
But security...
I look forward to the part where the Gremlin setup gets compromised and hackers DoS all the things using a nice shiny API for convenience...
3 publicly visible posts • joined 8 Jul 2019
Not thick at all - the short answer is "complex maths", a longer answer is here in an academic paper:
https://www.google.com/url?sa=t&source=web&rct=j&url=https://cubs.buffalo.edu/images/pdf/pub/symmetric-hash-functions-for-secure-fingerprint-biometric-systems.pdf&ved=2ahUKEwjD4N-0xYTkAhVIRhUIHTFaCaAQFjADegQICRAB&usg=AOvVaw00GCvzl7MsmpbO1DKIm7MJ&cshid=1565861732946
"there is no evidence of any of their data being extracted from the server."
is not the same as
"No data was extracted from the server"
The former could simply be the the result of terrible logging and monitoring, even if plenty of data was extracted.
Then again, if no card details have been used fraudulently, that's a good sign.