View Single Post
Old 06-23-2011, 04:58 PM   #277
ATimson
Evangelist
ATimson ought to be getting tired of karma fortunes by now.ATimson ought to be getting tired of karma fortunes by now.ATimson ought to be getting tired of karma fortunes by now.ATimson ought to be getting tired of karma fortunes by now.ATimson ought to be getting tired of karma fortunes by now.ATimson ought to be getting tired of karma fortunes by now.ATimson ought to be getting tired of karma fortunes by now.ATimson ought to be getting tired of karma fortunes by now.ATimson ought to be getting tired of karma fortunes by now.ATimson ought to be getting tired of karma fortunes by now.ATimson ought to be getting tired of karma fortunes by now.
 
ATimson's Avatar
 
Posts: 456
Karma: 1044878
Join Date: Apr 2009
Device: Kindle Paperwhite 4
Quote:
Originally Posted by anamardoll View Post
From what I've read online, I was under the impression that B&N had been pretty responsible with the CC# storage. Since they also use the name on the card, they wouldn't even need to use the full card number, they could use the last 4 digits, for instance.
They use the last 8 digits, actually - and they're stored hashed.

So yes, you could theoretically brute-force the encryption and discover name/last 8 digits of the CC #. That would take forever and still not give you enough info to do damage, however.
ATimson is offline   Reply With Quote