Updates from Paavo Viilup Toggle Comment Threads | Keyboard Shortcuts

  • Paavo Viilup 11:28 on April 26, 2012 Permalink |
    Tags: thetask   

    April 26 

    http://www.bbc.com/news/technology-17842926

    1. Describe in technical detail the process the system follows each time money is deposited and/or something purchased using the system.

    2. Discuss at least two possible security issues that may occur during the use of the system.

    3. Comment briefly on the social implications a system like this might have.

     
    • Taavi 12:12 on April 26, 2012 Permalink | Log in to Reply

      How is babby formed???
      1. Describe in technical detail the process the system follows each time money is deposited and/or something purchased using the system.
      The user of the app has to have a virtual credit/debit card which it binds to its mobile account. On first use the app system asks for the user’s all personal details, pin codes, passwords and other financial data which it saves on remote central servers rather than on the mobile device. Later the app only asks for identification info like username and password. If all the necessary data can be accessed by the app it asks for the amount of money to be deposited or spent. The system checks whether the user has required money on his account or his/her debit/credit card. If there is not enough money the user is notified. Also the system checks whether the amount does not exceed £500 if it does not the system proceeds to transaction phase otherwise the user is notified. In transaction phase the system transfers the money from the user’s account to the chosen recipient or in the case of depositing the money the money is transferred from the credit card to the account.
      2. Discuss at least two possible security issues that may occur during the use of the system.
      In case of the NFC if the user’s mobile phone is stolen the thief can go around spending with the user’s mobile phone without being stopped. This is a serious security issue and it cannot be prevented as NFC uses no secondary security measure such as password. Thus it would be safer to resort to regular username password identification and drop support for NFC.
      Another security issue is the storage of bank account info in central servers. It is weak to save bank info in other servers than the bank itself as possibly O2 does not spend as much money on server security as banks. Thus the bank info is more easily accessible to hackers and as the O2 servers do not have connection with the bank’s ones it might be possible for the hackers to trick the bank by using legitimate access to accounts that the user actually is using its bank account. This is a huge security risk that has to be dealt with. I personally think the best way would be for the banks and O2 to work together and produce a single unified system. It is difficult to achieve but it is probably the only possible way forward.
      3. Comment briefly on the social implications a system like this might have.
      As the paying process using the discussed system would only take a push of one button and people do not see the money being transferred as would be the case of paying in cash they are more likely to spend money. Thus regular user’s would be more prone to make easy payments and will spend more money. This would be better for the sellers and stores and it would aslo increase the tax income. Therefore, introducing the new text payment system would be beneficial for the whole economy of the UK. It can be said that when buying is made easier for the users they are more likely to buy and more likely to help the economy. Thus, it would be the UK’s first priority to help in fixing the security issues regarding the system. All in all in the end of the day everybody would win from this system.

    • Brent 12:14 on April 26, 2012 Permalink | Log in to Reply

      1 Answer

      The person opens the app.
      The person logs on to the system using passwords or PIN code
      The system checks the data on a remote server, where all the user data is.
      The data is verified.
      The person then chooses the retail store to whom they want to pay
      The transfer is made, money has been taken from the user’s account.
      The change is made in the store’s database, the O2 database and the bank database which all signal that a transaction has been made.

      2 answer

      The O2’s database might not be safe. People with evil intentions could try to hack the O2’s database and steal people’s personal data. Also the data transaction might not be safe.
      if a person’s PIN code or password is stolen, it can be used to make mobile payments.

      3 Answer.

      This could be really good for stores, since people could find shopping to be easier compared to current standards and therefore would shop and spend more. From a capitalist point of view this would be good for the economy, since more money would be moving in the system and thereby would generate prosperity. The downsides of the technology would be, that people would spend their money too quickly, since it is so easy to do. Also mobile devices would assume a larger role in people’s financial life and therefore would become bigger targets for thieves, since the app could be used to capture people’s financial data. Overall the app could to little bit to boost the economy by creating a bigger flow of cash, but it would also make people more vulnerable because of their spending habits or because of the financial data connected to the phone.

    • alex 12:20 on April 26, 2012 Permalink | Log in to Reply

      1. The person who owns a smartphone and this O2 wallet app first has to create a virtual credit or debit card or set up their regular bank account. Then if the user has a credit or debit card, money needs to be loaded onto the cards via from the persons bank account. Finally when the money is loaded then the system shows the user all of the retailers that have agrred to this app. When a user chooses a retailer to buy from then first off the app needs to check that the purchase is not more than 500 pounds because this was the assigned limit for a single purchase. Then the app checks whether or not the user can actually afford the purchase by checking the accounts balance. Since all the data is in a remote server then upon checking the balance the info is retrieved from the server. Once it knows that all of the financial aspects are in order then it sends amount needed to the retailer. Then when the retailer account receives the money then that account automatically has to send the transaction fee to O2. For now the user has no fees to pay but in the future they have to pay 15p for each transaction which then is either deducted from their current balance upon the transaction or then added to the phone bill which is then later transferred to the specific O2 bank account. Upon adding money to a credit or debit card the system retrieves the bank data from the remote server and then adds the amount of money requested to the debit or credit card with a specific number. Also with a bank transaction the user has to pay a fee to the bank for every transaction if the contract does not state otherwise.

      2. The greatest security risk is of course when the user loses his/her phone or it is stolen. Since most people tend to leave their phones logged in to all of the social networks then probably also the O2 wallet app is constantly running. Hence if someone steals a persons phone then they can wreak a lot of havoc on the persons life. They can easily go to any of the listed retailers and use that phone to buy anything they want until the limit is reached or until they don’t need it anymore. This can have irreversable damage on the users financial situation ruining his/her life in an instant. Of course the user can have his phone shut down or blocked form usage but the time it takes to do that means that the thief still has an opportunity to do some harm to the person.

      Another security risk is that all of the data is stored in a remote server not the phone itself. The risk is that if somebody finds out how a person logs in to the system with their data then this other person can also use this data to log on to the system without the other one knowing. This also means that a person does not need to steal the phone but just find out their data. By logging in to the system using someone elses data can harm the user even more because he may not even know at first that his account has been hijacked and used by somebody else. By using a coffe shop wifi it is also hard to trace it to the hijacker and stop him.

      3. Since this new system makes it easier for people to make these sort of transactions without having a care in the world for the money being spent then it is more likely that people will start spending more money and making more of these kinds of purchases. Hence the retailers and aslo the developer of this app will start making more moeny hence the economy goes up for the retailers in general .

    • Silver 12:33 on April 26, 2012 Permalink | Log in to Reply

      1) Describe in great detail the process the system follows each time something is purchased/money is deposited using the system.

      For the transaction to take place, the mobile phone has to have the capability of NFC connectivity. The mobile phone will therefore need to install a dedicated application which will allow the phone to connect to the servers and make transactions. An SMS system is integrated into the system, allowing the users to deposit money on their “Mobile wallet” accounts. Whenn the phone is to be “swiped” across the magnetic payment strip, the server checks for user information and the balance of the account. Furthermore, if the account has sufficient funds, the desired amount and subtracks the money from the account. The time and name of the transaction is also saved for future overview of the spendings.

      2) Discuss at leas two possiböe security issues that may occur during the use of the system.

      a) The phone gets stolen. Since this application allows the user to pay for services using a mobile phone or a similar device, the process of misplacing or losing the gadget will put the balance of the bank account of the “unfortunate user” in danger. As there is no indication of password requirements while making the transaction, strangers who have found the phone could use the new application to pay for services with “stolen” money. Furthermore, if the system was to use a username-password solution, losing either one could possibliy turn out as a catastrophe as people would have remote access to one’s account.

      b) As to RFID cards, even if the transmission range of the service is rather small, there is a possibility that the application could charge the user for services they did not recieve.

      3) Comment briefly on the social implications a system like this might have.

      Using this application service, people will have a more simple access to their money and funds. Paying trough a mobile phone service will allow for a uniform way of paying for services, making ther lives of the users easier.

  • Paavo Viilup 11:28 on March 8, 2012 Permalink |  

    March 8 

    Oh, look at this: http://ope.tik.edu.ee/courses/498/items/17501/

    Command terms!

    For pre-exam pre-thinkery, do the following mental exercise:

    • consider the new iPad
    • define, evaluate, discuss, formulate etc – the new iPad

    Thus: write a piece using at least four command terms to elaborate on the new iPad. Please try not to be funny and write as briefly as possible. I think the time for frivolity has long passed and you should follow form.

    Post here – I’ll TRY to evaluate these today, right after class. I’ll also evaluate your previous writings, including the non-existent ones.

     
  • Paavo Viilup 13:22 on February 15, 2012 Permalink |  

    Now that we’ve had our very own ACTA… 

    Now that we’ve had our very own ACTA protests, numerous essays from both sides, funny statements from our PM and all the other brouhaha surrounding the new legislation, it is time for you to flex your analytical muscle. An essay then, on ACTA, on what you think of it, and on what you think of the noise surrounding it. The length – 600 words, the due date – Feb 17.

    In case you use other people’s thoughts, apply appropriate referencing techniques.

     
  • Paavo Viilup 13:52 on February 1, 2012 Permalink |  

    The ban on all laptop computers iPads and… 

    The ban on all laptop computers, iPads and smartphones in lectures by the Public Relations Institute of Tallinn Technical University raises, in addition, to the more obvious questions (e.g. was the university right to do that; why should everyone suffer for the folly of some), a much more interesting one concerning teaching and learning.

    In essence, the university is approaching the problem from the wrong angle. Instead of figuring out how to limit using certain ubiquitous items, the institute should instead figure out a way to capitalise on said items in the educational process. One might argue here that the institute should also find a way to implement Coke cans in teaching (because people have them in lectures, for example), but it is obvious that computers and phones ARE used for studying by most students (whereas Coke cans are not). Thus, by banning them from lectures, you are effectively creating a barrier for learning (even though the aim is exactly the opposite), as people will not be able to use their usual tools during lectures. You are making studying more difficult for many.

    The ideal solution would be to use the computing capacity in the lecture hall to make the process of teaching more interactive (allow chat in Google Presentations for a parallel discussion; make online polls etc) and challenge the students on their ground. Instead, the Institute has chosen to continue on their conservative path.

    (There is also the problem of boredom, i.e. if the students find it easier to surf Facebook instead of joining in the discussion – if there is one in the first place – there is something wrong in the first place.)

     
  • Paavo Viilup 08:21 on December 8, 2011 Permalink |
    Tags:   

    December 08 

    Today’s task: final (Christmas) essay!

    Recently, the Swiss governent “legalised” downloading music, films and other copyrighted material (see http://torrentfreak.com/swiss-govt-downloading-movies-and-music-will-stay-legal-111202/). Please discuss the reasons and possible outcomes of this decision in the form of an essay (approx. 500-600 words).

    The due time is 4 PM today (December 08).

     
  • Paavo Viilup 07:18 on November 18, 2011 Permalink |
    Tags:   

    The Death of Specs 

    http://techcrunch.com/2011/11/14/rip-spec/

     
  • Paavo Viilup 11:56 on November 16, 2011 Permalink |
    Tags:   

    Are specs relevant? 

    Post your opinion by November 17.

     
  • Paavo Viilup 12:55 on November 3, 2011 Permalink |
    Tags: futurevisions   

    Read this for Friday (Nov 4) 

    http://daringfireball.net/2011/11/companies_that_publish_concept_videos

     
  • Paavo Viilup 10:45 on October 12, 2011 Permalink |
    Tags: iphone4s thisweek   

    This week 

    Wednesday (individual): write and post -> “The importance/unimportance of getting an iPhone 4S”.
    Thursday (individual): work on paper 2 or your project
    Friday: we’ll check paper 2 + listen to your news reports.

     
  • Paavo Viilup 06:36 on September 30, 2011 Permalink |
    Tags:   

    The week – as of October 2011 

    Wednesday

    news <-> ITGS triangle

    Thursday


    1st week: course material (the book – key terms etc);
    2nd week: project stuff (presenting, coding, troubleshooting, documenting);

    Friday

    1st week: essay Friday;
    2nd week: coding (with Joel, maybe);
    3rd week: emergent lessons;
    4th week: ?

     
c
Compose new post
j
Next post/Next comment
k
Previous post/Previous comment
r
Reply
e
Edit
o
Show/Hide comments
t
Go to top
l
Go to login
h
Show/Hide help
shift + esc
Cancel