You’ve just completed a long hiring cycle. Your team is excited, the budget is approved, and the perfect Senior Software Engineer is slated to start. On the first day, the person who logs into your Slack or shows up at your office looks… different. Or perhaps they look the same, but the technical fluency they displayed during the interview has vanished.
This isn’t a bad hire or a case of nerves. It’s identity fraud. And a sophisticated form of it where a highly-skilled individual conducts the interview, but a less-qualified person actually takes the job.
At STACK IT, we believe that technical precision doesn’t end with a signed offer. Verification must be a continuous thread that runs from the first screening call to the first day at the job.
The mechanics of the proxy swap
In the remote-first world, identity is easier to obfuscate than ever. If a candidate is willing to use real-time interview botting to simulate knowledge, they are often willing to hire a professional interviewer to secure a high-paying role. Here’s how it works:
- A proxy candidate, often a seasoned contractor, performs the coding challenges and technical screens.
- In some cases, candidates use digital masks during the call, as we discussed in our physical tests for deepfake candidates post, making it nearly impossible to visually confirm identity without some tricks.
- Once the proxy secures the role, they hand off the credentials to the actual employee. The organization often doesn’t realize the swap has occurred until project timelines begin to slip and the cost of a bad hire begins to mount, reaching over $50,000 in lost productivity per mis-hire on average.
Why onboarding is your last line of defense
Most companies treat onboarding as an administrative task. Think, sending laptops, setting up emails, and signing tax forms. But in 2026, onboarding is a forensic event.
The reason why automated AI-detectors fail so frequently is that they are looking for bot-like behavior, not human-swapping behavior. A human swap is a social engineering attack, and it requires a human-led defense.
Our strategy for identity continuity
We don’t simply collect resumes; we collect context. To protect our clients from the two-person swap risk, STACK IT utilizes a structured, audit-ready verification process:
- We conduct all interviews via BrightHire, creating a permanent video record of the candidate who actually performed the technical tests. This serves for great notes and also as a forensic reference for the hiring manager to compare against the person who shows up on day one.
- We don’t wait for red flags. We use the checks during the interview to ensure we are speaking with a real person.
- STACK IT stays present after placement. Our onboarding follow-through service includes checking in with both the client and the candidate during the first week to ensure alignment and confirm that the technical voice in the room matches the technical voice on the recording.
Compliance and record-keeping under Bill 190
This two-person risk also introduces significant legal complexity. Under Ontario’s Bill 190 hiring requirements, employers must retain recruitment records for three years.
If you discover a proxy hire after the fact, your documentation becomes your primary defense. Having a structured record of the interview, the questions to ask candidates used, and the verification tests performed ensures you are audit-ready should you need to terminate for cause based on identity fraud.
Closing the trust gap
Hiring is about trust. You can’t afford to assume that the person who wowed you on Zoom is the person who will be working remotely on Monday.
At STACK IT, we operate as an extension of your team. Our success-based recruiting model is built on the belief that a hire is only successful if it is authentic. We provide the forensic layer that ensures the talent you interviewed is the talent you actually get.
Stop hoping for the best. Start verifying the person. Is your onboarding process a security vulnerability? Download the Forensic AI Hiring Playbook to access our full identity verification framework.


