The more I read about the development of electronic payment tech from 1990-2010, the more it looks like a scam designed to ensure that only existing banking (and those few tech companies the banks selected) were viable options.
Apropos a 2010 post by Paul Graham on why the PayPal founders were geniuses. Maybe this is true, but what did PayPal actually do brilliantly? They built anti-fraud tech so that people could use 1970s credit card tech online.
Why weren’t there dozens or hundreds of PayPals, or people doing more sophisticated cash-like payments on the Internet? Well? There were some of the latter but their doors all got kicked in by the Feds. en.m.wikipedia.org/wiki/Liberty_R…
The commercial banks and payment systems thought it was fine that payments meant “copying 16 digits numbers off plastic cards and typing them into websites”, and this was so hilariously vulnerable to theft/fraud that you had to be a genius to make it work.
It is 2021 and most online payments *still* involve “copying 16 digit numbers off a plastic card and typing it into a webform”. You can’t have a lot of open, permissionless competition in a system so insecure.
Everyone is like “why cryptocurrency” but the answer is that cryptocurrency is what happens when you create a gigantic technical vaccuum. Literally anything that can survive the ambient conditions will fill it.
Anyway I just mostly hate PayPal and I think the answer to most questions like “why did the PayPal founders blah blah” is “because they were deliberately chosen to be the only competitors in a desperately valuable area, and got very rich as a result.”
(Also I feel like it taught a generation of influential SV founders about the value of anti-competitiveness but I’m sure they would have figured that out anyway.)
• • •
Missing some Tweet in this thread? You can try to
force a refresh
So it looks like NYC is deploying some half-cooked “blockchain” solution for vaccine passports. theintercept.com/2021/03/24/and…
Thank you to @samfbiddle for only using the G-rated quotes.
At one point @samfbiddle told me that IBM claimed to have a technical document explaining how their system worked, and it (in all apparent seriousness) proposed this diagram as a “system architecture” or something. I nearly blew milk out of my nose.
Me: surely everyone else has been a little slower on publishing during the pandemic.
Me: *stupidly checks the websites of my theory friends*
Also me: *vanishes into a tailspin of insecurity*
Advice to new faculty: it is very important to make a friend in your field who will reassure you about why everyone else’s work is easy and yours is both harder and uniquely important. This does not need to actually be true for it to help.
For most of my life I’ve waited for someone to post a credible claim that they’ve broken a major cryptosystem like RSA, and I’m pretty sure tomorrow I’ll still be waiting.
But that doesn’t make it any less fun to think about what a real (implemented) RSA break would look like. Imagine you were a genius who found an efficient factoring algorithm. You have so much opportunity for drama.
Obviously you could just post your algorithm but that’s boring and anyway practical people won’t be able to tell if it works, especially if it’s complicated and you’re not one of a very small number of researchers.
Ok so let’s try these checklists out and see what it’s like to lock a phone down. I assume I’m concerned about someone else accessing my iCloud account as well as apps being evil.
Here’s step 1.
Ok this works pretty well, but it gives me the following confusing exception.
I was trying to be really low-key on this one, so let me make it really blunt. There is every reason to believe the NSA tried to subvert commercial cryptography in the 2000s, and now one of the architects of that work runs applied crypto at Amazon.