Feeds

Twitter founder signs up to iPhone mag-stripe reader

Square gives other card readers the finger

3 Big data security analytics techniques

Jack Dorsey, co-founder of Twitter, has launched a mag-stripe reader for the iPhone, proving you don't need a good idea to garner VC dollars.

Dorsey's "Square" service comprises a magnetic strip reader balanced precariously on the bottom of an iPod Touch, or iPhone, along with an application which processes the transaction and e-mails a receipt. It's no wonder that VC's have already handed over $10m in cash and can't wait to give him more.

Square reader on an iPod Touch

No way that's going to come loose or snap off, it looks secure to me

Setting aside the fragility of the design - which draws power from the swipe and connects via the audio jack - and the legality of a signature scrawled using a finger, Square does allow the customer to receive an e-mailed confirmation if they're prepared to stop and type in their e-mail address during the transaction.

Those who choose to register with the service can also upload a photograph which is displayed on the iPhone's screen, but photographs on cards have been tried before with limited success. A particularly famous UK trial culminated with one trialist replacing their photograph with that of a gorilla, without raising an eyebrow when it was used.

So setting aside the fluff, we have a credit-card-processing application on the iPhone, similar to the half-dozen already in the app store. Only this time, it comes with a plastic lump that reads the card number by taking advantage of a feature banks have been trying to phase out for a decade or two.

But this is the man who helped found Twitter, a company with a billion-dollar valuation despite having no revenue stream at all: where do we sign up, and do we have to use a finger to do it? ®

Top three mobile application threats

More from The Register

next story
Virgin Media so, so SORRY for turning spam fire-hose on its punters
Hundreds of emails flood inboxes thanks to gaffe
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
AT&T threatens to pull out of FCC wireless auctions over purchase limits
Company wants ability to buy more spectrum space in auction
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
Facebook splats in-app chat, whacks brats into crack yakety-yak app
Jibber-jabbering addicts turfed out just as Zuck warned
Google looks to LTE and Wi-Fi to help it lube YouTube tubes
Bandwidth hogger needs tube embiggenment if it's to succeed
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.