Hacker News new | past | comments | ask | show | jobs | submit login

While EMV is quite reasonable protocol, it is needlessly complex. And this complexity is at the root of what this attack exploits.



Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: