diff options
Diffstat (limited to 'financial-news.html')
-rw-r--r-- | financial-news.html | 12 |
1 files changed, 6 insertions, 6 deletions
diff --git a/financial-news.html b/financial-news.html index f55487e9..9d0922a0 100644 --- a/financial-news.html +++ b/financial-news.html | |||
@@ -71,7 +71,7 @@ | |||
71 | fear banks suing them for losses. It is not suggested that the merchant | 71 | fear banks suing them for losses. It is not suggested that the merchant |
72 | in question was not in compliance with PCI DSS security audit procedures.<br> | 72 | in question was not in compliance with PCI DSS security audit procedures.<br> |
73 | With Taler, merchants never handle sensitive personal credit data, and | 73 | With Taler, merchants never handle sensitive personal credit data, and |
74 | thus neither customers, mints nor governments would even have standing to | 74 | thus neither customers, exchanges nor governments would even have standing to |
75 | sue merchants in court. Thus, if a merchant system were to be compromised, | 75 | sue merchants in court. Thus, if a merchant system were to be compromised, |
76 | the damage would be limited to the merchant's own operations. | 76 | the damage would be limited to the merchant's own operations. |
77 | <p><a class="btn btn-info" href="http://arstechnica.com/tech-policy/2014/12/judge-rules-that-banks-can-sue-target-for-2013-credit-card-hack/" role="button">Source</a></p> | 77 | <p><a class="btn btn-info" href="http://arstechnica.com/tech-policy/2014/12/judge-rules-that-banks-can-sue-target-for-2013-credit-card-hack/" role="button">Source</a></p> |
@@ -100,11 +100,11 @@ | |||
100 | In Taler, customers do not have accounts with usernames, passwords | 100 | In Taler, customers do not have accounts with usernames, passwords |
101 | or associated e-mail addresses. Instead, Taler uses reserves which | 101 | or associated e-mail addresses. Instead, Taler uses reserves which |
102 | are represented by a private key on the owner's computer. Users | 102 | are represented by a private key on the owner's computer. Users |
103 | create a reserve by depositing currency at a Taler mint, and can then | 103 | create a reserve by depositing currency at a Taler exchange, and can then |
104 | withdraw digital coins from that reserve using the respective private | 104 | withdraw digital coins from that reserve using the respective private |
105 | key. There is no limit on the number of reserves a user can have, and | 105 | key. There is no limit on the number of reserves a user can have, and |
106 | even hacking the Taler mint would not provide an adversary with access to | 106 | even hacking the Taler exchange would not provide an adversary with access to |
107 | user's reserves (as the Taler mint does not have the private keys). | 107 | user's reserves (as the Taler exchange does not have the private keys). |
108 | Stealing in Taler requires breaking into each customer's computer to | 108 | Stealing in Taler requires breaking into each customer's computer to |
109 | extract the reserve keys or the coins from the digital wallet. | 109 | extract the reserve keys or the coins from the digital wallet. |
110 | </p> | 110 | </p> |
@@ -132,9 +132,9 @@ | |||
132 | As terrorism and organized crime are covered by legal means, industrial | 132 | As terrorism and organized crime are covered by legal means, industrial |
133 | espionage to improve the US economy is the only remaining US national | 133 | espionage to improve the US economy is the only remaining US national |
134 | interest within the NSA's mandate that would explain this illegal activity.<br> | 134 | interest within the NSA's mandate that would explain this illegal activity.<br> |
135 | With Taler, mints will only learn the value of a merchant's transactions, | 135 | With Taler, exchanges will only learn the value of a merchant's transactions, |
136 | not who paid or for what (governments may learn what was sold). Thus, | 136 | not who paid or for what (governments may learn what was sold). Thus, |
137 | the Taler mint is a significantly less interesting target for industrial | 137 | the Taler exchange is a significantly less interesting target for industrial |
138 | espionage. | 138 | espionage. |
139 | </p> | 139 | </p> |
140 | <p><a class="btn btn-info" href="http://www.spiegel.de/international/world/spiegel-exclusive-nsa-spies-on-international-bank-transactions-a-922276.html" role="button">Source</a></p> | 140 | <p><a class="btn btn-info" href="http://www.spiegel.de/international/world/spiegel-exclusive-nsa-spies-on-international-bank-transactions-a-922276.html" role="button">Source</a></p> |