| PixLab  & FACEIO | Knowledge Sharing & Public Forums

How do you defend against an attacker who tries to stream a video calling your APIs directly?

Viewed 277 times


I would really love to enable FaceIO for some of my customers, but before doing so I would like to ask you a couple of questions:
- How do you defend against an attacker who tries to stream a video calling your APIs directly?
- Do you currently perform some kind of device (browser) authentication (or fingerprinting)?

I'm asking this because I would love to get the PIN out of the equation completely.

Thank you so much.


Accepted Solution


Hi Michelle,

Thank you for reaching out, and welcome to the FACEIO Support center. To answer your questions:

  • Deep fake have indeed emerged as significant challenges in the realm of biometric authentication.
  • To address this, FACEIO has pioneered a Liveness detection & Face Anti-Spoofing system (documented here) capable of identifying deep fake videos through smartphone or laptop detection mechanisms.
  •  For a more in-depth understanding, including visual examples of attempted spoofs, you can explore our detailed blog announcement here.
    Our Face Anti-Spoofing feature, designed to combat Smartphone & Print Attacks from static images or
    video streams, require only a single frame to operate, and is available starting from the Business Plan
    Once activated, you can manage the Face Anti-Spoofing Security Option directly from the Application
    Security Tab within the FACEIO Console.
  • You are invited to refer to the press release document about our Deep Fake & Face Anti Spoofing system via this PDF document at: https://faceio.net/pixlab-faceio-deep-fakes-prevention.pdf for additional information.
  • Finally, you can disable the PIN Code Requirements option entirely from the Application Manager on the FACEIO Console. You can learn more about our security best practices via this link.