- May 22, 2016
- 349
This article describes the complete process in detail .
I never realized quite how many steps were involved in processing a single transaction .
To my thinking , more steps means more potential vulnerability , and yet it all seems to work OK ,
.... in most cases
I thought it was a good read .
I never realized quite how many steps were involved in processing a single transaction .
To my thinking , more steps means more potential vulnerability , and yet it all seems to work OK ,
.... in most cases
I thought it was a good read .