The Java Commerce API (Application Programming Interface) is still vaporware.
|Credit Cards Are Obsolete||Fraud|
|Alternatives to Credit Cards||Rant|
|Debit Cards||Cleaning Credit and Debit Cards|
Mag stripe cards have as much security as a pile of signed blank cheques. The new RFI (Radio Frequency Interface) credit cards have even less. Somebody should sue the credit card companies for this gross negligence. If you give your credit card over the phone or over the Internet to a merchant, he, his crooked employees or anyone snooping electronically, can use that number to makes as many purchases as he wants over the net. He has your number and your expiry date. If you hand your card to a merchant, he can easily record the information on the card for later illicit use. If you have a RFI credit card, a thief can steal the information on all the cards is your wallet simply by walking within 3.05 metres (10 ft) of you in a shopping mall. Your card willingly divulges this information, without your permission, on being given a tiny prod of radio waves from a device. The technology for secure commerce has been known for half a century. The credit card companies refuse to use it, presumably because they can usually stick their customers (vendors and purchasers) with most of the costs of the thefts.
Credit cards are obsolete. They are absolutely preposterous when it comes to security. Giving someone your credit card number is even more foolhardy that giving them a stack of signed blank cheques. Why?
Credit cards are an anachronism from the days when people used to leave their doors unlocked. What are your alternatives?
In Canada, smart cards are being phased in over the next two years. There will also have signatures and a mag stripe for use at merchants without the new readers. The cards will not become secure until the, number, the stripe or the signature are no longer valid anywhere. This likely won’t happen for many years to come. Banks could issue smart cards without stripes, numbers and signatures that are fully secure, but I have heard no plans to do this. You would not be able to use these for Internet purchases, until someone worked out a smart card reader for desktop computers.
There is some talk of using Smart Phones to access ATM (Automated Teller Machine) machines. This is too silly for words. Smart Phones have zero security. One app can spy on and interfere with another. For the idea to work, you need a computer architecture where hardware keeps each app in its own air-tight box where it cannot interact with any other app. Such devices have been developed, but Smart Phones don’t have those features. Making such a scheme secure is a very highly skilled art. Every feature you add creates yet another opportunity to bypass security. The devices have to be kept simple.
If you use a premium credit card you will pay an annual fee of $15 to $300. You will also pay an exorbitant variable interest rate on the outstanding balance.
In addition, your retailer pays 1 to 2% of your purchase if you use a standard credit card or 3 to 4% if you use a premium card. The credit card companies insist the retailer hide that cost in the overall prices. This is dishonest because it forces people to who pay cash to subsidise those who use credit subsidise The bank extorts money from cash users who don’t use credit cards at all and gives them nothing in return. That should be illegal. Cash users don’t even have a contract with the bank.
The fees for debit cards are 100 times smaller, e.g. 0.01%. These save the banks money counting and handling cash and securely transporting it. Debit cards give you all the convenience of a credit card at a fraction of the cost.
Retailers should be allowed to unbundle credit card fees and pass them on to the consumer. Customers should pay for what they use rather than fobbing cost of their irresponsible credit card use on others with less money.
If someone steals money with your credit or debit card or by other means and the bank finds out you shared your PIN with your spouse, they hold you responsible, even if your spouse is not the culprit!
The new chip cards are vulnerable to high tech thieves stealing your financial information without even touching your card. They can do it as they walk by in a shopping mall. Roots has designed a line of wallets lined with metal mesh to foil them. Others have created metal sleeves and metal boxes to store your credit cards.
Credit cards are so incredibly fraud-friendly it seems organised crime must have had a hand in designing them. The credit card companies make money from theft because most is not detected. Theft increases sales and increases transaction fees. In practice, customers get stuck with the lion’s share of the burden of the theft. Credit card companies thus have little incentive to reduce fraud. Making credit cards fraud-proof is not rocket science. The US military has been doing it for years with their CAC cards. The CAC (Common Access Card) acts as a:
Implementing CAC was just a matter of applying ordinary public key encryption. The rest was mere details. The same could be done for credit cards. All you would need is one card in your wallet to replace all the cards in there now plus your passport.
Most modern credit cards have a gold plated button on them in the upper left where the card makes contact with the reader. This tends to get dirty with sweat, oil and crud from other people’s cards inside the reader. If the card stops working reliably, the best way to clean it is to use DeoxIT Red. Apply a small amount and wipe it clean with a Kleenex which leaves a one molecule thick protective layer. Oddly, this will also help clean other people’s cards who use the same readers you do.
If you don’t have any DeoxIT Red, try cleaning it with isopropanol.
If the gold plating is badly chipped, pretty much all you can do as ask your financial institution for a replacement card.
This page is posted
Optional Replicator mirror
Please read the feedback from other visitors, or send your own feedback about the site.
Contact Roedy. Please feel free to link to this page without explicit permission.
Your face IP:[188.8.131.52]
You are visitor number|