krrose27's comments

krrose27 | 6 years ago | on: Chase did a bad thing, so we did a good thing

With a better understanding of how VGS works I really just fall back to my weakest link in the chain questions:

Does Lob hold any PCI level certifications? It appears they hold HIPAA but I see no mention of PCI?

Does Lob provide any interface that shows sent mail and the content (it appears they do)? If so and they don't hold any PCI certifications what benefit do we really have with ever getting a VGS token?

What stops you from scraping this data from Lob's API?

---

Original comment below.

I'm confused on how this data lands at Lob with an account number if you never get it.

Correct me if I'm wrong but the letter you send includes the account number and not the VGS token?

All of my following questions assumes an affirmative answer.

How is the account number landed in Lob? It appears something must be calling the Lob API with an unencrypted account number? What is making that call?

Does Lob hold any PCI level certifications? It appears they hold HIPAA but I see no mention of PCI?

Does Lob provide any interface that shows sent mail and the content? If so and they don't hold any PCI certifications what benefit do we really have with ever getting a VGS token?

krrose27 | 11 years ago | on: Amazon Echo

Since you mention fresh:

https://fresh.amazon.com/dash/

It still requires a jump to the pc to order; but no reason they couldn't add a way to initiate an order from it. It's also a tad less privacy intrusive then echo.

krrose27 | 13 years ago | on: Rackspace accused of patent infringement for hosting Github

krrose27 | 14 years ago | on: Java IAQ

The thing is String.length() doesn't do any re-computation. All it does is return a variable defined in the String object that is modified when the string it contains changes.

See my other comment saying you should ignore any speed suggestions by the article.

krrose27 | 14 years ago | on: Java IAQ

Goes directly to "What other operations are surprisingly slow?" and attempts to write micro benchmark with the same results.

Fails....

Most of the general stuff is accurate and dandy but I don't believe you should listen to many (most likely any) of the speed related statements as this article appears to have been written in 1998.

Topic should be "Java IAQ circa 1998".

krrose27 | 14 years ago | on: Caller ID Made Simple

I definitely find it interesting.

As somehow it pulls up my (not) apparently unlisted home phone; also, it pulls up family members names for cellphones which are under my name on the contract.

So I am definitely interested in finding out where this data is being taken from?

krrose27 | 14 years ago | on: How my comment on TechCrunch got me a Facebook Cease and Desist

Originally posted on your blog.

A sworn affidavit should work in a courtroom. (Not a lawyer!)

So at this point I would send a nicely worded certified letter telling them to stop harassing you.

At that point they have limited options (in my opinion). 1) Sue you because they can prove you own it in court. (At which point a simple affidavit should end your part in said suit). 2) File a John Doe suit and actually find out who runs it.

Best option would of course be to obtain a lawyer and head it off sooner than later. Also once you have yourself a lawyer you won't have to deal with their lawyers at all as they should be bared from contacting anyone but your lawyer.

page 1