Authentication

Location Spoofing

Detect use of location spoofing for better mobile fraud detection

Understand how fraudsters spoof their location using GPS spoofing, VPNs, Proxies, mobile emulators, and other techniques. 

incognia-mission-illustration
  • Improve fraud detection

    Enhance location spoofing detection

    • Detect GPS spoofing, VPNs, Proxies and Emulators
    • Upgrade from using IP addresses and GPS for fraud detection

     

  • Protect accounts

    Stop fraudsters, not customers

    • Use location behavior patterns for identification
    • Requires no action from the user

Detecting location spoofing

Location spoofing is now becoming a standard technique used by fraudsters. With access to off-the-shelf tools, fraudsters can easily defeat legacy fraud detection systems using simplistic location models based on IP address and GPS locations. By spoofing IP addresses and GPS locations, fraudsters can fool legacy risk decisioning engines.

Incognia location technology uses network signals and on-device sensors to build a location behavior pattern that is unique to each user and extremely difficult to mimic or forge.

  • icon-carrers-flag

    Spoofed GPS location

    GPS spoofing apps are now widely used and easily enabled on a device. Fraudster don't need to root their device or have super admin privileges, GPS spoofing apps can be easily enabled via developer mode on the device.

  • Identity and document verification

    Faked IP Address

    Most fraud prevention technologies use the IP address to locate the user's device, but the use of VPNs and proxies can easily fool these types of fraud detections systems and thereby conceal the user’s true location.

  • Asset 2

    Mobile emulation

    Fraudsters are using the powerful capabilities of mobile emulators to manipulate mobile app data and evade fraud detection. One of the data points that is easily manipulated via a mobile emulator is the geolocation information.

Insights & Analytics

Location and Device Intelligence

Incognia is highly effective at detecting location spoofing and use of mobile emulators. Detailed evidence is provided for all risk assessments.

  • Device
    dashboard-device
  • Location
    dashboard-location-a
Designed for developers

Fast SDK Integration & Easy to Use APIs

We provide a lightweight mobile SDK and intuitive APIs to make it easy for you to add location and device intelligence to risk assessments throughout the user journey. 

  • Instant value

    Integrate in minutes using our integration wizard

  • Well-structured API

    Work with well-structured and easy to understand API responses

  • Monitor-only mode

    Test in monitor-only mode and view results on the dashboards

SDK Payload Example
Blog Post

Real-time Address Verification for Mobile

With increasing mobile adoption, use of real-time address verification is an untapped opportunity for mobile identity verification

Solution Brief

Frictionless ID Verification using Location

Frictionless identity verification for mobile commerce, optimize your onboarding and new device swap process for better and faster user experience.

Infographic

Mobile Location Technology

Understand what are the main geolocation technologies used by a smartphone and how they work.

Start using private location awareness in your app.