diff options
author | Christian Grothoff <christian@grothoff.org> | 2015-05-02 13:55:15 +0200 |
---|---|---|
committer | Christian Grothoff <christian@grothoff.org> | 2015-05-02 13:55:15 +0200 |
commit | e83b26c5ee52a0ff86aeb302af550470b56fd55b (patch) | |
tree | d9e04ec03acb8083aa1be9e0e41132f9bd05fbf7 /financial-news.html | |
parent | 2ebf9a11a56bc0434d8c3b5a88e4fd98ba857758 (diff) | |
download | www-e83b26c5ee52a0ff86aeb302af550470b56fd55b.tar.gz www-e83b26c5ee52a0ff86aeb302af550470b56fd55b.zip |
another story
Diffstat (limited to 'financial-news.html')
-rw-r--r-- | financial-news.html | 15 |
1 files changed, 15 insertions, 0 deletions
diff --git a/financial-news.html b/financial-news.html index a5bc05b8..c5bde835 100644 --- a/financial-news.html +++ b/financial-news.html | |||
@@ -15,6 +15,21 @@ | |||
15 | <div class="row"> | 15 | <div class="row"> |
16 | 16 | ||
17 | <div class="col-lg-12"> | 17 | <div class="col-lg-12"> |
18 | <h2>30-4-2015: 1970 Researchers Predicted Debit Cards Would be Great for Surveillance</h2> | ||
19 | <p>"Suppose you were an advisor to the head of the KGB, | ||
20 | the Soviet Secret Police. Suppose you are given the | ||
21 | assignment of designing a system for the surveillance of all | ||
22 | citizens and visitors within the boundaries of the USSR. The | ||
23 | system is not to be too obtrusive or obvious. What would be | ||
24 | your decision?"<br> | ||
25 | The think tank RAND essentially answered this question with | ||
26 | a blueprint for modern payment systems. Taler offers an | ||
27 | escape from the financial panopticon. | ||
28 | </p> | ||
29 | <p><a class="btn btn-info" href="http://paleofuture.gizmodo.com/1970s-researchers-predicted-debit-cards-would-be-great-1699216972" role="button">Source</a></p> | ||
30 | </div> | ||
31 | |||
32 | <div class="col-lg-12"> | ||
18 | <h2>17-3-2015: Pointing Fingers in Apple Pay Fraud</h2> | 33 | <h2>17-3-2015: Pointing Fingers in Apple Pay Fraud</h2> |
19 | <p>Apple Pay may be easy to use, but the simplistic | 34 | <p>Apple Pay may be easy to use, but the simplistic |
20 | user identification creates opportunities for fraud, | 35 | user identification creates opportunities for fraud, |