Verify and validate customers globally using their phone number.


Discover the network provider for every mobile number globally.


Protect customers, accounts, and transactions within your app.


Discover if a mobile number is assigned to a subscriber.


A real time phone number credibility score.


Identify if a number has the propensity to be used for fraud.

Banks and Financial Services
Mobile Messaging
Gaming & Gambling
Communication and Service Providers
Identity & Verification Providers
About us
Contact us

Silent Authentication – why it’s the future and why the fraudsters hate it

Fergal Parkinson

5 min read
A man in a hoodie looking at a laptop screen with a concerned expression, alongside a promotional graphic for an article about silent authentication.

They were once expected to be a kind of smart bomb that would be a terminal blow to crooks.

But lately the fraudsters have found one or two cracks that can allow them to bypass the hitherto completely impenetrable security OTPs provided.

There’s certainly no need to panic – OTPs are still largely a robust means of protecting users from fraud during transactions. But there are now some known ways fraudsters can bypass them.

One of the biggest problems in the war on fraud is that the enemy is always looking to turn the weaponry that is intended to eradicate it to its own advantage and use it as a weapon itself. And just that has recently begun to happen in some circumstances with One Time Passwords (OTPs).

One of the newest scams, for example, allows fraudsters to get hold of OTPs without even having the victim’s phone or a replica of it. Instead, they’ll send an SMS that appears to come from their target’s bank asking if they just made a high value transaction – a £10,000 holiday booking, say. The horrified account holder will reply ‘no’. A new SMS will then ask them to verify this reply by sharing the OTP they are about to receive. At the same moment the hacker will attempt to log in to an account belonging to their victim. This will initiate a genuine OTP being sent by SMS to their phone – but worried about that holiday booking, the victim will enter it as instructed. In so doing, of course, they are actually sending that access code to a hacker.

OTPs Vulnerabilities

At the other end of the scale, on a cruder but more frightening level, is this version. A friend of mine was mugged recently. They took his phone and threatened him with violence unless he revealed his PIN to unlock it. Once they had that they could get into all his apps and begin causing mayhem with his money. Long after the phone was reported stolen they were still getting sent OTPs to facilitate their theft – because there was no correlation between the phone’s status as stolen and its ability to perform transactions.

There are multiple variations on these scams but you get the broader point – OTPs do have some vulnerabilities that can allow them to be bypassed by criminals.

Authenticate explanation design one app blog post

Which is why we are so excited about the coming of silent authentication.

This is a fast, frictionless and, crucially, entirely secure way of verifying users that is soon to be a very big deal in online security. For use at the point of onboarding and/or subsequent purchases, silent authentication gets rid of the vulnerabilities that OTPs have developed.

And the reason is that it’s based solely on the real time data around the user’s mobile phone.

We’ve been evangelical for years about how the key to online security is to use telecom data as it can tell us more about the user than any other insight. And that’s exactly what silent authentication does. So, it’s really gratifying to see it finally being adopted as the cutting-edge security weapon we always knew it could be.

And I hope it goes without saying, but we’ll of course be at the forefront of introducing silent authentication to mainstream use.

Our own version of silent authentication is called TMT Authenticate and brings data from over 50 telecom network operators globally into play. This means it offers genuine worldwide security protection to a standard never attained before.

It takes away that longstanding antagonism of having to choose between cutting edge fraud controls and a frictionless user experience: suddenly you can have both.

The ultimate winner here is the customer: because they never wanted to have to make the invidious choice between a fast, seamless online experience and feeling safe and protected either.

Now they won’t have to.

Last updated on July 9, 2024


Related Articles

Hand holding a smartphone emerging from a cutout against a green background with a caption about a phone fraud incident.

“Mum – I’ve been mugged and they’ve stolen my phone”

Article on Elon Musk's newest unexpected declaration for Twitter regarding silent authentication by Fergal Parkinson.

Elon Musk’s Latest Strange Announcement For Twitter

Hand holding smartphone with sports betting app on the screen against a background featuring an abstract design and text about silent authentication in gambling security article.

William Hill Gambled And Lost: Why The Only Future For The Gambling Industry Is Robust Mobile-Based Security

What Our Customers Are Saying

"BTS (Business Telecommunications Services) is successfully using TMT’s Velocity and Live services to check the status of mobile numbers. This way we make sure we optimize the performance of the service offered to our customers and ensure the quality of terminating traffic to all countries.”

Business Telecommunications Services

"Working with TMT’s TeleShield service has expanded our ability to detect fraud and minimise the risk to our business. TeleShield brings peace of mind and the opportunity to stop fraud before it affects our customers’ bottom line or the service."

Six Degrees Labs

"LATRO relies on TMT’s TeleShield to provide the most up to date and reliable numbering qualification information within our fraud reporting tools, enabling us to protect our customer’s revenues and empowering them to defend themselves against fraudulent numbers."


"TMT is a valued partner that enables us to manage our routing costs effectively. They proactively and continuously expand their operator and country coverage while delivering exceptional customer service. We can always count on them to achieve high-quality results and look forward to our continued collaboration."

Global Message Service

"TMT provides us with the most comprehensive numbering intelligence data through their fast and reliable Velocity and Live services. TMT is a trusted partner for us, their products ensure that we continue to optimise the best performance and service to our customers."

Global Voice

"TeleShield from TMT gives 42com the power to detect and target telephony fraud scams internationally, thereby protecting our company from the financial and customer experience impacts of telecommunications fraud."

Alberto Grunstein - CEO

"It has been a pleasure to work with the team at TMT. They have become an essential provider of accurate numbering data information and Number Portability services globally."

Luisa Sanchez - VP of SMS and Messaging Solutions, Identidad Technologies

"Deutsche Telekom Global Carrier uses TMT ID as one of their key suppliers for Mobile Number Portability Data services. Deutsche Telekom Global Carrier uses TMT ID’s Velocity MNP solution. This is an ultra-fast query service that optimises the routing of international voice calls and A2P messaging."

Deutsche Telekom Global Carrier

Ready to get started?

We provide the most comprehensive device, network and mobile numbering data available

Contact us > Chat to an expert >