← All talks

Breaking the Payment Points of Interaction (POI) - Nir Valtman, Patrick Watson

BSides Las Vegas49:06353 viewsPublished 2016-08Watch on YouTube ↗
About this talk
Breaking the Payment Points of Interaction (POI) - Nir Valtman, Patrick Watson Breaking Ground BSidesLV 2016 - Tuscany Hotel - Aug 02, 2016
Show transcript [en]

to breaking ground before we get started I just want to do a shout out to our sponsors really quick thanks to the folks at Vera sprite tenable amazon protiviti and source of knowledge for putting helping us put all this on for the the couple days i do want to introduce our speakers today we have near and patrick both from the NCR corporation nears the head of application security at NCR and Patricks a application security architect with NCR and they'll be talking to us today about breaking the payment points of interaction so gentlemen over to you thank you welcome everybody I know it's a tough hour after lunch but I can assure you that we're going to make it

really interesting for you because today we're talking about breaking payment points of interaction and the main thing that we're going to do is break few things that you think they may be secure so we have a bunch of demos will still credit cards in Lavin amar environment here so we really hope that that you're enjoying so we'd like to make a quick introduction the main challenge that we have with this introduction is that we want to talk a lot of our about ourselves but we can do that we have really limited time so we made an XML file that explains who we are I don't know if you'll be able to read it but we

just shorten it for you so as I mentioned like my name is near and I'm heading the application security my motto is if you think that security is expensive just try to ignore it spoke at several conferences and I'm an open source contributor non Patrick Watson I'm application security architect with NCR and I am a first time speaker so hooray for b-sides and hooray for me so thank you thank you very much you're a gracious audience and I've contributed to a few open source projects openssl C or C URL but not that much mostly proprietary closed source stuff you know business things I'm sort of the engineer the software developer guy so I like to

brag about that a little bit I develop a bit better than year but let's move on see what we're going to be talking about our research so part of our jobs at NCR is not only to make sure that our software is secure but to make sure that the software in the ecosystem is secure so we take a look at other peoples software and the devices running it stores or banks or wherever as well part of that is sometimes we have to actually disable some of the security alter our code so that we can figure out if our stuff is protecting everybody or if it's the protection built into say pin pads so that's sort of what we did in this

case and lo and behold a whole bunch of stuff came out that we really didn't want to know about but now we do so we kind of have to deal with it now let's talk about the industry a little bit NCR serves a bunch of stuff but you don't really care about that it's we've got different aspects of the payment ecosystem and they all do kind of the same things but you've got retail doing it one way hospitality that's us hotels restaurants that sort of place in petroleum convenience stores all doing things slightly different now a couple years ago you may have heard of a few very high-profile breaches in the retail industry almost everybody in the US was

affected in one way or another and because of that retail has started paying a lot more attention to security now what would you guys say if I told you that the problems of security and retail was were solved that people had figured it out and we're good now we can we can go home right and well no not really that that just doesn't know okay so we have some background about the industries and one why we came here but before you get the information about how to hack some stuff I think that you should understand the architecture that we're trying to break so there are several architecture types that that I want to cover especially three that if

you go to any retail store or you know hospitality businesses you'll probably see the same architecture with minor changes so the first architecture is something called the segregated store architecture it's essentially an architecture that that you have the point of sales in the store you have a store server and you have the pin pads so the pin pads the managed pin pads are the ones that can connect to point of sales using Ethernet cable or just serial cables in this specific architecture you may have firewalls in the store which is great and you have your pin pads in some cases you have the pin pads segregated to specific villain in the store or a specific villain for

the whole chain whatever it is this is one attack vector the other architectures that we're exploring is the all-in-one solution are all in one store architecture which means that you have the pin pad as I mentioned can be connected using serial cables so when you see the malware attacks on pin pads or on point of sales in most cases you see it in this architecture meeting if you have any memory scraper that tries to get the credit card number from the memory that's pretty much the architecture because you have the credit card number that is received from the serial port so this is one thing about this architecture doesn't think that's worth mentioning is that when you have these memories

scrapers on this point of sale eventually you will figure this out you will see that you have a malware there the reason for that is because there is a weak hardware on most point of sales and member scraping just take CPU so you will eventually see that so when you scan an item you won't hear the BIP immediately after that you'll just probably hear it a little bit that I'm you know a little bit after that and the last architecture that I want to cover is fuel stations when is the last time that you saw any fuel station getting hacked well probably didn't hear a lot of it so with kill station architecture it's even less secure than what you know

or what you here now with fuel architecture you actually have the fuel pump which has a pin pad and the fuel pump is connected to a kind of a layer 2 adapter the lurch adapter gets kind of a 2 cables connected to it it's a proprietary protocol and the layer 2 adapter which in most cases nothing is authenticated to that then it speaks with a payment application so that's pretty much was the architecture but let's talk for a moment about the payment flow because that's what we're going to exploit in this talk so a typical payment flow let's say that we're getting into a store and you're starting to scan the items you scan the

items and eventually you need to check out so the cashier press on the pay on the pay button the pay button eventually brings you to the payment application the payment application as I mentioned can be a dll it can be a server that gets this request and and eventually the payment application controls the pimp at the point of interaction it says the point of interaction what to do and what to get from the consumer so the first thing that the pain application will ask will be the credit card data which may be track 12 data for those no what track 12 means that's the the data that is reading on the magnetic stripe of your card it can be that or it

V tags in case using a chip and pin technology so once you get it if you're using a chip and pin technology or generally you need to enter a pin then again the pointer the payment location request from the point of interaction to get a pin receives it back and in online scenarios it will just submit the request to the to the host in order to process the payment in other cases if the host is not available it will just for that transaction in most cases in encrypted manner in the payment application eventually the transaction ends when you get the authorization code and you're checking out so let's start talking about the interesting stuff because now I just thought that you know

after lunch that's a good time to give you the background you can get asleep now that's the time to get awake so with the authentication to point of interactions the first thing that I want to show you is the layer 2 adapter somehow we managed to get a photo of it believe me we have access to some stuff and and this is an l2 adapter and cable called a current loop so eventually if you're able to tap that you will be able to see all requests in clear text and do pretty much whatever you want including sending your own requests to the l2 adapter because there is no authentication error having said that there is a compensating control because

these cables are just under concrete in the field stations so you won't be able to see these adapters unless someone just made a bug a small mistake in the design so our scenario is focuses mainly on something that called shrimp software the main idea is to men in the middle between the payment application and the point of interaction we don't care about the point of sale we don't care how much secure the point of sale is all we care about is how to tap the connection between these two components so by tapping the the connection with these components we can do it by you know why shark with tcp/ip we can do it with serial port monitor

like we can just check what's going on back and forth and obviously we can just use it as a binary so when I mentioned binary it's not a malware binary means that you take the payment application dll make your own changes to this dll and just replace it so essentially it's not a malware and it will not be identified anywhere it will not affect the performance because no one reads the damn memory no one cares about it we just care about getting the credit card number from the same dll that handles that handles it so take it away pan yes so the first thing we're going to tell you about is just sort of what we've got

up here because you guys can't see it you know especially those of you in the back we've got my laptop this is running a point-of-sale simulator in one of our payment applications the like I mentioned early or that payment application has been modified so some of its own proprietary security stuff is disabled that we we concentrate on the security of the pin pad pause simulator is just something we use internally too so that we don't have to lug a giant point-of-sale round got a switch we've got a raspberry pi 3 here which is running our attack code the man in the middle part the raspberry pi 3 frankly is a little bit of overkill for this but

it's fun to have hardware so you know apparently having a little bit of technical difficulty with the display that will be fine finally we've got a pin pad here the law it is we've got 80 what we call a shroud of secrecy over the pin pad because we didn't want to specifically call out this vendor there's a lot of pin pad vendors out there a lot of different models and this isn't a vulnerability in a single pin pad it's sort of a problem in the way the system works so now let's go to the demo and I believe with this one we're just swiping a card and seeing if we can see the track data see what that looks

like while Patrick does it it's important to mention that we're running a production image on this pin pad so it's not what we disabled some functionality on the pin pad itself it just that's the way it works in production when you pay yeah you could probably go and find this in a real store somewhere today they probably would have prettied up the graphics on the pin pad screen a little bit but that's the only difference so let's start a transaction this time let's just put a deli item on there and if you note it says please swipe your card so I'm going to go ahead and do what's called a swipe ahead transaction a little tricky

to get the card in there with the privacy screen in place so swipe ahead is where you swipe the card before the transaction is complete the reason I'm doing that this time is because when you're doing a swipe ahead transaction you can actually easily see track 1 and 2 both of them versus with this an EMV enabled pin pad when you complete the transaction it goes into EMV mode and then you can really only see track 2 i'll show you a little bit about that later but in the slot

let's just do a sale it's a live demo so you'll need to understand that said this looks like in real data here this is the EMV screen I was talking about earlier

there we go all right so now it's swiped and if you look over there at the Raspberry Pi we've captured the entire track data it's complete out the sale things there we go and near if you could bring up wireshark for me so it's adjust this here where's the thingy well we need to enlarge it again ah alright so here you can see that the pin pad makes a request of the man metal manda middle requests to the pause simulator so it's passing the data through so let's scroll over here to the right and here is that same track data in plain text that you saw up here on the Raspberry Pi so from the track data

perspective pretty darn easy to capture this stuff ok that was easy except the swiping stuff yeah the thing is that you saw in our case that it's not encrypted in fact in most cases it's not encrypted the reason for that or at least in you know in network communications is first of all the point of sales running legacy operating system sometimes windows XP and sometimes the pin pads are pretty old but that's not an excuse this is just affect one time I remember that we requested you know to enable TLS one or two on one of the pin pads and they said like why we can give us sl3 is that good enough so that's the business

justification eventually you know we want them to secure it but eventually hackers have also their own justifications so that was talking about Ethernet man-in-the-middle a passive men and mel which you know everybody knows how to capture packets and wash our coo whoopty-doo right so you might think to yourself well what about those pin pads connected via serial ports they're probably a little more secure right because it's not an ethernet cable you can't intercept those things right well no not really and because it's a pain to carry around a bunch of pin pads and you definitely can't switch them in the middle of a presentation we've got a video here capturing us wiping the data while it's connected via serial port

this is some software from Ultima software called serial port monitor that's very useful for this sort of thing and you might not be able to see it on the screen there so we've got another slide here that's blown up in if you recognize it this would have been the exact same packet that you saw if we had done the swipe of a head however you get the same stuff when you do the EMV transaction as well point is you can see track one up there starting with the B and track to further down so not only can you capture serial port data and if serial port monitor can do it malware or replace dll can do it too so that was

swiping how many of you are really swiping today let's talk about EMV that's probably secure okay it's a good one so let's talk about what EMV does first Andy does prevent a duplication of the card because it has the chip on the card so this is one thing the other thing is in case you want to use a stolen card it prevents you to use it when you use the chip and pin like you don't know the pin so you shouldn't be able to using it that's all let's talk about what he does not do let's say that someone stole my track data from the card so first of all or let's say even someone stole my card that's it first of

all he can use this card on pin pads that they are not Chip and PIN enabled so if one if someone steals my chip and pin card he can use it in other places on e-commerce on like no old pin pads or even in manual card entry how many times it happens to you that you scan the card and you just can't read it well you just happen here but but eventually that that's a real scenario the other scenario is actually the fact that you can take the track to data from the pin pad and you will need to change only one number in this track in order to make it non capable or swipe card the

thing is that when you swipe the card that the pin pad knows to identify if it's a chip and pin card it's not it reads the card it's not with the chip it just sees the number that says this is one moment this is the type of the card and the last thing is even if you steal the car door still the track data you can come with a card with an image of a chip or a broken trip it doesn't matter when you come to the cashier and you try to stick your chip and pin card to the pin pad and you know sometimes it just doesn't work so the cashier can manually fall back to swipe that's the idea so

envy it's quite old standard should we be able to bypass it if it's like really old standard probably so we have three men in the middle scenarios in this talk the first man the middle scenario is kind of a passive men in the middle the passive men in the middle is relatedly simple the main idea is to get the EMV data and see if we can see the track data and actually create a credit card from EMV transaction so the main idea is first of all inject your men in the middle stuff it can be you know the dll or just intercepting the communication so we have the adversary on the left side and we have the rest as we already

had in the regular payment process so the main idea is that you're doing you're selling activity is obviously finished then you ask from the paint application to pay the payment application will get a credit card number request the credit card number from the pink pad which eventually will go to the adversary and from there to the to the pin pad and then once the consumers sticks the data sticks the card we will actually be able to see the full track data demo in a moment once we see the data you can continue with the whole process including getting the chip and you finish so I think that the best thing to show you is just hand it over

to Patrick yeah so near if you would please set up the camera for us so we're like near said we're going to run a regular EMV transaction this time just to see if we can capture the EMV data and see what it looks like so let's start a transaction put a deli item on here just because we like delis start a sale it should prompt for us to insert our card got a standard UL test card here insert it into the slot it's going to prompt me to accept the transaction amount and if you look over there near it should have the track data on the Raspberry Pi at this point you can take a photo of it but you can't use it it's

a test it's a test card ok so I don't know that all of you taking photos of it it won't work yeah and that explanation took long enough that the pin pad timed out now now so that you guys can get a good view of this let's start that over again in the transaction start it back up daily item sale give it a matte insert accept the transaction amount now type in our pin which is for 315 by the way never tell anybody your PIN but since it's a test card that's okay press ENTER and I must have mistyped it it to love them five there we go typed it right that time so approved remove the card and the

transaction should process there we go alright so now near if you please could you switch the next slide for us

alright so just so that we don't have to go through Wireshark every time and find the package and all that we pre captured this for you this is what the EMV response packet looks like to the request to get track data essentially so you can see some stuff over there on the right and I'm just going to tell you that where it says American Express that's called a a ID that's the application identifier which type of card it is below that it says e IPS blah blah blah that's the cardholder name in this case because it's a test card it's kind of weird-looking now does anybody in here see track data in there near does because I made a deck yeah so we

know where it is good we've got one person yep now anybody else nope not yet so in most payment applications it often is transferred via a ski so you actually see a ski card numbers like you know the standard 1 2 3 4 blah blah blah but EMV actually sticks it over in kind of a weird format where they take the actual text representation can change the binary bites into that representation so it shows up that way in when you're looking at looking at it in hex now that means that we've got the whole track they're available for us from an EMP transaction now if you look down here at the bottom of the screen you can see

that we've got it in a couple different colors the red is obviously the card number the purple next to it the 1903 is the expiration date then in kind of a orange that doesn't display all that great is 201 now get to that what that is in a second and then a whole bunch of discretionary data that depends on what type of card it is that 201 is called a service code in the two is a very very important part of that code because that is what lets you know if it's a swipe card or a chip card so when you just swipe it that too tells the pin pad this is a chip card

don't allow the swipe so in the tax scenarios near was talking about earlier if you're offline and not being verified by a host you can switch that to two a-one and your PIN pad all except the transaction so that's great you know we found a way to get the credit card data great but we're still meeting we're still missing some data we still want to get more data to be able purchasing online for instance so when you purchase online why do you really need to enter exactly exactly so cvv2 is exactly what you need to enter the cb2 is you know it's something that came with water one of the brands but basically it's the

three or four-digit number that you have in the back of your card or with MX you have the four digits in front of it card that allows you to perform card-not-present transactions meaning online transactions and and we want to check if we will be able to get the cvv2 here with this flow so we found a way surprising let's talk about the active man the middle attacks so the first act amend the middle attack is the one that compromises the cvv data we have the same flow again doing the payments asking for the cardholder data the EMV tags are sent back to the adversary which we already know that we can get the data from there and then the the

most important part here is to understand the timing so we adversary gets the EMV tags back the diverse re will not send the EMV tags back to the payment application until he gets more data because eventually we want to make sure that we successfully finish the transaction from that reason the adversary sends another API call to the pin pad the API call will just request the cvv data that it's it's a built-in functionality within the pin pads so we don't need to exploit anything we just need to have additional API call it's nothing essentially we're not exploiting anything we're just playing with the flows so let's take a look let's take a look at it cameraman

if you will so once near gets that set up we'll go ahead and start the transaction but while he sets it up an important thing to know about cvv2 and the equivalents from other merchant or a card brands is in theory the cvv helps protect online transactions because it's never encoded anywhere in the actual data on like the mag stripe or the chip so that's why it's on the back of the car so let's start a transaction let's put two deli items on there this time well if it will feel daring start the sale should prompt for entry there goes insert the chip card and at this point we've already got the track data over

there in the raspberry pi now we'll accept the transaction amount it'll prompt me for my pin for 315 and hopefully I typed it correctly looks like I did and look at this a new prompter that wasn't there before and this is since this is test card it doesn't actually have a real cvv2 so I'm just going to make one up anybody got a suggestion need three or four one two three four type that in processes for a minute the Raspberry Pi picks it up and the pin pad approves payment application is none the wiser

okay so that was good enough to get online payments anyone needs a yacht something but the thing is that we want to get more information what happened if we could get the pin well we can that's the idea so in this flow we're actually doing pretty much the same thing but in this case we won't stop in the in the EMV tags so let's assume that we finish together the EMV tags now the payment application requests for a pin which by the way we avoided in the previous flow but we had it in the demo so you request a pin or the payment application requests the pin then cryptid pin from the point of interaction the point of

interaction responds with a pin to the adversary and then that versuri does it again before responding with the encrypted pin to the payment application it actually requests a numeric screen the numeric screen will eventually asked to reenter the pin when it will request to reenter the pin it will be our screen something that we injected into this process and then we'll get the pin so let's get few pins yep and for times sake I'm going to go ahead and start the transaction couple items on here and once near gets the camera ready so we've got the couple items on the screen click sale so it'll prompt for the card entry if i can find the slot there it is

now we've got the track data on the Raspberry Pi except the transaction amount now here's the real pin entry screen like you've been seeing before 4315 push enter and here's a new screen this one's kind of important though now if I was at a place I'd know hey this I I shouldn't be prompted for this but it's a PIN pad what if you're all security professionals maybe you'll catch it maybe you won't but check out the Raspberry Pi it's got the pin number now and Joe from the farm down the street not to impinge on farmers but a layman isn't going to know the pin pad shouldn't be doing this and in our informal testing even in the payments

industry ninety percent of the people weren't even suspicious of it they just entered their pin anyway the ones that were suspicious still thought well maybe i mistyped it's kind of weird that security guys are having me do this demo and whatever and they typed it in any way

did it hurt the question yes I prefer to keep the questions to the end because we have few more things to cover okay and quickly running out of time yes we'll get together so let's say that we've got the pin and we've got the cvv these were great demos but in fact you know several poonam poonam interaction manufacturers they actually put some security measures in these pen is in these pin pads so one of the security measures is do not allow any text except the text that I allowed in the Islam placed guess what this long list includes please reenter so when you have the screen of enter pin and then you and then you request to reenter it

refers to the pin it's not re-enter your address address which is quite difficult to enter the address there so that's pretty much what we're exploiting so let's say that we bypass the whitelist and and succeeded with that that's great but in some cases we can't bypass the whitelist because the whitelist is so strict so that's it we ended up with it not exactly several manufacturers actually allow you to inject a form or a screen to the software the reason for that is because as Patrick mentioned in the beginning of the talk in the reach in the hospitality and petroleum petroleum and convenience stores they have their own flows and the pimpette manufacturers cannot come up with all of

the flows in retail it's pretty more pretty much standard but that's what we're we can do because it's just something available so in order to bypass the white layer we can actually put a photo with please enter pin that's it and obviously at the control to get a card number so I guess that in order to for us to believe us we did it too so so Patrick will demonstrate in a moment one thing that's worth mentioning is that several manufacturers actually have protection against it they request or require a sign forum that designed by the vendor or by the by themselves so let's see how it works so normally when a attacker is injecting forms like this it would

happen pretty quick so we're going to actually slow down a little bit so you can see what's happening as smart attacker would also do this part like at midnight or whenever some time where the stores not actually open however with some pin pad models it is possible to do it mid transaction although it'd be kind of crazy so I'm about to inject a form into the pin pad you should see a downloading screen and it'll pause there click OK give it a second there it goes now if you saw the progress bar go across there really really fast once it reached the end that's when a normal pin pad would have went right back to the

welcome screen this obviously is paused here so you can see it but this is what would have flashed almost instantaneously in a real attack now let's go back and start a transaction start transaction let's put a deli item in a grocery item this time click sale Oh prompts for card entry

except the amount as usual we've got the track date over there enter the pin 2 or 3 15 and now we've got our own custom screen now obviously nobody's really going to enter their pin in this screen but the point is so that you know that it's a form from us a screen from us it's not a dick come from the pin pad vendor will say that but in all 10 if it comes from the vendor well I don't know if I want my face on every transaction out there but to each their own so remove the card take a look at the pie we've got the pin again and there we go

now thank you thank you so we've talked about a bunch of stuff here but what other attack vectors are there and I'm going to breeze through this because we're short on time a little bit you've probably heard about skimmers before there's still problem we get reports about them happening all the time some of them are incredibly clever too like I wouldn't be able to identify them myself if they were sitting right here in front of me point is those are kind of a known thing next is remember this diagram from before we've got the pin pad over there too now and we've only really been taking a look at one application on that pin pad but remember like most Internet

of Things type devices this is really a computer it's running all kinds of code on there there's an OS there's a secure reading and entry device that's kind of like a TPM and a whole bunch of other applications for example what if there's a buffer overflow in the forum loading app it's accepting input for just from just so anybody there so maybe there are other places we can look for attacks as well so I'll review quickly the mitigations that may be taken by the vendors or like point of attraction vendors mainly so the idea is to have a point upon encryption the point encryption should be hardware based and with the pimpette vendors they have few options to encrypt

the data in the hard way they can use it like in regular memory or they can put it in a separate memory which is a secure memory the new vent the new pin pads the majority of them at least support the srad functionality which means separate components some separate hardware component that no sensitive data goes out from there the thing is that this pin pad also supports the same functionality we just didn't enable it to do the ass red stuff important to mention that the peanut vendors they invest a lot in crypto like it's essentially a crypto product it's a hardware crypto product and and the idea is to use strong enough algorithms so even though you see here Triple DES

which you may think why the hell do you have Triple DES on a pin pad well actually it's a triple test duck but it means that for every transaction you have your different key that you encrypt with the transaction itself next thing is obviously preventing remote ferment downgrades like let's say that we have a harder encryption on the pin pad we just want to prevent downgrading it to a software encryption like we had this time if there is a whitelist in some cases you can add your own whitelisted components in this case you'll probably need to have your trusted root authority that at least accept it on a PIN pad and in some cases you also have exceptions

of credit card numbers so everything is encrypted except specific bean ranges it's a common thing for loyalty memberships and last but not least is including crypt offline transactions as I mentioned in the first place in most cases if you won't be able to get out to the host to the processing host you'll need to encrypt the data at rest so let's say that the pointer attraction doesn't support it we don't have point encryption doesn't mean that we screwed probably not you can request from the vendors to try to tell asset or at least SSL it with your certificates or just sign all requests to the point of interaction in several cases you will be surprised that they can do that for you

and as for the consumers well except paying with cash I think you can actually do a few things one of them is do not re-enter pin like ever okay you saw what we can do check what the forms prompt to you in general because sometimes they may request also Security numbers and it's something that is acceptable by you know by these pin pads and the last thing is try to use alternative methods to pay like you know a base payments I'm paying with my watch in that case someone can prompt me to reenter my pin or to get my CDV data well theoretically they may be able to do that but it's just worth additional

research we're just keeping some stuff to the next year of besides so in summary it's relatedly easy to exploit point of interactions just because of the regular flow that we have there and we can secure the point of interactions it's just a matter of knowing what to ask from the vendors and that's the time for I don't think we have enough question enough time for questions but we can at least address with fellow or we actually have time for maybe one or two questions so so first talking to the guy that mentioned earlier about CBB to remember when you're doing an EMV transaction if your cards in the slot and you pull the card out it'll cancel

the transaction I think that's what he's probably referring to because you need to look at the back of the card for the CBB to but because this is an active man in the middle and it can prompt whatever at once it can do it whenever at once so it can prompt for that before you actually swipe your card the average consumer may not even realize that it's not supposed to be happening so there you go hold on hold on hi new chunk was on tonight begin new service I want to ask when you mentioned about the prompting cvv data you may you said that it sends an AP call and this is built-in functionality is this particularly for

the cvv or were you talking about inserting the screen in general because if it's about cpv why why is this functionality there doesn't settle go ahead it's actually kind of both so the question was when we were asking for cvv2 and we said that was a built-in API car call where we talking about the prompt itself or specific place cvv2 so what's actually going on there as we use a screen or for more input method whatever you want to call it called get numeric and that it allows you to provide a set of texts to prompt with so we can just ask for basically whatever we want there is customizable yes what near had mentioned at park in part of

the talk was there is in some pin pads a white list of allowable prompts inner cvv2 is one of those allowed prompts in some cases you just need to to perform a card not present transaction so it's just one of the acceptable flows across the industry okay one more question one more question

thank u verse thank you very much for the demos awesome if the bank issuer of the card and our choir and terminal implement full MV 0 this demos yo just so short are protected this is full EMV all of them for indeed this is fully MV yes yes okay okay thank you thank you all right round of applause please thank you