Merge branch 'master' of git+ssh://taler.net/var/git/wallet-webex
This commit is contained in:
commit
481f9ff554
@ -181,6 +181,15 @@
|
|||||||
publisher={Centrum voor Wiskunde en Informatica}
|
publisher={Centrum voor Wiskunde en Informatica}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
@misc{NYA:CyberExtortionRisk,
|
||||||
|
title = {Cyber Extortion Risk Report 2015},
|
||||||
|
author = {\relax NYA International},
|
||||||
|
month = {October},
|
||||||
|
year = {2015},
|
||||||
|
howpublished = {\url{http://www.nyainternational.com/sites/default/files/nya-publications/151027_Cyber_Extortion_Risk_Report_2015_0.pdf}}
|
||||||
|
}
|
||||||
|
|
||||||
@misc{ECB:TRoCF2014,
|
@misc{ECB:TRoCF2014,
|
||||||
title = {Third Report on Card Fraud},
|
title = {Third Report on Card Fraud},
|
||||||
author = {{\relax European Central Bank}},
|
author = {{\relax European Central Bank}},
|
||||||
@ -188,3 +197,30 @@
|
|||||||
year = {2014},
|
year = {2014},
|
||||||
howpublished = {\url{https://www.ecb.europa.eu/pub/pdf/other/cardfraudreport201402en.pdf}},
|
howpublished = {\url{https://www.ecb.europa.eu/pub/pdf/other/cardfraudreport201402en.pdf}},
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@inproceedings{3DSsucks,
|
||||||
|
author = {Murdoch, Steven J. and Anderson, Ross},
|
||||||
|
title = {Verified by Visa and Mastercard Securecode: Or, How Not to Design Authentication},
|
||||||
|
booktitle = {Proceedings of the 14th International Conference on Financial Cryptography and Data Security},
|
||||||
|
series = {FC'10},
|
||||||
|
year = {2010},
|
||||||
|
isbn = {3-642-14576-0, 978-3-642-14576-6},
|
||||||
|
location = {Tenerife, Spain},
|
||||||
|
pages = {336--342},
|
||||||
|
numpages = {7},
|
||||||
|
doi_url = {http://dx.doi.org/10.1007/978-3-642-14577-3_27},
|
||||||
|
doi = {10.1007/978-3-642-14577-3_27},
|
||||||
|
acmid = {2163598},
|
||||||
|
publisher = {Springer-Verlag},
|
||||||
|
address = {Berlin, Heidelberg},
|
||||||
|
url = {https://www.cl.cam.ac.uk/~rja14/Papers/fc10vbvsecurecode.pdf}
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -305,7 +305,7 @@ the merchant not accepting the particular card issuer.
|
|||||||
Traditionally, merchants bear most of the financial risk, and a key
|
Traditionally, merchants bear most of the financial risk, and a key
|
||||||
``feature'' of the 3DS process compared to traditional card payments
|
``feature'' of the 3DS process compared to traditional card payments
|
||||||
is to shift dispute {\em liability} to the issuer of the card---who
|
is to shift dispute {\em liability} to the issuer of the card---who
|
||||||
may then try to shift it to the customer.
|
may then try to shift it to the customer \cite[\S2.4]{3DSsucks}.
|
||||||
%
|
%
|
||||||
% online vs offline vs swipe vs chip vs NFC ???
|
% online vs offline vs swipe vs chip vs NFC ???
|
||||||
% extended verification
|
% extended verification
|
||||||
@ -421,13 +421,15 @@ volatile.~\cite{jeffries_economists_v_btc,lehmann_btc_fools_gold,lewis_btc_is_ju
|
|||||||
|
|
||||||
Bitcoin's pseudononymity applies equally to both customers and
|
Bitcoin's pseudononymity applies equally to both customers and
|
||||||
merchants, which makes Bitcoin amen\-able to tax evasion, money
|
merchants, which makes Bitcoin amen\-able to tax evasion, money
|
||||||
laundering, and sales of contraband. As a result, anonymity tools
|
laundering, sales of contraband, and especially extorion
|
||||||
like mixnets do not enjoy widespread support in the
|
\cite{NYA:CyberExtortionRisk}.
|
||||||
Bitcoin community where many participants seek to make the currency
|
As a result, anonymity tools like mixnets do not enjoy widespread
|
||||||
appear more legitimate. While Bitcoin's transactions are difficult to
|
support in the Bitcoin community where many participants seek to make
|
||||||
track, there are several examples of Bitcoin's pseudononymity being
|
the currency appear more legitimate. While Bitcoin's transactions
|
||||||
broken by investigators~\cite{BTC:Anonymity}. This has resulted in
|
are difficult to track, there are several examples of Bitcoin's
|
||||||
the development of new protocols with better privacy protections.
|
pseudononymity being broken by investigators~\cite{BTC:Anonymity}.
|
||||||
|
This has resulted in the development of new protocols with better
|
||||||
|
privacy protections.
|
||||||
|
|
||||||
\begin{figure*}[t!]
|
\begin{figure*}[t!]
|
||||||
\includegraphics[width=\textwidth]{figs/paypal.pdf}
|
\includegraphics[width=\textwidth]{figs/paypal.pdf}
|
||||||
|
Loading…
Reference in New Issue
Block a user