40 Million Credit Cards — I.

Editor’s Note

The image may be downloaded in higher resolutions:

↓ Transcript
A closed door has a sign that says: DO NOT DISTURB.

Voice from door: We'll choose between point-of-sale models A and B.

Voice from door: At stake: security of 40 million credit cards. Maybe up to 110 million.

The next panel shows a number of people sitting at a circular table. In order from left to right, they are: man 1, man 2, woman 1, man 3, and woman 2.

Man 1: Model A uses open source. We can look inside and examine it for security issues.

Woman 2: So can the hackers?

Man 1: Excellent point. Sadly, yes.

The conversation continues across several panels.

Man 1: A boots into cryptographically-signed point-of-sale software. It allows no external programs.

Woman 1: How do we run an antivirus program?

Man 1: We can't.

Woman 1: Unacceptable.

Man 1: The other alternative is Model B. It uses tightly closed software. Nobody can look inside it. Not even us.

Man 2: Good. No hacker will ever figure out how to make a virus for Model B.

Man 1: There are several antivirus products on the market for Model B. That guarantees ironclad security.

Man 2: Great!

Woman 2: Excellent!

The next and final panel shows only man 1.

Model B lets us run any program on it. We could do web browsing. Maybe even document editing.

Off-panel voice: Very convenient.

Off-panel voice: Perfect!

Off-panel voice: We have a winner!

Title: 40 Million Credit Cards -- I.