Get your free personalized podcast brief

We scan new podcasts and send you the top 5 insights daily.

Because compute theft occurs before a transaction, fraud risk for AI companies starts at sign-up, not checkout. In response, Stripe has adapted its Radar product to be integrated at the beginning of the user lifecycle, assessing risk before any costly credits are granted.

Related Insights

Binary decisions are brittle. For payments that are neither clearly safe nor clearly fraudulent, Stripe uses a "soft block." This triggers a 3DS authentication step, allowing legitimate users to proceed while stopping fraudsters, resolving ambiguity without losing revenue.

Stripe frames unoptimized payment infrastructure not just as a missed opportunity but as an active state of "low-revenue mode." This leakage from poor conversion, authorization, and fraud prevention rates represents one of the highest ROI growth levers a company can pull, often overlooked for splashy ad campaigns.

Stripe avoids costly system rebuilds by treating its new payments foundation model as a modular component. Its powerful embeddings are simply added as new features to many existing ML classifiers, instantly boosting their performance with minimal engineering effort.

The evolution of fraud prevention is shifting from a static view of "who the customer is" to a real-time understanding of "what this customer is trying to do right now." This focus on intent allows brands to adapt dynamically, either stopping abuse or creating loyalty.

Stripe's AI model processes payments as a distinct data type, not just text. It analyzes transaction sequences across buyers, cards, devices, and merchants to uncover complex fraud patterns invisible to humans, boosting card testing detection from 59% to 97%.

For complex cases like "friendly fraud," traditional ground truth labels are often missing. Stripe uses an LLM to act as a judge, evaluating the quality of AI-generated labels for suspicious payments. This creates a proxy for ground truth, enabling faster model iteration.

By creating dense embeddings for every transaction, Stripe's model identifies subtle patterns of card testing (e.g., tiny, repetitive charges) hidden within high-volume merchants' traffic. These attacks are invisible to traditional ML but appear as distinct clusters to the foundation model, boosting detection on large users from 59% to 97%.

A defender's key advantage is their massive dataset of legitimate activity. Machine learning excels by modeling the messy, typo-ridden chaos of real business data. Fraudsters, however sophisticated, cannot perfectly replicate this organic "noise," causing their cleaner, fabricated patterns to stand out as anomalies.

Unlike traditional SaaS, AI companies' free tiers have high marginal costs from compute. Fraudsters now steal these valuable compute credits via multi-account and free trial abuse, creating an existential threat to unit economics that goes beyond simple payment fraud.

Purely model-based or rule-based systems have flaws. Stripe combines them for better results. For instance, a transaction with a CVC code mismatch (a rule) is only blocked if its model-generated risk score is also elevated, preventing rejection of good customers who make simple mistakes.