←back to thread

693 points hienyimba | 2 comments | | HN request time: 0.698s | source
Show context
edwinwee ◴[] No.28523676[source]
Edwin from Stripe here. (OP, I've just sent you an email and we can talk more over there—I'm terribly sorry for the trouble.) I can't get into too many specifics about an individual business publicly, but unauthorized charges have high potential to be disputed in the near future—and while Stripe itself doesn't have a dispute threshold, the card networks require businesses to keep disputes low.

Although that email in the post was admittedly a template, a human did review the transaction activity and actively sent the email. We're digging more into exactly what happened here to prevent the confusion from happening again. Over the past few weeks, we've been overhauling how we work with businesses in situations like these and are rolling out some meaningful improvements soon.

replies(5): >>28523708 #>>28523811 #>>28523985 #>>28528152 #>>28528827 #
ddtaylor ◴[] No.28523708[source]
So, if I want to disrupt a competitor all I have to do is hire a bunch of darknet identify thieves and you'll shut down their merchant account?
replies(4): >>28523802 #>>28523989 #>>28527061 #>>28527154 #
gilrain ◴[] No.28523802[source]
Yes, if you’re willing to break the law and risk the consequences, you can get up to all sorts of stuff. Same as anything?

Like, “So, if I want to disrupt a competitor, all I have to do is hire thugs to smash all their stuff?”

Yeah, that’d do it. Good luck.

replies(3): >>28523918 #>>28523936 #>>28524053 #
1. MichaelApproved ◴[] No.28523936[source]
I think the point is that this attack vector can be pretty anonymous and absolutely deadly to the target company.

This attack is also not protected by insurance, like someone setting fire to your office would be.

It’s fair to explore just how vulnerable a company can be to this type of attack from a malicious competitor.

replies(1): >>28525929 #
2. BoorishBears ◴[] No.28525929[source]
It's a weak point.

You can also pull API keys from most apps and get them banned from advertising networks.

You can hire people to review bomb.

Hire people to make fake news about a competitor go viral.

Someone willing to do illegal things can always hire other people to do illegal things for them "anonymously"