I’m just some guy, you know.

  • 0 Posts
  • 38 Comments
Joined 5 months ago
cake
Cake day: May 7th, 2024

help-circle


  • The issue is that the digital tap-to-pay cards are actually reissued cards with their own unique numbers. They also require significant security measures to protect from cloning attacks.

    So banks need a party that they can safely issue a digital card to, knowing that the card data will be stored safely.

    Even a FOSS app that covers all the user’s needs is going to have a lot of trouble actually getting a card loaded into it under current standards.

    I hate to say it, but crypto wallets are likely the closest thing we’re ever going to get to a FOSS tap-to-pay system. Banks are inherently corporate and capitalist, so it’s not really in their nature to make things open source.

    Perhaps if there were an industry standard for issuing digital cards, instead of banks partnering with centralized wallet apps, we could procure our own digital cards to load onto our phones and watches, or integrate into other devices. But that’s a whole other battle that nobody is fighting right now.







  • Ask him for his passwords, and when he says no, ask him to explain why. He’ll surely have things he doesn’t want you to access. Then explain that other people he doesn’t even know have that access right now, because he keeps thoughtlessly giving away digital access using apps and linked accounts.

    If he gives you his passwords, log into his stuff and print his browser history or something. Stick it to his fridge.









  • If encryption doesn’t matter to them, then at least one of these statements must be true of every phone they unlock:

    1. The device wasn’t actually encrypted.
    2. The device was already in a decrypted state and we bypassed the screen lock and not drive encryption.
    3. We acquired the decryption keys somehow.
    4. We have technology that can break modern encryption without learning keys from another source or brute forcing.
    5. We have enough processing power to brute force a modern encryption algorithm.

    #1 and #2 are possible because government contractors lie all the time about what they actually do. Pretending to decrypt stuff isn’t outside the realm of possibility.

    #3 is the biggest concern, especially if they are able to infer what the key is by uncapping silicon or something, because that would mean that any phone that could be unlocked by this company is as good as unencrypted since the device contains the keys in a retrievable format for some reason.

    #5 and #6 are pretty much impossible, and such abilities would be far more profitable if used for just about anything but unlocking phones.