[FYI] Did Encryption Empower These Terrorists? (addenda to chargebacks)

lynn.wheeler at firstdata.com lynn.wheeler at firstdata.com
Thu Sep 27 15:04:18 EDT 2001


Basically there are chargeback rules for card holder present, card present,
as well as ability to read track 1&2 (on mag. stripe). One of the issues is
that even in card present scenerios with indication that trace 1&2 could be
read, there are starting to be counterfeits and fraudulent transactions:
http://www.garlic.com/~lynn/aepay6.htm "out of control credit card fraud"

In the X9.59 scenerio using something along the lines of an AADS card:
http://www.garlic.com/~lynn/aadsm2.htm#straw

there is plauseability that it could represent "stronger" authentication
than current card present (i.e. much harder to counterfeit) even when
non-face-to-face, MOTO, &/or internet transactions are involved.

However, fraudulent transactions (either in MOTO/internet scenerio or card
present ... because of short-comings in strength of authentication) still
doesn't account for all the reasons for charge-backs &/or disputes ... aka
even given absolute perfect authentication and no (consumer) fraudulent
transactions ... there are still reasons for charge-backs and/or disputes.

ref:
http://www.garlic.com/~lynn/subtopic.html#publickey





---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com




More information about the cryptography mailing list