<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Compliancely</provider_name><provider_url>https://compliancely.com/blog</provider_url><author_name>admin</author_name><author_url>https://compliancely.com/blog/author/admin/</author_url><title>5 Biggest Challenges In Identity Verification - Compliancely</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="KCxoWoTkdd"&gt;&lt;a href="https://compliancely.com/blog/5-biggest-challenges-in-identity-verification/"&gt;5 Biggest Challenges In Identity Verification&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://compliancely.com/blog/5-biggest-challenges-in-identity-verification/embed/#?secret=KCxoWoTkdd" width="600" height="338" title="&#x201C;5 Biggest Challenges In Identity Verification&#x201D; &#x2014; Compliancely" data-secret="KCxoWoTkdd" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://compliancely.com/blog/wp-includes/js/wp-embed.min.js
&lt;/script&gt;
</html><thumbnail_url>https://compliancely.com/blog/wp-content/uploads/2022/02/5-biggest-challenges-1.png</thumbnail_url><thumbnail_width>730</thumbnail_width><thumbnail_height>400</thumbnail_height><description>A variety of enterprise industries are leveraging the identity verification solutions, such as Compliancely that are available in the market. While incorporating identity verification infrastructure is just the starting point of compliance in accordance with AML and ATF regulations, the scope for effective utilization of identity validation is plenty. &#xA0; It is important to understand [&hellip;]</description></oembed>
