Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Importantly, though, the credit card system is based around more than just the cryptography involved. By removing the ability to obtain portable payment credentials, the scammer is forced to perform the transaction right then and there. This allows the network to pinpoint the source of the compromise.

A scummy merchant can be banned, a hacked terminal can be removed and examined, etc. And, unlike say a blockchain, a fraudulent transaction can be reversed.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: