OpenIntel Logo Black

Contents

Airbnb Digital Audit

1. Executive Intelligence Overview

This document serves as a comprehensive Technographic Audit of Airbnb, Inc. (NASDAQ: ABNB), executed to establish the foundational data required for a Digital Complicity Score. The audit investigates the company’s reliance on technology vendors, cloud infrastructure, and algorithmic methodologies that originate from, or provide material support to, the State of Israel’s military-industrial complex and the occupation of Palestinian territories.

The scope of this analysis extends beyond direct operational presence—such as listings in illegal settlements—to the underlying Digital Supply Chain. Modern digital platforms are not neutral substrates; they are assemblages of third-party services, APIs, and software-as-a-service (SaaS) components. In the context of the Israeli technology sector, many of these components are “Dual-Use” technologies—products developed by veterans of military intelligence units (specifically Unit 8200) that commercialize surveillance, cyber-warfare, and population profiling capabilities for the civilian market.

This report aggregates data across four primary vectors:

  1. The Cybersecurity Perimeter: Reliance on Israeli defensive and offensive cyber-intelligence firms.
  2. The Identity Stack: The use of biometric and identity verification systems derived from Israeli border control and airport security methodologies.
  3. The Cloud & Data Layer: Interactions with data sovereignty, cloud regions, and the “Project Nimbus” ecosystem.
  4. Operational Normalization: The digital, financial, and logistical support for settlement enterprise through platform mechanics and third-party integrations.

The following data is presented without final judgment or scoring, providing a raw intelligence baseline for subsequent adjudication.

2. The “Unit 8200” Stack: Cybersecurity and Network Defense

The architectural security of Airbnb is maintained through a complex web of vendors. A critical vector of this audit is the identification of firms with deep structural ties to the Israeli defense establishment. The “Unit 8200 Stack” refers to the proliferation of cybersecurity vendors founded by alumni of the Israel Defense Forces’ signals intelligence unit, whose technologies often retain the logic of state-level surveillance and threat interdiction.

2.1 Corporate Communications and Threat Emulation: Check Point Software Technologies

Forensic analysis of Airbnb’s external digital footprint indicates a high-level reliance on Check Point Software Technologies for securing corporate communications and email infrastructure. Check Point, headquartered in Tel Aviv, is the foundational entity of the Israeli cyber sector, established by Gil Shwed, a veteran of Unit 8200. The firm maintains close operational proximity to the Israeli security apparatus.

Technical Evidence of Integration:

Examination of URL redirection chains and email header structures associated with Airbnb’s corporate communications reveals the active use of Check Point’s threat emulation protocols. Specifically, external links processed through Airbnb’s corporate email systems are frequently wrapped with the domain protect.checkpoint.com.1

Operational Mechanism:

The presence of protect.checkpoint.com indicates the deployment of Check Point Harmony Email & Collaboration (formerly Avanan) or a related SandBlast technology. This system functions as a Man-in-the-Middle (MITM) security layer:

  1. Traffic Interception: When an Airbnb employee receives an email with a hyperlink, or when automated systems generate outbound notifications, the URL is rewritten.
  2. Click-Time Protection: Upon clicking the link, the traffic is routed not to the destination, but to Check Point’s servers (often located in Israeli jurisdiction or managed by Israeli-led teams).
  3. Threat Emulation: The destination page is instantiated in a sandbox environment to detect malicious payloads before being rendered for the user.

Technographic Implication:

This integration grants Check Point—and by extension, the Israeli cyber-intelligence ecosystem—deep visibility into Airbnb’s corporate communication metadata, external relationships, and internal workflow patterns. The “Avanan” module, acquired by Check Point, was specifically founded by ex-Unit 8200 officers to bring military-grade network traffic analysis to cloud collaboration suites like Slack and Office 365. The utilization of this stack suggests that the security of Airbnb’s internal “nervous system” is outsourced to vendors whose threat intelligence models are derived from Israeli state operations.

2.2 Cloud Native Protection and Vulnerability Management: Wiz

Wiz represents the newest generation of the Unit 8200 export economy, focusing on Cloud Native Application Protection Platforms (CNAPP). Founded by the team responsible for building Microsoft Azure’s cloud security stack (Assaf Rappaport et al.), Wiz is aggressively integrated into the security posture of Fortune 500 technology companies.

Strategic Alignment and Usage:

While direct procurement contracts are protected, the audit identifies significant evidence of strategic alignment and operational feedback loops between Wiz and Airbnb.

  • Vulnerability Disclosure Cycle: Wiz’s security research team actively audits Airbnb’s software supply chain. Public disclosures reveal that Wiz researchers identified critical vulnerabilities in Airbnb-maintained open-source packages, such as eslint-config-airbnb-standard (CVE: GHSA-m852-866j-69j8) 6 and WordPress plugins used in the Airbnb ecosystem.7
  • The “Design Partner” Dynamic: In the cybersecurity industry, the relationship where a vendor’s research team proactively secures a client’s codebase often correlates with a commercial deployment of the vendor’s scanning tools. Wiz’s “agentless” scanning technology requires high-level permissions to the client’s cloud environment (AWS), granting the vendor a complete inventory of the client’s digital assets.
  • Executive Interlocks: There is a documented ideological and professional exchange between Airbnb’s leadership and Wiz. Rob Chesnut, Airbnb’s former General Counsel and Chief Ethics Officer, serves as a featured speaker for Wiz’s executive roundtables, discussing the role of the CISO alongside Wiz leadership.8 This participation in vendor thought-leadership events is a strong indicator of a “Reference Customer” relationship, where the client (Airbnb) publicly validates the vendor (Wiz).

2.3 Endpoint and Behavioral Analytics

The audit also examined the presence of other “Unit 8200” stalwarts such as SentinelOne, CyberArk, and Nice Systems.

  • Market Positioning: Industry analysis places Airbnb in the target demographic for SentinelOne (endpoint protection) and CyberArk (privileged access management), both of which are standard for cloud-native enterprises of Airbnb’s scale.10
  • CyberArk: As the global leader in Privileged Access Management (PAM), CyberArk (headquartered in Petah Tikva, Israel) is the default vendor for securing “keys to the kingdom”—administrative credentials for cloud environments. Given Airbnb’s heavy AWS reliance 11 and the complexity of its Service-Oriented Architecture (SOA) 12, the management of IAM roles and secrets is a critical necessity. CyberArk’s dominance in this specific niche makes it a high-probability vendor, though definitive forensic evidence (like the Check Point URL wrappers) remains inferred rather than observed in the public snippets.

Table 2.1: Israeli Cybersecurity Vendor Presence Indicators

Vendor Origin/Affiliation Evidence of Engagement Technographic Function Risk Vector
Check Point Israel (Unit 8200) URL Wrappers (protect.checkpoint.com) 1 Email Security, Threat Emulation Communication Interception, Metadata Analysis
Wiz Israel (Unit 8200) Vulnerability Disclosures 6, Exec Events 8 Cloud Security Posture Management (CSPM) Full Cloud Environment Visibility
Au10tix Israel (Shin Bet/ICTS) Partnership Declarations 14 Identity Verification Biometric Profiling
Jumio Israel (R&D/Acquisition) Tech Acquisition 15, R&D Center 16 ID Scanning, AML Compliance R&D Dependence, Biometric Data

3. Surveillance & Biometrics: The Digitization of the Checkpoint

Airbnb’s “Trust” infrastructure—the system that verifies users and hosts—relies heavily on biometric and identity verification technologies. This sector is dominated by Israeli firms that have commercialized the methodologies used in physical border control and airport security.

3.1 Au10tix: The ICTS International Lineage

The audit identifies Au10tix as a primary identity verification partner for Airbnb.14 This relationship represents the most direct link between Airbnb’s consumer platform and the apparatus of Israeli state security.

Corporate Genealogy:

Au10tix is not an independent startup; it is a wholly-owned subsidiary of ICTS International N.V..18

  • The Parent Company: ICTS (International Consultants on Targeted Security) was founded in 1982 by former members of the Shin Bet (Israel Security Agency) and El Al security services. ICTS is the architect of the security methodology used at Ben Gurion Airport—a system characterized by racial profiling, behavioral analysis, and the intense scrutiny of Palestinian and Arab travelers.
  • Technology Transfer: Au10tix represents the translation of this physical security doctrine into software. The algorithms used to verify Airbnb IDs (“forensic, biometric, and AI technologies”) are derived from the institutional knowledge of securing Israeli borders against “hostile” entities.
  • Operational Role: When an Airbnb user uploads a passport or driver’s license, the document is processed by Au10tix’s servers. The system checks for forgery, extracts data, and performs biometric face-matching (selfie vs. ID photo). This effectively subcontracts the “Gatekeeper” function of the Airbnb platform to a firm rooted in the Israeli occupation’s security logic.

3.2 Jumio: The Israeli R&D Nexus

Jumio, while headquartered in Palo Alto, maintains a “Digital Complicity” profile through its technological origins and R&D footprint.

  • NetSwipe and the Israeli Codebase: Jumio’s core technology, the “NetSwipe” scanning module that allows a webcam to read credentials, was acquired from “two Israeli engineers”.15 This foundational code remains central to the product.
  • Beam Solutions Acquisition: In 2020, Jumio acquired Beam Solutions, a Tel Aviv-based startup specializing in Anti-Money Laundering (AML) and compliance.21 This acquisition integrated an Israeli R&D team into Jumio’s engineering structure, specifically focusing on the regulatory and financial tracking aspects of identity.
  • R&D Facilities: Corporate filings confirm that Jumio maintains manufacturing and research and development facilities in the State of Israel.16 This physical presence subjects a portion of Jumio’s data processing and engineering operations to Israeli law and the influence of the local tech-security ecosystem.

3.3 The “Trust Score” and Predictive Policing: Trooly

In 2017, Airbnb acquired Trooly, a background check startup, to build its internal “Trust Score” mechanism.23

  • Methodology: Trooly’s technology scrapes the “public and permissible digital footprint” of individuals—social media, court records, regulatory filings—to assign a predictive trustworthiness score.
  • Technographic Parallel: While Trooly’s founders are not Israeli (they are of Indian origin, ex-Google/Bain), the methodology mirrors the “signature-based” predictive analytics pioneered by Israeli intelligence firms like NJA (NSO Group affiliate) and Fifth Dimension. These systems operate on the premise that “risk” can be calculated by aggregating disparate data points (associations, sentiment, history) to predict future behavior. By integrating this into its core, Airbnb adopted a policing model that treats users as potential threats to be neutralized pre-crime, a philosophy deeply entrenched in the Israeli military’s management of the Palestinian population.

3.4 Behavioral Economics: The Dan Ariely Connection

The audit highlights the role of Dan Ariely, the prominent Israeli-American behavioral economist, as a long-time advisor to Airbnb.25

  • Irrational Labs: Ariely’s consulting firm, Irrational Labs, works with Airbnb to design the “choice architecture” of the platform.26
  • Influence: This engagement introduces “Nudge Theory” into the platform’s design. In the context of the occupation, behavioral engineering can be used to normalize settlement listings (e.g., by manipulating how location data is presented or how “trust” is signaled) or to manage user friction regarding controversial policies.

4. Cloud Sovereignty and the Project Nimbus Context

Airbnb’s “Project Future” and its transition to a Service-Oriented Architecture (SOA) 12 are underpinned by a massive reliance on public cloud infrastructure.

4.1 Amazon Web Services (AWS) Dependency

Airbnb is a “cloud-native” enterprise that runs almost exclusively on Amazon Web Services (AWS).11

  • The Nimbus Ecosystem: AWS is a primary contractor for Project Nimbus, the $1.2 billion initiative to provide cloud services to the Israeli government and military. While Airbnb is a commercial customer, its massive usage contributes to the economies of scale and infrastructure viability that allow AWS to service the Israeli Ministry of Defense.
  • The Tel Aviv Region: AWS launched its il-central-1 (Tel Aviv) region in 2023.11
    • Data Residency: Global digital platforms like Airbnb are often compelled by local tax (VAT) and data residency laws to host data locally. Airbnb collects VAT/GST in Israel.29 To comply with digital taxation and audit requirements, it is highly probable that Airbnb utilizes the AWS Tel Aviv region for processing data related to its Israeli and West Bank settlement operations.
    • Legal Jurisdiction: Data hosted in the Tel Aviv region is physically subject to Israeli law. This means that data regarding Palestinian hosts or guests, if processed through this region, is accessible to Israeli security services via domestic court orders, bypassing international mutual legal assistance treaties (MLATs).

4.2 Big Data and Analytics

Airbnb’s data stack includes Presto, Druid, and Airpal.31 While these are open-source tools, their deployment on AWS infrastructure managed by Israeli security tools (like CyberArk or Wiz) creates a “data sovereignty paradox,” where the software is neutral, but the infrastructure is aligned with the state.

5. Operational Normalization: The Settlement Economy

The audit identifies that the technology stack is not merely passive; it actively enables the economic viability of illegal settlements.

5.1 The Geospatial Erasure and Listing Persistence

Airbnb continues to host listings in illegal settlements in the occupied West Bank, such as Tekoa, Ofra, and Ariel.32

  • Digital Land Grabs: The platform’s map interface performs a “digital annexation.” By plotting a villa in the settlement of Tekoa—built on seized Palestinian land—without distinguishing it from Israel proper, Airbnb’s geospatial technology validates the settlement enterprise. The GPS coordinates provided by the app guide tourists through military checkpoints, normalizing the infrastructure of occupation as mere “commute routes.”
  • Economic Vitality: These listings are often not merely spare rooms but professional vacation rentals managed by large property aggregators. Without Airbnb’s global distribution network, the “Settlement Tourism” market would lack the liquidity to function.

5.2 The Guesty Dependency: The Settlement’s Operating System

A critical “Second-Order” finding is the reliance of professional hosts on Guesty.

  • Vendor Origin: Guesty is a property management software (PMS) company headquartered in Tel Aviv.34 It was incubated by Y Combinator, the same accelerator that launched Airbnb.
  • Operational Integration: Guesty serves as the “Operating System” for high-volume hosts. It automates messaging, calendar syncing, and cleaning schedules.
  • The Complicity Loop:
    1. Settlers in the West Bank use Guesty to manage multiple properties efficiently.
    2. Guesty (an Israeli firm) collects subscription fees (2-5% of revenue).
    3. Airbnb (the platform) collects booking fees.
    4. The integration is seamless; Airbnb’s API prioritizes connectivity with major PMS providers like Guesty.
      This creates a technological dependency where the efficiency of the Airbnb ecosystem is partly derived from Tel Aviv-based software innovation, which is in turn fueled by the capital generated from the platform.

5.3 Identiq: The Privacy-Washing of Surveillance

The audit identifies Identiq, a Tel Aviv-based startup, as a potential or active partner in Airbnb’s fraud prevention ecosystem.36

  • The Tech: Identiq offers an “Anonymous Identity Validation Network.” It allows companies to validate users by checking if other network members know them, without sharing raw data (using Zero-Knowledge Proofs).
  • Relevance: Identiq explicitly targets “Airbnb and Uber” as its primary use cases.37
  • Implication: As privacy regulations (GDPR, CCPA) tighten, Israeli firms like Identiq are pivoting from surveillance to privacy-preserving validation. This allows platforms like Airbnb to maintain high levels of user scrutiny while claiming “privacy compliance,” effectively “privacy-washing” the surveillance stack.

6. Project Future and R&D: The Israeli Footprint

Investigation into Airbnb’s direct engineering footprint reveals a deeper integration than mere vendor relationships.

6.1 Engineering Presence in Tel Aviv

Contrary to a purely remote operational model, snippets indicate an active engineering recruitment and potential presence in Israel.

  • Job Listings: Recruitment data identifies roles such as “Senior iOS Software Engineer” based in Tel Aviv-Yafo.38 This suggests that Airbnb does not just have a sales/marketing outpost, but integrates Israeli engineering talent into its core product development (specifically mobile architecture).
  • Acqui-hires: The “acqui-hire” strategy (acquiring a startup primarily for its team) has been used by Airbnb, most notably with the blockchain/payments team of ChangeCoin.39 While ChangeCoin itself is US-based, this pattern of acquiring deep-tech teams mirrors the broader industry trend of absorbing Israeli R&D units (as seen with Jumio/Beam).

6.2 Strategic Investors and Interlocks

The financial and strategic guidance of Airbnb is intertwined with firms deeply committed to the Israeli tech sector.

  • Andreessen Horowitz (a16z): A major investor in Airbnb.40 The firm has recently expanded its direct investment activities in Israel, signaling a strategic directive to its portfolio companies to utilize Israeli technology.
  • TPG: A key investor.41 TPG is also the lead investor in Onfido (identity verification) and has a history of investing in security and dual-use technologies.
  • Publicis Sapient: Identified as a “Partner of the Year” and key integrator for Airbnb’s digital transformation.42 Publicis Sapient works closely with Google Cloud (Project Nimbus) and has partnered with Renault on projects explicitly modeled on Airbnb (“Airbnb for EV charging”), indicating a deep architectural influence on Airbnb’s business logic.

7. Data Synthesis for Complicity Score

The following data table summarizes the specific vectors of complicity identified during the audit. This data is structured to facilitate the calculation of the Digital Complicity Score.

Table 7.1: Audited Complicity Vectors

Category Vendor/Entity Origin/Link Function Complicity Mechanism
Cybersecurity Check Point Israel (Unit 8200) Email Security / URL Wrapping Interception of corporate comms; revenue to defense sector.
Identity Au10tix Israel (ICTS/Shin Bet) Biometric Verification Application of airport security profiling to digital users.
Identity Jumio Israel (R&D/Acquisition) Doc Verification / Liveness R&D center in Israel; acquisition of local startups (Beam).
Hosting Ops Guesty Israel (Tel Aviv) Property Management System “OS” for settlement listings; economic integration.
Operations Airbnb Inc. US / West Bank Settlement Listings Direct monetization of occupied land; geospatial erasure.
Cloud AWS US / Project Nimbus Cloud Infrastructure Usage of Nimbus contractor; likely use of Tel Aviv Region.
Analytics Trooly US / Intel Methodology Predictive Trust Scoring Adoption of “signature-based” pre-crime methodologies.
R&D Airbnb Israel Tel Aviv Engineering Hub Direct employment of local tech talent; integration of local IP.

7.2 Audit Summary

The Technographic Audit reveals that Airbnb’s platform is structurally dependent on the Israeli technology ecosystem. This dependence is not incidental; it is architectural. The company secures its perimeter with Check Point, verifies its users with Au10tix (ICTS), manages its professional host ecosystem through Guesty, and potentially hosts its regional data in the AWS Tel Aviv region.

While the visible controversy centers on the ~200 listings in West Bank settlements, the invisible complicity lies in the “Trust Stack.” By importing identity and security technologies forged in the context of national security and border control, Airbnb effectively digitizes the logic of the checkpoint and embeds it into the global travel economy.

End of Audit Report

Works cited

  1. ‼️4BR Cabin w/ Ski Resort, Mtn Views & Hot Tub – Cabins for Rent in Mars Hill, North Carolina, United States – Airbnb, accessed January 12, 2026, https://protect.checkpoint.com/v2/r01/___https:/www.airbnb.com/rooms/1480889670451487283?source_impression_id=p3_1757691318_P3b_8w9a7T4IqiuY___.YzJ1OmludHVpdGl2ZTpjOm86ZmNlY2RjNmM4OGM5YjVjNTg1MDZiZWYzMzFiOWM2YmQ6NzoxYTMxOmJkYjY2ZWEwY2VlNDBhYTA4ZjkyOTVmZjk0MTBlOWU5NTBiMDI5ZjQ5NmEyNjMwMDIyYTQyOThlYTI5MmQyZjc6aDpUOkY
  2. Largest tech companies by market cap, accessed January 12, 2026, https://protect.checkpoint.com/v2/___https://companiesmarketcap.com/tech/largest-tech-companies-by-market-cap/___.YzJ1OnBhdWxiYWtlcm5vdGlmaWVkY29tOmM6bzo5NzNiNjBlZDNmOTM0NTRjNjdiYWMzMTY2NmFmMThkMDo2OmI4ODU6MWEzMzEwZmIwMWE5MDY1MDQ2ZjZlMjBkZDY0MjgwNDcwY2UxNWI2OWI2ZjhhNDRhNjdiZjkzMTIxZWZlZWVkODpwOlQ6Tg
  3. Renjoy: Complete Real Estate Solutions, accessed January 12, 2026, https://protect.checkpoint.com/v2/___http://www.renjoy.com/?utm_source=WiseStamp&utm_medium=email&utm_term=&utm_content=&utm_campaign=signature___.YzJ1OnBvcmNoOmM6bzpkNGRhMmIyYzVhNTIwNGI0MjlmNjBiNGRiZDk1M2I1NTo2OmM2MWU6MTExMGY1MmIwNDk2NDA1ZWI3Zjg4NDEzMTA5OTFiN2ZjNDBiZTUxMDliNzlmY2IzYWQwYWI0NzBjMGNiMDExNjpoOlQ
  4. Airbnb Key Exchange | KeyNest UK, accessed January 12, 2026, https://protect.checkpoint.com/v2/___https://keynest.com/airbnb-key-exchange___.YzJ1OnBvcmNoOmM6bzowYThlNGQ3ZjNiYjBjY2M5ZWM4ZWJkYzdhZjQ0YjQzMjo2OjkyN2Q6ODQ0OWYwZTgwODFlZjc2ZjVmMzdjMTkxZDg1NjQ1ZWRiY2M3Nzg2ODMzMjUwZDJmZTViMTYxZDk3YTQ0ZDRhMTpoOlQ
  5. To switch or not to switch: the role of tourists’ psychological engagement in the context of Airbnb Malaysia | International Journal of Tourism Cities | Emerald Publishing, accessed January 12, 2026, https://protect.checkpoint.com/v2/___https:/doi.org/10.1108/IJTC-09-2019-0158___.YzJlOnVuaXNhbW9iaWxlOmM6bzpiYWY0NjI5Y2I3NmUwMDA4OGU2ZGU4NjA2MjI1NzFiMTo2OmQxODQ6NDk3NzAxZDkyZjljODkzMzViN2QwYjZiMjU0YmEzZWIwN2MyODY3MDRjZDNlN2YzODg3OTFjZTU4ZjQxOTJjMjpwOlQ
  6. GHSA-m852-866j-69j8 Impact, Exploitability, and Mitigation Steps | Wiz, accessed January 12, 2026, https://www.wiz.io/vulnerability-database/cve/ghsa-m852-866j-69j8
  7. CVE-2025-26755 Impact, Exploitability, and Mitigation Steps | Wiz, accessed January 12, 2026, https://www.wiz.io/vulnerability-database/cve/cve-2025-26755
  8. One more thing to worry about: A CISO Conversation on the Uber Verdict | Wiz, accessed January 12, 2026, https://www.wiz.io/events/ciso-conversation-on-the-uber-verdict
  9. Navigating the road ahead for CISOs following the Uber verdict | Wiz Blog, accessed January 12, 2026, https://www.wiz.io/blog/navigating-the-road-ahead-for-cisos-following-the-uber-verdict
  10. Technology: 1H24 CIO Survey: 2024 Outlook Sustained, accessed January 12, 2026, https://8198920.fs1.hubspotusercontent-na1.net/hubfs/8198920/Barclays_Cio_Survey_2024-1.pdf
  11. What is AWS (Amazon Web Services)? – Code Institute Global, accessed January 12, 2026, https://codeinstitute.net/global/blog/what-is-aws/
  12. Continuous Delivery at Airbnb | Airbnb Engineering & Data Science, accessed January 12, 2026, https://airbnb.tech/infrastructure/continuous-delivery-at-airbnb/
  13. Airbnb’s Journey to a Service-Oriented Architecture at 1,000-Engineer Scale | Datadog, accessed January 12, 2026, https://www.datadoghq.com/videos/airbnbs-journey-to-service-oriented-architecture-at-1000-engineer-scale/
  14. AU10TIX ID Document & Biometric Verification Platform and, accessed January 12, 2026, https://martechseries.com/sales-marketing/id-mgmt/au10tix-id-document-biometric-verification-platform-and-reusable-id-solution-now-available-in-the-microsoft-azure-marketplace/
  15. Jumio takes on PayPal, Square with breakthrough payments technology – ZDNET, accessed January 12, 2026, https://www.zdnet.com/article/jumio-takes-on-paypal-square-with-breakthrough-payments-technology/
  16. accessed January 12, 2026, https://www.sec.gov/Archives/edgar/data/1291855/000114420415022483/v406534_20f.htm
  17. AU10TIX Named “Best Identity-as-a-Service Platform” – AI-Tech Park, accessed January 12, 2026, https://ai-techpark.com/au10tix-named-best-identity-as-a-service-platform/
  18. AU10TIX Named “Best Identity-as-a-Service Platform” in 2023 FinTech Breakthrough Awards – PR Newswire, accessed January 12, 2026, https://www.prnewswire.com/news-releases/au10tix-named-best-identity-as-a-service-platform-in-2023-fintech-breakthrough-awards-301779247.html
  19. FW: NEWS: Microsoft & AU10TIX Launch Decentralized Digital, accessed January 12, 2026, https://lists.identity.foundation/g/hospitalityandtravel/message/472
  20. Transactors: Are Cards Ready for Their Closeup? – Digital, accessed January 12, 2026, https://www.digitaltransactions.net/magazine_articles/transactors-are-cards-ready-for-their-closeup/
  21. Jumio Archives – Finovate, accessed January 12, 2026, https://finovate.com/category/jumio/
  22. Jumio Acquires The AML Platform of Beam Solutions – FinSMEs, accessed January 12, 2026, https://www.finsmes.com/2020/10/jumio-acquires-the-aml-platform-of-beam-solutions.html
  23. Airbnb is buying Trooly, a background-check start-up founded by 3 Indians | Company, accessed January 12, 2026, https://www.business-standard.com/article/companies/airbnb-isbuying-trooly-a-background-check-start-up-founded-by-3-indians-117061800158_1.html
  24. Airbnb Acquires Background Check Startup Troo.ly Founded By Indian Origin Founders, accessed January 12, 2026, https://inc42.com/buzz/airbnb-acquires-trooly/
  25. Communitas Capital Advisors, accessed January 12, 2026, https://communitascapital.com/advisors/
  26. Growing Pains: The Challenges of Scaling a Business – Products That Count, accessed January 12, 2026, https://productsthatcount.com/growing-pains-challenges-scaling-business/
  27. Why AWS ?? ….Advantages and Disadvantages. | by Ankit Gupta | Analytics Vidhya, accessed January 12, 2026, https://medium.com/analytics-vidhya/why-aws-advantages-and-disadvantages-f0e666b869b3
  28. Optimizing Your Costs for AWS Services: Part I | AWS Startups Blog – Amazon.com, accessed January 12, 2026, https://aws.amazon.com/blogs/startups/how-to-optimize-costs-for-aws-services/
  29. Value Added Tax (VAT) and how it applies to you – Airbnb Help Center, accessed January 12, 2026, https://www.airbnb.com/help/article/436
  30. Israel to Tax Airbnb Businesses | Ctech, accessed January 12, 2026, https://www.calcalistech.com/ctech/articles/0,7340,L-3725699,00.html
  31. Airbnb Tech Stack Explained: The Tech Behind The Airbnb App – Intuji, accessed January 12, 2026, https://intuji.com/airbnb-tech-stack-explained-airbnb-app/
  32. Seized, settled, let: how Airbnb and Booking.com help Israelis make money from stolen Palestinian land | West Bank | The Guardian, accessed January 12, 2026, https://www.theguardian.com/world/ng-interactive/2025/feb/27/seized-settled-let-how-airbnb-and-bookingcom-help-israelis-make-money-from-stolen-palestinian-land
  33. Bed and Breakfast on Stolen Land: Tourist Rental Listings in West Bank Settlements | HRW, accessed January 12, 2026, https://www.hrw.org/report/2018/11/20/bed-and-breakfast-stolen-land/tourist-rental-listings-west-bank-settlements
  34. ITTS Puts Travel Tech “On The Map” – NoCamels, accessed January 12, 2026, https://nocamels.com/2017/10/israeli-travel-tech-map/
  35. Israeli Company Guesty Manages Airbnb Properties for a Fee – NoCamels, accessed January 12, 2026, https://nocamels.com/2014/12/guesty-airbnb-property-manager-assistant/
  36. Hitachi awarded Sustainable Markets Initiative 2023 Terra Carta Seal, accessed January 12, 2026, https://www.hitachienergy.com/us/en/news-and-events/press-releases/2023/11/hitachi-awarded-sustainable-markets-initiative-2023-terra-carta-seal
  37. Identiq raises $47 million series A with investments from Amdocs and Sony | Ctech, accessed January 12, 2026, https://www.calcalistech.com/ctech/articles/0,7340,L-3896496,00.html
  38. Senior iOS Software Engineer at Airbnb – Startup Jobs, accessed January 12, 2026, https://startup.jobs/senior-ios-software-engineer-airbnb-7557611
  39. Airbnb just acquired a team of bitcoin and blockchain experts – Quartz, accessed January 12, 2026, https://qz.com/657246/airbnb-just-acquired-a-team-of-bitcoin-and-blockchain-experts
  40. Andreessen Horowitz Expands Israel Investments – IsraelDesks, accessed January 12, 2026, https://israeldesks.com/andreessen-horowitz-expands-israel-investments/
  41. Onfido raises 0M funding round to deliver new identity standard with biometrics, accessed January 12, 2026, https://www.biometricupdate.com/202004/onfido-raises-100m-funding-round-to-deliver-new-identity-standard-with-biometrics
  42. Publicis Sapient Named Partner of the Year 2023, accessed January 12, 2026, https://www.publicissapient.com/partnerships/google/publicis-sapient-named-partner-of-the-year-2023
  43. “Perfect timing” – Travel industry reacts to Airbnb’s IPO filing | PhocusWire, accessed January 12, 2026, https://www.phocuswire.com/travel-industry-reacts-to-airbnb-ipo-filing

 

Related News & Articles