The man called his wife Eve [which probably means “living”] because she would be the mother of all the living.” People sometimes take or receive new names to indicate a change in their identity, such as when God renames Abram and Sarai to Abraham and Sarah as part of a promise to make them a great nation.</p>\n<p><img src=\"/f7dd0c103beb3fc46feb44d0afd569a9/image-8.webp\" alt=\"human identity\"> Zeno of Citium. Bust in the Farnese collection, Naples. Photo by Paolo Monti, 1969 <a href=\"https://commons.wikimedia.org/wiki/File:Paolo_Monti_-_Servizio_fotografico_(Napoli,_1969)_-_BEIC_6353768.webp\">Paolo Monti</a></p>\n<p>The ancient Greeks used mononyms as well, although historians added qualifiers called <em>epithets</em> when they needed to distinguish between two people with the same name. Epithets might be descriptive of the person or refer to their home or ancestry, but they are not considered part of their official name. For example, we have Zeno the Stoic (also known as Zeno of Citium) and Zeno of Elea.</p>\n<p>For a history of identity in the modern world, read Part II of this series next week. </p>\n<p><img src=\"/097b03db8ae840e524586576d4956c6d/image-9.webp\" alt=\"human identity\"> A newborn’s hospital name tag </p>\n<p><a href=\"https://pixabay.com/photos/baby-medicine-child-foot-care-3169975/\">Pixabay</a></p>\n<p>Learn how to create a unified digital identity for all of your customers. <a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=history-identity-part-1\">Book a demo</a> today with LoginRadius.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=history-identity-part-1\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"August 07, 2019","updated_date":null,"description":"The definition of human identity extends back to unrecorded history for thousands of years. We used language, artefacts, and records long before our identities were digitised and stored in databases to reflect and affirm our individuality.","title":"A History of Human Identity in Pictures - Part 1","tags":["public-sector"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/36ae89aa2233f3d7f6e12fed38a77825/c0524/history-identity-part-1.webp","srcSet":"/static/36ae89aa2233f3d7f6e12fed38a77825/61e93/history-identity-part-1.webp 200w,\n/static/36ae89aa2233f3d7f6e12fed38a77825/1f5c5/history-identity-part-1.webp 400w,\n/static/36ae89aa2233f3d7f6e12fed38a77825/c0524/history-identity-part-1.webp 769w","sizes":"(max-width: 769px) 100vw, 769px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},"pageContext":{"limit":6,"skip":840,"currentPage":141,"type":"///","numPages":164,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}