And further, you should have a client app on your computer for
dealing with
shared secrets, which is only capable of attempting a visa payment
with an
entity trusted by Visa.
On 2011-09-24 4:06 AM, John Levine wrote:
I don't see how to do that in a useful way without non-programmable
On Fri, Sep 23, 2011 at 1:46 AM, James A. Donald jam...@echeque.com wrote:
On 2011-09-23 8:33 AM, Nico Williams wrote:
In your view then, is the alternative at all a public key based
crypto system? If yes, is it SSH (or SSH-like) trust on first
contact or something else?
In order to shop,
On 23/09/11 08:33 AM, Nico Williams wrote:
On Sun, Sep 18, 2011 at 11:22 AM, M.R.makro...@gmail.com wrote:
In your view then, is the alternative at all a public key based
crypto system? If yes, is it SSH (or SSH-like) trust on first
contact or something else?
It could vary.
For low-security
Ben Laurie b...@links.org writes:
Wasn't that what SET did?
No. Or at least buried way, way down in a hidden corner there was something
that was a bit like that, sort of like painting one of the toenails on an
elephant, but the vast mass of the rest overwhelmed that one bit.
Peter.
And further, you should have a client app on your computer for dealing with
shared secrets, which is only capable of attempting a visa payment with an
entity trusted by Visa.
I don't see how to do that in a useful way without non-programmable
hardware. We've seen PC-based malware do pretty
And further, you should have a client app on your computer for dealing with
shared secrets, which is only capable of attempting a visa payment with an
entity trusted by Visa.
On 2011-09-24 4:06 AM, John Levine wrote:
I don't see how to do that in a useful way without non-programmable
hardware.
Also, what if we had real cryptographic money, with anonymity? In
other words: the payments system cannot be the trusted third party
for everything.
On 2011-09-24 4:08 AM, John Levine wrote:
Then malware would steal the crypto wallets. See Bitcoin.
Yet Bitcoin, nonetheless, works.
On Sun, Sep 18, 2011 at 11:22 AM, M.R. makro...@gmail.com wrote:
On 18/09/11 10:31, Ian G wrote:
On the other hand, a perfectly adequate low-level retail
transaction security system can best be achieved by using a
trusted-third-party, SSL-like system.
That's a marketing claim. Best ignored
On 18/09/11 10:31, Ian G wrote:
On the other hand, a perfectly adequate low-level retail
transaction security system can best be achieved by using a
trusted-third-party, SSL-like system.
That's a marketing claim. Best ignored in any scientific
discussion.
Yes, I agree, let's ignore it!
In