Epic Leaves a Big Crack in Apple’s Walled Garden

Epic Leaves a Big Crack in Apple’s Walled Garden

On Friday, after a contentious legal battle over Apple’s alleged monopoly power over the iOS ecosystem, a California judge snipped the tug-of-war rope between Apple and Epic Games.And Apple must change its App Store rules to allow developers to use other payment systems⁠—a blow to Apple’s iron grip on the iOS ecosystem.

Epic Games' Lawsuits Fire a Shot at Apple and Google's App Store 'Monopolies'

Epic Games' Lawsuits Fire a Shot at Apple and Google's App Store 'Monopolies'

The lawsuit came just moments after Apple removed Fortnite from its iOS store for instituting an in-app payment system that let users circumvent Apple altogether, a violation of App Store guidelines.

The US Could Deliver Relief Checks Faster—With Tech's Help

The US Could Deliver Relief Checks Faster—With Tech's Help

Oxfam transfers digital money to thousands in need of relief in Syria, Greece, Kenya, Australia, and the cyclone-prone island of Vanuatu via SMS, an Android phone app, or an NFC card—a kind of contactless payments card that also acts as proof of ID.These applications, in Oxfam’s case the Sempo Cash and Voucher Assistance program, have proven capable of disbursing tens of thousands of dollars at a time to many beneficiaries within minutes—at a near negligible cost.

What Are Zero-Knowledge Proofs?

What Are Zero-Knowledge Proofs?

For example, zero-knowledge proofs can be used to validate cryptocurrency transactions managed on a blockchain and combat fraud without revealing data about which wallet a payment came from, where it was sent, or how much currency changed hands.

Cashless Stores Alienate Customers in the Name of Efficiency

Cashless Stores Alienate Customers in the Name of Efficiency

There’s been growing support from both consumers and retailers to move away from cash in favor of digital payment options .It’s one thing for luxury brands to self-select their customers on the basis of price point, but it’s another for a retailer to deny access to a person trying to buy a pack of gum.

A New Breed of ATM Hackers Gets in Through a Bank’s Network

A New Breed of ATM Hackers Gets in Through a Bank’s Network

Beyond so-called jackpotting attacks , which cause individual ATMs to spit out money , hackers are manipulating ATM networks and the digital authentication checks in the machines to cash out fraudulent transfers they initiate around the globe.

Shouldn’t We All Have Seamless Micropayments By Now?

Shouldn’t We All Have Seamless Micropayments By Now?

If you buy things directly from small vendors, you’re stuck entering your credit card information, your email, and your billing address on site after site—sinking ever deeper into the surveillance economy as each digital form puts your personal details into someone else’s database, while also giving hackers ever more opportunities to filch your data.

Why Japan Is a Rare Holdout in Asia’s Cash-Free Future

Why Japan Is a Rare Holdout in Asia’s Cash-Free Future

(Sayurai went to graduate school in the US, and she made it clear to me that she doesn’t think much of American shopkeepers’ cash-counting abilities.) "It's much faster to pay with cash than wait for a card transaction," International University of Japan professor Soichiro Takagi told me.There is something about the feel of bills, the skill of the shopkeepers in dealing with them, and the ceremonial role of cash throughout life which resonates profoundly in Japan.

A Quiet War Rages Over Who Can Make Money Online

A Quiet War Rages Over Who Can Make Money Online

Members of the incel community—including the official Twitter account for incels.is, a central hub for adherents—have joined with other men’s rights activists, using the content policies of online payment companies such as PayPal as weapons to block female pornographic actors and sex workers from making or spending money online.The campaign is called the “ThotAudit,” in reference to the derogatory term “thot,” which stands for “that ho over there.” It began over the Thanksgiving holiday as a grassroots effort to intimidate sex workers and women who sell access to private pornographic social media accounts by reporting them to the Internal Revenue Service for tax evasion—without evidence of wrongdoing.

How Hackers Slipped by British Airways' Defenses

How Hackers Slipped by British Airways' Defenses

But the company later clarified that the compromised data included payment card expiration dates and Card Verification Value codes—the extra three or four-digit numbers that authenticate a card—even though British Airways has said it does not store CVVs. British Airways further noted that the breach only impacted customers who completed transactions during a specific timeframe—22:58 BST on August 21 through 21:45 BST on September 5.These details served as clues, leading analysts at RiskIQ and elsewhere to suspect that the British Airways hackers likely used a "cross-site scripting" attack, in which bad actors identify a poorly secured web page component and inject their own code into it to alter a victim site's behavior.