zKYC

4.4K posts

zKYC banner
zKYC

zKYC

@zkyctech

Where privacy and compliance finally align. zKYC brings zero-knowledge verification to the world’s largest ecosystems. Built on zkTLS Powered by @zkPass

Katılım Temmuz 2025
2 Takip Edilen454 Takipçiler
Sabitlenmiş Tweet
zKYC
zKYC@zkyctech·
Big news 👀 We’re excited to share that zKYC is the first product to join @zkPass’ Verifiable Application Acceleration Program (VAAP), the launchpad for the Proof Economy. TLS secured connections. zkTLS secures trust. And zKYC proves compliance without exposing identity.
zkPass@zkPass

The next wave of KYC will not ask who you are. It will prove it, privately. @zkyctech has joined the @zkPass Verifiable Application Acceleration Program (VAAP) to redefine what trust means in identity verification. Built on zkTLS, zKYC turns traditional KYC into a privacy-preserving proof - verifiable across ecosystems while keeping every piece of personal data untouched. No intermediaries. No exposure. Only cryptographic truth. The Verifiable Internet begins with verifiable identity.

English
22
8
59
5.1K
zKYC
zKYC@zkyctech·
We’re giving AI agents access to: ✅ wallets ✅ APIs ✅ workflows and treating them like users. They’re not. They act. They execute. They multiply risk. As agents become more capable, the challenge is no longer authentication. It is control.
zKYC tweet media
English
0
1
3
25
zKYC
zKYC@zkyctech·
We built systems that verify who you are. But not whether you should be allowed to act right now. That’s the gap. Execution needs authority.
zKYC tweet media
English
0
1
6
48
zKYC
zKYC@zkyctech·
@IntCyberDigest that’s not a breach…. that’s a full tour!
English
0
0
1
1.3K
International Cyber Digest
International Cyber Digest@IntCyberDigest·
🚨 MASSIVE CYBERATTACK: The EU Commission, ENISA, and the DG for Digital Services have been compromised by threat actor ShinyHunters. Leaked data includes: ▪️ Emails & attachments ▪️ Full SSO user directory ▪️ DKIM signing keys ▪️ AWS config snapshots ▪️ NextCloud/Athena data ▪️ Internal admin URLs It's a mess!
International Cyber Digest tweet mediaInternational Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
120
863
2.6K
190.7K
zKYC
zKYC@zkyctech·
@IntCyberDigest attackers stopped hacking systems they just send better emails now
English
0
0
0
140
International Cyber Digest
International Cyber Digest@IntCyberDigest·
🚨‼️ EXCLUSIVE: Zoom was breached by threat actor Mr. Raccoon. A South Korean employee installed an infostealer via a fake Zoom-themed website, delivered through a spoofed security email. Mr. Raccoon told us: "Their security was terrible, but Okta saved them."
International Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
28
145
961
87.6K
zKYC
zKYC@zkyctech·
This is why there is increasing focus on minimizing data collection and designing systems where sensitive information is not exposed even indirectly. Because in today’s environment: The biggest risk isn’t just bad actors. It’s over-collected data.
English
1
0
0
37
zKYC
zKYC@zkyctech·
“just tracking my run real quick” leaked an aircraft carrier 💀 Strava just did it again. From soldiers → to warships. Same mistake. We’re not addicted to apps We’re addicted to leaking ourselves.
zKYC tweet media
English
1
1
3
85
zKYC
zKYC@zkyctech·
Update your phone → upload your ID. We really built an internet where: to browse freely you must prove who you are. Age verification is no longer app-level. It’s becoming device-level infrastructure. The risk isn’t just verification. It’s where that data ends up.
zKYC tweet media
English
1
1
2
65
zKYC
zKYC@zkyctech·
@Alexarmstrong imagine needing to upload your ID just to use your own phone
English
0
0
3
269
Alex Armstrong
Alex Armstrong@Alexarmstrong·
If you update your iPhone, Apple will require you to send them a copy of your ID or credit card. This is the latest fresh hell as a result of the Labour and Conservative Online ‘Censorship’ bill. The phone will automatically block ‘adult’ material or websites until you submit.
Alex Armstrong tweet media
English
366
829
3.3K
770.2K
zKYC
zKYC@zkyctech·
@DeepHumor imagine needing to verify your identity just to buy stuff online
English
0
0
5
512
DeepHumor
DeepHumor@DeepHumor·
Amazon is emailing many users for "unusual ordering activity" and are asking for ID age verification. Surprise surprise, their age verification vendor is Persona.
DeepHumor tweet media
English
88
737
2.7K
58K
International Cyber Digest
International Cyber Digest@IntCyberDigest·
🚨‼️ BREAKING: Crunchyroll breached through outsourcing partner in India. A threat actor exfiltrated data from Crunchyroll's ticketing system and also managed to pull 100 GB of personally identifiable customer analytics data. We've analyzed sample data and it includes IP addresses, email addresses, credit card details, and more. An employee of their outsourcing partner Telus had executed malware on his system, which gave a threat actor access to Crunchyroll's environment.
International Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
504
2.1K
11.8K
5.4M
zKYC
zKYC@zkyctech·
@pubity location data just out here living its own life
English
0
0
0
38
Pubity
Pubity@pubity·
The FBI has admitted to buying location data to track people through their phones. Any smartphone could be a tracking device for the FBI if they want to find you.
Pubity tweet mediaPubity tweet media
English
25
37
432
13.7K
zKYC
zKYC@zkyctech·
Your phone isn’t the weakest link. The data inside it is. New iOS exploit “DarkSord” can install spyware that steals: • wallets • messages • photos • passwords You don’t need to be targeted. Just visiting the wrong site is enough The real risk isn’t just hacks. It’s how much sensitive data exists in the first place.
zKYC tweet media
English
1
1
1
72
zKYC
zKYC@zkyctech·
@IntCyberDigest 900k records just sitting there like loot boxes
English
0
0
1
78
International Cyber Digest
International Cyber Digest@IntCyberDigest·
❗️Cybersecurity company Aura suffered a data breach after a phone phishing attack by ShinyHunters. The attackers gained access to an employee account. Most of the stolen data came from a company Aura acquired in 2021: over 900,000 names and email addresses stored in Salesforce. Additionally, data of fewer than 20,000 current and 15,000 former Aura customers was stolen, including names, emails, addresses, and phone numbers.
International Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
14
23
134
19.8K