aboutsummaryrefslogtreecommitdiff
path: root/financial-news.html
diff options
context:
space:
mode:
Diffstat (limited to 'financial-news.html')
-rw-r--r--financial-news.html12
1 files changed, 6 insertions, 6 deletions
diff --git a/financial-news.html b/financial-news.html
index f55487e9..9d0922a0 100644
--- a/financial-news.html
+++ b/financial-news.html
@@ -71,7 +71,7 @@
71 fear banks suing them for losses. It is not suggested that the merchant 71 fear banks suing them for losses. It is not suggested that the merchant
72 in question was not in compliance with PCI DSS security audit procedures.<br> 72 in question was not in compliance with PCI DSS security audit procedures.<br>
73 With Taler, merchants never handle sensitive personal credit data, and 73 With Taler, merchants never handle sensitive personal credit data, and
74 thus neither customers, mints nor governments would even have standing to 74 thus neither customers, exchanges nor governments would even have standing to
75 sue merchants in court. Thus, if a merchant system were to be compromised, 75 sue merchants in court. Thus, if a merchant system were to be compromised,
76 the damage would be limited to the merchant's own operations. 76 the damage would be limited to the merchant's own operations.
77 <p><a class="btn btn-info" href="http://arstechnica.com/tech-policy/2014/12/judge-rules-that-banks-can-sue-target-for-2013-credit-card-hack/" role="button">Source</a></p> 77 <p><a class="btn btn-info" href="http://arstechnica.com/tech-policy/2014/12/judge-rules-that-banks-can-sue-target-for-2013-credit-card-hack/" role="button">Source</a></p>
@@ -100,11 +100,11 @@
100 In Taler, customers do not have accounts with usernames, passwords 100 In Taler, customers do not have accounts with usernames, passwords
101 or associated e-mail addresses. Instead, Taler uses reserves which 101 or associated e-mail addresses. Instead, Taler uses reserves which
102 are represented by a private key on the owner's computer. Users 102 are represented by a private key on the owner's computer. Users
103 create a reserve by depositing currency at a Taler mint, and can then 103 create a reserve by depositing currency at a Taler exchange, and can then
104 withdraw digital coins from that reserve using the respective private 104 withdraw digital coins from that reserve using the respective private
105 key. There is no limit on the number of reserves a user can have, and 105 key. There is no limit on the number of reserves a user can have, and
106 even hacking the Taler mint would not provide an adversary with access to 106 even hacking the Taler exchange would not provide an adversary with access to
107 user's reserves (as the Taler mint does not have the private keys). 107 user's reserves (as the Taler exchange does not have the private keys).
108 Stealing in Taler requires breaking into each customer's computer to 108 Stealing in Taler requires breaking into each customer's computer to
109 extract the reserve keys or the coins from the digital wallet. 109 extract the reserve keys or the coins from the digital wallet.
110 </p> 110 </p>
@@ -132,9 +132,9 @@
132 As terrorism and organized crime are covered by legal means, industrial 132 As terrorism and organized crime are covered by legal means, industrial
133 espionage to improve the US economy is the only remaining US national 133 espionage to improve the US economy is the only remaining US national
134 interest within the NSA's mandate that would explain this illegal activity.<br> 134 interest within the NSA's mandate that would explain this illegal activity.<br>
135 With Taler, mints will only learn the value of a merchant's transactions, 135 With Taler, exchanges will only learn the value of a merchant's transactions,
136 not who paid or for what (governments may learn what was sold). Thus, 136 not who paid or for what (governments may learn what was sold). Thus,
137 the Taler mint is a significantly less interesting target for industrial 137 the Taler exchange is a significantly less interesting target for industrial
138 espionage. 138 espionage.
139 </p> 139 </p>
140 <p><a class="btn btn-info" href="http://www.spiegel.de/international/world/spiegel-exclusive-nsa-spies-on-international-bank-transactions-a-922276.html" role="button">Source</a></p> 140 <p><a class="btn btn-info" href="http://www.spiegel.de/international/world/spiegel-exclusive-nsa-spies-on-international-bank-transactions-a-922276.html" role="button">Source</a></p>