Are you ready to fight deepfakes?

July 9, 2025
Are you ready to fight deepfakes?

The advent of deepfakes is upsetting the balance between visual confidence and digital proof. What was yesterday science fiction has become an economic, operational, and legal reality.

And the most exposed companies are precisely those regulated, chiefs of sensitive data, and subject to strict identification obligations: banks, insurance companies, public services, and payment platforms.

A threat that takes many forms

What is a deepfake?

A deepfake is a video, audio, or image generated or altered by artificial intelligence, designed to imitate the appearance, voice, or behavior of a real person.

But in 2025, it's no longer just faces stuck on videos:

We are talking about complete synthetic profiles: forged digital identity cards, AI-generated proof of addresses, credible resumes, cloned voices, and personalized videos.

And this, at a level of enough realism to fool a human... or an automated system.

Key figures 2024-2025

  • +281% use of synthetic identity documents detected
  • +900% of cases in Europe, +110% in Germany, +3400% in Canada
  • The most targeted sectors: e-commerce, edtech, crypto platforms, neobanks

Why it's a serious problem for regulated businesses

Regulatory compliance risk

A well-designed deepfake can pass through KYC/AML processes (identity verification, anti-money laundering), directly undermining the legal foundations of regulated industries. This exposes organizations to:

  • Administrative sanctions from regulatory bodies (AMF, ACPR, CNIL, etc.) for failure to implement sufficient fraud prevention measures.
  • Loss of accreditation or licensing, particularly for financial institutions, insurers, or digital ID providers.
  • Civil and criminal liability if customers or partners are harmed due to insufficient authentication safeguards.
  • Financial losses caused by successful fraud, refund obligations, and investigation costs.

In high-stakes industries, failing to stop a deepfake is no longer a technical issue; it’s a compliance failure.

Security and access risk

Deepfakes are used not just for identity theft but to gain access to highly sensitive or restricted environments. 

This includes:

  • Opening accounts under fake or synthetic identities, allowing money laundering or fraud.
  • Accessing healthcare portals, impersonating doctors or patients to retrieve confidential data.
  • Bypassing corporate authentication flows, gaining admin-level access to internal tools, payroll, or customer data.
  • SIM swap attacks, using manipulated documents or identities to hijack phone numbers and intercept 2FA.

These attacks render traditional authentication ineffective:

  • OTP by SMS? Can be intercepted.
  • Dynamic selfie? Can be deepfaked.
  • Static biometric? Can be spoofed.

Major reputational risk

A single deepfake incident can cause disproportionate brand damage:

  • Falsified video of a CEO announcing false information (layoffs, merger, political statement) spreading on social media.
  • Fake online meetings with high-level managers giving fraudulent orders to employees or partners.
  • Deepfake phone calls are used to manipulate customer support or validate high-risk transactions.
  • Impersonation in media with manipulated interviews affecting public perception.

In a digital world saturated with manipulated content, trust becomes your most fragile asset.

What the European regulations say about deepfakes

ETSI TS 119 461

  • European standard applicable to trust service providers
  • Taxation of Reinforced proof of life, supervised video, traceability
  • Objective: to prevent automated biometric attacks

eIDAS 2 & EUDI Wallet

  • The European digital identity wallet requires means that are resistant to AI attacks (deepfakes, spoofing)
  • Identification = strong proof + interoperability
  • Strict conditions for service providers (technical guarantees + auditability)

FIDA (Financial Data Access)

  • The opening of financial data (banks, insurance, crypto) will only be possible if proof is provided of the real identity of the applicant
  • The entry into force is conditioned on that of eIDAS 2

National regulations

  • France: SREN law (2024) → 1 year in prison for the unauthorized distribution of deepfakes (+2 years if online)
  • Denmark: Bill to give copyright to images and voices
  • UK: Creation of sexual deepfakes = criminal offense, unlimited fines

The answer: A proof of identity in real time

At ShareID, our conviction is simple: you can't trust what you see. OR you can trust what we prove.

Our authentication technology is:

  • Tied to the official identity through the verification of a government-issued ID. The document is then linked to both active and passive liveness detection of the user.‍
  • Based on the Zero Knowledge Proof concept → We store 0 personal or biometric data 
  • Frictionless, with re-authentication in 3 seconds with a simple smile

The result? A system that is resistant to deepfakes, phishing, and identity fraud.

Conclusion 

In the face of deepfakes, inaction is no longer an option. Anything can be imitated, but only a strong digital proof allows you to authenticate with certainty.

Let's talk about it 👉 Contact us

Are you ready to fight deepfakes?

RéglementationExigence cléRéponse ShareIDRésultat pour vous
DSP2 – Directive (UE) 2015/2366 + RTS SCA (UE 2018/389) Source DSP2 : Directive (UE) 2015/2366Authentification forte du client (SCA) obligatoire (art. 97) avec lien dynamique (art. 5 RTS) et indépendance des facteurs (art. 9 RTS).- Full IDV : authentification du document d’identité + biométrie (détection du vivant) - MFA 3.0: Ré-authentification forte basée sur l’identité Full IDV + MFA 3.0Conformité immédiate SCA ; fluidité pour l’utilisateur, sécurité renforcée.
DSP3 / Payment Services Regulation (projet) Source RTS SCA : Règlement délégué (UE) 2018/389 Entrée en vigueur prévue en 2025/ 2026.Articles 85–89 : consolidation de la SCA, règles d’accessibilité, clarification des exemptions.- Full IDV : authentification du document d’identité + biométrie (détection du vivant) - MFA 3.0: Ré-authentification forte basée sur l’identité Solution déjà alignée sur les parcours biométriques & exemptions. MFA 3.0Anticipez les évolutions futures sans refonte lourde.
DORA – Règlement (UE) 2022/2554 Source DORA : Règlement (UE) 2022/2554Authentification forte pour protéger les systèmes et les données critiques (art. 9(4)(d)), encadrement strict des prestataires de Technologie de l’information et de la communication (art. 28–30).- MFA 3.0: Ré-authentification forte basée sur l’identité. Intégrable via SDK/API (iOS, Android, Web), traçabilité complète. MFA 3.0Sécurisation des systèmes d’informations critiques, conformité démontrable aux superviseurs.
eIDAS (UE 910/2014) + implémentation 2015/1502 Source eIDAS (2014) : Règlement (UE) 910/2014Niveaux simple / substantiel / élevé ; multi-facteurs encouragés pour les niveaux substantiel et élevé.Authentification des documents + biométrie (détection du vivant). Full IDVValeur probante proche d’un contrôle présentiel.
eIDAS 2 – Règlement (UE) 2024/1183 Source eIDAS 2 : Règlement (UE) 2024/1183Les EUDI Wallets devront fonctionner à un niveau d’assurance élevé, avec partage sélectif d’attributs.- MFA 3.0: Ré-authentification forte basée sur l’identité Intégrable via SDK/API (iOS, Android, Web), traçabilité complète. MFA 3.0Intégration fluide des futurs portefeuilles européens.
MiCA – Règlement (UE) 2023/1114 Source MiCA : Règlement (UE) 2023/1114Les prestataires de services sur crypto-actifs doivent appliquer les obligations KYC/AML (Directive 2015/849) ; art. 76 impose CDD (renforcement de la vigilance client) renforcé pour certaines plateformes.Authentification des documents + biométrie (détection du vivant) = anti-deepfake et anti-spoofing. Doc IDV ou Full IDVRéduction drastique des fraudes, conformité crypto-AML.
ETSI TS 119 461 (V2.1.1, 2025) Source ETSI TS 119 461 : Norme européenneVérification d’identité à distance : 5 étapes (initiation → collecte → validation → liaison → résultat). Liveness et anti-spoofing obligatoires pour les parcours à distance.- Enrôlement complet : authentification des documents + Biométrie (détection du vivant) - Algorithmes entraînés sur une base de données de vrais et de faux documents de la Gendarmerie Nationale. Full IDVEnrôlement KYC robuste, valeur probante reconnue.
FIDA – Financial Data Access (projet) Source FIDA (proposition) : Commission européenneConsentement explicite, traçable et révocable via des tableaux de bord.- MFA 3.0: Authentification forte basée sur l’identité au moment du consentement + réauthentification fluide avec un simple sourire. MFA 3.0Accès aux données conforme et centré utilisateur.
RGPD – Règlement (UE) 2016/679 Source RGPD : Règlement (UE) 2016/679Durée de maintien de données chez ShareID paramétrable. Aucun stockage biométrique : hachages homomorphiques brevetés , ISO 27001.Image de marque, risque réglementairejuridique réduit, confiance accrue des régulateurs et clients.



← Tous les articles