You know the retail establishment has invested alot of money, what about the
underpaid waiter/checkout person they employ?

What is that waiter doing with your credit card when he/she takes it from
the table for processing?

Is the checkout person have a photographic memory writing down name/credit
card combinations when they take their smoke break?

Is the establishment using unencrypted wireless networks to link their POS
terminals to their backend systems?

What if the b&m store has an antiquated system that prints out your entire
CC# on the reciepts?

What if they still use a card-impression system?

Heck, what if they set your card on the big magnet they use to turn off the
security tags on the stuff you just bought?

What if they pretend your card has been denied with a code which requires
them to destroy the card?  They certainly won't give it back, and they'll be
able to copy the numbers down at their leisure.

  You can play 'what if' until the cows come home.  That doesn't change the
fact that the *VAST* majority of stolen credit card information was *NOT*
stolen as a result of an online transaction.  Most are stolen through much
more mundane methods, like 'shoulder surfing' at the register, or a waiter
copying the info while they're away from the table.  I don't shop at b&m
shops that I don't feel I can trust, any more than I shop at e-sites that I
don't feel I can trust.  I don't trust *ANY* e-site that isn't willing to go
to the effort to properly protect the transaction (certificates from a
trusted CA, encrypted communication, reasonable security efforts, etc.).

Properly signed certificates don't prove the vendor is trustworthy.  They
provide some sound evidence that the vendor is who they say they are.  A
self-signed certificate doesn't say anything except that they say they are
who they say they are.  The encryption provides a reasonable guarantee that
nobody except you and the vendor will be able to see your transaction.

The reason more CC fraud happens online isn't that more info is stolen
there.  It's that the vendor has no way of knowing that YOU are who you say
you are.  Thousands of sets of credit card info are stolen every day
*offline*.  You don't hear about it because it happens in ways that are
impossible to detect.  Some vendor's online site gets hacked, and you hear
about it because it could be detected.

        - Theo

P.S.: Shopping carts 'too boring'?!  Of course they're boring!

-----Original Message-----
From: Richard Lynch [mailto:[EMAIL PROTECTED]]
Sent: Monday, July 08, 2002 4:33 PM
To: [EMAIL PROTECTED]
Subject: Re: [PHP] HTTPS vs. HTTP ?


>>>How do you know their certificate hasn't been stolen, and they haven't
even
>figured it out yet?  How do you know they were trustworthy people in the
>first place?<<
>
>Why do you ASSUME that they're NOT trustworthy people?  Do you go through 
>your entire life in that shell?

Everybody gets a limited amount of trust extended to them, for "free"

That amount is NOWHERE NEAR the trust where I hand them my credit card
number.

Do you hand your credit-card to random people in the street?

With a brick-and-mortar retail establishment, I can tell a lot from
location, size, even the "look" of the store -- I also know, right off the
bat, that they've invested a *TON* of money and won't be able to make it
back in a short-time con.

With a web-site, I can tell:
They paid $119 to somebody for the CA.
They paid $20/month or so to somebody else.
They maybe paid somebody to design/build the site, or a turn-key system,
or...

That really doesn't tell me a whole lot.

I don't know:

They aren't storing my credit card number in their database "just
temporarily" while we process it.
[I've had to fix this error a couple times myself, and I hate doing shopping
carts.  Too boring.  I quit doing them.  I can't imagine how many times a
shopping cart "regular" has walked into this situation.]

They aren't using a badly-designed system where my CC# appears in "ps
auxwwww" output.

They aren't using a badly-designed system where the CC# is stored on the
disk during processing.
[Hint -- Last I checked, Linkpoint's PHP interface did this.  Guess what
happens when you get a network time out or the script fails for some reason?
 Your CC# is left hanging around in that file.  Sure, if the instructions
were followed, only root can read it...  If the server hasn't been hacked. 
If, if, if...]

The scripts that process my CC # have correct permissions, and are
accessible only to one, okay, *two* people to avoid somebody inserting a
back-door.

The list of failure points is endless, and I *STILL* don't even trust that
randomsite.com has had any kind of background check carried out by the
people issuing Certifcates.  Jeez, people -- We're talking one of the major
players is MICROSOFT!  Do you trust them with Security?!

I've seen too many bad home-brew shopping carts to have any faith in them. 
I still shop on-line, but rely on the fact that I can only get dinged for
$50, and we'll all be paying even higher interest rates next year.  I have
no trust that my CC# isn't being exposed.

>>>The more I think about this, the more I agree with people who just won't
do
>eCommerce at all...<<

Hey, I'm not saying I don't shop on-line.  I'm saying I have no faith that I
won't be calling up the credit card company and canceling the stolen account
much faster than at a traditional store.

I have no faith that the e-theft of credit cards won't raise my interest
rates.

The CC companies have already proven that they will accept an inordinately
high level of theft and just pass on the cost to consumers.  What do they
care what your interest rates are?

-- 
Like Music?  http://l-i-e.com/artists.htm

-- 
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to