Blake Hall
👤 PersonAppearances Over Time
Podcast Appearances
Time is one of the most important aspects of identity and not just for technology, just for relationships in general. Think about the first time that you met your best friend or your wife or whatever, what you knew about them then and what you know about them now. So time and the frequency of how often you interact with someone and the quality of those interactions really informs relationships.
Time is one of the most important aspects of identity and not just for technology, just for relationships in general. Think about the first time that you met your best friend or your wife or whatever, what you knew about them then and what you know about them now. So time and the frequency of how often you interact with someone and the quality of those interactions really informs relationships.
your perception of their identity as it relates to you, and you have a lot more touch points. For time, you might know, I'll trust this person with anything, and you might know, if I ask this person to do something, I'm gonna prepare myself to be let down. And so what I learned in Iraq was a lot about how telecom networks work,
your perception of their identity as it relates to you, and you have a lot more touch points. For time, you might know, I'll trust this person with anything, and you might know, if I ask this person to do something, I'm gonna prepare myself to be let down. And so what I learned in Iraq was a lot about how telecom networks work,
And the thing about bad guys versus normal people is that bad guys do things that you can see in math related to time that make them stand out. So you're probably not doing SIM swaps and changing your phone to different devices and porting your phone number that often. You probably change your phone every two to three years. You've likely had the same phone number for over 10 years now.
And the thing about bad guys versus normal people is that bad guys do things that you can see in math related to time that make them stand out. So you're probably not doing SIM swaps and changing your phone to different devices and porting your phone number that often. You probably change your phone every two to three years. You've likely had the same phone number for over 10 years now.
And so that tenure when it comes to identity really matters. If we can look at records and see, oh, Patrick's phone number has been tied to Patrick since he was at Notre Dame. And then you prove possession of that phone number and we can see that the phone number hasn't been ported because we can check with, that's really good.
And so that tenure when it comes to identity really matters. If we can look at records and see, oh, Patrick's phone number has been tied to Patrick since he was at Notre Dame. And then you prove possession of that phone number and we can see that the phone number hasn't been ported because we can check with, that's really good.
That'd be, if some bad guy was like setting us up and like from college, it was like the bad guy, like, you know, IRAs. I started seeding this phone number in college and now I'm like 55 and I'm going to hash it in. The long con. Yeah. These guys aren't playing the long game. And so what's really interesting is most folks have a phone number with tenure. Now it's not for everybody.
That'd be, if some bad guy was like setting us up and like from college, it was like the bad guy, like, you know, IRAs. I started seeding this phone number in college and now I'm like 55 and I'm going to hash it in. The long con. Yeah. These guys aren't playing the long game. And so what's really interesting is most folks have a phone number with tenure. Now it's not for everybody.
You'll get to 85 to 90% will have a long relationship. And then you'll have expats coming back to the country. Low income communities tend to switch their phone numbers more often because they're using prepaid devices instead of subscription and maybe avoiding collections calls. So it's not perfect.
You'll get to 85 to 90% will have a long relationship. And then you'll have expats coming back to the country. Low income communities tend to switch their phone numbers more often because they're using prepaid devices instead of subscription and maybe avoiding collections calls. So it's not perfect.
But just on that one signal alone, you can go, wow, if you did have a phone number for 20 years and showed possession, we're pretty confident right away that's Patrick. So the basic premise is there's a big theme in security right now about moving away from passwords. And And this is also why you want a shared service to do it.
But just on that one signal alone, you can go, wow, if you did have a phone number for 20 years and showed possession, we're pretty confident right away that's Patrick. So the basic premise is there's a big theme in security right now about moving away from passwords. And And this is also why you want a shared service to do it.
How long is it going to take each company to figure out how to do pass keys, which is just a fancy name for touch ID or face ID on your device that why can't we use things that are really convenient on our phones and our computers to be able to securely prove that we're the owner of the login credential, it's going to take time.
How long is it going to take each company to figure out how to do pass keys, which is just a fancy name for touch ID or face ID on your device that why can't we use things that are really convenient on our phones and our computers to be able to securely prove that we're the owner of the login credential, it's going to take time.
Whereas if it's more of a SaaS approach where it's already just baked in as capability, if you use a shared service for login, that one capability as we deliver it through our R&D is instantly available to thousands of different organizations. That's a much more efficient way where they just have to say, yeah, please turn that on. Or we turn it on and cool, thanks. So that's log insecurity.
Whereas if it's more of a SaaS approach where it's already just baked in as capability, if you use a shared service for login, that one capability as we deliver it through our R&D is instantly available to thousands of different organizations. That's a much more efficient way where they just have to say, yeah, please turn that on. Or we turn it on and cool, thanks. So that's log insecurity.
Identity can take many different forms because you've got your legal identity, which is where we focused on proving that you're you. But then you also have different personas. One out of five doctors in the country uses us to prescribe narcotics and other controlled substances. And that is not sufficient for you to be Patrick or me to be Blake.
Identity can take many different forms because you've got your legal identity, which is where we focused on proving that you're you. But then you also have different personas. One out of five doctors in the country uses us to prescribe narcotics and other controlled substances. And that is not sufficient for you to be Patrick or me to be Blake.