<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Bot Defense on ICE-ICE-BEAR-BLOG</title><link>https://ice-ice-bear.github.io/tags/bot-defense/</link><description>Recent content in Bot Defense on ICE-ICE-BEAR-BLOG</description><generator>Hugo -- gohugo.io</generator><language>en</language><lastBuildDate>Thu, 07 May 2026 00:00:00 +0900</lastBuildDate><atom:link href="https://ice-ice-bear.github.io/tags/bot-defense/index.xml" rel="self" type="application/rss+xml"/><item><title>Google Cloud Fraud Defense — The Next Evolution of reCAPTCHA, From Friction Layer to Risk Engine</title><link>https://ice-ice-bear.github.io/posts/2026-05-07-google-cloud-fraud-defense/</link><pubDate>Thu, 07 May 2026 00:00:00 +0900</pubDate><guid>https://ice-ice-bear.github.io/posts/2026-05-07-google-cloud-fraud-defense/</guid><description>&lt;img src="https://ice-ice-bear.github.io/" alt="Featured image of post Google Cloud Fraud Defense — The Next Evolution of reCAPTCHA, From Friction Layer to Risk Engine" /&gt;&lt;h2 id="overview"&gt;Overview
&lt;/h2&gt;&lt;p&gt;On 2026-04-23 at &lt;a class="link" href="https://cloud.withgoogle.com/next" target="_blank" rel="noopener"
 &gt;Google Cloud Next &amp;lsquo;26&lt;/a&gt;, Google unveiled &lt;a class="link" href="https://cloud.google.com/blog/products/identity-security/introducing-google-cloud-fraud-defense-the-next-evolution-of-recaptcha/" target="_blank" rel="noopener"
 &gt;Google Cloud Fraud Defense&lt;/a&gt;, positioned as &amp;ldquo;the next evolution of &lt;a class="link" href="https://cloud.google.com/security/products/recaptcha" target="_blank" rel="noopener"
 &gt;reCAPTCHA&lt;/a&gt;.&amp;rdquo; The core shift fits in one sentence — &lt;strong&gt;the question moved from &amp;ldquo;is this a human?&amp;rdquo; to &amp;ldquo;does this session match learned attack patterns?&amp;rdquo;&lt;/strong&gt;&lt;/p&gt;
&lt;pre class="mermaid" style="visibility:hidden"&gt;graph TD
 Layer1["L1 CAPTCHA &amp;lt;br/&amp;gt; image challenge"] --&gt; Layer2["L2 Risk Score &amp;lt;br/&amp;gt; signal-based score"]
 Layer2 --&gt; Layer3["L3 Behavioral Biometrics &amp;lt;br/&amp;gt; interaction patterns"]
 Layer3 --&gt; Layer4["L4 Device Fingerprint &amp;lt;br/&amp;gt; device identity"]
 Layer4 --&gt; Layer5["L5 Graph Anomaly &amp;lt;br/&amp;gt; entity relationship anomalies"]

 Layer1 -.-&gt; Era1["reCAPTCHA v1/v2 era"]
 Layer2 -.-&gt; Era2["reCAPTCHA v3 / Enterprise"]
 Layer3 -.-&gt; Era3["Account Defender era"]
 Layer4 -.-&gt; Era3
 Layer5 -.-&gt; Era4["Fraud Defense era"]&lt;/pre&gt;&lt;h2 id="1-the-end-point-of-18-years-of-recaptcha"&gt;1. The End Point of 18 Years of reCAPTCHA
&lt;/h2&gt;&lt;p&gt;&lt;a class="link" href="https://en.wikipedia.org/wiki/ReCAPTCHA" target="_blank" rel="noopener"
 &gt;reCAPTCHA&lt;/a&gt; began at &lt;a class="link" href="https://www.cmu.edu/" target="_blank" rel="noopener"
 &gt;Carnegie Mellon University&lt;/a&gt; in 2007. &lt;a class="link" href="https://googleblog.blogspot.com/2009/09/teaching-computers-to-read-google.html" target="_blank" rel="noopener"
 &gt;Google acquired it in 2009&lt;/a&gt;. A project that started as a byproduct of book digitization is now the front-line infrastructure of the bot economy, 18 years later.&lt;/p&gt;
&lt;table&gt;
 &lt;thead&gt;
 &lt;tr&gt;
 &lt;th&gt;Era&lt;/th&gt;
 &lt;th&gt;Version&lt;/th&gt;
 &lt;th&gt;Core mechanism&lt;/th&gt;
 &lt;th&gt;What broke it&lt;/th&gt;
 &lt;/tr&gt;
 &lt;/thead&gt;
 &lt;tbody&gt;
 &lt;tr&gt;
 &lt;td&gt;2007–2017&lt;/td&gt;
 &lt;td&gt;v1&lt;/td&gt;
 &lt;td&gt;Distorted text OCR&lt;/td&gt;
 &lt;td&gt;OCR crossed 99% accuracy&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;2014–today&lt;/td&gt;
 &lt;td&gt;v2&lt;/td&gt;
 &lt;td&gt;&amp;ldquo;I&amp;rsquo;m not a robot&amp;rdquo; + image grid&lt;/td&gt;
 &lt;td&gt;Image recognition + machine vision&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;2018–today&lt;/td&gt;
 &lt;td&gt;&lt;a class="link" href="https://developers.google.com/recaptcha/docs/v3" target="_blank" rel="noopener"
 &gt;v3&lt;/a&gt;&lt;/td&gt;
 &lt;td&gt;Background risk score (0.0–1.0)&lt;/td&gt;
 &lt;td&gt;Whitebox evasion&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;2020–today&lt;/td&gt;
 &lt;td&gt;&lt;a class="link" href="https://docs.cloud.google.com/recaptcha/docs/compare-tiers" target="_blank" rel="noopener"
 &gt;reCAPTCHA Enterprise&lt;/a&gt;&lt;/td&gt;
 &lt;td&gt;Cloud integration + Account Defender&lt;/td&gt;
 &lt;td&gt;Bot cluster automation&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;2026–&lt;/td&gt;
 &lt;td&gt;&lt;strong&gt;Fraud Defense&lt;/strong&gt;&lt;/td&gt;
 &lt;td&gt;Agentic policy + trust graph&lt;/td&gt;
 &lt;td&gt;AI agents impersonating humans&lt;/td&gt;
 &lt;/tr&gt;
 &lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;The &lt;a class="link" href="https://developers.google.com/recaptcha/docs/changelog" target="_blank" rel="noopener"
 &gt;v1 deprecation notice on 2017-10-18&lt;/a&gt; and the 2018-04-01 shutdown were not coincidental with v3&amp;rsquo;s launch on 2018-10-29. That was the start of the transition &lt;strong&gt;from challenge-based to score-based&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;The shift to &lt;a class="link" href="https://cloud.google.com/security/products/recaptcha" target="_blank" rel="noopener"
 &gt;reCAPTCHA Enterprise&lt;/a&gt; added &lt;a class="link" href="https://cloud.google.com/blog/products/identity-security/use-account-defender-in-recaptcha-enterprise-to-protect-accounts" target="_blank" rel="noopener"
 &gt;Account Defender&lt;/a&gt; and &lt;a class="link" href="https://docs.cloud.google.com/recaptcha/docs/passwords-leaked-detection" target="_blank" rel="noopener"
 &gt;Password Leak Detection&lt;/a&gt;. The latter hashes passwords against Google&amp;rsquo;s &lt;strong&gt;4-billion-credential breach database&lt;/strong&gt;. That alone already moved the product past pure bot blocking into credential stuffing defense.&lt;/p&gt;
&lt;h2 id="2-what-fraud-defense-actually-is"&gt;2. What Fraud Defense Actually Is
&lt;/h2&gt;&lt;p&gt;Pulling together the &lt;a class="link" href="https://cloud.google.com/blog/products/identity-security/introducing-google-cloud-fraud-defense-the-next-evolution-of-recaptcha/" target="_blank" rel="noopener"
 &gt;announcement post&lt;/a&gt; and the &lt;a class="link" href="https://cloud.google.com/security/products/fraud-defense" target="_blank" rel="noopener"
 &gt;product page&lt;/a&gt;, three axes emerge.&lt;/p&gt;
&lt;h3 id="axis-1--agentic-activity-measurement"&gt;Axis 1 — Agentic Activity Measurement
&lt;/h3&gt;&lt;p&gt;Agent identity measurement via standards like &lt;a class="link" href="https://developers.cloudflare.com/bots/reference/bot-verification/web-bot-auth/" target="_blank" rel="noopener"
 &gt;Web Bot Auth&lt;/a&gt; and &lt;a class="link" href="https://spiffe.io/" target="_blank" rel="noopener"
 &gt;SPIFFE&lt;/a&gt;. Web Bot Auth is a young standard, with the &lt;a class="link" href="https://www.ietf.org/archive/id/draft-meunier-webbotauth-registry-01.html" target="_blank" rel="noopener"
 &gt;IETF working group chartered in early 2026&lt;/a&gt;. AI agents attach a &lt;strong&gt;private-key signature&lt;/strong&gt; to every HTTP request; sites verify it against a public-key directory. &lt;a class="link" href="https://blog.cloudflare.com/web-bot-auth/" target="_blank" rel="noopener"
 &gt;Cloudflare&lt;/a&gt; and &lt;a class="link" href="https://datadome.co/changelog/web-bot-auth-verifying-user-identity-ensuring-agent-trust/" target="_blank" rel="noopener"
 &gt;DataDome&lt;/a&gt; adopt the same standard. &lt;a class="link" href="https://corporate.visa.com/en/products/visa-trusted-agent-protocol.html" target="_blank" rel="noopener"
 &gt;Visa TAP&lt;/a&gt; and &lt;a class="link" href="https://www.mastercard.com/news/press/2025/april/mastercard-unveils-agent-pay-pioneering-agentic-payments-technology/" target="_blank" rel="noopener"
 &gt;Mastercard Agent Pay&lt;/a&gt; ride on top of it.&lt;/p&gt;
&lt;h3 id="axis-2--agentic-policy-engine"&gt;Axis 2 — Agentic Policy Engine
&lt;/h3&gt;&lt;p&gt;A policy engine that gates allow/block decisions per stage based on risk score, automation type, and agent identity. It is an extension of &lt;a class="link" href="https://docs.cloud.google.com/recaptcha/docs/actions-website" target="_blank" rel="noopener"
 &gt;reCAPTCHA Enterprise Actions&lt;/a&gt; — login, signup, payment, and checkout are no longer evaluated independently but as a single lifecycle.&lt;/p&gt;
&lt;h3 id="axis-3--ai-resistant-challenge"&gt;Axis 3 — AI-Resistant Challenge
&lt;/h3&gt;&lt;p&gt;A new &lt;strong&gt;QR-code challenge&lt;/strong&gt; scanned with your phone, designed to break the economics of automation. The same idea, however, drew &lt;a class="link" href="https://www.theregister.com/2023/07/25/google_web_environment_integrity/" target="_blank" rel="noopener"
 &gt;intense backlash&lt;/a&gt; when proposed as &lt;a class="link" href="https://en.wikipedia.org/wiki/Web_Environment_Integrity" target="_blank" rel="noopener"
 &gt;Web Environment Integrity&lt;/a&gt;, and &lt;a class="link" href="https://privatecaptcha.com/blog/google-cloud-fraud-defence-wei/" target="_blank" rel="noopener"
 &gt;Private Captcha&amp;rsquo;s critique&lt;/a&gt; argues that &amp;ldquo;Fraud Defense is WEI repackaged.&amp;rdquo; &lt;a class="link" href="https://www.eff.org/deeplinks/2023/08/your-computer-should-say-what-you-tell-it-say-1" target="_blank" rel="noopener"
 &gt;EFF&lt;/a&gt; called WEI &amp;ldquo;the DRM-ification of the web.&amp;rdquo;&lt;/p&gt;
&lt;h2 id="3-friction-layer-vs-risk-engine-layer"&gt;3. Friction Layer vs Risk Engine Layer
&lt;/h2&gt;&lt;p&gt;The cleanest framing is:&lt;/p&gt;

 &lt;blockquote&gt;
 &lt;p&gt;&lt;strong&gt;reCAPTCHA was the friction layer. Fraud Defense is the risk engine layer.&lt;/strong&gt;&lt;/p&gt;

 &lt;/blockquote&gt;
&lt;p&gt;The friction layer&amp;rsquo;s job was &lt;strong&gt;putting a challenge in front of the user&lt;/strong&gt;. The risk engine layer&amp;rsquo;s job is &lt;strong&gt;scoring a session against learned attack patterns&lt;/strong&gt;. When the score is clean, the user never sees a challenge. Google cites the &lt;a class="link" href="https://www.shopify.com/retail/the-future-of-retail" target="_blank" rel="noopener"
 &gt;2025 Shopify Retail Report&lt;/a&gt; projection that AI shopping assistants will lift average order value by &lt;strong&gt;25%&lt;/strong&gt; — that is the business gravity creating pressure to remove UX friction entirely.&lt;/p&gt;
&lt;pre class="mermaid" style="visibility:hidden"&gt;flowchart LR
 A["incoming request"] --&gt; B{"risk engine"}
 B -- "clean 0.9+" --&gt; C["pass &amp;lt;br/&amp;gt; no challenge"]
 B -- "ambiguous 0.3-0.9" --&gt; D["adaptive policy &amp;lt;br/&amp;gt; step-up auth"]
 B -- "suspicious 0.3-" --&gt; E["block / QR challenge"]

 F["behavioral signals"] --&gt; B
 G["device fingerprint"] --&gt; B
 H["account graph"] --&gt; B
 I["Web Bot Auth signature"] --&gt; B&lt;/pre&gt;&lt;p&gt;Google&amp;rsquo;s headline number is &lt;strong&gt;a 51% average reduction in account takeover (ATO)&lt;/strong&gt;. That is not a challenge-pass rate — it is the &lt;strong&gt;outcome metric&lt;/strong&gt; that only makes sense once you cross from the friction layer to the risk engine layer.&lt;/p&gt;
&lt;h2 id="4-competitive-landscape--turnstile--waf-bot-control--akamai--arkose"&gt;4. Competitive Landscape — Turnstile / WAF Bot Control / Akamai / Arkose
&lt;/h2&gt;&lt;p&gt;Fraud Defense did not appear in a vacuum. The bot/fraud defense market is already layered.&lt;/p&gt;
&lt;table&gt;
 &lt;thead&gt;
 &lt;tr&gt;
 &lt;th&gt;Vendor&lt;/th&gt;
 &lt;th&gt;Product&lt;/th&gt;
 &lt;th&gt;Positioning&lt;/th&gt;
 &lt;/tr&gt;
 &lt;/thead&gt;
 &lt;tbody&gt;
 &lt;tr&gt;
 &lt;td&gt;Cloudflare&lt;/td&gt;
 &lt;td&gt;&lt;a class="link" href="https://www.cloudflare.com/products/turnstile/" target="_blank" rel="noopener"
 &gt;Turnstile&lt;/a&gt; + &lt;a class="link" href="https://www.cloudflare.com/application-services/products/bot-management/" target="_blank" rel="noopener"
 &gt;Bot Management&lt;/a&gt;&lt;/td&gt;
 &lt;td&gt;Edge CDN-integrated invisible challenge&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;AWS&lt;/td&gt;
 &lt;td&gt;&lt;a class="link" href="https://aws.amazon.com/waf/features/bot-control/" target="_blank" rel="noopener"
 &gt;WAF Bot Control&lt;/a&gt;&lt;/td&gt;
 &lt;td&gt;Rule-based, native to AWS&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;Akamai&lt;/td&gt;
 &lt;td&gt;&lt;a class="link" href="https://www.akamai.com/products/bot-manager" target="_blank" rel="noopener"
 &gt;Bot Manager&lt;/a&gt;&lt;/td&gt;
 &lt;td&gt;Enterprise ML, with &lt;a class="link" href="https://www.f5.com/products/security/shape-ai-fraud-engine" target="_blank" rel="noopener"
 &gt;Shape Security&lt;/a&gt; lineage&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;F5&lt;/td&gt;
 &lt;td&gt;&lt;a class="link" href="https://www.f5.com/cloud/products/bot-defense" target="_blank" rel="noopener"
 &gt;Distributed Cloud Bot Defense&lt;/a&gt;&lt;/td&gt;
 &lt;td&gt;Shape-based, strong in financial services&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;Imperva&lt;/td&gt;
 &lt;td&gt;&lt;a class="link" href="https://www.imperva.com/products/bot-management/" target="_blank" rel="noopener"
 &gt;Advanced Bot Protection&lt;/a&gt;&lt;/td&gt;
 &lt;td&gt;WAF-integrated&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;Arkose Labs&lt;/td&gt;
 &lt;td&gt;&lt;a class="link" href="https://www.arkoselabs.com/arkose-bot-manager/" target="_blank" rel="noopener"
 &gt;Arkose Bot Manager&lt;/a&gt;&lt;/td&gt;
 &lt;td&gt;Challenge-based, strong in gaming/social&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;Sardine&lt;/td&gt;
 &lt;td&gt;&lt;a class="link" href="https://www.sardine.ai/" target="_blank" rel="noopener"
 &gt;Sardine&lt;/a&gt;&lt;/td&gt;
 &lt;td&gt;Behavioral biometrics-first&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;BioCatch&lt;/td&gt;
 &lt;td&gt;&lt;a class="link" href="https://www.biocatch.com/" target="_blank" rel="noopener"
 &gt;BioCatch&lt;/a&gt;&lt;/td&gt;
 &lt;td&gt;Mouse/typing patterns&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;DataDome&lt;/td&gt;
 &lt;td&gt;&lt;a class="link" href="https://datadome.co/" target="_blank" rel="noopener"
 &gt;DataDome&lt;/a&gt;&lt;/td&gt;
 &lt;td&gt;API-first, early Web Bot Auth adopter&lt;/td&gt;
 &lt;/tr&gt;
 &lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;Google&amp;rsquo;s differentiator is the &lt;strong&gt;scale of the data footprint&lt;/strong&gt;. Per the announcement, the fraud intelligence graph covers 50% of the &lt;a class="link" href="https://fortune.com/ranking/fortune500/" target="_blank" rel="noopener"
 &gt;Fortune 100&lt;/a&gt; and over &lt;strong&gt;14 million domains globally&lt;/strong&gt;. If friction itself is disappearing, &lt;strong&gt;signal richness becomes the decisive moat&lt;/strong&gt; — more signals make the score sharper, a sharper score lets you ship with less friction.&lt;/p&gt;
&lt;h2 id="5-the-regulatory-backdrop--psd2-sca-ftc-bot-rulemaking"&gt;5. The Regulatory Backdrop — PSD2 SCA, FTC Bot Rulemaking
&lt;/h2&gt;&lt;p&gt;Context builders should not forget: products like this are &lt;strong&gt;shaped by regulation&lt;/strong&gt;.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="link" href="https://en.wikipedia.org/wiki/Strong_customer_authentication" target="_blank" rel="noopener"
 &gt;PSD2 SCA&lt;/a&gt; entered force in the EU on 2019-09-14, mandating multi-factor authentication on electronic payments. Per the &lt;a class="link" href="https://stripe.com/guides/strong-customer-authentication" target="_blank" rel="noopener"
 &gt;Stripe SCA guide&lt;/a&gt;, at least two of knowledge / possession / inherence are required. But SCA also includes a &lt;strong&gt;TRA (Transaction Risk Analysis) exemption&lt;/strong&gt; — if the risk score is low enough, SCA can be skipped. The accuracy of your risk engine maps directly to checkout conversion.&lt;/li&gt;
&lt;li&gt;The &lt;a class="link" href="https://www.ftc.gov/policy/advocacy-research/tech-at-ftc/2023/06/keeping-fake-reviews-out-shopping-results" target="_blank" rel="noopener"
 &gt;FTC&amp;rsquo;s bot rulemaking&lt;/a&gt; has ramped enforcement on fake reviews and fake accounts, and the &lt;a class="link" href="https://www.fcc.gov/document/fcc-makes-ai-generated-voices-robocalls-illegal" target="_blank" rel="noopener"
 &gt;FCC&amp;rsquo;s AI robocall ruling&lt;/a&gt; closed off voice channels.&lt;/li&gt;
&lt;li&gt;Under &lt;a class="link" href="https://gdpr.eu/" target="_blank" rel="noopener"
 &gt;GDPR&lt;/a&gt; and similar laws, behavioral biometric data is close to sensitive data — the legal status of signals Fraud Defense collects and shares remains gray.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="6-ai-on-ai-defense--same-weapons-different-targets"&gt;6. AI-on-AI Defense — Same Weapons, Different Targets
&lt;/h2&gt;&lt;p&gt;The most honest framing: &lt;strong&gt;both attackers and defenders have access to the same LLMs.&lt;/strong&gt; &lt;a class="link" href="https://www.anthropic.com/news/threat-intelligence-report-2026" target="_blank" rel="noopener"
 &gt;Anthropic&amp;rsquo;s 2026 threat intelligence report&lt;/a&gt; documents the industrialization of LLM-assisted credential stuffing and phishing this year. &lt;a class="link" href="https://openai.com/index/scaling-trusted-access-for-cyber-defense/" target="_blank" rel="noopener"
 &gt;OpenAI&amp;rsquo;s Trusted Access for Cyber&lt;/a&gt; loosens safety policy only for verified defenders — an asymmetric policy. Fraud Defense&amp;rsquo;s agentic policy engine creates the same asymmetry on the bot traffic side — &lt;strong&gt;good agents authenticate and pass; bad agents get filtered by score.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The unresolved question is who defines &amp;ldquo;good agent.&amp;rdquo; Tier-1 vendors like &lt;a class="link" href="https://openai.com/" target="_blank" rel="noopener"
 &gt;OpenAI&lt;/a&gt;, &lt;a class="link" href="https://www.anthropic.com/" target="_blank" rel="noopener"
 &gt;Anthropic&lt;/a&gt;, and &lt;a class="link" href="https://www.perplexity.ai/" target="_blank" rel="noopener"
 &gt;Perplexity&lt;/a&gt; can plug into Web Bot Auth easily. What about a small builder running their own model? An agent hosted on &lt;a class="link" href="https://huggingface.co/spaces" target="_blank" rel="noopener"
 &gt;Hugging Face Spaces&lt;/a&gt;? Until the standard stabilizes, the score decides — and the score is graded by &lt;strong&gt;a model Google trained&lt;/strong&gt;.&lt;/p&gt;
&lt;h2 id="7-what-app-builders-actually-need-to-do"&gt;7. What App Builders Actually Need to Do
&lt;/h2&gt;&lt;p&gt;Existing &lt;a class="link" href="https://docs.cloud.google.com/recaptcha/docs/compare-tiers" target="_blank" rel="noopener"
 &gt;reCAPTCHA Enterprise&lt;/a&gt; customers have no migration, no pricing change, and their site keys still work. That said, there is real work to do.&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Pass a stable &lt;code&gt;hashedAccountId&lt;/code&gt;.&lt;/strong&gt; Without it, &lt;a class="link" href="https://docs.cloud.google.com/recaptcha/docs/samples/recaptcha-enterprise-account-defender-assessment" target="_blank" rel="noopener"
 &gt;Account Defender assessments&lt;/a&gt; cannot build the per-account activity model.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Wire Actions across the full lifecycle.&lt;/strong&gt; Login and signup are table stakes — &lt;strong&gt;add them to payment and checkout too&lt;/strong&gt;. Fraud Defense&amp;rsquo;s accuracy compounds with lifecycle correlation.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Design a false-positive remediation path.&lt;/strong&gt; Do not hard-block on a single low score. Layer in step-up auth with &lt;a class="link" href="https://webauthn.io/" target="_blank" rel="noopener"
 &gt;WebAuthn&lt;/a&gt; / &lt;a class="link" href="https://passkeys.dev/" target="_blank" rel="noopener"
 &gt;passkeys&lt;/a&gt; / OTP. Push the same policy to the edge by integrating &lt;a class="link" href="https://cloud.google.com/armor" target="_blank" rel="noopener"
 &gt;Cloud Armor&lt;/a&gt; with &lt;a class="link" href="https://codelabs.developers.google.com/codelabs/cloud-armor-recaptcha-bot-management" target="_blank" rel="noopener"
 &gt;reCAPTCHA Enterprise for WAF&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Observe agent traffic separately.&lt;/strong&gt; &amp;ldquo;User comes in through an agent&amp;rdquo; is about to become normal traffic. Use the agentic activity dashboard to track the human/bot/agent split.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Audit where data flows.&lt;/strong&gt; Fraud Defense contributes to a global graph. For sensitive domains (healthcare, finance), check &lt;a class="link" href="https://cloud.google.com/security-and-identity/data-residency" target="_blank" rel="noopener"
 &gt;data residency&lt;/a&gt; options and document which signals leak into the graph.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id="8-tying-it-together"&gt;8. Tying It Together
&lt;/h2&gt;&lt;p&gt;For 18 years reCAPTCHA&amp;rsquo;s job was to ask &amp;ldquo;is this user human.&amp;rdquo; Fraud Defense&amp;rsquo;s job is to ask &amp;ldquo;is this session risky.&amp;rdquo; The &lt;strong&gt;shift from friction layer to risk engine layer&lt;/strong&gt; improves the UX, but it inversely &lt;strong&gt;increases dependence on Google&amp;rsquo;s risk score&lt;/strong&gt;. When the score is wrong, the false-positive remediation path is the builder&amp;rsquo;s problem to design. Trust in the agentic web does not come for free.&lt;/p&gt;
&lt;pre class="mermaid" style="visibility:hidden"&gt;flowchart LR
 A["past: challenge is visible"] --&gt; B["present: score decides"]
 B --&gt; C["future: agent identity decides"]
 C --&gt; D["open question: who grades the score"]&lt;/pre&gt;&lt;h2 id="insights"&gt;Insights
&lt;/h2&gt;&lt;p&gt;The most interesting signal is the direction in which &lt;strong&gt;the challenge UI is disappearing&lt;/strong&gt;. Google is moving toward invisible verification, much like &lt;a class="link" href="https://www.cloudflare.com/products/turnstile/" target="_blank" rel="noopener"
 &gt;Cloudflare Turnstile&lt;/a&gt; — and at the same time &lt;strong&gt;laid the AI-resistant QR challenge as a backstop&lt;/strong&gt;. No friction when the score is clean; phone comes out only when it is suspicious. That is, in practice, &lt;a class="link" href="https://privatecaptcha.com/blog/google-cloud-fraud-defence-wei/" target="_blank" rel="noopener"
 &gt;a workaround that achieves what WEI could not&lt;/a&gt; — without forcing browser attestation, it pulls &lt;strong&gt;the phone as a trusted device&lt;/strong&gt; into the challenge surface and produces the same effect. The fastest-moving area next quarter is &lt;strong&gt;SCA exemption rates at checkout&lt;/strong&gt;. The moment payment PSPs start accepting the Fraud Defense score as a basis for TRA exemption, the conversion-rate uplift becomes a decisive moat. Practical takeaway for builders: &lt;strong&gt;wire Actions across the lifecycle, pass &lt;code&gt;hashedAccountId&lt;/code&gt;, and pre-design a false-positive remediation path with WebAuthn step-up&lt;/strong&gt;. Score accuracy is now the revenue curve.&lt;/p&gt;
&lt;h2 id="references"&gt;References
&lt;/h2&gt;&lt;p&gt;&lt;strong&gt;Google Cloud — Official&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="link" href="https://cloud.google.com/blog/products/identity-security/introducing-google-cloud-fraud-defense-the-next-evolution-of-recaptcha/" target="_blank" rel="noopener"
 &gt;Introducing Google Cloud Fraud Defense (Cloud Blog)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="link" href="https://cloud.google.com/security/products/fraud-defense" target="_blank" rel="noopener"
 &gt;Fraud Defense product page&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="link" href="https://cloud.google.com/security/products/recaptcha" target="_blank" rel="noopener"
 &gt;reCAPTCHA product page&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="link" href="https://docs.cloud.google.com/recaptcha/docs/account-defender" target="_blank" rel="noopener"
 &gt;Account Defender docs&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="link" href="https://codelabs.developers.google.com/codelabs/cloud-armor-recaptcha-bot-management" target="_blank" rel="noopener"
 &gt;reCAPTCHA Enterprise + Cloud Armor codelab&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="link" href="https://cloud.google.com/blog/products/identity-security/next26-redefining-security-for-the-ai-era-with-google-cloud-and-wiz" target="_blank" rel="noopener"
 &gt;Next &amp;lsquo;26 Security recap&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Standards / Protocols&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="link" href="https://developers.cloudflare.com/bots/reference/bot-verification/web-bot-auth/" target="_blank" rel="noopener"
 &gt;Web Bot Auth (Cloudflare docs)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="link" href="https://www.ietf.org/archive/id/draft-meunier-webbotauth-registry-01.html" target="_blank" rel="noopener"
 &gt;Web Bot Auth IETF draft&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="link" href="https://spiffe.io/" target="_blank" rel="noopener"
 &gt;SPIFFE&lt;/a&gt; · &lt;a class="link" href="https://webauthn.io/" target="_blank" rel="noopener"
 &gt;WebAuthn&lt;/a&gt; · &lt;a class="link" href="https://passkeys.dev/" target="_blank" rel="noopener"
 &gt;Passkeys&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="link" href="https://en.wikipedia.org/wiki/Web_Environment_Integrity" target="_blank" rel="noopener"
 &gt;Web Environment Integrity (Wikipedia)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Competitive / Comparisons&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="link" href="https://www.cloudflare.com/products/turnstile/" target="_blank" rel="noopener"
 &gt;Cloudflare Turnstile&lt;/a&gt; · &lt;a class="link" href="https://aws.amazon.com/waf/features/bot-control/" target="_blank" rel="noopener"
 &gt;AWS WAF Bot Control&lt;/a&gt; · &lt;a class="link" href="https://www.akamai.com/products/bot-manager" target="_blank" rel="noopener"
 &gt;Akamai Bot Manager&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="link" href="https://www.arkoselabs.com/arkose-bot-manager/" target="_blank" rel="noopener"
 &gt;Arkose Bot Manager&lt;/a&gt; · &lt;a class="link" href="https://datadome.co/" target="_blank" rel="noopener"
 &gt;DataDome&lt;/a&gt; · &lt;a class="link" href="https://www.biocatch.com/" target="_blank" rel="noopener"
 &gt;BioCatch&lt;/a&gt; · &lt;a class="link" href="https://www.sardine.ai/" target="_blank" rel="noopener"
 &gt;Sardine&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="link" href="https://privatecaptcha.com/blog/google-cloud-fraud-defence-wei/" target="_blank" rel="noopener"
 &gt;Private Captcha — Fraud Defense WEI critique&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Regulatory / Context&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="link" href="https://en.wikipedia.org/wiki/Strong_customer_authentication" target="_blank" rel="noopener"
 &gt;PSD2 Strong Customer Authentication&lt;/a&gt; · &lt;a class="link" href="https://stripe.com/guides/strong-customer-authentication" target="_blank" rel="noopener"
 &gt;Stripe SCA guide&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="link" href="https://www.eff.org/deeplinks/2023/08/your-computer-should-say-what-you-tell-it-say-1" target="_blank" rel="noopener"
 &gt;EFF — WEI critique&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="link" href="https://corporate.visa.com/en/products/visa-trusted-agent-protocol.html" target="_blank" rel="noopener"
 &gt;Visa Trusted Agent Protocol&lt;/a&gt; · &lt;a class="link" href="https://www.mastercard.com/news/press/2025/april/mastercard-unveils-agent-pay-pioneering-agentic-payments-technology/" target="_blank" rel="noopener"
 &gt;Mastercard Agent Pay&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description></item></channel></rss>