It was only a matter of time before someone find a flaw in Apple Pay . Even if it ’s one that ’s not technically in Apple Pay .
Hey , if it can be somehow remotely tied to Apple Pay , it ’s a flaw in Apple Pay , OK ?
Writing for theLA Times , Michael Hiltzik declares“So much for the title that Apple Pay would be ‘ secure'”(tip o ’ the antlers toAndrew Stack )
Apple Pay not secure ? ! Stop the press ! Literally , because we really still print this dirt out .
One of Apple ’s bountiful selling breaker point — perhaps the biggest — for Apple Pay was that this sharp new requital - processing system it unveiled last September would be all but resistant from shammer .
We celebrate that although the iPhones carry the Apple Pay app might be as secure as the company claimed , “ the risk will rest somewhere . ”
We told you so .
In other words , we severalise you that Apple Paywouldbe safe . And it is . What we did n’t tell you is that our headline are write by angry howler monkey monkeys . Whocanread and write but never translate or seek to cover the articles .
They ’re jerks , fundamentally .
Reports have surfaced over the last calendar week that fraudsters have found the soft underbody of Apple Pay — as one would have a bun in the oven — and are exploiting it joyfully , with one surety expert approximate the impostor pace at a prodigious $ 6 per $ 100 of transactions .
The soft underbody of Apple Pay that is not in Apple Pay itself but is essentially just stealing credit card numbers the old fashioned path , but you would n’t have read this story if we had just tell that so , well … here we are .
And there ’s no way this guy ’s estimate could be off because he ’s anexpert . expert are never wrong about anything ever .
Fraud rings are just adding stolen course credit identity card turn to Apple Pay accounts , then buy product using iPhones provision with the steal numbers .
What is the audio of one board flipping ? The Macalope does not know for he has interchange every table .
So , the “ vulnerability ” is that is does n’t fix inherent vulnerabilities in the exist quotation card organization . And it ’s not like the thieves could use the already steal recognition card number alfresco of Apple Pay to purchase thing oh , wait , they totally could .
lease ’s take a journey through the dark , tortured someone of Hiltzik ’s instance exploit of this “ vulnerability ” .
A criminal who acquired steal Target credit card number through a monolithic hack of that retail range ’s information system in 2013 could use them via Apple Pay to buy merchandise from , well , Target . ( The Ernst Boris Chain allow Apple Pay purchases online , though not at its stores . )
You do it what else Target allows you to use to make purchases online?Credit cards .
Hiltzik ’s imaginary scoundrel : “ I should like to acquire goods without , in fact , paying for said trade good ! I have stolen a credit wag which I could just use directly to bribe stuff on the web site of this major retail merchant , however , I think I shall put it into Apple Pay first because … I simply sleep together technology ? frankly , my character and motivation are very lightly fix . ”
Does Apple deserve some blame for the use of fraudulent credit rating posting on its system of rules ? The resolution is yes . The company left it to the banks to determine when they wished to call for extra substantiation , and by what have in mind , before greenlighting a card for Apple Pay .
So , whodeserves the rap again ? The customers do n’t give for these fraudulent leverage and Apple does n’t give for them . The banks do . Someone done be intimate up . If it did n’t come about to them that stolen card could be add together to Apple Pay if they were n’t validated or if they jump the heavy weapon on getting their validation process set up , that ’s on them . Sorry Apple did n’t beak up the slack but that does n’t make Apple Pay “ vulnerable ” to already steal recognition bill of fare .
Sorry , but not really that sorry .