Stytch device fingerprinting

UX / UI Design 2024
Stytch device fingerprinting

Overview

Device fingerprinting is one of the most technically complex features Stytch has built — a fraud prevention layer that lets customers analyze traffic patterns, identify suspicious devices, and create rules to block or challenge bad actors. The challenge wasn't building the capability; it was making it usable. How do you design a tool powerful enough for sophisticated security teams, but legible enough that a customer can make good decisions without a solutions engineer on the phone?

Lead Product Designer Stytch, San Francisco December 2024

Impact

Self-serve rule creation Customers create and manage fraud rules without Stytch assistance
Improved engagement Rule creation activity increased meaningfully post-launch
Platform expansion Part of Stytch's broader push into fraud and risk prevention
The Problem 01/03
A powerful tool that required an expert to use

Device fingerprinting is a technical concept — it sits at the intersection of authentication, fraud signals, and traffic analysis. When Stytch launched the feature, integration required heavy involvement from solutions engineers and internal engineering teams. Customers couldn't get meaningful value from the tool without Stytch personnel walking them through it.

That was a bottleneck. For customers to trust the product and use it independently, they needed to be able to understand their traffic, interpret what they were seeing, and take action — all from within the UI.

What I advocated for

I led both the research and design for this project, and from the start I pushed for an experience that educated as it informed. The UI needed to do more than display data — it needed to give customers enough context to make confident decisions about their traffic without relying on us.

I audited how other data streaming and security platforms handled similar complexity, and used those patterns as a starting point. The goal was to design something that felt familiar to security-minded developers while being approachable for the broader range of customers who would use it.

The Approach 02/03
Filtering that maps to how security teams think

The first challenge was helping customers dig into their data without needing to understand every underlying signal. I designed an advanced filtering system using patterns familiar from developer and data tools — composable filters that let customers slice traffic by device type, behavior signal, geography, and risk score.

The key was making filters feel powerful without requiring customers to know what they were looking for upfront. Filters exposed the right vocabulary — Stytch's fingerprinting signals — while keeping the interaction model simple enough to explore.

Rule creation that explains itself

Creating rules to block or challenge traffic is the highest-stakes action a customer takes in this tool. Get it wrong and you block legitimate users; get it too conservative and fraud slips through.

I designed a rule builder that shows customers a live preview of the traffic their rule would affect as they construct it — so they can see the targeting scope before they commit. This inline feedback made the tool significantly less scary, because customers could validate their intent before any rules went live.

The Outcome 03/03
Customers could act independently

The redesigned experience made it possible for customers to understand their traffic, explore the data, and create rules without requiring assistance from Stytch's team. From qualitative conversations with customers post-launch, the improvement to their workflows was significant — the kind of feedback that signals a tool has gone from something you tolerate to something you actually use.

Rule creation engagement improved, and we expect overall fraud prevention across Stytch customers to improve as more teams adopt the tool and configure it to their specific threat models.

Part of a bigger story

This project was part of Stytch's broader push into fraud and risk prevention — positioning the platform not just as an authentication layer but as a comprehensive security tool.

Read more about the release →

Key Decisions

Power vs. approachability

Security teams need sophisticated filtering and rule-building capabilities. But Stytch's broader customer base isn't security experts. I designed the filtering system using composable patterns familiar from developer tools — powerful enough for advanced users, but with a vocabulary that helped less technical customers explore without needing to know what they were looking for upfront.

Live preview for high-stakes actions

Creating fraud rules is the highest-stakes action in this tool — block too aggressively and you lose legitimate users. I added a live preview showing exactly which traffic a rule would affect as it's being built. This made the scariest action in the product feel safe, because customers could validate intent before committing.

01

Stytch device fingerprinting expanded info
Next Project Stytch docs wayfinding