aboutsummaryrefslogtreecommitdiff
path: root/articles
diff options
context:
space:
mode:
authorChristian Grothoff <christian@grothoff.org>2016-08-23 11:14:26 +0200
committerChristian Grothoff <christian@grothoff.org>2016-08-23 11:14:26 +0200
commit0cf49c93b8e3805f3fe69b18e930a07846b12b84 (patch)
treeda51fe71c17c7004c0fb3c88e612cc1375947351 /articles
parent1c7aeaf3b7fd7c07fde534559ed59afc0e0aaae4 (diff)
downloadwallet-core-0cf49c93b8e3805f3fe69b18e930a07846b12b84.tar.xz
improve abstract/intro
Diffstat (limited to 'articles')
-rw-r--r--articles/ui/ui.tex77
1 files changed, 41 insertions, 36 deletions
diff --git a/articles/ui/ui.tex b/articles/ui/ui.tex
index 7e6cdb5ed..18f7e8341 100644
--- a/articles/ui/ui.tex
+++ b/articles/ui/ui.tex
@@ -101,29 +101,27 @@ Marcello Stanisci}
\begin{abstract}
GNU Taler is a new electronic online payment system which provides
privacy for customers and accountability for merchants. It uses an
-exchange service to issue digital coins, and is thus not subject to
-the performance issues that plague Byzantine fault-tolerant
-consensus-based solutions.
-
-We first describe the interaction processes of various existing online
-payment systems, and analytically compare the processes involved for
-both customers and merchants. The focus here is in particular on how
-to make electronic payments work nicely with the current Web
-architecture.
-
-We then focus on the key advantages the Taler payment system offers,
-in particular in the context of Web payments. Web payment systems
-must face the reality of constraints imposed by modern Web browser
-security architecture, so the analysis includes considerations of how
-Taler exploits the security infrastructure provided by the modern Web.
-Here, we include in particular the perspective of merchants, as
-existing systems have often struggled with securing payment information
-at the merchant's side.
-
-Finally, we discuss possible failure modes, highlighting how the
-various payments systems can fail in practice. We argue that the
-Taler payment system offers a good combination of accountability,
-privacy, security and usability.
+exchange service to issue digital coins using blind signatures,
+and is thus not subject to the performance issues that plague
+Byzantine fault-tolerant consensus-based solutions.
+
+The focus of this paper is addressing the challenges payment systems
+face in the context of the Web. We discuss how to address
+Web-specific challenges, such as handling bookmarks and sharing of
+links, as well as supporting users that have disabled JavaScript. Web
+payment systems must also navigate various constraints imposed by
+modern Web browser security architecture, such as same-origin policies
+and the separation between browser extensions and Web pages. While
+our analysis focuses on how Taler operates within the security
+infrastructure provided by the modern Web, the results partially
+generalize to other payment systems.
+
+We also include the perspective of merchants, as existing systems have
+often struggled with securing payment information at the merchant's
+side. Here, challenges include avoiding database transactions for
+customers that do not actually go through with the purchase, as well
+as cleanly separating security-critical functions of the payment
+system from the rest of the Web service.
\end{abstract}
\section{Introduction}
@@ -158,7 +156,7 @@ The focus of this paper is GNU Taler, a new free software payment
system designed to meet certain key ethical considerations from a
social liberalism perspective. In Taler, the paying customer remains
anonymous while the merchant is easily identified and thus taxable.
-Here, anonymous simply means that the payment system does not require
+Here, {\em anonymous} simply means that the payment process does not require
any personal information from the customer, and that different
transactions by the same customer are unlinkable. Naturally, the
specifics of the transaction---such as delivery of goods to a shipping
@@ -172,15 +170,22 @@ digital coins, and a new {\em refresh} protocol~\cite{talercrypto} to
allow giving change and refunds while maintaining unlinkability.
This paper will not consider the details of Taler's cryptographic
-protocols\footnote{Details of the protocol are documented at
-\url{https://api.taler.net/}} % But not the crypto details
-and instead focuses on how a modern payment system using
-blind signatures could practically be integrated with the modern Web.
-This includes the challenge of hiding the cryptography from the users.
-We also illustrate how existing {\em mental models} users have from
-existing widespread payment systems apply naturally to Taler.
-
-\newpage
+protocols.\footnote{Details of the protocol are documented at
+ \url{https://api.taler.net/}} The basic cryptography behind
+blind-signature based payment systems has been known for over 25
+years~\cite{chaum1990untraceable}. However, only in 2015 the W3c
+started the payments working group~\cite{pigs} to explore requirements
+for deploying payment systems that are more secure and easy to use for
+the Web. Our work describes how a modern payment system using blind
+signatures could practically be integrated with the modern Web to
+improve usability, security and privacy. This includes the challenge
+of hiding the cryptography from the users, integrating with modern
+browsers, integrating with Web shops, providing proper cryptographic
+proofs for all operations, and handling network failures. We explain
+our design using terms from existing {\em mental models} users have
+from widespread payment systems.
+
+%\newpage
Key contributions of this paper are:
\begin{itemize}
\item A description of different payment systems using
@@ -194,7 +199,7 @@ Key contributions of this paper are:
Web payments and the intricacies of securing payments
within the constraints of modern browsers.
\item A publicly available free software
- reference implementation of the proposed architecture.
+ reference implementation of the presented architecture.
\end{itemize}
@@ -246,7 +251,7 @@ to the amount of cash that they carry or accept at a given
time~\cite{Bankrate}. Additionally, customers are advised to choose
the ATMs they use carefully, as malicious ATMs may attempt to {\em
steal} their customer's credentials. Authentication with an ATM can
-involve a special ATM card, or, more commonly, the use of credit or
+involve a special ATM card, or the use of credit or
debit cards. In all these cases, these physical security tokens are
issued by the customer's bank.
@@ -306,7 +311,7 @@ line for liabilities, there are still risks customers incur from the
card dispute procedures, such as neither them nor the payment
processor noticing fraudulent transactions, or them noticing
fraudulent transactions past the {\em deadline} until which their bank
-would refund them. The customer also typically only has a
+would reimburse them. The customer also typically only has a
merchant-generated comment and the amount paid in his credit card
statement as a proof for the transaction. Thus, the use of credit
cards online does not generate any cryptographically {\em verifiable}