Guided Technical Tour

Six-step journey

Move through the dashboard in order, or jump directly to any step.

Previous stepNext step

Step 1

Identity Crisis

This opening module establishes the why behind IWISI, shifting the perspective from traditional data collection to strategic data stewardship.

IWISI (I’m Who I Say I’m) started as a data analytics capstone and responds to the vulnerabilities of Knowledge-Based Authentication. Legacy questions like a mother’s maiden name or previous address are often compromised in breaches, so IWISI replaces the honey pot of stored facts with a Stateless Identity Reconstruction engine that rebuilds a challenge from live lifestyle data when needed.

Honey Pot Liability
High

Static KBA records are often already available on the dark web after large-scale breaches.

KBA Exposure
Public facts

High school mascots and previous addresses can become easy reuse targets for attackers.

Liability Goal
Remove treasure

The aim is to eliminate the treasure inside the fortress by moving away from stored secrets.

The honey pot liability

Traditional knowledge-based authentication relies on static records. The problem is that the same facts used to help a user sign in can also help an attacker impersonate them after a breach.

When an organization stores this history, it creates a high-value honey pot that increases both legal and financial exposure every time the data is copied, backed up, or synchronized.

From record to performance

IWISI treats identity as a performance: the system proves a user is who they say they are through recognition, rather than by storing and reusing a list of memorized facts.

Stateless architecture

A stateless Lifestyle Identity Graph verifies presence without maintaining a permanent database of sensitive personal facts. It fetches live anchors only when needed, then discards the raw inputs.

Live lifestyle anchors

The system reaches out to authorized third-party providers to fetch current data points, such as recent media habits or vehicle records, ensuring the identity graph is a living reflection of the user.

That makes the profile dynamic and useful for proof, while still avoiding permanent storage of the raw facts that attackers would want to steal.