Guided Technical Tour
Six-step journey
Move through the dashboard in order, or jump directly to any step.
Step 1
Identity Crisis
This opening module establishes the why behind IWISI, shifting the perspective from traditional data collection to strategic data stewardship.
IWISI (I’m Who I Say I’m) started as a data analytics capstone and responds to the vulnerabilities of Knowledge-Based Authentication. Legacy questions like a mother’s maiden name or previous address are often compromised in breaches, so IWISI replaces the honey pot of stored facts with a Stateless Identity Reconstruction engine that rebuilds a challenge from live lifestyle data when needed.
Static KBA records are often already available on the dark web after large-scale breaches.
High school mascots and previous addresses can become easy reuse targets for attackers.
The aim is to eliminate the treasure inside the fortress by moving away from stored secrets.
The honey pot liability
Traditional knowledge-based authentication relies on static records. The problem is that the same facts used to help a user sign in can also help an attacker impersonate them after a breach.
When an organization stores this history, it creates a high-value honey pot that increases both legal and financial exposure every time the data is copied, backed up, or synchronized.
From record to performance
IWISI treats identity as a performance: the system proves a user is who they say they are through recognition, rather than by storing and reusing a list of memorized facts.
Stateless architecture
A stateless Lifestyle Identity Graph verifies presence without maintaining a permanent database of sensitive personal facts. It fetches live anchors only when needed, then discards the raw inputs.
Live lifestyle anchors
The system reaches out to authorized third-party providers to fetch current data points, such as recent media habits or vehicle records, ensuring the identity graph is a living reflection of the user.
That makes the profile dynamic and useful for proof, while still avoiding permanent storage of the raw facts that attackers would want to steal.