this post was submitted on 17 Feb 2022
1 points (100.0% liked)

Privacy

33499 readers
288 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
 

When you buy something online, you obviously need to give your card details, which are tied to you. Virtual cards solve that, but, in the UK (and I think most places) you also need to provide a billing address. I don't think virtual card providers give you a masked billing address and I doubt you will be able to use a PO box with most banks to try and prevent fraud. Because of this, can online purchases still be linked to you even with virtual cards?

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 0 points 3 years ago (1 children)

VCs are just there to protect the CC companies. They don't care about your data. Even the term identity theft is a scam. It's not your identity you protect, but their money. The way to protect your identity and information is not to give it out in the first place.

[–] [email protected] 1 points 3 years ago

" I write ‘identity theft’ in quotes as it’s a propaganda term for the old-fashioned offence of impersonation. In the old days, if someone went to a bank, pretended to be me, borrowed money from them and vanished, then that was the bank’s problem, not mine. In the USA and the UK, banks have recently taken to claiming that it’s my identity that’s been stolen rather than their money, and that this somehow makes me liable. So I also parenthesise ‘victims’ — the banks are the real victims, except in sofar as they commit secondary fraud against the customer. There’s an excellent discussion of this by Adam Shostack and Paul Syverson. "

Security Engineering by Ross Anderson