Advanced Topics
Consortium Sharing
Participate in shared threat intelligence to detect cross-platform fraud patterns.
Consortium sharing lets VerifyStack customers contribute anonymized fraud signals to a shared intelligence network. If a device is flagged as fraudulent by one customer, all participants benefit from that knowledge.
How It Works
- When fraud is confirmed (via /feedback), anonymized signals are submitted to the consortium
- Signals are hashed and anonymized — no PII, user IDs, or business data is shared
- Shared data includes: device fingerprint hashes, IP reputation signals, and behavioral anomaly markers
- All participants can query the consortium for known-bad device/IP reputation
- Reputation scores decay over time (90-day window by default)
Privacy Guarantees
| Data Type | Shared? | Format |
|---|---|---|
| Device fingerprint | Yes | SHA-256 hash only |
| IP address | Yes | Hashed + reputation score |
| User ID | No | Never shared |
| No | Never shared | |
| Transaction details | No | Never shared |
| Decision outcome | Yes | Anonymized label only |
Enabling Consortium
Consortium sharing is opt-in. Enable it in Dashboard → Settings → Privacy → Consortium Sharing. You can opt out at any time, and your contributed data will be purged within 7 days.
Consortium sharing is available on Growth and Enterprise plans. It typically improves detection rates by 15-25% for new customers.
GDPR Compliance
Consortium data processing is covered under legitimate interest (Article 6(1)(f) GDPR). All shared data is anonymized and cannot be linked back to individual users. See our GDPR documentation for details.