HOWTO solve identity theft: make banks responsible

Follow Us

Bruce Schneier’s op-ed on CNet about identity theft talks about why “two-factor” authentication (e.g. having to enter a password and a number that you read off of a little keychain fob) is useful for lots of things, but not for preventing identity theft. He goes on to explain how to practically solve identity theft through new liability measures: Criminals impersonate legitimate users to financial intuitions. That means that any solution can’t involve the account holders. That leaves only one reasonable answer: Financial intuitions need to be liable for fraudulent transactions.

They need to be liable for sending erroneous information to credit bureaus based on fraudulent transactions. They can’t say that the user must keep his password secure or his machine virus-free. They can’t require the user to monitor his accounts for fraudulent activity, or his credit reports for fraudulently obtained credit cards.

Those aren’t reasonable requirements for most users. The bank must be made responsible, regardless of what the user does.

If you think this won’t work, look at credit cards. Credit card companies are liable for all but the first $50 of fraudulent transactions. They’re not hurting for business; and they’re not drowning in fraud, either. They’ve developed and fielded an array of security technologies designed to detect and prevent fraudulent transactions. And they’ve pushed most of the actual costs onto the merchants. Link (via Cryptogram )

It s the end of an era, sort of: Fraunhofer IIS, the developers of the MP3 audio compression format, announced that they are ceasing their licensing program. In a blog post, spokesman Matthias Rose says that it s had a good 20-year run and is obsolete. But it s also true that the decoding patents expired last year, [ ]

Freddy deBoer writes that he s been telling the same joke for years about Silicon Valley s only product, which might be universalized as At last, a way to verb with nouns on the internet! But the social-media techopoly is stable, now, and so the venture capitalists have moved on to the three terrible trends that will [ ]

Alex Wood is an addict but won t give up his smartphone. But he has five strategies for limiting its control over him: I used to wake up tired. My body would ache and my head felt sore, like waking up with a hangover. Finally, I took control, like attending an AA class for addicts, I [ ]

Having grown out of its awkward adolescence, JavaScript is no longer a novelty language for animating elements on webpages. It has become the lingua franca of the web, imbued with a variety of other libraries and tools to form complex, interactive sites. To make a real career as a programmer it s not enough to just [ ]

HideMyAss VPN does exactly what it says on the tin: covers your digital footsteps on all of your connected devices.VPNs have proliferated in recent months, thanks to increasing demand for online privacy protection. While there might be tons of cheap VPN services with varying degrees of legitimacy popping up every week, it s wisest to trust [ ]

If Apple’s AirPods are a bit too rich for your blood, or you know, you re an Android user, these discreet earbuds can be had for a fraction of the cost and will stay securely in place whether you re working out, commuting, or running between errands. Plus, with IPX4 water resistance, they can survive splashing water [ ]

Leave a Reply

Your email address will not be published. Required fields are marked *

Post Navigation