How Modak are creating one of the safest spots in town for teens

profile picture Yoti 2 min read
Modak visa cards, front and back

I am pleased to say that implementing age verification software through Yoti has been a great enabler for our growth. It has enhanced our customer experience by streamlining the process of verifying age, reducing manual errors, and minimising the risk of fraudulent activity. Our customers appreciate the added layer of security and convenience, and it has resulted in increased customer trust and loyalty.” 

Madhu Yalamarthi
Modak CEO

Modak is a US startup based in California that’s empowering teens by offering them a Visa-secured credit card and a checking account.

We helped them:

  • Ensure their own customers were being honest about their age.
  • Create age-appropriate experiences.

 

Solution: Facial Age Estimation
Industry: Fintech

Related stories

Synthetic identity fraud is committed by the theft of a real piece of persoanl information such as an SSN, and combined with false information to make up an entirely synthetic identity that often bypasses traditional checks

What is synthetic identity fraud? How it works and how to prevent it

What is synthetic identity fraud? Synthetic identities are fake identities, built by combining real and made-up information, earning them the nickname “Frankenstein IDs” due to their pieced-together nature. Synthetic identity fraud is different to traditional identity fraud as it doesn’t involve an obvious, immediate consumer victim. These fake profiles are designed to mimic real customers, often slipping past traditional fraud detection systems because they don’t raise typical red flags. As a result, the primary victims of synthetic identity fraud are businesses and lenders, who bear the financial losses.   How synthetic identities are created and used Fraudsters combine

8 min read
Woman presenting a 2d image trying to perform a presentation attack

Why early detection is critical in stopping deepfake attacks

Digital identity and age verification are becoming integral parts of customer onboarding and access management, allowing customers to get up and running on your platform fast. However as customer verification tools become more advanced, so too are fraudsters seeking to spoof systems by impersonating someone, appearing older than they really are or passing as a real person when they’re not. Deepfake attacks, which can mimic a person’s face, voice or mannerisms, pose a serious threat to any business using biometric customer verification. In this blog, we explore why detecting deepfakes early is essential for maintaining trust, security and regulatory

6 min read
An image showing a woman using her mobile phone. An illustration shows that the owner of the account matches the person who attempting to log into it.

Protecting your business and customers from account takeover

In today’s digital world, we have dozens of online accounts. These range from online banking to social media, dating apps to gaming platforms. Though convenient, this opens the door to the rapidly growing threat of account takeover fraud. Account takeover fraud is surging, with global losses expected to hit $17 billion by the end of 2025. The number of account takeover attacks is rising sharply too, increasing by 24% year-over-year in 2024. This blog walks you through what account takeover is, how it happens and what you can do to prevent it.   What is account takeover? At its

8 min read