When credit card tokens are leaked / stolen, what can the attacker do with them?
I’m implementing an online payment system relying on an external payment processor handling all credit card entry. We only see and store card tokens (not the actual card numbers), which we then use to charge another month’s w… Continue reading When credit card tokens are leaked / stolen, what can the attacker do with them?