Nametag Location Integrity™: Verified Physical Presence tied to Verified Workforce Identity

by
Nametag
North Korea Blog Post Header

Workforce Impersonation Report

How AI-enabled impersonation is redefining identity security and shaping the future of enterprise trust.

Nametag is proud to introduce another patent-pending innovation and enhancement to our Deepfake Defense™ identity verification engine. Location Integrity™ expands our unmatched assurance to cover not just a person’s identity, but their location. For the first time, an employee's physical location becomes an auditable, first-tier security control––a huge step forward in the fight against employment fraud, including North Korean IT workers and laptop farms.

Restoring trust in distributed workforces

For companies managing distributed workforces, location is no longer a “nice-to-have” signal. It’s a foundational security control spanning HR, recruiting, IT, security, and compliance teams.

Recent reporting has exposed active, large-scale hiring fraud schemes in which North Korean operatives obtain remote IT and security jobs using deepfakes, stolen identities, and U.S.-based collaborators operating “laptop farms.” In many cases, the individual performing the work is located in an entirely different hemisphere from the device they’re working through. 

This risk is not hypothetical. Organizations that unknowingly hire sanctioned workers face regulatory exposure, reputational damage, intellectual property theft, and ransomware attacks. Many companies already have fraudulent workers embedded in their environments today.

Knowing someone’s true location becomes a critical control for:

  • Preventing sanctioned-region employment violations
  • Detecting proxy operators and device relays
  • Enforcing geographic workforce policies
  • Supporting audit and compliance investigations

But until now, location signals have never been secure enough to serve as a first-class identity control. IP addresses and network signals can be spoofed. Browser-reported location data can be manipulated. VPNs make physical location ambiguous by design. 

Nametag’s approach dramatically reduces the attack surface by eliminating this vector entirely. For the first time in remote identity verification, physical presence becomes an enforceable control rather than just another low-assurance signal.

Nametag Location Integrity™: Where is this person?

Nametag Location Integrity uses cryptographically-attested signals to transform a person’s location from a weak background risk signal into a first-class security control. It generates a tamper-resistant, auditable record of a device’s true location at the time of verification

Location Integrity answers the question, “Where is this person?” with a level of assurance previously unattainable in remote environments. The result? Employers can know with more certainty where a remote worker is at important moments like onboarding or access requests.

With Location Integrity integrated into our Deepfake Defense™ identity verification engine, Nametag is uniquely capable of cryptographically binding a verified identity to a verified device at a verified physical location at a specific moment in time

In simpler terms: When paired with a selfie, Location Integrity™ produces an auditable record that a specific person was in a specific location at a specific moment in time.

The security implications are significant. Already, Location Integrity is enabling some of the world’s most security-conscious organizations to:

  • Prevent remote worker fraud, including laptop farms.
  • Enforce regional workforce policies with defensible audit trails.
  • Support investigations of suspected identity fraud.

Location checks can be added anywhere you use Nametag to verify your workforce, whether via human-initiated (e.g. by recruiters or IT staff) or via automatic workflows via our integrations

Get Started with Location Integrity™

Current Nametag customers can start using Location Integrity™ today. Not yet a customer? Learn more about our workforce identity verification solutions or contact us today to learn how Nametag can secure your distributed workforce against AI-enhanced impersonation.

Learn About Workforce Impersonation

Bad actors are increasingly using generative AI and deepfakes to supercharge their attacks. In the age of AI, identity verification isn’t just part of the security stack. It is the security stack.

Learn more about workforce impersonation in the 2026 Workforce Impersonation Report.

Secure your helpdesk against social engineering and impersonators.
Decline
Accept All Cookies