Red Hat buys Hell's Kitchen Systems for $80M 130
Anonymous Coward writes "Yahoo reports Red Hat is buying this e-commerce company. Their product (credit card verification system) appears to be closed-sourced." I called Melissa London at Red Hat to find out the scoop; it's all open source above the API. Below that, the verification system makes use of the financial institution's proprietary protocols, which are made available to HKS under NDA. It's not perfect, but until the banks get clueful, it's the best we can hope for.
Re:Jan 5, 2002 (Score:1)
FDR - CCVS - OpenCCVS (Score:1)
Re:Religion versus Fiduciary Responsibility (Score:1)
andover? slashdot? clueful? (Score:1)
This is really good (Score:1)
Can the other distros copy/include or not (Score:1)
to include the same software and have it work
or not?
Re:I'm no crypt. freak, but (Score:1)
Re:Pollyanna attitudes (Score:1)
-
Re:Credit Card Transaction Protocol (Score:1)
Re:What do they have to "get clueful" (sic) about? (Score:1)
SSH and shadow passwords do not rely on security through obscurity. They do rely on hiding information (hence "cryptography"), but the process by which they generate and hide said information is an open book. Not the same thing.
um why does this have to be open source? (Score:1)
Re:Banks are slow to change (Score:1)
Re:RedHat press release (Score:1)
I was impressed that they did take the time to call and inform me that the second charge would be removed from my card.
What burned me about making that online purchase was that I received a offer for a free "RedHat Cap" (if I purchased v6.2 online) about a week later.
So when she asked if I had any other questions, I asked for the Hat. I said, "I've been a loyal customer since version 2.1 and
I should get the Hat sometime next week.
Awesome. Please don't abandon your FreeBSD ports! (Score:1)
You are correct (Score:1)
If I were to sell it today, I'd lose a big chunk. You don't lose until you sell, right? In 10 years I won't care about the temporary price dip after I bought.
Prediction: OS credit validation system in 1 year (Score:1)
If Red Hat lowers the (certainly) obscene price of this package, and starts bundling this CC validation code with their commercial distro bundling, I wouldn't be surprised to see it reverse-engineered within a year from now.
Right now, the only reason that the CC validation code hasn't been reverse-engineered is probably because too few people have the code to play with, or that few people even know where to get it. For example, this is the first time I've ever heard of a CC validation code being available for Linux in the first place.
Red Hat will probably burn this 'ware onto the commercial version of their distro, which should be sufficient to flood the market with umpteen copies of it.
Let's put it this way: I'd be very much disappointed even this doesn't get reverse-engineered within a year.
--
Re:What do they have to "get clueful" (sic) about? (Score:1)
I *gasp* DON'T want my bank to give away source code to their software either!... and I know this violates the GPL propaganda line. Tough. The fact is security through obscurity WORKS, otherwise what would be the point of SSH or /etc/shadow??
Re:FDR - CCVS - OpenCCVS (Score:1)
Re:Where Have We Seen This Before? (Score:1)
If you think you know what the hell is going on you're probably full of shit. -- Robert Anton Wilson
I'm no crypt. freak, but (Score:1)
Re:I'm no crypt. freak, but (Score:1)
My point here is if the full source is available for the transport of the confidential information, how is it prevented from being subverted? If I am knowledgable in what a program does and exactly how it does it, what prevents me from making changes or using that code to build a tool to hijack or undermine the security of the transport?
Re:I'm no crypt. freak, but (Score:1)
Behold, the power of Slashdot...
Re:Open Source above the API? (Score:1)
Re:YADCCBSWMIDH (Score:1)
who else has stopped giving a crap about what Micro^H^H^H^H^HRed Hat is doing anymore?
Re:Pollyanna attitudes (Score:1)
In the "personal privacy" corner, we've got my credit card numbers, my social security number, *specific actual data* about me. Private stuff.
In the "proprietary corporate information" corner, we've got the methods the data is stored, transfered, used, etc.. *NOT* the data itself. The data itself, of course, is private. The methods can be private too, for all i care, except when the data is info about me, that i am supposed to trust them with.
Open Source above the API? (Score:1)
Re:What do they have to "get clueful" (sic) about? (Score:1)
Re:What the hell does 'Hell's Kitchen Systems' mea (Score:1)
-russ
Yet another .deb bigot? (Score:1)
So Sir go to Hell with all your hate and paranoia!
Now, do you say the same thing about Debian going commercial?
RedHat is simply the best! (Score:1)
It's simply the best overall distro out there!
Go RedHat!
Re:CCVS (Score:1)
Re:Banks are slow to change (Score:1)
Unix is elegantly designed (well mostly, ish, sort of, perhaps), COBOL is just hideous.
--
First Data Resources (Score:1)
Hi.. I was wondering if anyone had an opinion on First Data Resources, a credit card processing/holding company.
Re:Religion versus Fiduciary Responsibility (Score:1)
Hmm. I might dispute that slightly - Redhat knows it is in it's best interest to keep in good standing with the OSS community, who are the source of the Linux software it is selling, and takes pains to be seen to "do the right thing".
Then again, I suspect that what Macchiavelli said of States can be equally applied to corporations. They are not "moral" or "principled" in the sense that a man can be.
no, but they are led by a board of directors that is small enough to reflect the personalities of it's members - governments just have too many people with too many agendas to do similarly.
--
above API? (Score:1)
Re:Banks are slow to change (Score:1)
Security through Obscurity (Score:1)
Just open-sourcing something will not make it inherently more secure. I don't know how many people would actually be interested in working with this code, but I'd be willing to bet it's a lot less than those who want to work on, say, GNOME, or ProFTPd. After all, more people want to use those programs.
Yes, this has been said before, but it needed to be said again.
---
Re:Pollyanna attitudes (Score:1)
Yes, and I'm so sure that people that would boycott/email represent so many bank customers that they wouldn't be laughed at for boycotting a bank. What exactly is so wrong with banks at the current point in time that would require them to open source their software? You're an IT professional, and you "know" that the only good security is open security, do you think if security by obscurity was really that bad banks would use it? The banks aren't clueful of what? That "open source" is taking over the world? Let me know and I'll shut up.
Re:I'm no crypt. freak, but (Score:1)
I don't see how. The client just needs to send the credit card number, the price, and whatever information to identify the merchant. The server just needs to send back an authorization number or a failure reason. All this could take place over an encrypted connection if security is a concern. What possible danger could there be if the source to do this was available?
Its nice to see a good bunch of guys make out well (Score:1)
Its also nice to see a tech firm that's NOT in New York or California making some $dough$. (Yay, Pittsburgh)
Just a note of congrats from one who's trying to make to to another who has.
Re:What do they have to "get clueful" (sic) about? (Score:1)
Consider how something like RSA public key crypto works...
* Find 2 very large primes, p and q.
* Find n=pq (the public modulous).
* Choose e, such that en and relatively prime to (p-1)(q-1).
* Compute d=e^-1 mod[(p1-)(q-1)] OR ed=1[mod (p-1)(q-1)].
* e is the public exponent and d is the private one.
* The public-key is (n,e), and the private key is (n,d).
* p and q should never be revealed, preferably destroyed
Note what you end up hiding here. Your obscuring certain numbers. Hence RSA ends up being security through obscurity.
Yes, you may say that the system is open, (which btw in the USA it really isn't...remember RSA Inc. still holds that patent) but the ideology behind it isn't much different that keeping the gory details of its functionality away from the masses.
I guess it comes down to different definitions of "security through obscurity".
Re:Pollyanna attitudes (Score:1)
I remember reading something about RMS not giving himself remote access to his machines because they had to be secured and as a result since the systems weren't open for all to use and work on, why should he be allowed access to the same.
So many of us seem to forget the ideology that brought about the Free Software movement. A lot of people haven't heard the term "Free Software" but have heard "open source". We really need to be pushing harder for truly free software and systems, but unforutnately these systems need to be secured because society as a whole can not trust itself.
Its a sick, sad world isn't it folks.....
Re:Hmmm... (Score:1)
Red Hat + success == Good Thing(tm)
Re:Jan 5, 2002 (Score:1)
Re:I'm no crypt. freak, but (Score:1)
Online, you don't just swipe the card and get the cash.
You get the card number, then query the bank "Can user xyzzy afford $35,000.00 from www.newtoyota.com?"
If yes, then you "reserve" $35,000.00 and send a message into your internal system that this order has been "authorized".
Once the order has actually shipped, you go back and issue the charge against your "reserved" sum.
In the event you can't ship and Mija Cat cancels his order for a new Toyota Tundra (extended cab in catnip green) you have to issue a "reserve cancel".
Remember, since you're dealing with delayed shipment, you get into really legally weird areas if you "charge" before delivering "goods and or services".
Of course, that's more detail than you may have needed...
Meow
CCVS Purchase a good thing? (Score:1)
Re:Jan 5, 2002 (Score:1)
Privacy and freedom of information go hand-in-hand (Score:1)
Re:getting the cob...slashdot style (Score:1)
First Data Resources was great (Score:1)
I can't speak for anyone else, but I had a very good experience with them.
PS, we'll sell for less than $80M :)
Re:OpenCCVS (Score:1)
http://www.blackholesun.com/occvs [blackholesun.com]
Just a directory with files now, full web page to follow.
Dave Cinege doesn't work on this anymore, but we are fixing it up to use for our own site.
It'll be a cold day... (Score:1)
=======
There was never a genius without a tincture of madness.
Re:Banks are slow to change (Score:1)
Re:Pollyanna attitudes (Score:1)
Actually, in the US, personal privacy is the same thing as proprietary corporate information. The purpose of incorporating a business is to create a legal entity distinct from any human. In the eyes of the law (at least theoretically) a corporation is entitled to pretty much the same rights (and is supposed to follow the same laws) as an individual.
Hmmm... (Score:1)
Good for RedHat (Score:1)
Although many would see this as big company eating up smaller company, what they are doing is openning up market for Linux. More people will be able to use Linux as a solution, and this can only be a good thing.
Re:Banks are slow to change (Score:1)
Since these rivals arose, our big & conservative banks seem suddenly beeing urged to use the same systems... mostly object-oriented, Smalltalk or C++ Clients, C++ Servers (occasionally Smalltalk/X) and CORBA for the communication (good for legacy systems integration).
I can Imagine just a handful of companys that could realize systems of this size, apparently this was the main reason to choose Smalltalk, since Smalltalk companies tend to have more experience in *big* object-oriented projects than the others (IMNSHO).
Re:CCVS (Score:1)
Re:Banks are slow to change (Score:1)
Not all updated systems were very modern though. Quite a few of the new systems wouldn't have looked out of place in the 70's.
It's not really a case of being "modern" though, it's more that they are still conservative (with a small C) and traditionalist - you don't stay in business over the long term by taking unnecessary risks, and that includes going with the latest trends for the sake of it.
As an example, Samba is quite often used within banks to integrate Sun workstations with NT, however Linux is frowned upon. The argument against Linux is the usual "no-one owns it, it's free, it's not to be trusted". Strangely this isn't applied to Samba - presumably because they need it!
Re:CCVS (Score:2)
Right, if the banks refuse to release source we have to reverse engineer the program or use it as closed source.
Reverse engineering doesn't necessarily help here. It's probably a breech of contract to use non-approved software to connect to the system (and it is THEIR system).
The systems used show signs of being quite old (1200 - 2400 baud with even parity for starters), and may not be robust enough to deal well with protocol errors.
I would like to see that fixed, but it may take a while for it to actually happen. I think it would be in their best interest to fix it as well before someone does reverse engineer the protocol and use it to attack them.
Re:CCVS (Score:2)
However, blame doesn't really come into it as much as one might think.
Blame was probably too strong a word. I can see your point, it would be awefully expensive to make the transition. It will have to happen one day anyway, but probably not quickly.
Re:Open Source above the API? (Score:2)
Does anyone know if there is anything in HKS's product that's actually open-sourced?
The package comes with full API documentation, C libraries, perl module, a cli utility, and example source code.
Re:Open Source above the API? (Score:2)
The question is of legality. Compare this to the mess when SB released the Unified drivers for their TNT cards that basically emulated 3dfx calls. They used the freely avaiable 3dfx API definitions, and wrapped the TNT calls with mapping functions to get a 3dfx library. 3dfx still tried to sue them but I believe they lost (or something happened, I've not heard what however.)
Same idea *could* be applied here, but it depends what level the API of the software is at.
Re:Jan 5, 2002 (Score:2)
for size: you have the source, fix it.
for running something else underneath it: you have the source, build it.
one of the things i like about free software is that it really highlights the whiners from the doers...
Red Hat's stock (Score:2)
Anyway, RedHat's agressiveness in finding more markets for themselves and therefore Linux is what prompted me to sell off my Microsoft and buy Red Hat stock with the money. It would be nice to see more of this sort of thing from the other Linux companies though. I want to see many large Linux companies besides Red Hat sharing the marketplace.
Where Have We Seen This Before? (Score:2)
"Big clueless industry with no will to innovate depends on closed-source security-through-obscurity to protect its service."
Answer: DVD Video
The answer here is simple: Someone possessing clue needs to reverse engineer the protocol, and open soruce an application which can "simulate" any of the "permitted" applications. (e.g., so that OpenCCVS can pretend to be CCVS, or any other credit card verification software).
You know that each individual verification application must have some "fingerprint" or signature, because an individual application has to be "permitted" to connect, so there must be some licensing or keying going on to permit that. This is analagous to the many keys that the DeCSS people discovered.
When you create the Open Source version, it is one which the clearing houses cannot prevent, because it can present the appropriate protocols as though it was coming from any of the licensed applications. What are they going to do? Kill all the existing licensees and make them retool to a new system? Forget it, they had enough problem getting credit-card swipes reconfigured to handle Y2K expirations, they ain't gonna redo the whole authentication scheme.
All this needs is someone to commit the time to doing it.
D
Re:Pollyanna attitudes (Score:2)
You completely miss the point. Personal privacy is *NOT* the same thing as proprietary corporate information. I'm not asking which hand you wank with, i'm asking for proof that you are being responsible with the private personal information that you are asking me to trust you with. If my personal privacy depends on the security of your proprietary protocols, I want a better garantee than "trust me" that i am being protected.
If anyone is a hypocrite it is YOU for expecting me to give corporations my private info and not expect them to prove to me that they're protecting it.
This isn't flamebait, but it should get an "Inciteful." You say that there is a difference, no, there isn't. If those companies that are being requested by you to give all of their information to you asked you for yours, what would you say?
What *would* i say? Have you ever had a bank account? A credit card? A car? A drivers license? They ask for pleanty of private information. I suppose you're happy just keeping your fingers crossed that they know how to keep it secure?
That aside, i'm not asking them for their financial records, etc. Nothing as private as what *they're* asking *me* for.
Re:Banks are slow to change (Score:2)
Huh? Banks are slow and monolithic because they use a 40 year old programming language, but everyone on
Re:Religion versus Fiduciary Responsibility (Score:2)
You almost say that like its a bad thing or something.
Re:I'm no crypt. freak, but (Score:2)
And, there's never too much detail... Especially about stuff like this.
Re:CCVS (Score:2)
But... as a previous poster said, talking to your bank about wanting the software and protocols made available might work, if you point out that open source software can be trusted in a way closed source can't. They'll be reluctant, but if they realize it's a good thing, both for the customers, and for them, because they can use it to show they're not making any horrid mistakes in their code, they might be interested.
So, ask your bank. Fax the manager a letter and explain that for your security review you need to know the security procedures of the companies you're working with, like with y2k preparadness, you can't be in business if your supliers are down.
Not correct (Score:2)
This is a common misconception. Encryption algorithms can be proven (mathematically) to be impratical to break without break-thoughs in decryption algorithms.
Security flaws usually come in the implementation of those algorithms, and in the supporting code around them.
Re:Open Source above the API? (Score:2)
Is there anything out there now? What sort of thing are we looking at, do any
Security through Obscurity (Score:2)
They're probably also worried that open-sourcing their protocols might lead to cyber attacks on their clearinghouses.
They're wrong, of course - mainly because Security through Obscurity doesn't work. But try to tell that to a suit.
Re:Banks are slow to change (Score:2)
bend over, OS (Score:2)
Just included in RH Professional... (Score:2)
Just wondering...
BTW, what would be more difficult: doing an open-source e-commerce API (which would undoubtedly increase e-comm revenues by sheer volume) or to convince the banks, etc., to support this development (replace NDAs with sane, well-designed protocols, etc.)? The trick would be convincing the big players that letting "anyone" do e-commerce would increase revenues more than charging for the privilege---it's all about transaction volume (you have to think of the spin-off benefits).
For example, I don't need to pay a bank to use cash (thier current "open" protocol) but they make money from the side-effects of that cash transaction (banking, investment, loans, everything really).
What bankers read (Score:2)
"Hi, I am currently a customer of your bank. I am interested in online banking and making special withdrawals (especially with links to e-commerce), but as an anarchist I know that the only good security is open security. Please send me the source code/protocols/etc of your online security system so I can evaluate it against my capabilities. I will only be considering financial institutions that can make me feel comfortable with their security."
Re:CCVS (Score:2)
Basically, that is my understanding as well. However, blame doesn't really come into it as much as one might think. There is not an easy way for these banks, etc. to change things from the current system without dropping a few billion dollars in the U. S. alone. Unless someone wants to remodularize their entire software systems that track billions of transactions on a really good day. The change to open source, or any other change, is a financial mountain to hurdle.
In short, keep in mind that the cost for them to repay the full value of all the stolen money and wrongful charges in a year is likely to be miniscule in comparison to the cost of replacing CCVS. As much as we might grumble about it, the banks will do what saves them money in the short run until the need to change it becomes sufficiently great. This is the way business works. A less than ideal product that is in place is better than paying two years income to replace it.
B. Elgin
Re:Banks are slow to change (Score:2)
Mike Eckardt [geocities.com] meckardt@spam.yahoo.com
The merger more helpful than Hell's Kitchen (Score:2)
websiteparodies.com/redhut [websiteparodies.com]
---
"And the beast shall be made legion. Its numbers shall be increased a thousand thousand fold."
Banks are slow to change (Score:2)
Re:I'm no crypt. freak, but (Score:2)
Re:Banks are slow to change (Score:2)
The Chrysler Payroll Project (C4) was a similarly sized project (there should be quite some stuff floating around about the technology they used - search for Kent Beck).
Uhh, that's criminal . . . (Score:2)
There are about a zillion laws against this kind of thing, and unless they've got really deep pockets they could find themselves in VERY serious trouble (like, the kind of trouble that completely ruins your finances, forever).
If someone detects this "extracurricular" activity on their credit cards, they can complain to the card issuer. If the issuer gets enough complaints, they'll come after your friends with lawyers -- the individual customers won't have to spend a dime in legal fees. The gigantic financial institution will take care of that for them . . .
RedHat press release (Score:3)
CCVS (Score:3)
The install is really rough, but the system works well. I have used it a few times for web sites and would choose it again. I don't work for Hell's Kitchen, I just like CCVS.
The closed source issue goes beyond NDAs. The clearing houses require that the software be certified to work with their systems in order for it to connect. They loose control of that certification if they allow anyone to release open source credit card software. Don't blame Red Hat or Hell's Kitchen, blame the clearing houses and merchant banks.
CCVS API is pretty good (Score:3)
Re:Pollyanna attitudes (Score:3)
If "we" did want all information to be free and still demanded our privacy, we would indeed be hypocrites. But we don't. Some people say "information wants to be free" but not all of us say that and those who do don't always mean what you appear to think they do.
When we demand openness, we aren't asking to see the data stored within systems, but the code that runs the system -- the very code we want to ensure is good enough to protect our privacy among other things.
--
I'm afraid not... (Score:3)
Wouldn't an open source credit card verification system be a Bad Thing(tm)? I would assume that this would make it easier to engineer the ablility to compromise the transaction. I know that security through obscurity is a bad policy by nature, but in these types of things, is it not required?
Not really, no. Well-designed secure protocols retain their security even when all of the participants know all the details of the protocol, and even when one or more of the participants is malicious.
If it makes a difference whether or not people know the full protocol, then it's a sign that the protocol isn't really secure in the first place. It's a sign that you already have a problem.
If you're relying on secrecy of the protocol to protect the integrity of the protocol, then you are SOL the moment someone finds out the details. That wouldn't necessarily mean you told them, either; they could have reverse-engineered without your knowledge, or been told by someone who knew (there wouldn't necessarily be any specific way of tracing the leak, either).
Obviously, secrets are in fact required for security, but that secrecy should be concentratd in well-defined and controllable things like encryption keys that individual people are responsible for.
Think about any multiuser OS in a secure configuration (I'll use a secured Unix as an example here) -- is the system secure because the users don't know how it works, or because it really is secure?
Relying on the obscurity of your protocol for security is like giving the root password to all of your users, and then trying to keep them from learning any more about Unix so they won't know enough to do anything malicious.
What you want to do instead is give them individual accounts, with individual passwords (secrets) and individual accountability, with access controls in place to prevent them from doing anything malicious. It's hard work, but protocols can be designed this way.
"Security Through Obscurity" doesn't really help; it just hides the problem from everyone but the people who have found a way to exploit it until it's too late.
Look at the situation with cheating and the Open Sourced Quake -- there have been the same kind of cheats (aimbots, b0rked models, modified rendering and so forth) long before Quake was open-sourced. The only substantial effect Open-Sourcing had in the case of Quake was making the people who weren't already cheating aware of the specific problems, and the exploits marginally more accessible.
Don't just take this from me, I would strongly encourage you to read books like "Applied Cryptography" by Bruce Schnier to get a better understanding of these issues.
Re:Pollyanna attitudes (Score:3)
You may be surprised at the number of banks that are potentially clueful.
Where you are going to run into serious problems is with the regulatory institutions, such as the FDIC, FFIEC, NCUA, etc.
Theseguys are the tough nuts to crack. I can tell you from first hand experience that they take privacy and security very seriously.
Supposed data processing specialists in the examiners offices are utterly mystified in many respects. They wouldn't know an AS/400 from a 300 bowling game. They have an armlock on the software companies, forcing them to hold source code in escrow with a third party, so that no one other than the company messes with it, and so that (surprise) they can peruse it at will.
The whole open source concept would be entirely foreign and entirely unacceptable to them, however , that is where headway needs to be made.
What you'll hear from the banks, to a one, is this, "Will it pass muster with the examiners?"
In this case, the answer would be a resounding NO.
Re:I'm no crypt. freak, but (Score:3)
All the code does is take the number the merchant types/scans in and sends it off to the bank saying "Can this #/Exp Date, purchase this ammount? (y/n)". If the merchant types in a bogus number, or scans a fake card, the software will ask the bank about it, and should. It's the job of the bank to not authorize accounts that don't exist.
The software might do some basic checking, for the correct number of digits, or such, but that'd just be to save network traffic on obviously incorrect entries, not for the verification itself.
There is no honest security reason for not releasing source, it's just part of an overall policy of not releasing any information. This isn't even really security related.
Pollyanna attitudes (Score:3)
Right, so let's all sit around and hope they get clueful.
How about this instead: Send them a clue. By email, by boycotts, by not buying HKS, etc.
For instance, why not send your bank something based on the following: "Hi, I am currently a customer of your bank. I am interested in online banking (especially with links to e-commerce), but as an IT professional I know that the only good security is open security. Please send me the source code/protocols/etc of your online security system so I can evaluate it against my needs. I will only be considering financial institutions that can make me feel comfortable with their security."
---
CCVS and Open Source Credit Card Processing (Score:3)
However, it's really important that they get some more functionality in the base of the software first. Major technical limitations make CCVS a poor choice in hardcore processing environments.
I was setting this up for a client who was processing CC's pretty seriously - thousands of authentications per day. The biggest problem we ran into with CCVS was that it kept separate files for each transaction being processed. Each file would contain the transaction ID that you assign. To find any information out about a transaction, it opened every transaction file to find out the information you requested.
Meaning, simply, that the machine was coming to it's knees after a few days simply because of a poor way to store transactions. This could have been cut down to a few hits to the filesystem, had a schema as simple as naming the file after the transaction ID been implemented.
Plus we had assorted modem problems. HKS was always very helpful with us. Unfortunately, I had to replace the Linux box running CCVS with a SCO box running ICVerify before my client could really go into production mode. Yuck.
In any case, it would be very difficult to write an open source credit card processing program. Technically, all the protocols (at least most of the major ones) are pretty simple, and could be implemented quickly. The problem is that with the clearinghouses.
The clearinghouses are glad to hear that you want to develop processing software. To them, third-party processing software means money. If you want to talk to them, you pay them. Before your software is allowed to communicate with a credit card processor, it has to pass their tests to ensure that it does the right things. To get your software tested, you have to pay. Plus you typically have to license the protocols, you pay again.
Of course, it would be possible to start a company with some funding to create an open source credit card processor. But you're signing NDA's before you can see the protocol specs. They don't want that out there in the public, and they won't let you open source the code to speak their protocols.
It would still be possible to write an open source processor, by watching the serial I/O of an established processor and reverse engineering it. But then you're putting out software that the clearinghouse doesn't approve of. Which means that they can refuse to deal with a merchant until they get the appropriate software.
Which means a merchant might be denied money. Given the choice, most people will shell out the $x for a commercial, proprietary processor rather than risk losing their merchant account.
Of course, when I say "the clearinghouses", I'm only referring to the ones I've talked to. Hopefully, if they got enough mail about it, they might consider allowing open source software to talk to them. So if you want to see an open source CC processor, or care about the open source movement, you should mail the clearinghouses about this. I'd start with First Data Corp.
Re:Jan 5, 2002 (Score:4)
Skip Mozilla 18.63, too - Armadillo surpassed it in speed and stability long ago.
As for your boss, just happily tell him you're running Red Hat (keep the splash screen) and run your BSD. With the Linux acceleration layer, nobody will know.
My point - open source is open source, and I could care less who buys what company, for the most part.
----
Banking protocols ARE open, get the facts straight (Score:4)
I could go into long and boring detail about what each of the messages do, but to preserve sanity, I will refrain.
What is "closed" is who the banks will talk to with this protocol. This is a "good thing" (tm). You are required to have your product certified by the bank by a test regime that they require to be performed.
So, you can get a copy of AS2805, write a gateway (open or closed source, your choice) and talk to your local bank about getting an expensive X.25 connection to them, and you can pass financial transactions (in my case credit card transactions) to the banking network.
How do I know ? Well, I've done it.
The company previously known as ABA (now eSec) built a real-time credit-card transaction system all in Java. I was one of 6 programmers involved in the development.
Offtopic rant: There is some desperate need for many of the Slashdotters to do some research or thinking _before_ posting. The editors posting stories should also be a lot more responsible in their editorial comments. Slashdot has recently become a very "bandwagoneer" production which is starting to mimic the popular press.
Lift your game, or lose your readers.
What do they have to "get clueful" (sic) about? (Score:4)
Was that a news story or opinion? Do I get a chance to read the story and decide for myself what opinion to form?
Religion versus Fiduciary Responsibility (Score:4)
Then again, I suspect that what Macchiavelli said of States can be equally applied to Corporations. They are not "moral" or "principled" in the sense that a man can be.
Re:Pollyanna attitudes (Score:4)
Security through obscurity is the only thing that people understand. Maybe they're wrong, but maybe they're right. It falls once again into an issue of information. WE ARE HIPPOCRITS. We want all information to be free, but mandate privacy. See a discrepancy there?
This isn't flamebait, but it should get an "Inciteful." You say that there is a difference, no, there isn't. If those companies that are being requested by you to give all of their information to you asked you for yours, what would you say?
Jan 5, 2002 (Score:5)
Why can't Red Hat let anyone else into the market? Ever since they drove Microsoft into bankruptcy they've bought every conceivable service on the planet. They have their little red logo on everything, and whenever someone looks to buy an OS it's either Apple or Red Hat. Why do they have to bundle every conceivable service with their systems??? I want to go with a BSD at work, but my boss won't let us because "Everything works better if it's all Red Hat." 90% market share is a pain in the neck no mater who has it. And while I'm on it, why do I need an Athelon 190 Gigahertz and half Tetrabyte of Ram to run their GUI?!?!?!?! I remember when a Merced with a gig of ram was all you needed for SERIOUS computing!
BTW: Mozilla 18.63 still sucks. No browser download should be 200 megs. What happened to the nice, clean, small 40 meg download from not too long ago. It's getting to the point where us poor cheapskates with a pokey SDSL connection can't get along anymore!