Endgame with Gita Wirjawan - How AI-Enabled Organized Crimes & Systemic Scams Work - Niki Luhur

Episode Date: March 7, 2026

AI’s greatest disruption may not be automation — but trust. From deepfakes and adversarial attacks to cyber fraud funding organized crime, the risks are no longer theoretical. In an age where cont...rolling your own data feels increasingly impossible, Niki Luhur (Founder & Group CEO, VIDA), argues that only a zero-trust redesign of digital systems can prevent the next systemic crisis.Learn how to protect yourself and your business in the age of scamdemics: https://vida.id/en/wheresthefraud#Endgame #GitaWirjawan #NikiLuhur------------------Get your copy of Gita Wirjawan’s book, “What It Takes: Southeast Asia”, NOW: https://sgpp.me/what-it-takes-ytAnd leave your review here:https://www.goodreads.com/book/show/241922036-what-it-takes------------------Watch Niki’s first episode on Endgame:https://youtu.be/yIGS5ZXVnJU?si=6zgyvMmnu7QyA91CYou might also like:https://youtu.be/HXM089acVZ0?si=q_BgjGBqKpiSQMuthttps://youtu.be/xUdCSq4W1Kk?si=_Kf4OrGHH2M6wwayhttps://youtu.be/yln9TcNRw8w?si=vn3EBVY4110IsIr3------------------

Transcript
Discussion (0)
Starting point is 00:00:00 We lose trust, and our economy and our digital economy, especially in this case, can move backwards. If you still believe that a password is a secure factor, that's definitely very questionable, but it's still accepted. If you believe that a SMSOTP is also a secure factor, the proof is the majority of the fishing and the biggest threat, today, the number one attack method or vector is through fishing. And what are they fishing for? They're fishing for that SMS with TP. They will be weaponized. Already has been.
Starting point is 00:00:44 Already has been. Geopolitics is also intertwined today with cyber-related risks, whether it's cyber espionage, it's spread of disinformation, or it's literally cyber-enabled fraud and identity theft used to fund nuclear weapons programs. I mean, it sounds crazy, but it's actually true. I don't believe it's enough to say, well, we need to educate the consumer. I believe that the call to action is to step in and say, we need to change the system. Hi, friends. It's a pleasure to tell you that my book, What It Takes Southeast Asia, has been released in English and Bahasa Indonesia. You can buy it through
Starting point is 00:01:48 books.endgame. ID or at any of these stores. Now back to the show. This is Gita Wideawat. I don't usually do endorsements like this, but this opportunity is only for people who trust my judgment. If you believe that, this is a deep thick and next time there may be no warning. Hello, time. Today, today we're coming Nikki Luhur, with a time to my Godfey as founder and the pinpinan from Vida.
Starting point is 00:02:22 Nikki, so good to see you. Good to see you again, Pagita. Welcome back. It's been around four years since we last talked on a podcast. Let's talk about AI. What's your general view about AI?
Starting point is 00:02:39 I mean, as everyone has talked about the incredible advancements of you know, essentially the democratization of intelligence. It's not just about access to information of what the internet has brought,
Starting point is 00:02:56 but I think we've seen very materially since we last book four years ago. I mean, it was at a nascent, almost conceptual stage. So now it's everyday, everyone can and probably is using AI to some degree. And the rate of improvement is just, going exponentially. I mean, one of the simple statistics is the state of the art technologies, right, each model,
Starting point is 00:03:28 there's a half-life of how fast it's moving. You know, GPT4 stood, you know, at the top of the game for maybe about 12 months. And if you fast forward to the most recent models being released, now they're probably being outpaced and redundant, or being a new state of the art is coming out every two weeks. So even in the past year, I don't think we fully comprehend the exponential curve that we're really facing. It's just hard for us to think in those, in that time frame.
Starting point is 00:04:10 So we're still in the very early days. And yet, I don't think we fully grasp. how fast things are moving and how much faster they will continue to move. So there's a lot of promise. I think personally, I love the fact that there's a lot more focus on things like personalized health. And being able to leverage AI to give me a fully custom tailored view on all of my reports,
Starting point is 00:04:43 all my diagnostic, all of my vitamins, my supplements and my diet, my nutrition, it actually can synthesize all of those micro signals. Right? Because if we think about health, I mean, let's think about the foundations. You know, it comes down to your sleep and you have devices that help track our sleep, our exercise, our nutrition.
Starting point is 00:05:05 And there isn't these sort of blunt force approaches anymore. So I think there is a real promise that I'm very excited about for AI when it comes to things like personalized health. I think it was very much becoming a reality. And especially if we start looking at, you know, even on the research side, things like peptides and where that's going. It's very, very exciting. So I think there's an amazing view there at the same time professionally.
Starting point is 00:05:37 Since we're in the cybersecurity space, we directly see some terrifying things. And, you know, some of the first. fraud we used to see of deep fakes. We would back then call them four years ago cheap fakes. I mean, they're very laughable. I mean, you can look at it and you could see, that's clearly, you know, a fake. That background does not look real at all.
Starting point is 00:06:02 That face swap is so rough. It looks like, you know, a third grader cut, cut, you know, and crafted a new ID by pasting someone's face, you know, on an old ID. to then what we've seen last year of generative AI, stable diffusion models being used to craft extremely realistic deep fakes and not just one at scale, rapidly, targeted, organized. And not just all of that, but there are some that we've seen that are so sophisticated.
Starting point is 00:06:42 they actually have inserted what's called adversarial noise, which is it looks like this grain in image, but it's designed to attack AI models that are trying to detect fraud. So it's a counterattack that's embedded in the image itself, which means the scammers, the fraudsters, actually have a team of data science engineers behind them, crafting this.
Starting point is 00:07:14 So that's what I think has been the big shift is there's such a big polarity. The technology is undeniable of how fast it's improved, how incredible it's improved. But we've also seen really
Starting point is 00:07:29 positive and very negative applications of that technology. And I think that's where a lot of topics about governance are coming out. But that's the, I would say, the dual-sided coin of what AI has to bring in terms of promise and also in terms of the concerns and the threats that are very real. This is not some theoretical
Starting point is 00:07:59 distant future threat. I mean, there's attacks that are emptying people's bank accounts and their entire life savings today. Are we at a level where it is so simple to do it or only, Only very finite numbers of people. They can do it. Anyone can do it today. Oh, my gosh. Anyone can do it. You literally can download an application.
Starting point is 00:08:23 And within five minutes, create a hyper-realistic custom deep fake. And in fact, we can make one of you, Bob. I saw. We made one of you just to show you and just to prove you. And that was actually you, right? Talking. That was me talking. what shows up is my face talking with my voice.
Starting point is 00:08:45 With your voice, a professional voice clone, and every gesture from a hand gesture to my facial movements or your facial movements, because it's already been trained on your podcast data. And it's, you only need, at least today, and this will get better, you only need about 15 minutes of a decent audio, clip to make a professional voice clone of someone.
Starting point is 00:09:16 So this is where... It could also scrape my thought processes that are online. Well, because every single video that's online, there's plenty of AI that can turn any video and any audio into transcripts and then analyze your mannerisms, analyze the way you speak, the topics you think about, your mental model, how you dissect information, your large views on geopolitics,
Starting point is 00:09:50 on the macro environment, on infrastructure, and of course your views on Indonesia on Southeast Asia, it can give a very concise summary today. In fact, I could probably just pull out chat GPT and I could give you a summary of your views,
Starting point is 00:10:07 but. When we're, when, We met four years ago, you probably didn't think it was going to go this fast, right? No, you have some or better feel of the velocity and acceleration that this train is moving at. Picture or draw a picture of what it's going to look like in five years. Or it's unimaginable because it just might supersede anybody's expectations or anybody's reality. I think going to five years is actually quite difficult nowadays.
Starting point is 00:10:49 But even thinking about what's going to happen in the next one or two years, because we're in cybersecurity, we tend to think of the negative and the risks quite a lot. How much can anyone be able to eyeball whether this is real or not? I believe within a year or two will be near impossible. So the spread and the risk, of course, if you talk about geopolitics, of misinformation, is an incredibly large risk. And in today's day and age, I don't think that we fact check or verify information being spread. in a scalable way.
Starting point is 00:11:50 It's often just trust and not trust and verify. And I think that's something that we need to structurally change because those risks will become very large geopolitical risks. These are not things that are small amateur issues anymore. And they will be webbing. It already has been. It already has been, but I think even more so. And not just weaponize at large, you know, political agendas or even state sanction agendas, but down to, you know, criminal organizations that are not at that level of a state level, but able to, you know, pose a very significant.
Starting point is 00:12:46 economic risk. In fact, I mean, this is the week of, I don't know, a bunch of people are in Davos today, right, for the World Economic Forum. And the number one risk that, global risk that World Economic Forum, in fact, highlighted even then since we last talked four years ago, cyber-related fraud and identity theft and cyber-related cybersecurity risk, infrastructure risk, we're already called out back then. And if anything, it's become a bigger issue. The number one issues that, of course, everyone's talking about today is definitely geopolitics. But geopolitics is also intertwined today with cyber-related risks, whether it's cyber espionage, it's spread of disinformation, or it's literally cyber-enabled fraud and identity theft used to fund nuclear. weapons programs. I mean, it sounds crazy, but it's actually true. So even at the global scale,
Starting point is 00:13:54 you have this number one issue, but actually it's intertwined with these cybersecurity threats. And the threats have actually, if we look at the evolution, especially in this last year, there's been a lot of change and what has been the traditional threat of a traditional cybersecurity threats, whether we're talking about ransomware attacks. Definitely still a big issue. But CEO's number one concern today is cyber-related fraud and identity theft. And a lot of that coincides with the advancement of AI technology and Gen AI and the ability to personalize that attack, the ability for me to. to take on a stolen identity and be able to create a hyper-realistic deep fake, visually, audio.
Starting point is 00:14:59 It's already extremely difficult. And someone can do this in five minutes. And if they're really good, they can do it in a minute. And it's not hard. So this is where fighting this problem will be an expert. exponentially harder problem. And I think that's where we need to flip a lot of the way we think about it as opposed to just using, of course, there's AI versus AI and you continue to have, you know,
Starting point is 00:15:30 on our side, we build neural networks to do a lot of the fraud detection to analyze lots of signals. But on the other side, it's how do we actually rethink trust? Yeah. And a lot of it is being able to actually develop a clearer way to track provenance and a clear way to link that trust from the point of creation all the way through the distribution. I want to pick up on geopolitics. The world order has become much more multipolar. than ever
Starting point is 00:16:16 or then maybe 10 years ago and it's much more structured it's more structured it's more structured in the sense that you can better identify who's an enemy who is a friend
Starting point is 00:16:31 and who can swing and you know pops in my mind just some observations with respect to what you've alluded to earlier I just kept thinking of vulnerabilities whether you're a friend, a foe, or a swinger.
Starting point is 00:16:51 I'm in a camp that believes that Southeast Asia can swing between China and the West. But the vulnerabilities with respect to Southeast Asia outside Singapore, of course, because they're just a high-income country. The first vulnerability I keep thinking is the cognitive development. of the citizenry, right? To the extent that you know, the people are not well educated, you combine that with the ability of anybody with a funny idea to spread misinformation,
Starting point is 00:17:37 much less disinformation, which is essentially misinformation on steroids. The vulnerability is there, structurally. That's the first vulnerability that I can point out. And unfortunately, Southeast Asians, for the most part, are not as educated at both the non-turtiary and tertiary levels as they should be compared to the Chinas of the world and the Western countries of the world. The second is energy, right? And energy doesn't get talked about as much as it should be in a context of that being the, unequalizer. People talk about inequalities in the context of wealth, income, opportunities, right?
Starting point is 00:18:24 But some villages may not have as much or nearly as much as energy as the bigger towns, secondary or primary. Some countries have a lot of less energy. What do you think of these two vulnerabilities, lack of energy and lack of cognitive development? Are those, I mean, they're not going to get remedied anytime soon, right? Those are the recipes for systemic vulnerabilities for frauds or scams, right? How do you remedy this? So, I mean, if it takes one guy to, just 10 to 15 minutes to create a scam onto a lay person who is not well educated, who's not well off, the vulnerability is there and who's not
Starting point is 00:19:19 well energized. What's the quick fix? I think the quick fix is regulations. And simply put, if we looked at whether it's a financial regulator or we look at a regulator in charge of digital infrastructure or the digital economy, I mean, we can easily reference anywhere in the world, electronic transaction acts, personal data protection acts, cyber security acts, anti-fraud or scamming acts, these are actually some of the new ones coming out. And ultimately, one of the things that is always most important from all of these regulators's, you know, priorities is always consumer protection. And whether it's a technology standard or a data security standard or privacy standard, it's really the job of, I believe, the regulators to set an appropriate minimum bar
Starting point is 00:20:37 for the institutions, the industry to operate in how they serve consumers. because I agree with you. I mean, for us to continue to believe that as long as we educate, hey, don't share your OTP, that fraud's going to go away, it's not. Those quizzes and those education campaigns have gone on for 10 years, and they're still going on. But fraud is at an all-time high. Scams are an all-time high. So giving these quizzes and being able to
Starting point is 00:21:13 find temporary workarounds like, oh, we'll put it in a cooling off period. I mean, those are maybe patches. But at the end of the day, you know, if we think about the physical world, you know, when a bank has a physical vault, there's a standard of what security that's allowed. Or, you know, if you talk about transportation networks, airports, once there's a big incident, everyone has to change about. What is the minimum bar to maintain security in an airport? The same is true in the digital world. It cannot be a static standard. And the good news is there are global standards that are very well defined.
Starting point is 00:22:00 And the good news is that a lot of Indonesian regulations, whether it's our, you know, unang unang i.e te'a, unang pelep, a lot of it is already benchy, marking global standards. So to me, really the onus is, of course, it's in the interest of the government to make sure that consumers
Starting point is 00:22:26 and citizens are protected. And they need to define the regulations appropriate of responding to the risks that we face today. At the same time, it should be up to the industry to then be not
Starting point is 00:22:43 not only for the government to enforce, but for the industry to implement those standards appropriately. And for that to be table stakes to operate, because otherwise we lose trust. And our economy and our digital economy, especially in this case, can move backwards. So this is not, you know, the development of a digital economy is not only moving
Starting point is 00:23:09 in one direction of forward. It can move backwards. How much trust? Do you think has been lost since the last time we did a podcast? I've, we have done interviews of victims who have lost their entire life savings. And the thing about fraud is and scams is it's indiscriminate, whether you're a high net worth individual or you are, you know, and where you live at what socioeconomic strata you're from. They will just simply exploit the technical vulnerability and also the social vulnerability. And being able to just launch these scams at scale, for scammers and fraudsters, it's just a numbers game.
Starting point is 00:24:01 In fact, they don't really try and attack a specific organization per se. They would just exploit the technical vulnerability of any organization that has this vulnerability. they will just exploit it, regardless of the size of the company. And the same as goes, of course, for consumers and citizens. So, you know, I think this is where... So you think the equalizer would be the regulator, right? And I guess the follow-up question is whether, in your view, the regulatory framework is on the ball already in terms of the level of sophistication, its ability to...
Starting point is 00:24:42 anticipate greater risk in the future in order to mitigate, you know, whatever. So I think in across Southeast Asia, we're already seeing a response to this unprecedented level of scams and fraud. Ojika launched the Indonesia Scam Center, which is. a cross-ministerial cross-multi-government body that is able to coordinate between OJK, Bank, Indonesia, the police, PEPA-Tka, and being able to analyze these scams and frauds more effectively. In Malaysia, Bang Nagara, Malaysia has gone very, very prescriptive of how. how much the technologies for KYC, for example, onboarding must adhere to industry
Starting point is 00:25:50 accreditations. We must be able to detect deep fakes. And then even in the Philippines, there's a latest anti-financial account scamming act, Afasa, that has just been released at the end of last year to also go into deeper levels of transaction monitoring. device intelligence to be able to mitigate the risk of scams and fraud. And I think the industry is being forced, frankly, to converge on and the government are being pushed hard because the problem is very large.
Starting point is 00:26:32 And there's no way to deny that. And a lot of money is being lost. I mean, one of the recent, I would say, bus, you know, that. involved even multiple governments was actually involving in Cambodia and in Myanmar. That was pretty serious.
Starting point is 00:26:51 And that was a, and they managed to seize $14 billion of Bitcoin. And that's not the only assets, but they managed to seize $14 billion of Bitcoin. And it just shows how this problem is scaled and is a global problem.
Starting point is 00:27:09 And to also connect that, more recently there was an organized crime bust even in Sleman that is linked to a lot of these global syndicates. So it shows that this is not a problem that is domestic or local or purely a foreign problem. It's fully connected and highly organized. And I think that's something that is making the problem. So significant. These activities are being backed by people, personalities, or organizations that knew that they could arbitrage upon the weakness of the respective places, right? What added sophistication that they come with that allowed them to be able to just basically exploit upon the weaknesses of the victims?
Starting point is 00:28:07 Well, I think what's really changed is that. the technical capabilities today. These fraud syndicates are not just a bunch of people in a call center. They're equipped with proper technology. And we know that some of them are actually in forced labor camps. And actually, they're coming into what they believe, is a job opportunity and software engineers, data scientists are being conned and then put into forced labor and being given targets. So they're highly equipped with extremely
Starting point is 00:28:56 sophisticated talent with full technical skills to then conduct these attacks. So even when we look at the attacks and the nature of the attacks, there are trends that we've identified. And I think some of the obvious ones is the timing, a lot of the historical timing that we've analyzed, coincides with, of course, money flows. And one of the ones that's coming up is Tejaer. So as soon as a couple of months, a couple of months when Tejaheir drops and payday hits and now it's not just a regular payday, but there's an extra month of bonus. That's when there's a much higher rate of attack. So these are not accidental events.
Starting point is 00:29:45 They're carefully planned. They're carefully orchestrated. So the nature of the attacker and the nature and the, for example, we already see in the deep fakes that we have to fight against. The sophistication is very clear from a technological point of view. But beyond just the technology they're using is how. organized and how orchestrated that these syndicates operate in. So that's the, I would say, the other big piece that, you know, we want to dispel the myth that this is just some single actor, you know, a hacker wearing a hoodie out of some
Starting point is 00:30:28 cafe that is doing this. It's not. It's an entire industrial compound. There could be people flying in from different continents or countries, right, operating in some country. That's right. Right. And I think just the other day, there was an article of there were 800 Indonesians
Starting point is 00:30:44 queuing at the embassy in Cambodia trying to come home because they were in forced labor in these scam compounds. Nikki, on the assumption that the regulator is the best, if not one of the best equalizers, you think they're the regulatory frameworks, you think they're already. highly sophisticated, right, by way of emulating the GDPRs of the world. If we embrace that premise, what's the level of compliance or adherence, body operators or participants? I think you're right on the point, Pakita. And it's today, yeah, UNDANGER PILUGAN data-PRIBadi is already, you know, very much
Starting point is 00:31:34 crafted and interoperable to some degree with GDPR. are. We look at unang undang yi-e and it's actually quite, there's quite a lot of detail already. And when we go further into Comdiji and Comdigi's regulations, there actually is a standard verifici identity das, and autenticasi. And that standard is based on global standards. They're based on, and they've very clearly defined what are, how do I prove someone's identity? and they even rank different levels of assurance or trust, right? What's level one? What's level two?
Starting point is 00:32:14 What's level three? And not just how do I prove your identity, but also how do I authenticate? So not just when you want to create an account the first time, but later when you come back and you want to transact, how do I make sure it's you again, that this is Bakita again? So it's not just the first time of onboarding, but when you want to continue to transact, online that we really have
Starting point is 00:32:38 strong level of assurance or confidence that it's you. And actually all the standards already exist in Indonesia. All of the standards but maybe, yeah,
Starting point is 00:32:54 maybe the time of it's now that time it's to implement. Blum there's deadline. So I think that's one of the biggest challenges today is how do we align and not just on the financial sector, but this impact health. This impacts, frankly,
Starting point is 00:33:17 even government infrastructure, education. These are critical assets for an infrastructure for the country. It keeps coming back to me. Education is key. I know it hasn't worked out the way it was probably designed in the last 10 years, but assuming the regulatory framework, is perfect or near perfect, assuming that the compliance rate is high. You've got a bank that complies with the regulations. But for some reason, the customers of the bank get an SMS for OTP confirmation from some fraudster. He or she could still be exposed, right? Yes.
Starting point is 00:33:59 You know, as to transfer money to some guy living in Caracas or whatever. And that could still happen, right? So you've got a perfect scenario of a well-implemented regulatory framework, a well-operated, well-complying organization, all of the financial institution, but the vulnerability still prevails. Well, let me step in there and maybe clarify. So I think that the high-level regulatory framework is there. Okay. And some of the technical definitions exist.
Starting point is 00:34:38 does it mean that they are being enforced? Okay. So and are organizations complying? So I think there is still a compliance gap and there is still an enforcement gap. Okay. And a lot of this sometimes is, especially when we deal with cybersecurity standards, they can be seen to be quite technical. and I do believe there should be a balance between what is the macro prudential view of regulations and to make sure we're not being too prescriptive and understand that point of view.
Starting point is 00:35:19 And usually that's where the balance is setting regulations and then being able to collaborate with industry to define very clear industry standards. and then to make sure that the enforcement and the compliance are managed by independent bodies like auditors. Same way that financial compliance, we can define what is the overall rules of taxation. Right? That's something from the government point of view. But when it comes down to defining gap, the accounting standards, that should come from, industry. And then you need an accounting or you need to have an audit body to be able to then
Starting point is 00:36:10 verify that those principles are actually being implemented appropriately. And that should be run by an independent audit body. So I think what's missing in the cybersecurity space today is being able to have very well agreed industry standards across many industries. I think it exists at the Comdiji level,
Starting point is 00:36:37 but being able to see that enforced consistently across sectoral ministries as well. And this is where again, different countries have different approaches, but we've seen in Malaysia, Manglingar of Malaysia has outwardly
Starting point is 00:36:54 banned SMS OTPs for authentication. It's become very, very specific because... And that's something that we could adopt. You could. And that's a very straightforward regulation policy, and there can be a clear timeline to enforce. And I think that is what is shifting in the financial industry in Malaysia is shifting very rapidly.
Starting point is 00:37:22 MAS in Singapore has done the same thing. Philippines has now just recently announced this act, which is also doing the same thing. And really, when we think about it is if we talk about authentication standards need to be improved, it can be a bit vague of what the call to action is. If we call out a specific type of technology can no longer be used and we must progress to a new technology, whether that's leveraging, for example, biometrics or cryptography, then it's very clear. And the call to action is clear. And I think that level of clarity needs to be there and a clear deadline to also enforce that the whole industry will move together at the same time is going to be important.
Starting point is 00:38:11 Talk about what you mentioned earlier in a separate conversation about how these fraudsters are traveling in a car with telecommunication capabilities, you know, fishing around. Yeah. So I think that's a, that's a new thing to me. It's quite crazy. So actually, you know, even where we're sitting right now, there are fraudsters driving around on Tsudirban with a, an unauthorized base transmitter station, a BTS. And the way that our phones work is, will attach, the phones will attach to the closest base transmitter station, a BTS. and that BTS can claim whichever ID they want. They can claim that they are a bank's channel as well.
Starting point is 00:39:02 So from there, they can start to send messages and rogue messages and assume it's part of a legitimate network. And then send messages and authorize messages that appear to come from an authorized bank channel. And in fact, the biggest real. risk is it's very hard for your average consumer to know that that's fraud because the the SMS before and the SMS after that fishing link is actually legitimate in the same channel with the same header. So it can say this is bank ABC but underneath and you may have just
Starting point is 00:39:45 been shopping online and you got your OTP for a legitimate OTP from the bank and a legitimate transaction and then you get this fraud link that says generally speaking it's hey you know, Tukur point, Bapa
Starting point is 00:40:01 d'apa d'aput voucher and you can use this to munasie, you know, tagia in Bapa, just click this and it's very credible and believable because the previous
Starting point is 00:40:14 communication was an authorized channel. So they're able to essentially hijack what is in your perception, in your phone, is seemingly a trusted channel. And that's really one of the limitations of the technology. So this is where, you know, in today's day and age, I think one of the other ways we think about it in terms of security, so I was mentioning earlier,
Starting point is 00:40:44 it's not just about AI. new technologies, but there's actually ways for us to track the provenance. What could have been done by the relevant bank to prevent that from proceeding in a bad way? I mean, assuming that they're complying? Yes. 100% with the pre-existing regulatory framework. There's not much the bank can do, actually. So this is a technology limitation to prevent a rogue BTS from sending out this fishing link
Starting point is 00:41:15 and claiming they're a bank channel, there's almost nothing that the bank can do. But if the bank had complied completely perfectly, that link that was provided was not going to be able to allow that customer to penetrate. It's actually highlighting that that technology, that method of communication, should no longer be considered secure.
Starting point is 00:41:38 Okay. And we need to evolve. So perfectly complying financial institution probably would not be considering. So authentication through that means, right? So I think today a lot of the way that as the security is seen is, you must have two-factor authentication or multi-factor authentication, which, again, principle-wise is not incorrect. It is about multi-factor authentication. The question is which factors?
Starting point is 00:42:05 So if you still believe that a password is a secure factor, right? that's definitely very questionable, but it's still accepted. If you believe that a SMSOTP is also a secure factor, the proof is almost the majority of the fishing and the biggest threats today, the number one way that all of these cyber-related fraud issues are, you know, the number one attack method or vector, is through fishing. And what are they fishing for?
Starting point is 00:42:46 They're fishing for that SMS with TP. So the reality is there's so much fraud because of a combination of social engineering and us being able to, you know, send fraudsters to be able to trick you that this is a trusted channel. This is a trusted bank representative talking to you and offering you this.
Starting point is 00:43:08 And you incorrectly click on a link that looks like the bank's website. and you put in your details there. We have to question whether or not, if this is actually happening at scale, by definition, that's a systemic risk issue. And I don't believe it's enough to say, well, we need to educate the consumer.
Starting point is 00:43:34 We need to warn the consumers. I believe that the call to action is to step in and say, we need to change the system. we need to change the standards of how we operate. If that vulnerability, if that method continues to be exploited, then the question is, is that method still secure or not? And the good news is we do have other methods that actually we already use every day. How do you unlock your phone, Batita?
Starting point is 00:44:11 I can press the six digits. Fingerprint or a fingerprint or a face. Yeah. Right. Facial recognition. And if you log into a new device, let's say, you know, your email account on a new device on a new laptop, what happens? Right. You get a push authentication to your phone.
Starting point is 00:44:37 You get an alert, hey, is this you? And that's because at the earlier stage at some point, you mark that, hey, you mark that, hey, I want to trust this device. And what happened was a set of private keys were put and were generated in the secure part of your phone. And now your phone becomes a clear way to check that this is really you. And really, when we think about multi-factor authentication or, you know, it's just keep it simple. it's the three categories is something you are, your biometrics, something you have, which is generally your phone, everyone carries their phone all the time nowadays, or something
Starting point is 00:45:27 you know. And I think it's this last part of something you know that gets manipulated all the time. Because passwords are something you know. And unfortunately, a lot of that data leaks. and there's breaches. And including, you know, with the issue of the SMSOTP, it's not actually generating the OTP and generating the six digit code. That's still done in a secure way.
Starting point is 00:45:54 But the way it's distributed allows for somebody to then be in the conduit. The person ends up being has the knowledge. And that knowledge can be passed to somebody by accident. And that's how social engineering works. So this SMSOT. because of we have to manually enter it in. But imagine the system just automatically entered it in. Then you actually don't have that problem.
Starting point is 00:46:22 Because if somebody asks you for the code, you don't know what the code is. You can't give it away. And actually all those technologies already exist today. So, you know, whether consumer tech is called the pass key, which is again, like it's a little bit, is it easy to understand? And I think that's the challenge of a lot of the cybersecurity industry is being able to keep things simple.
Starting point is 00:46:49 Do you foresee a future where we keep running into a scenario where the bad guys are always outsmarting the good guys that people might just go back to the prehistoric methodologies? A bit of a sci-fi thing here. I mean, you know, to some degree, if you're operating at a, a nation state security level. There are things where you end up going into an air gap room where it's completely offline. Using time writers. Go back to completely offline, right? So I think if you face some extremely high security issues, then yes, we might have to go a bit
Starting point is 00:47:31 backwards into going offline. But at the same time, I don't think we can go backwards in terms of how do you reverse the digital economy? That is the future. And the question is, how do we play a part in that future? And how fast do we get there or do we get left behind? And a big part of that is making sure
Starting point is 00:48:03 that we have the appropriate infrastructure underneath to support it. The same way that e-commerce, right, e-commerce could not take off without the appropriate logistics infrastructure, without their appropriate payments infrastructure, right? It just wouldn't be able to operate at the same level. We take it for granted nowadays. You know, in Indonesia, we get deliveries instantly, even sub-hour, you know? And I think that's an amazing thing that happens in Indonesia
Starting point is 00:48:37 that beats even the best of Amazon Prime, right? But this is where we often forget some of the enabling infrastructure underneath. But when we think about the digital economy more broadly, you know, someone's identity and trust, especially in financial services, to manage, you know, compliance and risk, risk of, you know, making sure that you do the right customer due diligence, this is the right person. It's not someone laundering money.
Starting point is 00:49:15 That is necessary. And I think some of that underlying infrastructure is exactly what Vita is trying to focus on to help build that out. But, you know, it's not just in financial services. This is something that relates to health. And someday, as we talked to in the early days, I said, I want to have personalized health.
Starting point is 00:49:35 I'm very optimistic of AI. Well, you're doing all right. You're doing all right. But I need. need my medical records. I don't have all my medical records. And that's something that I would love to have access to. Yeah. And one of the feign things that obviously, if I were to even go to a physical clinic to ask for my medical records, the first thing I say is, who are you? Can I see your proof of ID, please? Yeah. How do I know you're actually pagita? Yeah. And you hand over your Kattepe.
Starting point is 00:50:01 They'll look at you, they check you, they eyeball you. And essentially, we're doing the same thing. And they might still give me the wrong medical records. But, Nikki, talk about the typical blind spots for practitioners, right? You've been talking about this, the MFAs and the idea that having an IT guy will protect you from anything and the idea that you've incurred a loss and that's well defined. That's the extent of your exposure. These are, I think, blind spots that a lot of people are exposed to. I think the biggest blind spot is thinking that I already have that. I'm already secure.
Starting point is 00:50:52 I bought that application. I bought a piece of software. I'm good. The reality is fraud, scams are evolving rapidly. And to think that. that you can have a one and done silver bullet solution deployed one time and you're good forever is a big mind spot. Two is what we tend to see is, you know, the way we prove or institutions prove someone's identity
Starting point is 00:51:30 actually is very fragmented. So the system that onboard you and the system that approves your transaction are actually two different systems and oftentimes not very well connected. So do we even know if you're when you onboarded and you created that account, you use that phone, wouldn't it be helpful to know that? that when you transact that you're still using the same phone. Sure. And that that's a real phone. Yeah. So I think a lot of the times thinking in, you know, these systems are siloed is also a big blind spot.
Starting point is 00:52:19 And actually, this is exactly where a lot of the fraudsters and scammers target is the handoffs between systems and exploit the fact that these systems are not unified and don't have a holistic view. So that's where, you know, I guess a lot of our approach, I mean, we're very well known for our KIC products or document verification products. But actually, it's really about connecting that all the way into authentication and the transactions. So it's not just about onboarding a customer securely, but how do you make sure that the
Starting point is 00:52:55 person transacting is still the same person? And for us, we try and keep it simple and make sure that it's just, Is it the same face and is it the same device? And because the first question is, is this a real ID? Is this a real person? Is this a real device? And if all three are yes, okay, then we can create an account. And from there, we remember the details of that real device.
Starting point is 00:53:20 We remember the details of that real person. And we can challenge based on those things that we've already proven up front. But being able to also analyze a lot more signals. So this is where I think AI is also, as much as it's being used by the scammers and fraudsters, it's also being used by cybersecurity practitioners for defense and to be able to analyze millions of signals, whether that's signals about your identity documents, signals about your biometrics, signals about your device. And being able to give a holistic view is actually extremely important to be able to track,
Starting point is 00:54:09 you know, to some degree, what's your normal behavior and profile you to the point where when something happens out of your profile and there's an anomaly, why are you all of a sudden operating and transacting on a different device from a different location, from a different IP address, you know, why are you, why is this person who's entering this information? Why are you copy pasting your name? Why are you copy pasting your phone number? You know, these are certain specific behavioral analysis that is a very simple question. Nobody would ever copy paste their name when filling out a form.
Starting point is 00:54:49 They're just going to type it. That's a long-term memory field, right? And it's going into these. is going into these details and the systems actually have these signals available. And being able to be able to analyze those details well with the help of AI to be able to analyze millions of signals in real time can help us trigger, hey, there's an anomaly going on here. This is not normal. There's higher risk associated. let's put a bit more caution.
Starting point is 00:55:26 Let's make sure that we challenge, we give a step-up challenge to that event to make sure it's really that person. Let's make sure that that transaction is secure. Oh, I want to go back to AI, but let's talk about data, right? Data needs to be parked somewhere at a parking lot. What's your,
Starting point is 00:55:52 ideal definition of data sovereignty from a fraud prevention philosophical standpoint I believe that most important about data is defining the access and control and what's more important is the logical access and control rather than the physical
Starting point is 00:56:20 access and control And a lot of today's world, especially from a cybersecurity perspective, it's very hard to control your data. It's very hard to control that your data won't be leaked because as an end user, as a customer of, let's say, an e-commerce platform, I don't have that ability to control. Now, I think that's what generally causes a lot of concern from the regulators, is being able to access that data to be able to control it, to be able to audit, to be able to inspect what really happened. So from that perspective, I believe that a lot of sovereignty should be more focused around the control of the data. and given today's technology, my personal view is that, you know,
Starting point is 00:57:21 encryption and cryptography is the easy answer. It's the easiest answer. Because if I encrypt by default all of my data as an institution, all I have to do then is I grant access to parties. So rather than saying, hey, this data is available for everyone to read, free to read, I actually make it, nobody can read it. And then when I decide to do a, to engage to work with another counterparty, it's like, okay, I'm going to give you, I'm going to give you a right.
Starting point is 00:57:56 I'm going to give you a privilege to access these data under these circumstances in this context. But if it turns out that you go rogue or you start, I don't start trusting you or, or simply, you know, we don't really, we didn't really find a way to work together in a, mutually beneficial way and we want to say, okay, I no longer want to work together with you. I can simply revoke that access or, you know, if I want to terminate the engagement, I can revoke the key that was used to decrypt the data for you. Yeah. And then done.
Starting point is 00:58:30 So it really comes down to being able to manage the keys. It doesn't matter where it's part. It doesn't matter which cloud or what country it's in. that data is forever encrypted and I have full control. So in a modern cryptography architecture, I think that's the right answer. And it's not about cloud versus on premise or whether the cloud is onshore or offshore.
Starting point is 00:59:00 We can control data simply by making sure we manage the keys. Now, where those keys are stored, how those keys are stored, that should be under higher scrutiny. But the actual data assets, it's important that it can flow more freely because then the digital economy can be more interconnected, more interoperable. That's more powerful. And I think that's the role of digital trust infrastructure is to give that empowering
Starting point is 00:59:30 layer, not to create more friction. In fact, it's supposed to do the opposite. By building the architecture correctly, the economy can flow. faster. It can be more interoperable. And it's very easy to grant the ability to, you know, collaborate and work together across many organizations, across geographies, across, you know, different industries and rules of law. To what extent do you think the location of the parking space is influenced by the degree to which the parking space has certain geopolitical affinity or animosity with the data users?
Starting point is 01:00:19 There's definitely concern, I think especially increasingly today in geopolitics of where that data is being parked. Because if it is being parked in certain locations, the question is access inadvertently being granted. So I think this is where some of the hesitation to adopt, for example, open source AI models is fundamentally where does that data go? And I don't think it's about the parking lot. It's about who has access to that.
Starting point is 01:01:01 So I think that's the bigger point. And especially since we deal with banks a lot. I do believe that a lot of that answer comes down to being able to act from a zero trust, you know, design from the beginning. So as long as you can manage that up front in your design, it makes life a lot easier. And you don't have to worry as much. But with AI models, of course, there is a lot more lack of clarity of where all the data is being transmitted and who has access to it. What explains the fixation of regulators of onshoreing data? Is it just the simple definition of sovereignty?
Starting point is 01:02:01 or is it something else? I do believe that, of course, it makes it a lot easier if you can go to a physical place and just pull the plug. You can pull off the path, unplug it. So there is a practical side of it. And should you trust any infrastructure abroad? Probably not. But there is definitely very reputable
Starting point is 01:02:32 cloud infrastructure being provided today on a global basis. So, you know, the onshoreing, perhaps it's more the economic incentives of driving foreign direct investment in that infrastructure.
Starting point is 01:02:50 There's definitely an incentive there. They can go with that, yeah. Job creation. There's job creation, of course. So that definitely helps. Yeah. And I think Indonesia is, in a strong enough position that is able to try and catalyze those investments with some of those policies.
Starting point is 01:03:12 But I think maybe that's also one of the blind spots is just because your infrastructure is onshore doesn't mean the data access and controls are automatically implemented either. Right. Can I test the hypothesis where in a country where the distribution of public goods is already well done, the need for fraud prevention is a lot less than those other countries where the distribution of public goods may not be as well done. public goods being defined as voice, power, intellect, education, welfare, healthcare, social value, moral value. I don't think that that's correlated, actually.
Starting point is 01:04:11 So if you take the case of Singapore, great distribution of all of the above. Extremely prone to fraud, extremely susceptible to fraud. That is so paradoxical. And a lot of it is because it's a high-trust society. Wow. And in a high trust society, perhaps your guard is not up as much.
Starting point is 01:04:33 But so Singapore has really a lot of challenges in dealing with a lot of scams and fraud. These are in the billions or tens of billions? I think it's hard to say what is the exact thing. They don't disclose. It's definitely in at least official reports or in the hundreds of millions. if not billions. Wow. All right.
Starting point is 01:04:57 So that's, it's definitely very significant. And again, what is the real number versus the reported number? It's a bit difficult to say. So it's a pretty universal philosophical requirement. It's universal. And, you know, the U.S. is definitely a heavy target for a lot of the online sclam and fraud rings. You know, even, you know, in the economist, there was a whole podcast.
Starting point is 01:05:25 Scamara Inc. That actually was talking about a rural bank in the Midwest being taken down as well. So it's, this is a global issue. That's the decline of multilateralism. Wow. Now, let's let's talk about AI, deep dive a little bit. Open source or close source? It's becoming a lot more ostensible in terms of,
Starting point is 01:05:58 of how China and the US are ushering the AI narrative. China seems dogged with open source. That resonates to developing economies. Yes. The global south, right? Yes. Because it just intuitively translates to something cheaper. Exactly.
Starting point is 01:06:20 And I think that's really the where the point of difference of where your choice goes. But even I argue that this wouldn't even just be for about the global South and developing economies but even just startups in general. Startups
Starting point is 01:06:45 generally you're going to be bootstrapped, right? You're going to have limitation of capital. You're going to have limitation of resources. So the promise of an open source, you know, free model or a much less costly model to help power your products is of course naturally very attractive. I think that's where a lot comes down to well are there definitions on where this data
Starting point is 01:07:18 goes and what is allowed and what is not allowed. So obviously in our space we're a bit more conservative in our views. So we do look for companies that have a lot more established governance, especially on their data security and their data privacy before we were
Starting point is 01:07:41 to engage in any of those and leverage any of those other technologies and products. So that's very important for us and ensuring that there's full privacy is extremely important. So
Starting point is 01:07:56 But at the same time, if you think about where is this arms race going, I think in China, on the AI front, they are focusing on really, you know, at the end of the day, how do they manage the cost side a lot more efficiently. Whereas I think in the allegedly, disproportionately lower. Disproportionately lower. And it's also almost because of the geopolitics, because of the geopolitics, because of, the lack of access to a just simply capital. I mean, the capital equation behind the amount of capital
Starting point is 01:08:35 going behind open AI, Gemini, you know, anthropic versus AI in China is orders of magnitude of difference. So the access the capital is... The Americans might debate that, but let's go with that presumption. Orders of magnitude, right?
Starting point is 01:08:54 N-second is also the access to the hardware. Access to GPUs, access to the infrastructure, access to the data flows is also very different. So I think the strategies are very different.
Starting point is 01:09:09 You see this, I would say, in the US, especially almost a race to AGI, right? To providing the highest levels of intelligence and advancing that level of intelligence versus, I would say in China,
Starting point is 01:09:26 perhaps a more industrial approach of how to apply this most cost effectively to businesses to be able to sort of yield the value of that application in the near term. I think there are very different approaches. I'm also a little concerned by the observation that some LLMs are more. more ideologically driven as opposed to truth-seeking. You can see it with some basic questions, right, and how the answers or the hallucination that comes out of it just seems more ideologically driven as opposed to truth-seeking.
Starting point is 01:10:19 And that concerns me on the bank of the vulnerabilities that we've talked about earlier. lack of cognitive development capabilities in most Global South members, right? Second, you know, if you use a Gemini, Grog, chat, GPT, or even deep sea, that uses about 10 to 50 times more energy than a simple search on Google. Now, I'm also in the film industry where we use SORA, right? And that uses 10,000 times more energy. Then I look at the electrification of Indonesia, which is only 1,300 kilowatt hour per capita. China is at 10,000,
Starting point is 01:11:00 United States 10,000. So if, if let's say Indonesia were to want to be inspired by what Lin-Vanfei did at Deep SIG, on the bank of this order is a magnitude cheaper. We want to do it, but we don't have the energy.
Starting point is 01:11:21 Right? And then to go up from 1,300 kilowatt hour per capita, 10,000 kilowatt hour per capita, Indonesia's got to build about terawatt worth the power generation capabilities, which will cost roughly $2 to $3 trillion. It's a lot of donuts. Right? So, and then you start doing a math, we only build about 5,000 megawatts per year.
Starting point is 01:11:47 So if we were to build a terawatt, that's going to take only 200 years. I mean, I'm actually optimistic. We're going to be able to build a lot more than 5,000 megawatts per year. And we're going to be able to attain the economic capital. But we've got our work cut out, right? So on the assumption that Deep Seek was Sputnik or nonlinear for the developing economies, do you think that will permeate on with more Sputnik moments? I think trying to build deep tech, given some of these,
Starting point is 01:12:28 constraints will definitely be challenging. Is it impossible? I don't think it is, but at the same time, the odds are not in the favor. Put it that way. Now, on the other hand, we do have a lot of industry and a lot of economy, you know, a lot of opportunity to transform a lot of the economy in Indonesia to a digital economy and the opportunity for local entrepreneurs to harness uh gen ai capabilities AI capabilities all these amazing technologies to then advance industry not only scaling them
Starting point is 01:13:16 locally but then being able to scale internationally um i believe that opportunity is a lot more real. And I think that Indonesia we're lucky to have a very vibrant technology sector. And I think that's where there's a lot of opportunity to continue to digitize the economy and to grow at least regionally, if not beyond. That definitely is an immediate opportunity that I see. So whether or not Indonesia will make the next generation
Starting point is 01:13:59 foundational AI model, I'm not sure that that's a realistic expectation, nor a good use of our resources. I believe there are better low-hanging fruit. And we need to be
Starting point is 01:14:16 a bit realistic in some senses of what we can expect in our industry. But at the same time, it doesn't mean that we have to build the next foundational model to be able to reap the benefits of AI. I just think that for anybody to be able to craft the AI narrative and use it properly or narrate it properly, that nation needs to be investing massively. in STEM. Yes. I mean, it's just some data points, right? China produces 4.5 million STEM products per year.
Starting point is 01:15:06 S-S2 S2i K. Every year, undergrad's, grads, PhDs. India, about 2 million. Southeast Asia, about 750,000, of which Indonesia, 250,000. The US, 800,000. So just from those data points, it's tempting to just conclude that China has done a better job in ushering scientific discoveries, inclusive of AI, right? So if Indonesia were to be an AI narrator, it needs to produce disproportionately a lot more than $250,000.
Starting point is 01:15:53 AI, I mean, STEM products per year, because they can count these guys. You're a great product of STEM, right? So you know how to narrate the narrative or even craft it. What do you think? Well, I think, again, if we talk about the deep, a deep tech invention aspiration, I believe that it's an aspiration. It's not that it's impossible, right? But it's definitely more of an aspiration.
Starting point is 01:16:32 Now, the reality is a lot of the value can come from innovation over invention. And I think that's where we can really focus, is how do we apply the technology? How do we distribute? How do we realize the material, concrete, real-world benefits of whether it's upskilling the talent we have today and augmenting them with better AI capabilities that will help drive higher productivity? Of course, I think we should learn from and collaborate. and learn from people who are at the forefront of inventing this technology, to learn and to collaborate so that we can also innovate better. But I believe that Indonesia has a very, the big advantage is the scale of our distribution domestically, but more importantly is regionally.
Starting point is 01:17:50 That opportunity is right there, especially for the scale. a digital economy perspective. You're singing to the choir. So I think that that is the more realistic and important short-term objective for hopefully what a lot of entrepreneurs in the region can help drive forward. And I think that that can be realized within the next couple of years. You know, given the recent geopolitical. development where we're witnessing a much higher unilateralism of the United States.
Starting point is 01:18:31 And China smelled this from a few years ago. They started consciously reducing exportation to the U.S., relatively speaking. Their exports to the U.S. used to be about 26% of their total exports. As of today, is about 12 or 13%. on the back of their shifting, their focus is a lot more on everybody else outside the U.S. Call that the Global South and a few others. Southeast Asia, its intratrate,
Starting point is 01:19:04 is about 23% of the collective GDP. That's the amount of or a number of economic activities that Southeast Asians do with each other. The Europeans, 65% of their collective GDP. And I always tell people that that's largely attributable to the fact that we just don't tell stories to each other in Southeast Asia. We shake hands, but we don't tell stories. The more we tell stories to each other, the more we understand each other. The more we understand each other, the more we understand what we need to produce.
Starting point is 01:19:46 And what we need to produce should more be in complementarity, as opposed to. to competition at the rate that, you know, we've got to rely a little bit more on ourselves, given the uncertainties that are happening outside. So just think about being able to move the needle from 23% to 65% the way the Europeans have. That's $2 trillion worth of economic activities, goods and services. Imagine what that could do to your business. And everybody else. within this region.
Starting point is 01:20:25 700 million people, $4 trillion worth of GDP. So you're right. You know, it just hit the note in my head when you talked about, you know, how business could actually expand
Starting point is 01:20:39 within Southeast Asia. Well, and I think Southeast Asia, you know, is not the EU in the same way that in the sense of from the political side, there's no supernational body. Right?
Starting point is 01:20:52 So we have a lot more independence when it comes to sovereignty and policies and laws. At the same time, you know, the economic opportunity is really where I think we can all generally agree is the advantage of what we need to also in terms of, especially given the current geopolitical situation, you know, need to focus more on being able to foster the region. cooperation and strengthen, I would say, the geopolitical position of the entire region. And I think that's specifically where, hopefully, at least, you know, from a Vita perspective, we can play a role, a small part at least, in helping build better trust. And it's almost like if I draw the parallel to a passport, every country will issue its own passport. But if we can operate and make the visas to travel between countries, to operate and work
Starting point is 01:22:01 between countries a lot easier and to recognize and be able to trust each other's passports and visas a lot more easily. Imagine the upward mobility. That should be a big enabler. And that's at least what we're trying to do. It is more on the infrastructure level to, enable more connectivity and have these, you know, digital visas, if you will, to connect these identities so that I don't need to KYC four times per country just to open a bank account. Because at the end of the day, if any business, you need a bank account, you need to open up, you know, a local entity, you'll need a standard level of financial compliance, you'll need, you know, from your human capital.
Starting point is 01:22:50 You'll have to, you know, manage contracts, legal infrastructure. I mean, if we can streamline some of the basic foundation of what it takes to operate a business in each country, just make it easier for entrepreneurs to operate cross borders. I believe the entire region should benefit and prosper from that. Let's stick on this a little bit. You know, we brag about diverse. diversity within Southeast Asia. But we don't talk about divergence.
Starting point is 01:23:24 Diversity is positively connotated. Divergence, unfortunately not so. Economic divergence, you've got a bunch of countries earning less than $2,000 per capita every year. You've got Singapore, the LeBron James, at $91,000 per capita every year. That's divergence. And out of 11 countries, you've got two countries surpassing the global average of PISA scores, attainment of lingual proficiency and STEM for 15-year-olds.
Starting point is 01:23:56 You've got only two universities in Southeast Asia that are in the top 20 out of 10,000 universities, two of which are in Singapore. The next best university in Malaysia ranked 53. The others even lower. So that's divergence. So you hit a note. In my head, again, when you mentioned supranationalism, which we lack, I think it's high time to call for some degree of supranationalism within Ozan just for educational attainment purposes.
Starting point is 01:24:29 There is no reason for there to be a principle of subsidiarity. I mean, if you want to be much more cohesive, much more collective on the back of the evolution, of geopolitics, economics, and technology at a much more exponential rate, you've got to be more cohesive. I think the most structural way to increase that cohesiveness is to reduce the educational attainment divergence.
Starting point is 01:25:01 And educational attainment divergence correlates with economic divergence, big time. What do you think? Well, I think I agree with you and perhaps the shorter-term ways we can attain that is not just through secondary and tertiary education which may take a bit more time.
Starting point is 01:25:23 Any type of education. But especially vocational education and being able to transfer knowledge from the best in the world to learn from the best in the world at the industry level and to immediately apply that I think is really important.
Starting point is 01:25:42 So being able to encourage a lot more collaboration and invite a lot more foreign investment and to find the best in the world to hopefully bring that expertise to teach us, to learn the way and for us to evolve and adapt into and focus on how we can tune
Starting point is 01:26:09 some of that expertise to localize it to the problems and the challenges we face in our markets. I think that's where the opportunity is. And again, I'll bring that more from an opportunity of innovation versus invention. We don't need to recreate the craft. No, just copycat pre-existing best practices.
Starting point is 01:26:35 Let's look at the best practices. Let's learn from the best craftsmen there are. And then think about what's the best way for us to apply it in our environment, which we do understand the idiosyncrancies of how each of our markets in Southeast Asia do operate differently. We are a mobile first sort of economy in a digital economy. We do have a wider, maybe a lower range of smartphones. We have very unique social media behavior. There is a lot of different nuances.
Starting point is 01:27:15 that do impact consumer behaviors. And I think that's, those are the types of insights that entrepreneurs across Southeast Asia should harness. And the more that are, because the reality is the digital economy is a global, it's a global game. It's going to be global competition. And hence the better the region can leverage,
Starting point is 01:27:39 not just any individual country's home market, but actually be able to compete and promote regional champions and have that scale, it will only help us compete better at the global scale as well. And of course, I don't think that this is something that we operate purely independently, but again, through collaboration, through learning from the best and the brightest minds in the world. We need to talk to each other more among Southeast Asians, understand each other. Look, we've covered quite a lot of stuff with respect to,
Starting point is 01:28:15 fraud or skim prevention, right? As it relates to how on the ball the regulatory framework is, how participants may not be adhering to the scale necessary, how data ought to be parked and secured encryption and cryptography, and AI, the philosophies of AI, and how it needs to be ushered forward. We haven't talked about one thing that I think quite be, I mean, could be relevant to fraud prevention.
Starting point is 01:28:57 Rule of law. What's your take on that? Yeah, I think in that sense, we do need a strong rule of law. enforcement against criminal syndicists. Bad behaviors, right? Bad behaviors. That is definitely an important, a very important driver.
Starting point is 01:29:25 I think in the way that maybe makes Southeast Asia a bit more unique is we've front-loaded a lot of the security and industries taken on a lot more. of that responsibility to handle that up front. But I think that is where, you know, agencies are trying to collaborate more now between ministries and also hopefully across the region as well. And sometimes it does take a big problem. before things change. So it's no longer a vitamin,
Starting point is 01:30:14 but a true painkiller that presses the urgency of being able to change and the way we collaborate, the way we work together. So there are a few organizations that are trying to drive this, you know, whether it's the,
Starting point is 01:30:31 you know, we're also part of the global anti-scam alliance, which does collaborate with several law enforcement agencies across the region. So I am optimistic that hopefully the collaboration can improve. There is increasing transparency, even in Indonesia, between Odeca and Comdiji, being able to facilitate what is fraudulent, suspected accounts, fraudulent phone numbers, to be able to more concretely provide very important signals to warn consumers before you.
Starting point is 01:31:07 you transfer that money. There's a little warning signal that say, hey, this account has been suspected of fraud before or this phone number is obviously a suspicious phone number. So I think we need more concrete action like that.
Starting point is 01:31:22 And law enforcement agencies actually sit on a wealth of data as well. And the more open we can be, of course, in a controlled fashion, with the right authorized industry players with the right trusted players, be able to collaborate and leverage that data
Starting point is 01:31:42 together, that's really the most concrete way we can step up and involve in an exponential way to fight fraud and scams and have a very clear deterministic view of our ability to improve exponentially and protect consumers better. You know, my wife studied cybersecurity. She always reminds me with respect to the definition of digital literacy. It's not just about being able to use your headphones. It's really about understanding risk management, right, while using digital capabilities. Look, I'm actually feeling pretty optimistic talking to you about what's to come in the next few years.
Starting point is 01:32:33 And especially if you put that in a context of Just take a look at Singapore When it became independent It was earning $100 per capita per year It's now at 91,000 It's been able to turn itself big time In one generation or perhaps two China's GDP per capita in 1980
Starting point is 01:32:53 It was $125 Indonesia's GDP per capita was $400 dollars. And China has been able to jump up to $13,000 within a generation. So I think the future for Southeast Asia may not be that bad, right? Anything else you want to share with the audience? Well, I think the entrepreneurs that I've met across the region, there's an incredible
Starting point is 01:33:23 amount of energy, and I'm definitely optimistic that things can change. I look forward to being able to find ways to collaborate more across the region, across ecosystems as well, across industries, to be able to, you know, I think really unify the opportunity that we have across the region and hopefully focus on, you know, at least on our part, continue to build out the digital infrastructure that can help enable that economy. the digital economy forward. And, you know, not only make it more safe and secure, but hopefully reduce a lot of the friction and just make it easier as well for you to, you know, to transact, to do what you need to do across all of ASEAN. So I'm optimistic. I think there's a lot of great energy and especially from the entrepreneurs and met across
Starting point is 01:34:24 the region. So I think that there is, you know, hopefully with the. right geopolitical advancements as well. We'll land in a good place. But regardless, I think the industry is moving forward in a very strong way. And hopefully we'll give you a good update in the next podcast, Bagheita. Well, hopefully we don't have to wait for four years for the next time. Nikki, thank you so much.
Starting point is 01:34:50 Thank you so much, Baguita. It's been a pleasure. Friends, that was Nikki Luhir from Vida. Thank you. Thank you.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.