this post was submitted on 03 Nov 2024
666 points (97.3% liked)

linuxmemes

21263 readers
1092 users here now

Hint: :q!


Sister communities:


Community rules (click to expand)

1. Follow the site-wide rules

2. Be civil
  • Understand the difference between a joke and an insult.
  • Do not harrass or attack members of the community for any reason.
  • Leave remarks of "peasantry" to the PCMR community. If you dislike an OS/service/application, attack the thing you dislike, not the individuals who use it. Some people may not have a choice.
  • Bigotry will not be tolerated.
  • These rules are somewhat loosened when the subject is a public figure. Still, do not attack their person or incite harrassment.
  • 3. Post Linux-related content
  • Including Unix and BSD.
  • Non-Linux content is acceptable as long as it makes a reference to Linux. For example, the poorly made mockery of sudo in Windows.
  • No porn. Even if you watch it on a Linux machine.
  • 4. No recent reposts
  • Everybody uses Arch btw, can't quit Vim, and wants to interject for a moment. You can stop now.

  • Please report posts and comments that break these rules!

    founded 1 year ago
    MODERATORS
     
    you are viewing a single comment's thread
    view the rest of the comments
    [–] [email protected] 16 points 1 week ago (4 children)

    Absolutely spot on, thank you - always handy to know.

    I'm wondering what it does to mitigate the "card not present" fraud though, for online purchases or remote purchases?

    [–] [email protected] 10 points 1 week ago* (last edited 1 week ago)

    In my case, I have to verify online purchases on my bank's app. Which makes online banking impossible without an android or apple phone.

    [–] [email protected] 4 points 1 week ago (1 children)

    As far as I understand it the pin&chip system involves a challenge/response between the bank and the card. You can't just "clone" the chip, because the secret data it contains is essentially write-only.

    [–] [email protected] 7 points 1 week ago (3 children)

    Sorry, maybe I wasn't clear.

    I'm assuming the 16 digit card number, start and expiry dates, and CVV are printed on the reverse - whereas it used to only have the CVV on the reverse and the rest of the details on the front.

    What's stopping someone with a picture of the rear of the card visiting an online retailer and going wild with a picture of just one side of the card these days - aside from multi-factor authentication at the point of authorising the payment?

    [–] [email protected] 5 points 1 week ago

    The CVV should really be 2FA from your card issuer.

    [–] [email protected] 5 points 1 week ago

    Oh! In that case: absolutely nothing. Credit cards are terrifyingly insecure. Whether or not the info is on two sides or one. Any webshop you use your credit card at can just arbitrarily charge it from then on if they feel like it.

    [–] [email protected] 0 points 1 week ago

    Most card allow you to set that transactions have to be approved either by app or by SMS.

    [–] [email protected] 1 points 1 week ago

    There’s additional tools for e-commerce transactions like 3DSecure (step up authentication like an OTP) and passive identity verification tools.

    [–] [email protected] 1 points 1 week ago* (last edited 1 week ago)

    I just replied this to the parent comment.

    Furthermore even if a card is skimmed these days, at least in the UK, it’s still unlikely transactions would be processed online.

    That’s because it’s become so commonplace now for transactions to pop-up in the banks app on the owners phone and they must confirm the transaction and / or receive a code via SMS. Some just use SMS as a means to confirm a transaction.

    I guess one vector for attack still remains and that is SIM swapping, but even that is more difficult these days due to widespread awareness from carriers.