Chris Swan's Weblog
  • About
  • Commenting
  • Speaking
  • Podcasts
  • Dart

« The end of the bus tour
Review – Thule 9705 BoltOn bike carrier »

3D (in)Secure

24Aug10

It’s not news that the 3D Secure system that gets branded as ‘Verified by Visa’ is a steaming pile of something that should be scraped off shoes rather than presented on screens. Ben Laurie was the first serious voice of dissent (that I noticed), but then along came Ross Anderson and Steven Murdoch to ensure that we were left in no doubt – how online card security fails [paper].

There is however an insidious problem that none of these worthy security researchers seem to have noticed, which is that the system doesn’t deal with additional cards.

It’s common practice for couples to have joint bank accounts, but there’s not really such a thing as a joint credit card. With credit cards there’s an individual card hold, and there can be additional cards. My wife has a number of these additional cards that she considers to be joint, but they aren’t (even if they’re paid from our joint account) – I’m the cardholder. This is where 3D Secure breaks down (again), as purchases made with additional cards (e.g. my wife) lead to a request for authentication by the cardholder (i.e. me). If I’m not there to type in my password then she can’t buy stuff online, which is kind of inconvenient.

Of course I’m sure that many couples just share their 3D Secure password, this is after all what the banks tell them to do, sadly it’s also directly in contravention of the terms and conditions:

FAQ ‘Only the primary cardholder can enrol with xxx Secure. All other additional cardholders on the same account should use the same login and password as established by the primary cardholder.’

Ts&Cs – ‘You are responsible for keeping your password and username secret. You must not write down, store (whether encrypted or otherwise) on your computer or mobile phone handset or let anyone else know your password or username, and the fact that they are for use with this service.’

I’m sure that the banks don’t care much about this obvious conflict. As Ross and Steven point out the whole purpose of the scheme is to pass liability to the customer, and of course that customer becomes more liable the moment that they break the Ts&Cs (even if the FAQ tells them to).

Clearly whoever contrived the system (as it would be foolish to say that it was designed) forgot to have a conversation with a business analyst about additional cardholders.

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on X (Opens in new window) X
Like Loading...

Related


Filed under: could_do_better, security   |  2 Comments
Tags: 3D Secure, additional cardholder, cardholder not present, CNP, credit, credit card, joint account, liability, payments, phishing, security, Verified by Visa

2 Responses to “3D (in)Secure”

Feed for this Entry Trackback Address
  1. Chris Swan's avatar 1 Chris Swan on November 16, 2010 said:

    Another perspective here – Verified by Visa and Mastercard SecureCode are broken and need to be fixed

    Reply

  1. 1 Google Wallet – even worse than PayPal pt. 2 | Chris Swan's Weblog
« The end of the bus tour
Review – Thule 9705 BoltOn bike carrier »

Leave a comment Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.


  • Subscribe

     Default feed link

     Subscribe in a reader

  • Search

  • Top Posts

    • GL.iNet MT-6000 Flint2 Review
    • E*TRADE Backup Withholding Tax
    • Fixing flow on Aqualisa Midas Plus shower mixer
    • SOCKS Proxy SSH Tunnels on OpenWRT
    • ValidScript - a modest proposal for app security
    • Multiple single pages in Hugo
    • USB C Charger Reviews
    • Directories 2.0 - entitlements services
    • Monitising the freetards pt.1
    • 3 MiFi mini review redux
  • Recent Posts

    • Milo cancer diary part 21 – CHOP #4
    • November 2025
    • Clocking on at the Outrage Factory
    • Checking that Docker image manifests are complete
    • Don’t huff the fumes
  • Recent Comments

    Chris Swan's avatarChris Swan on Milo cancer diary part 20…
    Chris Swan's avatarChris Swan on Milo cancer diary part 20…
    Chris Swan's avatarChris Swan on USB C Charger Reviews
    Peter's avatarPeter on USB C Charger Reviews
    Unknown's avatar“Yes, ma’am” – being… on July 2025
  • RSS Pinboard.in bookmarks

    • Keeping Up with the Commodore: A Hands-On Review of the Commodore 64 Ultimate
    • Design Thinking! Comic: Mickey Mouse demands outrage.
    • Replace Your GitHub Actions YAML with CUE
    • Why Agentic AI Can't Be Secured: The Pattern Matching Problem
    • LLMs and the semantic revolution
    • Social media companies to be held liable for financial scams under new EU rules
    • Stop Hacklore!
    • Dex Hunter-Torricke: What comes next - Navigating the Kaleidoscopic futures of AI and Security
    • AI Underpants Gnomes: The Missing Step in Your Strategy
    • Networking Is the Hydra of Kubernetes
  • Blogroll

    • 451 CAOS Theory
    • Adam Bosworth’s Weblog
    • Andrew McAfee
    • Behavioural Investing
    • CapitalSCF
    • Carpe Visum
    • causticTech
    • Charles Stross
    • confused of calcutta
    • Cory Doctorow
    • Craig Murray
    • Dan Creswell’s Weblog
    • Dark Reading
    • Dilbert Blog
    • DJW
    • Doc Searls
    • Don Box’s Spoutlet
    • Dopplr
    • Eben Moglen
    • Enhyper
    • Financial Cryptography
    • Fred Destin
    • Freedom to Tinker
    • Graham Glass, etc.
    • Greg Matter
    • Hugh Grant
    • Internet Alchemy
    • Invisible Things
    • James Strachan’s Weblog
    • John Merrells
    • Jon Udel
    • Justice League
    • Kim Cameron
    • Lambda the Ultimate – Programming Languages Weblog
    • Light Blue Touchpaper
    • Loosely Coupled weblog
    • Luke Hutteman’s Weblog
    • Marc Andreeson
    • Nick Selby
    • ongoing
    • Otaku, Cedric’s weblog
    • Park Paradigm
    • Paul Graham
    • Phil Becker
    • Pi4Tech
    • PJKtech
    • Radovan Janecek: Nothing Impersonal
    • rants
    • Richard Monson-Haefel
    • SAAS
    • Schneier on Security
    • Service Oriented Enterprise
    • Simon Phipps’s Blog
    • techno.blog(“Dion”)
    • The BileBlog
    • THE GRID BLOG
    • Tim Oren’s Due Diligence
    • timbl’s blog
    • virtualization.info
    • WebMink
    • WebServices.org
    • XKCD
  • Categories



Blog at WordPress.com.
  • Comment
  • Reblog
  • Subscribe Subscribed
    • Chris Swan's Weblog
    • Join 299 other subscribers
    • Already have a WordPress.com account? Log in now.
    • Chris Swan's Weblog
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Copy shortlink
    • Report this content
    • View post in Reader
    • Manage subscriptions
    • Collapse this bar
%d