Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
Get HideMyAss! VPN, PC Mag's Top 10 VPNs of 2016 for 55% off for a Limited Time ×

Comment Re:They don't make disasters like they used to (Score 1) 394

EMV is the half of the new system that gets the news coverage, but the other half, point-to-point encryption, is more important. The transaction gets encrypted in the credit card pad, and the merchant never sees the card information. So if you break into their network, there's nothing there to steal.

How does the merchant do settlement at the end of the day or representments without that information? Are you maybe thinking about tokenization, where the merchant is given a token by the processor to store in place of the card number? The token is then used for followup transactions.

Comment Re:Oh please. (Score 1) 394

I used to work for a credit card processor and had to test the systems for grocery stores with 20 or so lanes before they were installed. One of the things I was watching for was slow performance (way back in the day of X.25 links. Get offa my lawn. ;) ), so I still pick that up regardless of the swipe versus insert dichotomy.

So what you're saying is that you don't know anything about how the EMV protocol works or how modern POS systems communicate with their processors and from there to the issuer, but you're going to toss out your $0.02USD anyway. Kinda like the guy telling the Tesla owner that his car isn't as fast as it could be. He knows because he worked on Model Ts back in the day and he can just tell that the Tesla just the wrong size jets installed in the carburetor.

Comment The Proper Response? (Score 1) 254

The proper response is of course the same as the one given in the case of Arkell v. Pressdram:

Dear Sirs,

We acknowledge your letter of 29th April referring to Mr. J. Arkell.

We note that Mr Arkell's attitude to damages will be governed by the nature of our reply and would therefore be grateful if you would inform us what his attitude to damages would be, were he to learn that the nature of our reply is as follows: fuck off.


Private Eye

Comment Crap Headline and Summary (Score 1) 42

Vine's Source Code Was Accidentally Made Public For Five Minutes


Twitter's bounty program paid out - US$10,080 - and the problem was fixed in March (within five minutes of him demonstrating the issue).

Who knows how long the docker container was actually available to the public.

had its source code made publicly available by a bounty-hunter

Where did that come from? I saw nothing in the article or the blog post that said the "bounty hunter" made the source code available to anyone.

Comment Re:Translation: (Score 3, Informative) 99

No they haven't, read the description of their implementation.

No thanks, I would rather read their actual implementation (ie open source). The only way you can even begin to trust such a communications system is if it is open source and you can build the client from the provided source. Insert oblig reference to Ken Thompson's "Reflections on Trusting Trust" here. At any rate, the description of the implementation is not the implementation itself.

Comment Re:phone numbers are transient and disposable (Score 1) 188

I'm assuming that you don't live in the USA and that you don't work in IT. Both apply to me. This is not as easy to do as you claim for a lot of us. First of all, while you can buy SIM cards in the USA, it's difficult. US mobile telephone service isn't really setup to work this way. Everybody expects you to sign a contract with a carrier for a certain number of years. Just walking down to some local electronics store and buying a SIM card off the shelf is not at all how things work in the USA. You have to go to carriers to get SIM cards here and those aren't really setup to be pay as you. You can do that sort of thing if you're willing to use crap disposable phones like with Tracfone, but not so much if you actually have a good phone.

I'm assuming that you don't live in the USA either, because your facts are way out of date. I just ordered a couple of new SIMs off of Amazon yesterday to swap out on phones.
Here are a couple of examples.

Comment Re:Why are we still using Human Pilots? (Score 1) 441

War is not something that should be automated, we need to retain the potential of real losses to restrain our desire to engage in war.

More specifically, we need to retain the potential of real losses of members of the policy and decision maker's families. Their children should be just a likely as any other citizen's to be drafted and put in harm's way carrying out our foreign policy. When it might be their sons or daughters coming home in flag draped coffins, maybe they will at least pause for a second to consider all of the options.

Slashdot Top Deals

Writing software is more fun than working.