Content deleted Content added
→Security model: Reply |
Divinations (talk | contribs) m Reverted edits by 102.88.111.82 (talk) to last version by 107.123.53.77: using talk page as forum |
||
Line 20:
Q. I would request to provide details on how does CVV verification process work. for example when a user enters his CVV in the payment termina intertface then what verification and validation processes occur in backgroung and the user gets authorized for the transaction. such information would be most appreciated.
[[User:Lavkru|Lavkru]] ([[User talk:Lavkru|talk]]) 09:48, 7 May 2013 (UTC)
I do not quite understand the security model underlying the CVV2. Isn't it the case that credit card numbers are typically obtained by making the user enter them on forged websites or by sniffing network traffic? Now what additional security do I gain if all such transactions will soon require to give the CVV2 as well? The same online methods used for stealing the credit card number can also be used to steal the CVV2.
|