Beware of internet payment--apple pay is no exception

Source: Internet
Author: User
Keywords Internet finance Big Data solutions online education Tian
Tags apple apple pay authentication big data code consumers data finance

In recent years, Internet payments have appeared around us. From tick-tock taxi, quick taxi, to the two-dimensional code to pay, the bank fast payment. Today, Apple's high-profile release of the Pay Apple, rumors that UnionPay is in contact with the popularity of the trend. However, as consumers, we should still be vigilant, looking at something beautiful behind often hidden risks.

Apple pay fingerprint verification is foolproof

From the way Apple Pay is validated, NFC plus fingerprint verification is seemingly flawless. But we have to be wary of, fingerprints or passwords or face recognition, in the final analysis is a set of data.

Fingerprint information is also used as a set of data. Although Apple has done a strict encryption of fingerprint information, using a secure enclave to protect, but secure enclave can not be foolproof. While secure enclave can set up a security zone, the data is not physically isolated (security zone storage is powered down), and the data generated by fingerprint-aware sensors can be intercepted before being stored in a secure area, This is even more dangerous if the data is uploaded to a Web server for reasons such as itunes or network payments. So as long as the data, there is the possibility of interception, replication, utilization. There is no guarantee of absolute safety.

For the traditional bank card, itself is a not intelligent thing, no one can let the bank card to run the program. Security verification is done through the bank's network and mobile communication network, and the card reader is closed. The third party wants to install a Trojan horse on the card reader device is more troublesome.

Mobile phones are completely different, mobile phones can run the program. Third-party Trojan if entered the mobile phone, not only can intercept your password, may also intercept your fingerprint data. The fingerprint data, the Apple ID, the credit card data are stored in the phone, which is too dangerous. The equivalent of the name, account number, password information is all transparent, hackers as long as cracked your mobile phone, everything is gone.

Ii. Apple's own security problems

Prism door not long ago, mother's phone changed from Apple to Nubia. For Apple, investigations by the US government or the powerful sector are irresistible.

If Apple's servers are now compromised, it's just leaked, and if Apple's servers are pay, the global Apple User's financial security will be under threat. For China, letting Apple apply to the pay is a big risk for the country's financial security to turn into a black box for an American business company.

Financial enterprises, the general internal and external network is physically disconnected. In addition to net silver and other deliberately set aside the channel, the extranet is unable to access the bank's core data through the Internet. And does Apple's security reach the financial level? It's very worrying.

At present, the mainland's popular mobile payment itself is not very safe, especially related to the fast payment function of bank cards, often appear users cheated, the bank card was empty case. Apple's apply pay is more worrying.

Third, mobile payment convenience, but be careful to use

There is no denying that mobile payment brings us a lot of convenience, but it is convenient for users. For consumers, it is necessary to watch your wallet more. For large amounts of bank cards, do not open online banking, not to open fast payment, if Apple Pay popular, also try not to associate. or a real person to the bank counter is the safest. The convenience of the transfer payment, we can use a dedicated account, do not put too much money, even if the hacker cracked nothing but lost a small change.

Mobile payment, be careful to sail the ship.

(Responsible editor: Mengyishan)

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.