Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The card details and payment are encrypted and then signed by the firmware running in the secure/trusted zone, using public keys provided by the acquirer.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: