<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>On the road to Bandol &#187; mobile payment</title>
	<atom:link href="https://javacard.vetilles.com/tag/mobile-payment/feed/" rel="self" type="application/rss+xml" />
	<link>https://javacard.vetilles.com</link>
	<description>A weblog on Java Card, security, and other things personal</description>
	<lastBuildDate>Mon, 18 Aug 2025 06:48:26 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.0.32</generator>
	<item>
		<title>Did Apple just boost mobile security?</title>
		<link>https://javacard.vetilles.com/2014/09/12/did-apple-just-boost-mobile-security/</link>
		<comments>https://javacard.vetilles.com/2014/09/12/did-apple-just-boost-mobile-security/#comments</comments>
		<pubDate>Fri, 12 Sep 2014 20:47:13 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Discussions]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[iPhone]]></category>
		<category><![CDATA[mobile payment]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=893</guid>
		<description><![CDATA[I have been working on mobile security for many years, and things haven&#8217;t moved much: justifying mobile security is always painful. Whyshould Ispend more money? There aren&#8217;t that many attacks! Some business use cases seemed like a good justification, but the economics are unclear and remain in the order of &#8220;if youget hacked, it could [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>I have been working on mobile security for many years, and things haven&#8217;t moved much: justifying mobile security is always painful. Whyshould Ispend more money? There aren&#8217;t that many attacks! Some business use cases seemed like a good justification, but the economics are unclear and remain in the order of &#8220;if youget hacked, it could cost you a lot of money&#8221;.</p>
<p>With iPay, Apple just proved to many people that mobile security can have a favorable economics. By embedding a biometric sensor and putting their critical credentials on an embedded secure element, they have been able to negotiate a lower transaction fees on their payments and save millions in the future. Mobile security brings millions instead of just boring geek stuff? Now, that&#8217;s innovation.</p>
<p>Of course, the security of the iPhone 6 must live up to these high expectations. As much as the latest announcements bring a boost to mobile security, the announcement of a hack allowing a guy to steal a phone and use it &#8220;illegally&#8221; has the power to bring us back to the dark ages.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2014/09/12/did-apple-just-boost-mobile-security/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Convenience vs. Security vs. (Perceived) Security</title>
		<link>https://javacard.vetilles.com/2012/11/28/convenience-vs-security-vs-perceived-security/</link>
		<comments>https://javacard.vetilles.com/2012/11/28/convenience-vs-security-vs-perceived-security/#comments</comments>
		<pubDate>Wed, 28 Nov 2012 08:59:02 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Banking]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[mobile payment]]></category>
		<category><![CDATA[Passbook]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=842</guid>
		<description><![CDATA[Yesterday, @poulpita tweeted a link to a blog explaining that convenience keeps winning against security. The main argument in this blog is about iOS6&#8217;s Passbook, which can store credit card numbers, for your convienience. The reasoning goes on with a comparison of the security merits of a credit card number stored on Passbook and a [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Yesterday, <a href="https://twitter.com/poulpita" class="liexternal">@poulpita</a> tweeted a link to a blog explaining that <a href="http://www.infosecisland.com/blogview/22574-Convenience-vs-Security-Why-convenience-keeps-winning.html" class="liexternal">convenience keeps winning against security</a>. The main argument in this blog is about iOS6&#8217;s Passbook, which can store credit card numbers, <em>for your convienience</em>.</p>
<p>The reasoning goes on with a comparison of the security merits of a credit card number stored on Passbook and a real card. Read the paper for the details, but an obvious comparison is that a real card is easier to lose/steal (because we stick to our phone more than we stick to our wallet), and also easily accessible (the phone will be at least somehow encrypted, requiring some technical skillls to access the card numbers). In addition, credit cards are easily replaceable, and they usually entail a zero liability insurance for the end-user.</p>
<p>What surprised me is the conclusion: &#8220;convenience wins in the consumer mind&#8221;, and more specifically, &#8220;convenience may win out over a little risk&#8221;. From the risk analysis, my feeling is that using Passbook is actually less risky than carrying real cards, and even if one doesn&#8217;t agree with that, zero-liability means that, for the customer, the risk is the same: zero.</p>
<p>Although we agreee that security is a way to reduce risk globally, there are many different ways to reduce risk for every actor. For the end-user, in that specific case, the key aspect is the zero-liaility insurance offered by the credit card company. If there is a major security flaw in Passbook, there may be a problem between Apple and credit card companies, but end users should remain largely unaffected. The worst thing that could happen to them is to lose the convenience of Passbook if credit card companies deny to Apple the right to store card numbers in it.</p>
<p>Just another friendly reminder that our job as security providers is not just to randomly increase security of things, but to actually reduce the level of risk for an actor, which should be our customer. Banking smart cards are sold to banks, not to end users, and there is not reason to change this relationshp when the cards are dematerialized into software: our customers are the banks, and we need to reduce their risk (which, hopefully, can help them offer a zero-liability insurance to their customers at a better cost).</p>
<p>Disclosure: I just finished reading Brice Schneier&#8217;s <a href="http://www.amazon.fr/gp/product/1118143302/ref=as_li_ss_tl?ie=UTF8&#038;tag=lesvetilles-21&#038;linkCode=as2&#038;camp=1642&#038;creative=19458&#038;creativeASIN=1118143302" class="liexternal">Liars and Outliers: Enabling the Trust That Society Needs to Thrive</a><img src="http://www.assoc-amazon.fr/e/ir?t=lesvetilles-21&#038;l=as2&#038;o=8&#038;a=1118143302" width="1" height="1" border="0" alt="" style="border:none !important; margin:0px !important;" />, which may explain why I have this unusual high-level view of security. Good book, by the way.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2012/11/28/convenience-vs-security-vs-perceived-security/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Google&#8217;s vision of Secure Elements</title>
		<link>https://javacard.vetilles.com/2011/12/30/googles-vision-of-secure-elements/</link>
		<comments>https://javacard.vetilles.com/2011/12/30/googles-vision-of-secure-elements/#comments</comments>
		<pubDate>Fri, 30 Dec 2011 14:35:39 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[mobile payment]]></category>
		<category><![CDATA[Secure Element]]></category>
		<category><![CDATA[wallet]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=776</guid>
		<description><![CDATA[Google has launched its Google Wallet service, which uses a secure element in the phone to provide some security. Of course, Java card is in every one of these secure elements, but it is not the point today. I have just stumbled upon the Google Wallet page. Initially, I was looking for information about how [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Google has launched its Google Wallet service, which uses a secure element in the phone to provide some security. Of course, Java card is in every one of these secure elements, but it is not the point today. I have just stumbled upon the <a href="http://www.google.com/wallet/" class="liexternal">Google Wallet page</a>. Initially, I was looking for information about how to load the Google Wallet on my Nexus S during a visit to the U.S. I haven&#8217;t found this information (if you know, I am interested). However, I have found how Google talks about its wallet&#8217;s security.</p>
<p>Here is the sentence that first drew my attention:</p>
<blockquote><p>
<strong>A wallet you can lock</strong>. Stay safe with the Google Wallet PIN and with secure underlying technology.
</p></blockquote>
<p>This started again my love/hate relationship with Google. A wallet you can lock? It&#8217;s just brilliant, far better than anything else I have seen on the same topic. Where do they find these things? Now, let&#8217;s see how the rest fares, from their <a href="http://www.google.com/wallet/how-it-works-security.html" class="liexternal">Security</a> section.</p>
<blockquote><p>Google Wallet stores your encrypted payment card credentials on a computer chip on your phone called the Secure Element.
</p></blockquote>
<p>Sounds good. The Secure Element is explicitly defined as a separate chip. I find it interesting that they feel the need to mention that the credentials are encrypted.</p>
<blockquote><p>Think of the Secure Element as a separate computer, capable of running programs and storing data. The Secure Element is separate from your Android phone&#8217;s memory.
</p></blockquote>
<p>Once again, all of this sounds good. Very nice way to describe a smart card.</p>
<blockquote><p>The chip is designed to only allow trusted programs on the Secure Element itself to access the payment credentials stored therein.
</p></blockquote>
<p>Uh oh! I really recognize my favorite Java Card firewall, isolating applications from each other. But I am a bit disappointed to read that the &#8220;chip&#8221; is designed to support that. Yes, the chip&#8217;s memory can only be accessed from the chip itself; but on the chip, the isolation is software-based.</p>
<p>Next step, the FAQ&#8217;s <a href="http://www.google.com/wallet/faq.html#security-and-privacy" class="liexternal">Security and Privacy</a> section. Among basic questions about lost phones, there are two good questions related to secure elements:</p>
<ul>
<li>What is the Secure Element and how secure is it?</li>
<li>Could a malicious application access my credit card on the Secure Element?</li>
</ul>
<p>You can read the complete answers there. However, here is what should be the most important sentence, since it ends the answers to both questions:</p>
<blockquote><p>
There are multiple levels of protection for data stored on the Secure Element and it is protected at the hardware level from snooping or tampering.
</p></blockquote>
<p>Of course, smart card specialists know about all the terrible attacks hidden behind the &#8220;snooping and tampering&#8221;, and how to protect from them. But the sole mention of data is a bit disappointing.</p>
<p>The answers also mention several times that only the Google Wallet (and other authorized programs) can access the Secure Element, and that this access control is strictly enforced. This is good, and we all like the fact that access control is present.</p>
<p>Now, what&#8217;s missing? You may have guessed it from my &#8220;data only&#8221; disappointment. There is no mention of the fact that the secure element can do more than payment. So, Google, if you are reading this, I will go as far as writing the missing FAQ piece:</p>
<blockquote><p>
<strong>Can I use my Secure Element for protecting other assets?</strong></p>
<p>Your Secure Element is a small but powerful chip, which runs its own applications to manage sensitive data. It can even host several applications, to provide different security-related services. Of course, since the access to the Secure Element is strictly controlled, only authorized developers can write applications for it. We have selected a limited number of partners, who provide applications that rely on the Secure Element to manage their security credentials. These offers include VPN application, secure authentication applications, and much more.
</p></blockquote>
<p>Hoping that it will become useful someday. And if you need more material on Java Card, just let me know.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2011/12/30/googles-vision-of-secure-elements/feed/</wfw:commentRss>
		<slash:comments>5</slash:comments>
		</item>
		<item>
		<title>Mobile Trust, from M-Pesa to Bump</title>
		<link>https://javacard.vetilles.com/2011/01/08/mobile-trust-from-m-pesa-to-bump/</link>
		<comments>https://javacard.vetilles.com/2011/01/08/mobile-trust-from-m-pesa-to-bump/#comments</comments>
		<pubDate>Sat, 08 Jan 2011 22:59:09 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[mobile payment]]></category>
		<category><![CDATA[SIM]]></category>
		<category><![CDATA[trust]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=675</guid>
		<description><![CDATA[Mobile banking in Africa is becoming a well-known example of how technical and business innovation can benefit poor people around the world (on NPR, for isntance). Such systems now existing in other countries, but they are all more or less based on the same technical and business models. On the technical side, these financial applications [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Mobile banking in Africa is becoming a well-known example of how technical and business innovation can benefit poor people around the world (on <a href="http://www.npr.org/2011/01/05/132679772/mobile-money-revolution-aids-kenyas-poor-economy" class="liexternal">NPR</a>, for isntance). Such systems now existing in other countries, but they are all more or less based on the same technical and business models.</p>
<p>On the technical side, these financial applications are all <a href="http://en.wikipedia.org/wiki/SIM_Application_Toolkit" rel="nofollow" class="liwikipedia">SIM Toolkit</a> applications. This means that the applications are actually running on the SIM card, simply delegating the interaction part to the mobile. The interface with the remote servers is usually performed using SMS. Of course, this is a financial system, so the level of security must be sufficient to reduce fraud to a minimum.</p>
<p>Among the features that contribute to the security of the system, we have:</p>
<ul>
<li><strong>Private network</strong>. Mobile networks are private, which makes them  more the information that circulates on them more difficult to attack than the information that flows on Internet.</li>
<li><strong>Application running on the SIM, with some cryptography</strong>. SIM cards aren&#8217;t the most secure smart cards, but getting access to the data stored on a SIM card remains a long and difficult process, even for card evaluators. So, stealing/forging keys is hard.</li>
<li><strong>SIM Toolkit driver buried deep in the phone&#8217;s software</strong>. Since the application logic is on the SIM card, the mobile phone only provides a generic driver that manages the user interaction. This driver is handled by the phone&#8217;s baseband processor, which is usually not the most accessible piece of software. As a result, it is difficult to attack this interaction</li>
</ul>
<p>Don&#8217;t get me wrong; I am not claiming that the system cannot be attacked. I am just claiming that the inherent security properties of SIM Toolkit applications are sufficient to guarantee the security of the small data transfers performed daily in developed countries. Now, if you want to use that system to buy a â‚¬500,000 house, I may want to take a very different stand.</p>
<p>Actually, the main reason for which this reasoning cannot be extended to developed countries is that SIM Toolkit definitely went out of fashion with the advent of smartphones. The STK text-based interface is simply not acceptable on today&#8217;s phones, where we expect fully interactive applications.</p>
<p>That means that our current status is quite different with our smartphone applications:</p>
<ul>
<li><strong>Internet connectivity</strong>. Forget the private network, we are connected directly to the Internet, and that&#8217;s where we want to do our transactions.</li>
<li><strong>Mobile applications</strong>. We get our applications from our local application store, so protecting data (both in storage and in communication) is a bit hard.</li>
<li><strong>Customized interactions</strong>. We like our interactions to be customized for each application. In many cases, the interaction at least partly comes from Internet, and HTML5 is going to make this more common. Here, no need to attack a low-level device driver to get to our stuff.</li>
</ul>
<p>So far, this is fear-inducing rhetoric. You should be afraid, because your applications are not secure. Yet, there aren&#8217;t that many attacks, and mobile transactions are becoming more common on phones. With the announced success of NFC and the announced <a href="http://www.nfctimes.com/news/google-builds-nfc-mobile-wallet-us-banks-interested" class="liexternal">Google wallet</a>, the future is looking bright in 2011. One of the reasons is that secure elements are becoming fashionable again on smartphones. Another one is that Apple, Google, and the others are keeping a rather tight control on our devices, and the users feel safe. Jailbreakers pose a small problem, but this is marginal for transactions (hint: if a payment application gets hacked on your jailbroken phone, &#8220;losing&#8221; the phone and denying the jailbreak sounds like a good option). Overall, I have no problem performing transactions with my phone today.</p>
<p>The really interesting question is: Would I feel just as safe if one of the financial app became as popular as M-Pesa is in Africa? A financial transaction application installed by 50 million users in Europe and the U.S. would sure make a tempting target for hackers around the world, especially with the average balance of our accounts.</p>
<p>In such a case, I would be tempted to say that the various stakeholders would like to have a few additional guarantees. The smart card and security industries have some answers to that: Let&#8217;s perform Common Criteria security certifications on cards to prove their security! Let&#8217;s add a security layer in the phone to enhance its security! Let&#8217;s obfuscate this application to make it more difficult to hack!</p>
<p>All of these things work, and some of them even work well. Each counteremasure makes the cost of attacking the system slightly higher. But all these things provide incremental improvements, and they are definitely not disruptive. Disruption is more likely to come from the outside, from the &#8220;hundreds of start-up companies&#8221; promised by Eric Schmidt around NFC.</p>
<p>An example: <a href="http://bu.mp/" class="liexternal">Bump</a>. It is not about NFC, but it is a mobile security measure that &#8220;makes connecting as simple as bumping two phones into each other&#8221;. It relies on humans to perform most of the security checks, and leverages this on Internet. This is the way to go as our mobile devices become more personal, as they get closer to actually representing us on the Internet; the human being who holds the device will need to participate actively in the security protocols, and not only be entering a code. Disruption will come from those who make the security experience better, not from those who make the mobile experience more secure.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2011/01/08/mobile-trust-from-m-pesa-to-bump/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Schmidt on Android and NFC: A dream come true</title>
		<link>https://javacard.vetilles.com/2010/11/16/schmidt-on-android-and-nfc-a-dream-come-true/</link>
		<comments>https://javacard.vetilles.com/2010/11/16/schmidt-on-android-and-nfc-a-dream-come-true/#comments</comments>
		<pubDate>Tue, 16 Nov 2010 16:13:08 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[mobile payment]]></category>
		<category><![CDATA[NFC]]></category>
		<category><![CDATA[VRM]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=648</guid>
		<description><![CDATA[Yesterday, at the Web 2.0 Summit, Eric Schmidt started his &#8220;discussion&#8221; with Tim O&#8217;Reilly and John Battelle by Android and NFC. And what he said about the technology is like a dream for many NFC stakeholders, who have been waiting for signals from big players. First, the upcoming Nexus S will support NFC. This is [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Yesterday, at the Web 2.0 Summit, Eric Schmidt started his &#8220;<a href="http://www.youtube.com/watch?v=AKOWK2dR4Dg&#038;p=2737D508F656CCF8" class="liexternal">discussion</a>&#8221; with Tim O&#8217;Reilly and John Battelle by Android and NFC. And what he said about the technology is like a dream for many NFC stakeholders, who have been waiting for signals from big players.</p>
<p>First, the upcoming Nexus S will support NFC. This is big, because one of Google&#8217;s objectives (the main one?) with Nexus phones is to provide a reference design for Android devices. And now, NFC is part of that reference design (and of Gingerbread, Android&#8217;s upcoming release).</p>
<p>Then, Eric Schmidt talked about NFC. He started by a tag reading demo; of course, it didn&#8217;t work, because the network was too slow (typical in such environments). He gave a little description, and then switched to contactless payments, even mentioning the use of a secure element. Now, that was nice: Google is not only thinking about reading tags.</p>
<p>Later in his speech, he mentioned how the combination of location-aware, tag reading and mobile payment could change the way commerce works, using terms that would have been largely appreciated at a NFC conference.</p>
<p>To please me even more, he even threw in a mention of voluntarily provided information, which is of course limited by the fact that Google is an unlikely VRM supporter. But yes, if the system is able to integrate that I am actually looking for a new pair of pants, it may provide me with very useful information.</p>
<p>Finally, Eric Schmidt went as far as mentioning security several times, and even saying that &#8220;the technology has to be secure,&#8221; which is nice to hear for many of my colleagues. And his reason is rather simple: there is money involved directly, so security is a must.</p>
<p>One of the best parts of his vision is to remind us that mobile is personal, secure, and an aggregating technology. So when we think about what we can do with NFC or whatever we add to that, we need to figure out what it brings to the big picture, and how the technology can best be used with all the other mobile technologies.</p>
<p>OK. Enough ramblings. Here is an approximative transcript of what he said about Android (a bit raw, so if you have 10 minutes to spare, take a look at <a href="http://www.youtube.com/watch?v=AKOWK2dR4Dg&#038;p=2737D508F656CCF8" class="liexternal">the video</a>):</p>
<p><strong>Q</strong>: <em>There has been a lot of talk about a new operating system aligned with a potential hardware device, coming from Google. We&#8217;d love to see it if that was possible.</em></p>
<p><strong>ES</strong>: OK. How about instead a demonstration of some software.? So, I happen to have here an unannounced product that I carry around with me. That is an Android device, and we have taped over its origin.</p>
<p> You see, this is a placemark [showing a placemark panel, obviously with a tag in it]. The neat thing you could do with this new technology called NFC (which stands for Near Field Communication), and we think that Android should support that. It&#8217;s been around for a while, by the way.What you do is, these are chips that are embedded in things, eventually in clothes to prevent people from stealing. These chips are senders, and we are incorporating support for the reader-writer, so the way it works is you turn this thing on and you basically just tap like that, and it tells you, in the particular case, where you are.</p>
<p>What&#8217;s neat about the NFC chip is that the whole notion of location takes an entirely new meaning, because now I can just tap, I don&#8217;t have to take a picture, I don&#8217;t have to scan a barcode.</p>
<p><strong>Q</strong>: <em>So this is basically gonna be in presumably many of the new Android phones.</em></p>
<p><strong>ES</strong>:  It&#8217;s actually gonna be in the new operating system called Gingerbread that comes out in the next few weeks. So we think that the overall mobile market, which is already extraordinarily excited about these payment systems, will benefit from having those, because it is a secure element, and the secure element really is very hard to steal if you will.</p>
<p><strong>Q</strong>:  <em>So, the secure element allow you basically to do payment.</em></p>
<p><strong>ES</strong>: One way to think about this is that is that it will replace your credit card. The term of the industry is called tap and pay. The theory of the case is that you will be able to take these mobile devices from everybody, to walk into stores, do commerce, you&#8217;ll be able to figure out where you are, again, with your permission, all that kind of stuff.</p>
<p><strong>Q</strong>: <em>Effectively, bump for everything.</em></p>
<p><strong>ES</strong>:  Yes, bump for everything, and eventually, replace credit cards.</p>
<p><strong>Q</strong>: <em>It also turns the phone into a much more powerful form of identification.</em></p>
<p><strong>ES</strong>: It&#8217;s an example of what I have talked about for a while, which is &#8220;mobile first&#8221;. I don&#8217;t think that people understood how much more powerful these mobile devices are going to be than the desktops. You think of the desktop machine as having all this power and tremendous network, beautiful screen, but because these things are so highly personal, and because they are location aware, â€¦</p>
<p><strong>Q</strong>: <em>They also have network</em></p>
<p><strong>ES</strong>: Yes, with LTE networks coming  to the United States, first in the world, for a change, roughly in January-February around the country,  it is a really really god day for mobile.</p>
<p><strong>Q</strong>: <em>With the theme of points of control, it strikes us that one of the points of control is having tons and tons of credit card numbers; Amazon has tons, Paypal has tons, Apple has a lot. Combined with this kind of technology, it strikes me that it could possibly change the game. Do you agree with that, and where does Google stand with that.</em></p>
<p><strong>ES</strong>: Well, we see ourselves as a technology provider in this, we&#8217;re not trying to compete in those spaces, but ultimately this technology is personal, it&#8217;s secure, and it&#8217;s an aggregating technology. So it makes sense that you put everything in it and carry it around. It has to be secure, because it&#8217;s obviously going to be used as money repository.</p>
<p><strong>Q</strong>:  <em>But still, if you are doing payment, somebody is doing the payment processing.</em></p>
<p><strong>ES</strong>: There are industrial partners for all the initiatives in the industry, with very sophisticated payment processors, and regulations, and all </p>
<p><strong>Q</strong>: <em>You expect to be a partner there rather than â€¦</em></p>
<p><strong>ES</strong>: Absolutely. </p>
<p><strong>Q</strong>: <em>But you do have Google checkout.</em> </p>
<p><strong>ES</strong>: Remember, Google checkout is just a piece of this. Payment processors do something different. They actually deal with the merchants, moving the money around, you know with fraud and so forth. The reason why this NFC dhip is so interesting is because the credit card industry thinks that the loss rate is going to be much better, because they are fundamentally more secure. And ultimately, the money that brings us all to this wonderful venue comes out of commerce in one way or another; advertising in Google&#8217;s case. My guessis that there will be 500 new startups in the mobile payment space as these platforms emerge, with all these new and interesting things that we can do.</p>
<p><strong>Q</strong>: <em>What I&#8217;ve been fascinating by is the idea that this is gonna change is shorten the loop between the search and acquisition of a product. Right now, we see this in buying an app: you search for the app and then you buy it on the phone. But this really makes it possible in the real world. You can search for something, and â€¦</em></p>
<p><strong>ES</strong>: But, forget search. Well, I shouldn&#8217;t exactl say that, but that&#8217;s a joke. Imagine I am walking down the street, and instead of typing my search, my phone is giving me information all the time, and it happens to know that I need new pants or something. You can imagine all sorts of linkages between autonomous search, and location-based search, where you are, where your favorite stores are, what your preferences are, again if you opt in to these situations. Its likely to drive a very very large mobile commerce business and mobile e-commerce business.  And the scale of commerce is 14 trillion dollars, which is the global GDP,  so some large amount of money is to be gotten in these new platforms over time.</p>
<p><strong>Q</strong>: <em>And you can really how this could be a fabulous tie with groupon, because it tells you that there is a crowdsourced offer.</em></p>
<p><strong>ES</strong>: Again, if you look at groupon as a very good example of a very very successful local merchant, they today use e-mail as their primary acquisition mechanism, but they have competitors which are using other techniques. What we know is that people like a deal.</p>
<p><strong>Q</strong>: <em>One last question on Android. What are you dissatisfied about with regard to the platform, and what do you think need to be fixed, if anything.</em></p>
<p><strong>ES</strong>:  You score Android against the historically leader in the space, which is the iPhone, and I do this as a proud former board member of the Apple world. There is a set of things that the iPhone really did a brilliant job of bringing out in a closed system. Brilliant design, the app store, the platform and so on. So most people judge Android by how we are doing relative to that. And it&#8217;s clear that from a reach, choice, and so forth, we are in great shape. The next real focus is at the applications layer. So I think that if I want to be critical, I would have liked to put more emphasis on the application side earlier. It&#8217;s hard, because remember, the application decisions are made based on developers, who do it based on volume.  So you have to establish volume first, which is something that I think we have done with Android. And for all of these players at the third-party level, and again I know that we have a lot of developers here in the audience, it&#8217;s fundamentally about the math of the platform.  So we understand platforms very well, we think that Android will be, if not the leading platform, a leading platform.</p>
<p><strong>Q</strong>: <em>That brings up a question that I have been thinking about. As there are more and more applications, it becomes a search problem to figure out which one to choose, and that&#8217;s one of your sweet spots. But you don&#8217;t have some of the same mechanisms  for identifying the best apps. How are you thinking about search as a competitive advantage as the application space grows, where the Android Market is the Google of the app space?</em></p>
<p><strong>ES</strong>: We don&#8217;t think of it as a competitive edge, we just try to do it better, and the competitive environment will win. As a comment, I think people are obsessed with the competitive landscape, where what they should really be focusing on is how much bigger the market is getting. And because it&#8217;s, including the leadership that you guys did with Web 2.0 so many years ago, this is a very large universe, that is getting much larger very quickly, bringing more and more people into it. So the competition is healthy, what&#8217;s really happening is you&#8217;re growing the market. So with respect to the applications and application search, there&#8217;s all sorts of interesting ways of doing that; Admob, for instance, is doing on the order of a billion ad impressions a day now, and that kind of information, in theory, is useful as part of a search problem, because ads have a real value, and we really believe that.  There are many many ways in which the information people are using, usage patterns, can be used to provide better choices. But you&#8217;re correct that these markets tend to overcorrect; They have millions of apps, whatever, but then ultimately, the leaders emerge. </p>
<p><strong>Q</strong>: <em>One of the things that Steve and Apple did right is the about divorce from the carriers, the ability to pretty much say: I don&#8217;t want your stuff on my phone. Do you think that Android is ever going to be truly free of that â€¦</em></p>
<p><strong>ES</strong>: I certainly hope so, in the sense that the Android model is different from the Apple model, very distinctly on pretty much every point. It&#8217;s open system vs. Closed system, and closed systems have their advantages, and open systems have their advantages. Google made a bet on open systems. We are willong to let the vendors, the carriers, and so forth, set their pricing, set their distribution terms, and so forth. I think that &#8216;s the right model. </p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2010/11/16/schmidt-on-android-and-nfc-a-dream-come-true/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Mobile security remains flaky on smartphone apps</title>
		<link>https://javacard.vetilles.com/2010/11/14/mobile-security-remains-flaky-on-smartphone-apps/</link>
		<comments>https://javacard.vetilles.com/2010/11/14/mobile-security-remains-flaky-on-smartphone-apps/#comments</comments>
		<pubDate>Sat, 13 Nov 2010 22:02:03 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[mobile payment]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=645</guid>
		<description><![CDATA[With my colleagues, I have been looking at the security of mobile applications for a few years, and in most cases, I have been amazed at the lack of security in these applications. Most mobile developers simply don&#8217;t seem to care. A security and forensics company has recently looked into mobile applications, and got some [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>With my colleagues, I have been looking at the security of mobile applications for a few years, and in most cases, I have been amazed at the lack of security in these applications. Most mobile developers simply don&#8217;t seem to care.</p>
<p>A security and forensics company has recently <a href="http://viaforensics.com/appwatchdog/" class="liexternal">looked into mobile applications</a>, and got <a href="http://www.wired.com/threatlevel/2010/11/bank-apps-for-phones/" class="liexternal">some</a> <a href="http://online.wsj.com/article/SB10001424052748703805704575594581203248658.html" class="liexternal">coverage</a>.</p>
<p>Theyhave been studying banking and payment applications, from major banks and service like Wells Fargo and Paypal, and they found some flaws. Nothing big so far, as flaws are to be expected. The problem is that finding flaws was quite easy:</p>
<ul>
<li>One of the application stores the username and password in cleartext on the device. Twitter doesn&#8217;t want apps to do that, so one would think that banking apps are more careful than that.</li>
<li>Another one of the appplications opens a SSL connection, but it doesn&#8217;t check the certificate, which makes it vulnerable to man-in-the-middle attacks, for instance on WiFi networks.</li>
</ul>
<p>These flaws have been there forever, and we have identified them from the very beginning of mobile security evaluations. The SSL flaw is particularly common, and I am surprised to see it today, now that even browsers have a tendency to perform checks on certificates.</p>
<p>The only satisfying thing is that the reviewer hasn&#8217;t reported any backdoor into these programs. A few years ago, such back doors were very common, allowing developers to use their applications in &#8220;debug mode&#8221;.</p>
<p>If these backdoors have disappeared, we are moving in the right direction. But still, we are moving slowly.   </p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2010/11/14/mobile-security-remains-flaky-on-smartphone-apps/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Live from JavaOne: Call and Pay with Java</title>
		<link>https://javacard.vetilles.com/2010/09/23/call-and-pay-with-java/</link>
		<comments>https://javacard.vetilles.com/2010/09/23/call-and-pay-with-java/#comments</comments>
		<pubDate>Thu, 23 Sep 2010 00:18:00 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[JavaOne]]></category>
		<category><![CDATA[mobile payment]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=629</guid>
		<description><![CDATA[This talk is about the Mobile Telephony API (JSR-253) and Payment API (JSR 229) that can be added to MIDP/MSA phones. These JSR&#8217;s have been defined by Siemens/BenQ, and there were left in IP limbo after the demise of the company. Apparently, this transition time is over, work has resumed on these JSR&#8217;s, and they [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>This talk is about the Mobile Telephony API (<a href="http://jcp.org/en/jsr/detail?id=253" class="liexternal">JSR-253</a>) and Payment API (<a href="http://jcp.org/en/jsr/detail?id=229" class="liexternal">JSR 229</a>) that can be added to MIDP/MSA phones. These JSR&#8217;s have been defined by Siemens/BenQ, and there were left in IP limbo after the demise of the company. Apparently, this transition time is over, work has resumed on these JSR&#8217;s, and they are being updated through a maintenance release this year.</p>
<p>The idea of the Mobile Telephony API is that we now live in a connected world, and that we want to get applications that would allow us to control the way our device communicates, for instance to setup conference calls within an application.</p>
<p>In standard MSA 1.0, we get the ability to use HTTP(S), or Web Services. We also have the ability to use SATSA to communicate with a SIM card that, in turn, would have SIM Toolkit applications written in Java Card. This is interesting to work on mobile telephony and payment, but how can we do better with dedicated APIs?</p>
<p>The Payment API is a common front-end that is complemented by payment adapters, representing a particular payment method. It is oriented towards micropayment, and the idea is to use a simple API, and to put all the configuration information in the JAD file (that&#8217;s interesting for a security guy, because JAD files are not signed, so there may be some opportunities to get free stuff).</p>
<p>The Mobile Telephony is used to control calls, receive event changes of network state (YES, an application may know when we are roaming!), and a few more things. There is even a package that allows an application to get information about the money that a call costs; this is quite surprising, because this is well known for being very difficult to figure out. Like the payment API, the API is very simple, which looks quite good.</p>
<p>The real problem is mobile support for these optional APIs. We&#8217;ll have to see if support picks up with the maintenance release.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2010/09/23/call-and-pay-with-java/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>What about iCharge?</title>
		<link>https://javacard.vetilles.com/2010/02/16/what-about-icharge/</link>
		<comments>https://javacard.vetilles.com/2010/02/16/what-about-icharge/#comments</comments>
		<pubDate>Tue, 16 Feb 2010 12:13:54 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[mobile payment]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=541</guid>
		<description><![CDATA[Well, it seems that I was wrong on Europe and swiping. A European company is getting ready to launch iCharge, which looks like a clone of Square for many of its features: small card swiper, on-screen signature, location-based, &#8230; They don&#8217;t mention pictures and loyalty, but I guess that it&#8217;s coming next. The questions about [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Well, it seems that I was wrong on Europe and swiping. A European company is getting ready to launch <a href="http://www.icharge.net" class="liexternal">iCharge</a>, which looks like a clone of Square for many of its features: small card swiper, on-screen signature, location-based, &#8230; They don&#8217;t mention pictures and loyalty, but I guess that it&#8217;s coming next.</p>
<p>The questions about security remain, especially on the European market. If the American market is targeted (or any other non-EMV market), than it&#8217;s a fine product, which just has a buzz deficit when compared to Square. Now, if we are talking about Europe, then there is a &#8220;Chip &#038; PIN&#8221; issue. At least in France, for many people who don&#8217;t travel abroad, swiping and signing would at least be an extremely awkward way to pay. And legally, I am not sure that such transactions would be valid.</p>
<p>And also, some European banks (for instance, in France) have (too?) high expectations regarding security, that are unlikely to be met by a bunch of Apple and Android devices that can be jailbroken or hacked. I asked to get the newsletter from these guys, and I&#8217;ll keep you posted.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2010/02/16/what-about-icharge/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Magstripe: 1. Chip: -1</title>
		<link>https://javacard.vetilles.com/2010/02/14/magstripe-1-chip-1/</link>
		<comments>https://javacard.vetilles.com/2010/02/14/magstripe-1-chip-1/#comments</comments>
		<pubDate>Sat, 13 Feb 2010 22:18:50 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[User-centric]]></category>
		<category><![CDATA[mobile payment]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=539</guid>
		<description><![CDATA[Being from the smart card industry, I usually don&#8217;t spend much time looking at things that work better by swiping cards than by using a good old smart card. Then, a few minutes ago, I looked at the promotional video for the Square payment service. Well, it&#8217;s definitely worth watching. The basic idea is to [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Being from the smart card industry, I usually don&#8217;t spend much time looking at things that work better by swiping cards than by using a good old smart card. Then, a few minutes ago, I looked at the <a href="http://www.youtube.com/watch?v=QSzsFAJAKHI&#038;feature=player_embedded" class="liexternal">promotional video</a> for the <a href="https://squareup.com/" class="liexternal">Square</a> payment service. Well, it&#8217;s definitely worth watching.</p>
<p>The basic idea is to allow anybody (with an iPhone, but Android and Blackberry to follow, if we can believe the open positions) to accept a payment using any U.S. credit card. The iPhone application has a few advantages:</p>
<ul>
<li>With a very small attachment, you can swipe the card. Without it, you just need to enter the card data on the phone.</li>
<li>The customer signs on the iPhone, with a finger.</li>
<li>If the customer is a Square member, the vendor gets a picture for the authentication.</li>
<li>They even do automatic loyalty by mentioning the fact that a customer is a return customer.</li>
</ul>
<p>Easy payments for individuals is just great. It allows me to <em>accept</em> payments from anybody with a payment card, and that&#8217;s really new. It makes NFC and mobile payment look sooo 20th century; who really wants another way to pay?</p>
<p>In the meantime, the smart card payment guys read <a href="http://www.lightbluetouchpaper.org/2010/02/11/chip-and-pin-is-broken/" class="liexternal">the latest Ross Anderson paper</a>.</p>
<p>A few thoughts about Square after the jump.<br />
<span id="more-539"></span><br />
First, some good news: if you are in the USA; it is quite likely that Square will eventually work with your contactless card. It may even become the default interface if iPhone&#8217;s and other devices, if NFC becomes widely available. Why? Simply because in the USA, contactless cards simply emulate the magstripe, so the application can work in almost the same way: swipe and sign. The only difference is here the swiping gesture.</p>
<p>In Europe and elsewhere, things won&#8217;t be that easy, because we use the more complex EMV transactions, also known as &#8220;Chip &#038; PIN&#8221; in some countries. I am not sure that Square can&#8217;t be done with EMV, but here are a few factors that will make it more difficult:</p>
<ul>
<li>Keys on payment terminals. In EMV, terminals perform cryptographic computations, which means that they need to store keys. Of course, such keys could be managed on the SIM card, but this is not obvious.</li>
<li>PIN entry. In EMV, a PIN is entered on the terminal, and actually, a lot of the terminal&#8217;s security requirements are related to the fact that the terminal is a PED (PIN Entry Device). And well, an iPhone is far from being an <a href="https://www.pcisecuritystandards.org/security_standards/ped/index.shtml" class="liexternal">acceptable</a> PIN entry device.</li>
</ul>
<p>Of course, there are security issues around Square, not all equal:</p>
<ul>
<li>When signing up, one need to provide the iPhone&#8217;s unique identifier. If this thing is used for security purposes, it gets me worried that somebody may use a jailbroken iPhone to mount attacks.</li>
<li>If somebody uses a fake application, they may get an image of my magstripe <em>and</em> my signature. Well, anybody in a restaurant can do the same thing, so I guess that the risk is limited.</li>
<li>What if somebody pays me with a fake card? Who is liable for that? This is insurance matter, but it becomes one of my concerns if a become a &#8220;merchant&#8221;, and Square&#8217;s service agreement does not promise much.</li>
</ul>
<p>Finally, I may be wrong, but from the information I have, I think that we (in France) will have to wait quite a while before being able to use Square in our country. Hopefully, we will find a workaround, and we will be able to get a similar application, because this is just something that I would love to use.</p>
<p>What about Ross? Well, I&#8217;ll get back to that soon, after discussing it around.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2010/02/14/magstripe-1-chip-1/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Nokia Money</title>
		<link>https://javacard.vetilles.com/2009/08/26/nokia-money/</link>
		<comments>https://javacard.vetilles.com/2009/08/26/nokia-money/#comments</comments>
		<pubDate>Wed, 26 Aug 2009 20:38:21 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[mobile payment]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=415</guid>
		<description><![CDATA[When I am at work, I get this feeling that mobile payment always uses NFC. Nokia supports NFC, but they are not going to wait a few more years for this technology to be widely available. So, here comes Nokia Money, a mobile payment service that works with the Obopay platform (a company in which [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>When I am at work, I get this feeling that mobile payment always uses NFC. Nokia supports NFC, but they are not going to wait a few more years for this technology to be widely available. So, here comes <a href="http://www.nokia.com/press/press-releases/showpressrelease?newsid=1337248" class="liexternal">Nokia Money</a>, a mobile payment service that works with the <a href="https://www.obopay.com/consumer/Welcome.do" class="liexternal">Obopay</a> platform (a company in which Nokia recently invested a significant amount of money).</p>
<p>To make things short, the service works by opening an account, putting money on it, and then sending SMS&#8217;s to Obopay containing the phone number of whoever you want to send money to and an amount. Easy, huh? Of course, there is a catch: you can send money to people who don&#8217;t have an Obopay account, but they will need to open one to get the money.</p>
<p>Obopay offers other interesting services in the U.S., like the ability to obtain a prepaid MasterCard that makes it easy to spend the money on your account, as well as family accounts, which can be associated to several cards (one for each kid), which can be loaded as needed by the parents.</p>
<p>Doesn&#8217;t it sound too good?<br />
<span id="more-415"></span></p>
<p>Something I don&#8217;t like about this solution (and many others) is that it forces me to have a specific account, which contains some money. I don&#8217;t like the fact that we all need an Obopay account, a Paypal account, and many more in which our money just sits.</p>
<p>On the other hand, I like the simplicity of the solution, which could become a great way to exchange money with friends. And of course, the advantage of having a dedicated account containing a limited amount of money is evident in terms of security, as it limits the amount of a possible theft.</p>
<p>Nokia seems to primarily target countries with a limited banking infrastructure, focusing on people who have a mobile phone but no bank account. This also sounds very good, as this is a huge market, in which Nokia remains a dominant actor (Apple may cause them trouble in the smartphone business, but Nokia still reigns on low-cost phones). And anyway, some guy in the PR states that the service will be available &#8220;on virtually any mobile phone&#8221;, including non-Nokia phones. In parallel, Nokia is building a network of Nokia Money agents that will be used to deposit/withdraw cash from a Nokia Money account.</p>
<p>I would have loved to talk about the solution&#8217;s security, but I don&#8217;t have enough information to state anything interesting. I would just like to know how payment orders are confirmed, because sending a SMS from a phone is rather simple for any application.</p>
<p>Finally, I am wondering how this will be integrated with applications. If all it takes is sending a SMS, then triggering a payment may be extremely simple. Wouldn&#8217;t you love adding a little &#8220;Pay with Nokia Money&#8221; icon on your next iPhone application?</p>
<p>I guess that we will all need to watch for this at next week&#8217;s <a href="http://events.nokia.com/nokiaworld/" class="liexternal">Nokia World</a> event.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2009/08/26/nokia-money/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
	</channel>
</rss>
