their apps/websites used in screenshots. They are just examples, and have not been picked because they are any more (or less) vulnerable than their competitors. 2. Logos of companies used, are obviously, the registered trademarks of respected companies. 3. Vulnerabilities discussed here are technical in nature. All entities and organizations discussed here have legal and regulatory overwatch. Gaps in regulation/legislation/policy is not covered here. 4. Negligence is not criminal intent. Oversight is not same as a malpractice. I aim to point out possible points of failures and data leakage. 5. I am not making accusations against any given entity to the degree that they are stealing/hoarding/selling your personal data and payment details, but they could, if they want to
buying the product, is the one inside which you are entering your payment details u Such apps mostly have SMS reading permission (to auto retrieve OTP)
Juspay / Paytm / Mobikwik / PayUMoney / Razorpay etc. u Works as a WebView inside the app u You type your card details into this WebView u App developer implements this like a black box
as the payment SDK provider. Eg. Paytm is both. Freecharge has SDK, but gateway is Juspay u Loaded inside the WebView of the payment SDK u Gets card details, as well as SMS reading permissions via the SDK, via the parent app
in BLU, Lenovo, ZTE and Xiaomi phones. REPEATEDLY IN 2014, 2015, 2016 Call-home spywares, which read texts, MAC/IMEI numbers, call logs repeatedly found in multiple Chinese phones and laptops.
– safe unless PC has malware u Easy to make sure HTTPS connection and TLS certificate MOBILE u 3rd party Software keyboard – easily logged u No idea about underlying network characteristics
easier to stop than debit cards. Once paid, money gone u Create a bank account dedicated for eCommerce u Keep an amount that is acceptable loss u Top it up every month u BONUS: Helps curb spending
writing style from mails and SMS ? How about NO. u Do not give SMS reading rights to all and sundry. Read them and manually enter the OTP. u Do not give notification service permissions. Full SMS data is present in notification. u Watch out for apps asking accessibility permission.
better – fewer players involved u Settlement and refund process are faster u Avoid losing user trust by showing multiple payment portals u Get billed on your name
once, profit multiple times. u OTPs travel over unencrypted layers – can be sniffed. u ICICI Debit Card 16-box-letter code design is an efficient solution
integration of into OnePlus and Indus OS • One touch recharge/balance from dialer • “one click” transactions are always security nightmare Paytm Money Request • Verification is based on OTP. • OTP can be seen on locked phone’s lockscreen. • I can steal your money if I know your number and see your mobile lying on the table Tapzo / Haptik • A super aggregator of apps is just another layer of nesting of people who handle your card details • Keeping your card on tab of a chatbot is not too smart.
or to die as a good man? - TEDDY, SHUTTER ISLAND The onus of informing the world about a security breach in a firm lies with them. Do companies try suppressing facts, until they are compelled to admit ? (Case in point = Yahoo! )
all again ? - YURI KANE (RIGHT BACK, 2010) When your refund is late, who is in possession of the money? If it is a fraudulent transaction, who covers what amount of liability ?