The Many Layers of the SEC’s First NFT Enforcement Action

xxx

With that in mind, it’s important to revisit first principles on selling crypto-critters in the United States. One thing which I see a lot of, all the time, is when developers start out with something that is unregulated and gradually mission-creep their way into something regulated.
Preston Byrne, a CoinDesk columnist, is a partner of Brown Rudnick’s Digital Commerce Group.

From: The Many Layers of the SEC’s First NFT Enforcement Action.

xxx

Riding the crest of the tokenisation wave – The Banker

xxx

Luke Brereton, head of client engagement and strategy at investment company State Street Digital, says tokenisation is attracting significant interest and activity with a majority of its asset manager clients. “In short, this technology can help funds, and the industry, achieve two goals: improved efficiency and enhanced asset utility — with the former providing increased margins and the latter driving capital inflow for funds.”

The added value of tokenising an asset, explains Kevin de Patoul, CEO and co-founder at digital assets market-maker Keyrock, is that you are able to automate a lot of steps in the value chain of exchanging that asset. “The main savings are going to be around the post-trade value chain in terms of clearing, settlement and potential new custody asset servicing. You can automate lots of those steps, and some of them you can eliminate entirely. Also, you potentially get enriched information about the asset and its movement and ownership.”

From: Riding the crest of the tokenisation wave – The Banker.

xxx

NYC subway security hole lets people use card info to track journeys

xxx

The issue, reported by 404 Media, stems from a feature on the Metropolitan Transportation Authority’s (MTA’s) OMNY website, which allows users to see their seven day ride history.

To see this information, riders do not need to have an account with a PIN or password. Instead, they simply enter their card details.

The feature works for normal card payments as well as Apple Pay and Google Pay, despite the latter two giving merchants a tokenised number.

From NYC subway security hole lets people use card info to track journeys.

xxx

PSD3 and PSR: sharing data on fraudulent payment transactions | DLA Piper

xxx

The PSD3 and PSR proposal modernize the second Payment Services Directive (PSD2) and will in addition thereto incorporate the regulatory framework for e-money institutions. Consequently, the E-money Directive (EMD2) will be withdrawn upon adoption of the PSD3. PSR, once adopted, will be directly applicable in all EU member states and is aimed at harmonizing the ongoing requirements in relation to the provision of payment services across all member states.

From: PSD3 and PSR: sharing data on fraudulent payment transactions | DLA Piper.

xxx

Social Media Decline: Ending for Twitter, Facebook, Instagram, TikTok

xxx

At the core of Bruening’s frustration was a sea change that had swept across Instagram: Instead of everyday photos from regular people, the platform had become a curated platform where even seemingly authentic content was meticulously planned.

From: Social Media Decline: Ending for Twitter, Facebook, Instagram, TikTok.

xxx

Synthetic ID fraud – a growing threat to the insurance industry – Insurance Post

xxx

Ghost brokers, posing as legitimate brokers on social media, further complicate the landscape, peddling fraudulent insurance using fake policy documents.

LexisNexis Risk Solutions’ recent research highlights the issue’s magnitude: 34% of Irish insurance customers were lured by cheap social media insurance adverts, with 16% of young adults falling victim to such schemes.

From: Synthetic ID fraud – a growing threat to the insurance industry – Insurance Post.

xxx

Analysis of EU Digital Identity Architecture and Reference Framework | Avast

xxx

It is interesting to see that the PID (Person Identification Data) is seen as separate to other credentials (Electronic Attestations of Attributes). This seems like an additional complexity that is unnecessary, unless the document is just differentiating from the perspective of usage rather than the underlying technology.

From: Analysis of EU Digital Identity Architecture and Reference Framework | Avast.

xxx

New ‘Pay The Apple Way’ Campaign Shows Apple Pay Is Secure, Private, And Accessible

xxx

Speaking of the Wallet app, it’s also true the digitization of credit cards, identification cards, insurance cards, keys, and more means virtual wallets have accessibility benefits all their own over physical wallets.

From: New ‘Pay The Apple Way’ Campaign Shows Apple Pay Is Secure, Private, And Accessible.

xxx

Design a site like this with WordPress.com
Get started