Why Non-Repudiation and Eliminating Impersonation Matter in Cybersecurity

Matt McInnesBy Matt McInnes - Jul 16, 2025

In today’s digital landscape, proving who performed an action and ensuring identities cannot be falsified is crucial. Non-repudiation and preventing impersonation attacks are key to securing online transactions, yet traditional authentication methods often fall short.

The Issue: Fraud and Impersonation Attacks

Impersonation attacks are ubiquitous, from phishing scams to credential stuffing and session hijacking. Even with multi-factor authentication (MFA), attackers exploit social engineering and token theft to gain access. Traditional authentication lacks cryptographic proof of identity, leaving gaps in security.

Current Fraud Prevention Approaches

Security teams use various strategies to combat fraud:

  • Multi-Factor Authentication (MFA): Strengthening identity verification with “something you have” like a One-Time Passcode (OTP) or security keys, or “something you are”: biometrics.
  • Behavioural Analytics & Risk-Based Authentication: Flagging anomalies for additional verification.
  • Zero Trust Security Models: Continuously verifying identity, device, and context.
  • PKI and Digital Signatures: Cryptographic methods for document integrity and proof of authorship.

These approaches enhance security but can add friction and remain vulnerable to certain attacks. Verifiable Credentials (VCs) offer a stronger solution.

How Verifiable Credentials Improve Security

Verifiable Credentials (VCs) provide cryptographically secure, privacy-preserving identity proof. Issued by trusted entities (e.g., employers, governments), VCs ensure authentication without shared secrets like passwords.

Using decentralised identifiers (DIDs) and digital signatures, VCs establish non-repudiation. The verifying party can confirm both credential integrity and the identity of the holder, eliminating stolen credential risks and reducing impersonation attacks.

Integrating VCs for Better Authentication

Organisations can enhance security by integrating VCs into existing authentication flows via an OpenID Connect provider:

  • Reduce Impersonation Risks: Only verified credential holders can authenticate.
  • Strengthen Compliance: Cryptographic signatures provide indisputable identity proof.
  • Improve User Experience: Passwordless authentication reduces friction.
  • Minimise Fraud Costs: Preventing unauthorised access lowers financial and reputational risks.

With cyber threats evolving and regulatory pressures increasing, organisations must adopt stronger identity verification. Integrating VCs into on-boarding, authentication and authorisation processes enhances security by preventing impersonation attacks and identity theft, ultimately reducing risk for all participants—both end users and the organisations they interact with in the digital realm.

Matt McInnes

Matt McInnes

Head of Implementation

Matt has 20+ years' experience in digital transformation, both as a CIO/CTO and consultant He has led digital transformation of a major timber and hardware supplier Matt has held multiple Partner, Principal and Senior consulting positions, focusing on digital transformation across industries like health, telco, and government


Latest articles