Should Apple Credit Card Feature be Trusted

P { margin-bottom: 0.08in; }

the photo scandal in which prominent Hollywood stars such as Jennifer
Lawrence private pictures were stolen by hackers and uploaded on the
internet, Apple is hell bent on doing the marketing that is primarily
focus on damage control. Tim Cook Apple’s CEO wrote:

P { margin-bottom: 0.08in; }

and privacy are fundamental to the design of all our hardware,
software, and services, including iCloud and new services like Apple
Pay. And we continue to make improvements. Two-step verification,
which we encourage all our customers to use, in addition to
protecting your Apple ID account information, now also protects all
of the data you store and keep up to date with iCloud

want to be absolutely clear that we have never worked with any
government agency from any country to create a backdoor in any of our
products or services. We have also never allowed access to our
servers. And we never will.”

P { margin-bottom: 0.08in; }

we look at the statement Tim have highlighted two things. First he is
advocating about improvement and security of the new service ‘Apple
Pay’. We do need to keep in mind here that Apple’s current breach
is still under investigation and until the causes of the breach are
determined Tim’s claim cannot be taken seriously.

he is telling his loyal customers that Apple never share any
information nor have any secret contracts with the government. But in
the past Apple has cooperated with government investigations by
turning over individual users’ data. We know that Edward Snowden’s
leaks revealed in June 2013 that many tech companies assist
government investigations by turning over suspects’ data. Good for
Apple’s CEO that he realized this after one year and coming clean
on this.



Apple Pay includes near-field communication technology or NFC, which
allows for the transfer of small amounts of data between two devices
held closely to one another. The payment will be done by giving your
biometric finger signature, the database of which is obviously stored
on remote servers. Apple did not go into any detail describing the
security measures of Apple Pay. 

Pay is no doubt a big threat for conventional payment systems, but
regular users of iphone cannot just blindly put trust on this system.
The wise thing therefor for them if they are not tech savvy is not to
adopt the technologies such as Apple Pay and others of similar type
for some time. Therefore wise thing for regular users who are not
tech savvy is to observe how the new entrant is performing.

Image Credit

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

How to Become an Expert in Ethical Hacking

This article is mainly addressing the audience who wants to pursue their career in Cybersecurity as a professional that provides ethical hacking services, whether...

5 Cybersecurity Tips to Keep in Mind When Working From Home

  Due to the ongoing global health crisis, more and more people are being forced to work from their homes. In fact, Forbes estimates that about...

The Complete OSINT Tutorial to Find Personal Information About Anyone

This article mainly focuses on how to discover a person's digital footprint and gather personal data by using open-source intelligence (OSINT). So, in its...

How to find the password of hacked email addresses using OSINT

Open-source intelligence or OSINT is a potent technique, and it can give a lot of valuable information, if implemented correctly with the right strategy...