aboutsummaryrefslogtreecommitdiff
path: root/financial-news.html
diff options
context:
space:
mode:
authorChristian Grothoff <christian@grothoff.org>2015-05-02 13:55:15 +0200
committerChristian Grothoff <christian@grothoff.org>2015-05-02 13:55:15 +0200
commit0589c79cf3064898c575c06968a30b6f61f5d8c2 (patch)
tree96efd39ae6ca4879abbcf8a0164a7043f031d505 /financial-news.html
parentdcfd10436e224629e3f8909c3d32d37159f00870 (diff)
downloadwww-0589c79cf3064898c575c06968a30b6f61f5d8c2.tar.gz
www-0589c79cf3064898c575c06968a30b6f61f5d8c2.zip
another story
Former-commit-id: ba4bb057acb45fb0c26d7a31bf5da8de9b28e73d
Diffstat (limited to 'financial-news.html')
-rw-r--r--financial-news.html15
1 files changed, 15 insertions, 0 deletions
diff --git a/financial-news.html b/financial-news.html
index a5bc05b8..c5bde835 100644
--- a/financial-news.html
+++ b/financial-news.html
@@ -15,6 +15,21 @@
15 <div class="row"> 15 <div class="row">
16 16
17 <div class="col-lg-12"> 17 <div class="col-lg-12">
18 <h2>30-4-2015: 1970 Researchers Predicted Debit Cards Would be Great for Surveillance</h2>
19 <p>&quot;Suppose you were an advisor to the head of the KGB,
20 the Soviet Secret Police. Suppose you are given the
21 assignment of designing a system for the surveillance of all
22 citizens and visitors within the boundaries of the USSR. The
23 system is not to be too obtrusive or obvious. What would be
24 your decision?&quot;<br>
25 The think tank RAND essentially answered this question with
26 a blueprint for modern payment systems. Taler offers an
27 escape from the financial panopticon.
28 </p>
29 <p><a class="btn btn-info" href="http://paleofuture.gizmodo.com/1970s-researchers-predicted-debit-cards-would-be-great-1699216972" role="button">Source</a></p>
30 </div>
31
32 <div class="col-lg-12">
18 <h2>17-3-2015: Pointing Fingers in Apple Pay Fraud</h2> 33 <h2>17-3-2015: Pointing Fingers in Apple Pay Fraud</h2>
19 <p>Apple Pay may be easy to use, but the simplistic 34 <p>Apple Pay may be easy to use, but the simplistic
20 user identification creates opportunities for fraud, 35 user identification creates opportunities for fraud,