John Ioannidis wrote:
Perry E. Metzger wrote:
That's not practical. If you're a large online merchant, and your
automated systems are picking up lots of fraud, you want an automated
system for reporting it. Having a team of people on the phone 24x7
talking to your acquirer and reading them
At 10:24 -0500 26.01.2008, Perry E. Metzger wrote:
Wikileaks has released documents from the German police revealing
Skype interception technology. The leaks are currently creating a
storm in the German press[...]
I've skimmed some of the coverage and I can't help but think that
Perry E. Metzger wrote:
This evening, a friend of mine who shall remain nameless who works for
a large company that regularly processes customer credit card payments
informed me of an interesting fact.
His firm routinely discovers attempted credit card fraud. However,
since there is no way for
Great. What next? I guess air-gap transfer of flash memory might be the
best solution.
Malware's new infection route: photo frames
http://www.sfgate.com/cgi-bin/article.cgi?file=/c/a/2008/01/26/MNE7UHOOQ.DTL
- Alex
--
Alex Alten
[EMAIL PROTECTED]
[adding Cc: p2p-hackers and cryptography mailing lists as explained
below; Please trim your follow-ups as appropriate.]
Dear Gary Sumner:
On Jan 26, 2008, at 9:44 PM, Gary Sumner wrote:
I was researching on the weekend and came across Tahoe…very
exciting and can’t wait to delve in and
Ian G [EMAIL PROTECTED] writes:
There is a philosophical problem with suggesting an automated protocol
method for reporting fraud, in that one might be better off ... fixing
the underlying fraud.
Lets say you're a big company like Amazon or someone similar. You're
pretty sure someone is