So I'd love to talk about the type of fraud that our prospective customers experience. So across the top, we have examples of the same fraudster impersonating different victims. The victims are across the bottom. They steal someone's likeness either from social media, LinkedIn, Facebook, Instagram, find those likenesses, train a model, and overlay that likeness on top of themselves. And, unfortunately, they can use this very effectively to bypass some of the legacy tools for account opening and authentication. Alright. So I wanted to show some of the tooling that these fraudsters use to commit this type of fraud. On the bottom left, we have my actual face. Then we introduce a mapping of my face so we can track data points. Then we load up our target model of the person that we wish to impersonate. And then, ultimately, we merge the two to create this likeness so that it appears live to be used for fraudulent purposes across digital account opening, biometric authentication. This type of tool is becoming more widespread and easily accessible. And these types of fraud attacks are what authID Inc. is well-positioned to stop. Now to go through an example of how one would use this in practice, for account opening, a fraudster would steal potentially the ID of the victim through a data breach. It could be legitimate or it could be some digitally rendered version of that ID credential. Then secondly, as you saw me do live, I can steal the likeness of my target victim, create a deepfake video feed or overlay their likeness onto a live version of myself to pass biometric and liveness detection. And, ultimately, what the fraudster will then do is go through an account opening flow through a bank. Let's say that flow is on the left, and on the right, the fraudster would have tooling that allows them to push in stolen copies of identities for this digital account opening. So here we see a fraudster pushing in a stolen copy of someone's ID digitally, both for the front and the back. And then secondly, they'll take that biometric that they've created through a deepfake or generative AI and use that biometric impersonation of that individual to pass a biometric match plus liveness detection. Now, unfortunately, this works with some of our competitors in the market. Thankfully, authID Inc.'s solution is well-positioned to detect these types of fraud attacks.