Security

Fraud Prevention: How eIDAS Eliminates Fake IDs and Identity Theft

Discover how eIDAS-based identity verification stops fraud at its source through cryptographic signatures and government PKI, eliminating the vulnerabilities of traditional document-based verification.

eIDAS Pro Team
February 1, 2026
11 min read

The Growing Threat of Identity Fraud in E-Commerce

Identity fraud has evolved from an occasional nuisance to an existential threat for online merchants. The numbers paint a sobering picture: global e-commerce fraud losses exceeded €38 billion in 2025, with identity-related fraud accounting for over 60% of all incidents. For merchants operating in age-restricted or regulated industries, the stakes are even higher—a single compliance failure can result in license revocation, criminal penalties, and irreparable reputational damage.

Understanding the Attack Vectors

Modern fraudsters employ increasingly sophisticated techniques to bypass traditional verification systems:

Document Forgery: High-quality fake IDs can be purchased on dark web marketplaces for as little as €100. These documents often pass visual inspection and even basic automated checks. With advances in printing technology and access to template databases, forgeries have become nearly indistinguishable from genuine documents.

Synthetic Identity Fraud: Rather than stealing an existing identity, criminals construct entirely new identities by combining real data elements (like valid Social Security numbers from deceased individuals) with fabricated information. These synthetic identities can pass credit checks, open accounts, and make purchases before disappearing without a trace.

Account Takeover (ATO): Using credentials from data breaches, phishing attacks, or social engineering, fraudsters gain access to legitimate customer accounts. Once inside, they change shipping addresses, make purchases, and drain stored payment methods—all while appearing to be the real customer.

Deepfake and AI-Generated Documents: The latest frontier in fraud involves AI-generated identity documents and deepfake videos designed to bypass liveness checks. These sophisticated attacks can fool systems that rely on facial recognition or video verification.

Friendly Fraud: Also known as "first-party fraud," this occurs when legitimate customers dispute charges for goods they actually received, often claiming their identity was stolen. Without robust verification, merchants have little recourse.

The Financial Impact

The true cost of fraud extends far beyond the immediate loss of merchandise:

Cost CategoryAverage Impact
Direct fraud losses1.5-3% of revenue
Chargeback fees€15-100 per incident
Manual review costs€2-5 per transaction
False positive losses5-10% of declined orders
Customer acquisition (replacement)€30-150 per customer
Insurance premium increases15-25% annually
Regulatory penalties€10,000-500,000+

For a mid-sized e-commerce operation processing €10 million annually, fraud-related costs can easily exceed €500,000 per year—often the difference between profitability and loss.

How Traditional ID Verification Fails

Traditional identity verification relies on fundamentally flawed assumptions about document authenticity and verification accuracy. Understanding these weaknesses is crucial for appreciating why a paradigm shift is necessary.

The Document Scanning Problem

Most online verification systems ask users to upload photos of their identity documents. This approach has several critical vulnerabilities:

Image Manipulation: Photos can be digitally altered before upload. Fraudsters routinely use image editing software to change names, birthdates, or photos on document images. Without access to the original document, verification systems can only compare against expected patterns—patterns that sophisticated forgers have already studied.

No Cryptographic Verification: A photo of a document contains no cryptographic information. Unlike the physical document (which may have holograms, UV features, or microprinting), a digital image can be perfectly reproduced. There's no way to verify that the document image wasn't created from scratch.

Template-Based Forgery: Document verification APIs compare uploaded images against templates of known document types. This means fraudsters only need to match the template—they don't need to replicate security features that would be checked in person.

// Traditional document verification - inherently vulnerable
async function verifyDocument(documentImage: Buffer): Promise<VerificationResult> {
  // Compare against known templates - can be fooled by good forgeries
  const templateMatch = await matchDocumentTemplate(documentImage);

  // Check for obvious manipulation - sophisticated tools evade this
  const manipulationScore = await detectManipulation(documentImage);

  // Extract text via OCR - no way to verify authenticity of text
  const extractedData = await performOCR(documentImage);

  // No cryptographic verification possible
  // No connection to government databases
  // No proof document actually exists

  return {
    passed: templateMatch.confidence > 0.8 && manipulationScore < 0.3,
    data: extractedData,
    // Confidence is statistical, not cryptographic
    confidence: templateMatch.confidence * (1 - manipulationScore)
  };
}

The Deepfake Vulnerability

As AI technology advances, deepfake detection becomes an arms race that defenders are losing:

Liveness Check Bypass: Systems that ask users to blink, turn their heads, or speak can be defeated by real-time deepfake generation. Neural networks can now generate convincing facial movements synchronized with audio in real-time.

Video Injection Attacks: Sophisticated attackers inject pre-recorded or generated video directly into the verification stream, bypassing the camera entirely. The verification system receives what appears to be a live video feed but is actually a fabricated stream.

Generative AI Documents: Tools like Stable Diffusion can generate photorealistic images of documents that never existed. Combined with deepfake faces, attackers can create complete synthetic identities with matching documents and "live" video verification.

Manual Review Limitations

Many merchants rely on manual review for high-risk transactions, but this approach doesn't scale:

Inconsistent Decisions: Human reviewers make different decisions on similar cases. Studies show inter-reviewer agreement rates as low as 60% for borderline fraud cases.

Review Fatigue: After reviewing hundreds of documents, analysts become less vigilant. Error rates increase significantly during long shifts.

Speed vs. Accuracy Tradeoff: Thorough manual review takes time—time that customers aren't willing to wait. The pressure to approve quickly leads to rubber-stamping.

Cost Prohibition: At €2-5 per manual review, comprehensive human verification of all transactions is economically unfeasible for most merchants.

Why eIDAS is Fraud-Proof

eIDAS (Electronic Identification, Authentication and Trust Services) represents a fundamental paradigm shift in identity verification. Rather than trying to verify documents after the fact, eIDAS relies on cryptographic attestations from government systems that cannot be forged.

Cryptographic Signatures: The Foundation

Every eIDAS verification is backed by digital signatures using public key cryptography:

Government-Issued Certificates: Each EU member state operates a Public Key Infrastructure (PKI) with certificate authorities that issue signing certificates. These certificates are chained back to national root certificates that are publicly auditable.

Unforgeable Signatures: When a citizen's identity is verified through eIDAS, the national system creates a digital signature using keys held in government HSMs (Hardware Security Modules). Without access to these highly protected keys, signatures cannot be forged.

Timestamp Binding: Each verification includes a cryptographic timestamp from trusted time-stamping authorities. This prevents replay attacks and proves exactly when the verification occurred.

// eIDAS verification - cryptographically secure
async function verifyIdentity(sessionId: string): Promise<VerificationResult> {
  // Receive signed attestation from government PKI
  const attestation = await receiveAttestation(sessionId);

  // Verify signature chain to national root CA
  const signatureValid = await verifySignatureChain(
    attestation.signature,
    attestation.certificateChain,
    nationalRootCertificates
  );

  if (!signatureValid) {
    throw new Error('Invalid signature - potential forgery attempt');
  }

  // Verify timestamp from trusted TSA
  const timestampValid = await verifyTimestamp(
    attestation.timestamp,
    trustedTimestampAuthorities
  );

  // Check certificate revocation status
  const certificateValid = await checkRevocationStatus(
    attestation.certificateChain,
    ocspResponders
  );

  // Extract boolean attributes - cryptographically verified
  return {
    verified: true,
    attributes: {
      age_over_18: attestation.claims.ageOver18,
      age_over_21: attestation.claims.ageOver21,
      is_eu_citizen: attestation.claims.euCitizen
    },
    assuranceLevel: attestation.assuranceLevel, // 'high' for eIDAS
    verifiedAt: attestation.timestamp,
    countryCode: attestation.issuerCountry
  };
}

No Documents to Forge

The most elegant aspect of eIDAS verification is that it eliminates document handling entirely:

No Document Upload: Users never submit photos or scans of documents. The entire verification happens through their government-issued digital identity wallet.

No Image Analysis: Since there are no documents to analyze, there's nothing for AI to generate or for fraudsters to manipulate.

No Template Matching: The verification isn't about matching patterns—it's about validating cryptographic signatures that only government systems can create.

Live Government Connection: Each verification involves real-time communication with national identity providers. The government system confirms the citizen's identity at the moment of verification.

Hardware-Backed Security

eIDAS verification leverages security features built into modern smartphones:

Secure Enclave Storage: Cryptographic keys are stored in the device's secure enclave (TEE—Trusted Execution Environment), isolated from the main operating system. Even if the device is compromised, these keys cannot be extracted.

Biometric Binding: Verification requires biometric authentication (fingerprint or face) on the user's device. This biometric never leaves the device—it's used only to unlock the locally stored identity credential.

Device Attestation: The identity wallet can prove that it's running on a legitimate device that hasn't been tampered with, preventing software-based attacks.

Attack Vectors eIDAS Prevents

Let's examine how eIDAS-based verification defeats each major fraud vector:

Synthetic Identity Fraud: Eliminated

Synthetic identities cannot exist in eIDAS because digital identities are issued by governments based on civil registry records. You cannot "create" a government-issued digital identity—you can only use one that was legitimately issued to you based on your birth certificate, citizenship records, and identity documents that were verified in person.

The Kill Chain:

  1. Fraudster creates synthetic identity with fabricated documents ❌
  2. Synthetic identity has no government-issued digital wallet ❌
  3. Verification requires wallet attestation from government PKI ❌
  4. Fraud attempt fails immediately—no cryptographic credential exists ✓

Document Forgery: Impossible

There are no documents to forge. eIDAS verification doesn't involve document images, scans, or photos. The "document" is a cryptographic credential stored in a government-controlled digital wallet.

The Kill Chain:

  1. Fraudster creates fake ID document ❌
  2. Verification requires digital wallet, not document image ❌
  3. No upload mechanism exists to submit forged documents ❌
  4. Fraud attempt has no attack surface ✓

Account Takeover: Significantly Harder

Even if a fraudster gains access to a customer's e-commerce account, they cannot pass eIDAS verification without access to the victim's:

  • Physical smartphone with registered digital wallet
  • Biometric credentials (fingerprint/face)
  • Government-issued identity

The Kill Chain:

  1. Fraudster obtains account credentials ✓
  2. Fraudster attempts verification ❌
  3. Requires victim's physical device with wallet ❌
  4. Requires victim's biometric authentication ❌
  5. Fraud attempt blocked at verification step ✓

Deepfakes and AI-Generated Content: Irrelevant

Deepfakes are designed to fool visual verification systems. eIDAS doesn't use visual verification—it uses cryptographic verification. There's nothing for a deepfake to impersonate.

The Kill Chain:

  1. Fraudster generates deepfake video ❌
  2. Verification doesn't involve video or images ❌
  3. Cryptographic signatures cannot be deepfaked ❌
  4. AI-generated content has no attack vector ✓

Friendly Fraud: Documented Proof

When a customer disputes a charge claiming their identity was stolen, eIDAS verification provides irrefutable evidence:

  • Cryptographically signed attestation that verification occurred
  • Timestamp from trusted authority proving when it happened
  • Device attestation showing verification was performed on customer's device
  • Biometric confirmation that the customer personally authorized the transaction

This evidence is legally admissible and extremely difficult to refute.

Implementation Security Best Practices

Implementing eIDAS verification correctly is crucial for maintaining its security guarantees:

Secure Session Management

interface SecureVerificationSession {
  sessionId: string;
  createdAt: Date;
  expiresAt: Date;
  nonce: string;
  requestedAttributes: string[];
  clientIp: string;
  userAgent: string;
  status: 'pending' | 'completed' | 'failed' | 'expired';
}

async function createSecureSession(
  request: VerificationRequest
): Promise<SecureVerificationSession> {
  // Generate cryptographically secure session ID
  const sessionId = await generateSecureId(32);

  // Create single-use nonce to prevent replay attacks
  const nonce = await generateSecureId(24);

  // Short expiration window (5 minutes)
  const expiresAt = new Date(Date.now() + 5 * 60 * 1000);

  // Store session in secure, encrypted storage
  const session: SecureVerificationSession = {
    sessionId,
    createdAt: new Date(),
    expiresAt,
    nonce,
    requestedAttributes: request.attributes,
    clientIp: request.clientIp,
    userAgent: request.userAgent,
    status: 'pending'
  };

  await secureSessionStore.set(sessionId, session);

  return session;
}

Response Validation

async function validateVerificationResponse(
  sessionId: string,
  response: VerificationResponse
): Promise<ValidatedResult> {
  // Retrieve original session
  const session = await secureSessionStore.get(sessionId);

  if (!session) {
    throw new SecurityError('Session not found - possible replay attack');
  }

  if (session.status !== 'pending') {
    throw new SecurityError('Session already used - replay attack detected');
  }

  if (new Date() > session.expiresAt) {
    throw new SecurityError('Session expired');
  }

  // Verify nonce matches
  if (response.nonce !== session.nonce) {
    throw new SecurityError('Nonce mismatch - possible MITM attack');
  }

  // Verify cryptographic signature
  const signatureValid = await verifyCertificateChain(
    response.signature,
    response.certificateChain,
    trustedRootCertificates
  );

  if (!signatureValid) {
    throw new SecurityError('Invalid signature - forgery attempt');
  }

  // Mark session as used (prevent replay)
  session.status = 'completed';
  await secureSessionStore.set(sessionId, session);

  return {
    verified: true,
    attributes: response.attributes,
    timestamp: response.timestamp
  };
}

Audit Trail Requirements

Maintain comprehensive audit logs for compliance and dispute resolution:

interface VerificationAuditLog {
  verificationId: string;
  sessionId: string;
  timestamp: Date;

  // Request details
  requestedAttributes: string[];
  requestSource: {
    ip: string;
    userAgent: string;
    geoLocation?: string;
  };

  // Response details (without PII)
  result: 'success' | 'failure';
  attributesVerified: string[];
  issuerCountry: string;
  assuranceLevel: string;

  // Cryptographic proof
  signatureHash: string;
  certificateFingerprint: string;
  timestampAuthority: string;

  // Business context
  orderId?: string;
  transactionAmount?: number;
  productCategory?: string;
}

Compliance and Liability Protection

eIDAS verification provides significant legal and compliance advantages:

Regulatory Recognition

eIDAS is legally recognized across all 27 EU member states. Verification results carry the same legal weight as in-person identity checks. This recognition extends to:

  • Financial regulations: KYC/AML compliance
  • Age-restricted sales: Alcohol, tobacco, gaming
  • Healthcare: Prescription verification
  • Government services: Digital public services

Liability Shift

When you properly implement eIDAS verification, liability for identity fraud shifts significantly:

ScenarioTraditional VerificationeIDAS Verification
Fraudulent transactionMerchant bears full liabilityGovernment attestation provides defense
Age verification failureMerchant faces regulatory penaltiesDocumented compliance with highest standard
Chargeback disputeOften ruled against merchantCryptographic proof of customer authorization
Data breachMerchant liable for PII storedMinimal data retained, limited exposure

Admissible Evidence

eIDAS verification results are admissible in court across the EU. The cryptographic proofs provide:

  • Non-repudiation: The customer cannot deny they performed the verification
  • Integrity: The verification result cannot be altered after the fact
  • Authenticity: The government's digital signature proves the attestation is genuine
  • Timestamping: Trusted timestamps prove when the verification occurred

ROI of Fraud Prevention

Implementing eIDAS verification delivers measurable return on investment:

Chargeback Reduction

Merchants implementing eIDAS typically see chargeback rates drop by 60-80%:

MetricBefore eIDASAfter eIDAS
Chargeback rate0.8%0.2%
Chargebacks/month (€1M revenue)€8,000€2,000
Chargeback fees (€25/incident)€800€200
Annual savings-€79,200

False Positive Elimination

Traditional fraud systems often decline legitimate orders. eIDAS verification's certainty allows you to approve more orders:

MetricTraditionaleIDAS
False positive rate5%Less than 0.5%
Declined legitimate orders (€1M)€50,000€5,000
Customer lifetime value recovered-€45,000+

Insurance Benefits

Many insurers offer reduced premiums for merchants using strong identity verification:

  • Cyber liability: 15-25% reduction
  • Fraud insurance: 20-30% reduction
  • D&O coverage: Reduced exclusions

Operational Efficiency

Automated eIDAS verification eliminates manual review costs:

ProcessManual RevieweIDAS
Cost per verification€3-5€0.50-1.00
Time per verification2-5 minutes30 seconds
Staff required (1000 orders/day)8-10 reviewers0-1 monitors
24/7 coverage cost€150,000+/yearAutomated

Total Cost of Ownership Comparison

For a merchant processing €10 million annually with 100,000 transactions:

Cost CategoryTraditionaleIDASSavings
Direct fraud losses€150,000€30,000€120,000
Chargeback fees€20,000€5,000€15,000
Manual review€200,000€0€200,000
False declines€500,000€50,000€450,000
Compliance penaltiesRiskMinimalRisk mitigation
Total Annual Savings--€785,000

Conclusion

Identity fraud represents one of the most significant threats facing e-commerce merchants today. Traditional verification methods—based on document scanning, visual inspection, and statistical analysis—are fundamentally flawed and increasingly vulnerable to sophisticated attacks.

eIDAS verification represents a paradigm shift: instead of trying to detect fraud after the fact, it makes fraud cryptographically impossible. By leveraging government-issued digital identities, hardware-backed security, and public key infrastructure, eIDAS eliminates the attack vectors that fraudsters rely on.

The business case is compelling: reduced fraud losses, eliminated chargebacks, improved conversion rates, and regulatory compliance. But beyond the numbers, eIDAS provides something even more valuable—certainty. When a customer passes eIDAS verification, you know with cryptographic confidence that they are who they claim to be.

As AI-generated content and deepfakes become increasingly sophisticated, the gap between traditional verification and eIDAS will only widen. Merchants who adopt eIDAS now position themselves ahead of both the fraud curve and the regulatory curve.


Ready to eliminate identity fraud from your business? eIDAS Pro makes implementing cryptographic identity verification simple. Our WooCommerce and Shopify plugins integrate in minutes, with no complex PKI knowledge required. Schedule a demo →

Related Articles

Share this article

Help others learn about eIDAS verification