Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:A decade late? (Score 1) 193

From the VISA Website "If your card is lost or stolen you should notify your bank as soon as possible. If anyone has fraudulently used your contactless card to make a payment, providing you take reasonable precautions to protect your card and let your bank know as soon as you realise it’s gone, you will not be responsible for any losses incurred (subject to your bank’s terms and conditions)."

In other words you are not responsible for any losses. Provided you report it lost as soon as you realise.

They are very low value for any fraudster - the best they can hope is a few contactless transactions and probably each one runs the risk of being caught (and on CCTV).

VISA seem prepared to take the hit - so what's the issue?

Jason

Comment Re:RFID sleeve? (Score 1) 193

It's the intelligence of the reader - our library scanner can read multiple cards simultaneously. - because it's only a one way transaction. So it's perfectly possible to read.

The problem in a POS environment is they need to charge the transaction to one card only. Picking a random card in the customers wallet isn't appropriate.

This whole thing is nonsense anyway.. The reader will only show the publically available info which is the 16 card number and expiry. No CCV and No customer name. It's of no use whatsoever for online or contactless transactions.

About the only thing it could be good for is some casual analytics.

Jason.

Comment Re:Well Duh! (Score 1) 127

And it wasn't that either..

It was more like, we "accidentally" found out some information about an employee, can we use it in a disciplinary. - Answer yes.
It sounds like some chat logs or similar were saved on the work PC and came up in an investigation, seems fair enough.

This isn't the mega ruling it seems.

Jason.

Comment Re:PIC flashers (Score 1) 190

Yes, it is easy now. It used to be harder. The PIC16F84? was the start of it getting easier, but it always used to require some pretty weird voltages. The pin-outs and programming routines were different for each device, so it was a right old mess. The adaptors and so on used to often be the most expensive part of a programmer.. These were essential when it wasn't possible to program in-system. So yes, anyway, it was expensive and a hobby itself to create a programmer.

Jason.

Comment Re:revolutionary technology (Score 3, Informative) 172

Dunno how things are done in the US, but ballot boxes are sealed here (with actual lead / hard to change seals). The boxes are then couriered (with several different people accompanying the box) to a central location. There are various different registers that show who has attended the vote, what papers have been used. ie. Double Entry. with different people responsible for each register. Usually with a completely separate observer overseeing the ballot box.

At the count all the politicians and representatives can watch the boxes opened and counted. The teams responsible for counting boxes will not know ahead of time which box(es) they are counting. There are careful initial checks to count the papers, to ensure they tally with the registers. There are usually teams of about 8-9 people per box, with an overseer. The room is sealed / guarded. Politicians and representatives can ask for a recount. It is done then and there.

Any deviation from an X in one box on the voting paper, is carefully considered by a team of very senior well trained staff, with a very comprehensive manual to consider all the various ways that a vote can be considered valid or spoiled.

It would take an amazing level of conspiracy and corruption to rig a count in the UK. There are no volunteers, these people are usually paid (and paid well enough) for their role in the ballot and count. Consequences for interfering with the vote in any way are harsh and will include criminal charges as well as most likely loss of employment (staff typically are Local Government staff).

All these protocols would expose fraud or deception quite easily. It'd be simpler to put a gun to people on the way in to the count and tell them who to vote for and check they do this, than to actually create a convincing scenario where the count itself is corrupted.

I know techies often think traditional paper counts are more open to abuse, absolutely no way. If you've ever been at a count or worked with the people at the polling stations you would understand. The only problem is that a vote is expensive with all the oversight and double checking.

Jason

Comment Brilliant - This means... (Score 4, Interesting) 115

That the Gov cannot gain access to modern Apple and Microsoft devices. This legislation wouldn't be necessary otherwise. Microsoft and Apple have genuinely closed the encryption / key loopholes that would allow the authorities to force them to unlock these devices.

This is excellent news, now just to get this bill junked.

Jason.

Comment Re:Can Apple push extra software on the device? (Score 2) 225

Yes sure, you can enroll an iOS device in MDM and then send it an unlock command. The end-user has to agree and approve this first of all of course.

Apple have built the system so that it is immune to a direct unlock. Apple and Microsoft have been giving clear signals that they no longer want to be stuck in the middle of international legal / court disputes requiring them to unlock under court order. So they've re-engineered their encryption and unlock protocols so that they no longer hold any master keys / unlocks etc. This also makes these devices useless when stolen.

The only slightly questionable part is wether they can access any cloud backups. Although that might not be what the court asked.

Jason.

Slashdot Top Deals

"When the going gets tough, the tough get empirical." -- Jon Carroll

Working...