❕NEWS – Abra crypto banking application has added more crypto on its trading platform | Proxies-free

As per Yahoo Finance, traders can now trade and exchange the following cryptos on Abra’s trading platform:
Chainlink, Compound, Algorand, Tezos, Steem, CELO, Hedera Hashgraph, WAXP, and BitShares for worldwide traders; and
VeChain, Ontology, Crypto.com Chain, Crypto.com, TNC Coin, ICON, Zilliqa, Loopring, and Bancor will not be available to trade for US residents but available for everyone else. This move comes after continuing positive sentiments in the crypto market showing that crypto is getting more mainstream than ever.

mobile application – User experience / interaction design for elderly people using banking apps

Firstly you need to define ‘older people’: 80 year olds will behave differently from 40 year olds.

Eyesight starts to decline during the 40s decade: so you’ll get 48 year olds complaining about the text being too small.

( people who haven’t been lifelong glasses wearers tend to put off wearing glasses as their eyesight gets worse, they’ll blame the interface rather than give in to glasses !)

So 40 somethings are ‘older people’.

java – Programming challenge – report fraudulent banking activity times out

How can I optimise this code
there is time out error

Program Challenge:

HackerLand National Bank has a simple policy for warning clients about possible fraudulent account activity. If the amount spent by a client on a particular day is greater than or equal to the client’s median spending for a trailing number of days, they send the client a notification about potential fraud. The bank doesn’t send the client any notifications until they have at least that trailing number of prior days’ transaction data.
Given the number of trailing days and a client’s total daily expenditures for a period of days, find and print the number of times the client will receive a notification over all days.

For example,
and . On the first three days, they just collect spending data. At day , we have trailing expenditures of . The median is and the day’s expenditure is . Because , there will be a notice. The next day, our trailing expenditures are and the expenditures are . This is less than so no notice will be sent. Over the period, there was one notice sent.

Note: The median of a list of numbers can be found by arranging all the numbers from smallest to greatest. If there is an odd number of numbers, the middle one is picked. If there is an even number of numbers, median is then defined to be the average of the two middle values. (Wikipedia)

Function Description

Complete the function activityNotifications in the editor below. It must return an integer representing the number of client notifications.

activityNotifications has the following parameter(s):

expenditure: an array of integers representing daily expenditures
d: an integer, the lookback days for median spending

Input Format

The first line contains two space-separated integers and, the number of days of transaction data, and the number of trailing days’ data used to calculate median spending.
The second line contains space-separated non-negative integers where each integer denotes.

Constraints

Output Format
Print an integer denoting the total number of times the client receives a notification over a period of days.

Sample Input 0

9 5
2 3 4 2 3 6 8 4 5

Sample Output 0

2

HackerRank fraudulent activity.

public static int() CountSort(int ()arr,int si,int ei) {
      
      
     int ()count=new int(201);
      int result()=new int(ei-si);
      for(int i=si;i<ei;i++) {
          count(arr(i))++;
      }
      for(int i=1;i<count.length;i++) {
          count(i)+=count(i-1);
      }
      for(int i=ei-1;i>=si;i--) {
          result(--count(arr(i)))=arr(i);
      }

      return result;
  }
 // Complete the activityNotifications function below.
 static int activityNotifications(int() expenditure, int d) {
     int notice=0;
     for(int i=0;i<=expenditure.length-d;i++) {
         int arr()=new int(d);
         double median=0;
         arr=CountSort(expenditure,i,i+d);
         if(d%2==0) {
             int mid1=(d)/2;
             int mid2=(d)/2 +1;
             median=(arr(mid1)+arr(mid2))/2;
         }else {
             int mid=(d)/2;
             median=arr(mid);
         }
         if(i+d<expenditure.length&&expenditure(i+d)>=2*median) {
             notice++;
         }
    }
     return notice;
 }

cash – Trying CashApp to add funds and purchase Bitcoin immediately but not working, Have done all banking requirements, IS THERE ALTERNATIVE

Details: I was successful in entering in my bank information on Cash App however, keeps saying transfer failed even in the process of adding cash into the app from my bank, so I can use that to buy bitcoin immediately, And of cash app will not let me buy bitcoin using my debit card and there is always a routing number always showing that I did not enter(I assume that is Cash App routing for my new(just started it 6-12-2020)cash app account? The app doesn’t say which place it is pulling from except for the 1st time..

**I am wondering what the common causes are..could 1 be you must be connected to wi-fi, if so why since I do other transactions this way without connecting to wi-fi

**If CashApp is just too much trouble, WHAT IS ANOTHER APP TO INSTANTLY UPLOAD YOUR BANK INFO AND BUY BITCOIN not a 7-10 day thing__?…Does CoinBase now do immediate purchase?

Are liberals banking on the the Coronavirus for Trump to lose?

100 thousand dead – 40 million unemployed.

Believe me — The majority is sick of the dense morbidly obese clown punk!

It’s not a matter of ‘banking’ on something.  He’s a S*H*I*T leader.  He failed to handle the pandemic. Totally failed as he’s failed his entire life. 

The image below says it all…

Trump’s response to one of his tweets getting flagged for inciting violence was a thousand times faster than his response to a deadly pandemic. 

The country knows.  He F*U*C*K*ED up!  Period. 

Go suck on his butt and shut up!  You’re a cult follower.  Nobody expects reasoning from you. Nobody will bother trying to talk sense into you either.  Waste of time. 

You will always be in love with the racist – that’s who you are. 

Multithreading – Banking application – Optimization of the Java multithreading code

I created a simple banking application to do multiple transactions between multiple accounts. It works as expected. But I want to know if I can tweak the code.

public class BankingApplication {
    public static void main(String() args) throws  Exception{
        ExecutorService service = Executors.newFixedThreadPool(100);
        Bank bankObj = new Bank();
        for(int i =0; i <= 10000; i++){
            service.submit(bankObj);
        }
        service.shutdown();
        service.awaitTermination(1, TimeUnit.DAYS);
        bankObj.getTotalBalanceWithStats();
    }
}
class Account{
    String accountName;
    int balance;
    Object lock1 = new Object();
    Object lock2 = new Object();
    Object lock3 = new Object();
    Account(String name, int balance){
        this.accountName = name;
        this.balance = balance;
    }
    void deposit(int amount){
        synchronized (lock1) {
            this.balance = getBalance() + amount;
        }
    }
    void withdraw(int amount) throws Exception {
        synchronized (lock2) {
            int balance = getBalance() - amount;
            if(balance <= 0){
                throw new Exception("Invalid Transaction");
            }
            this.balance = getBalance() - amount;
        }
    }
    int getBalance(){
        synchronized (lock3){
            return this.balance;
        }
    }
}
class Bank implements Runnable{

    List accountList = new ArrayList<>();
    Bank(){
        for(int i=0; i <= 30; i++){
            accountList.add(new Account("A"+i, 1000));
        }
        getTotalBalanceWithStats();
    }

    public void run() {
        Random random = new Random();
        Account from = null;
        Account to = null;
        while(true) {
            int a1 = random.nextInt(30);
            int a2 = random.nextInt(30);
            if(a1 == a2) continue;
            from = accountList.get(a1);
            to = accountList.get(a2);
            break;
        }
        doTransaction(from, to, random.nextInt(400));
    }

    private void doTransaction(Account from, Account to, int nextInt) {
        System.out.println("Transaction from " + from.accountName + " to " + to.accountName);
        try {
            from.withdraw(nextInt);
            to.deposit(nextInt);
        } catch (Exception e){
            System.out.println(e.getMessage());
        }
    }

    void getTotalBalanceWithStats(){
        int total = 0;
        for(Account acc : accountList){
            System.out.println("Account " + acc.accountName + " balance " + acc.getBalance());
            total += acc.getBalance();
        }
        System.out.println("Total Balance " + total);
    }
}

As far as I know, the deposit (), withdrawal () and getBalanace () APIs are independent of each other, so different mutexes are created for each process.

Some scenarios that I'm trying to test

I'm trying to get Account1 to try sending money to Account2 at the same time. Account3 can also send money to Account2 or vice versa.

If Account1 sends money to Account2 at the same time, Account2 can also send money to Account1.

When Account1 sends money to Account2 and Account3 sends money to Account1 at the same time. The unfold method () of Account1 should not block the deposit ().

Ease of use – secure banking apps

Single factor authentication (usually with "something you know", usually a password) is not particularly secure.

In banking, it is common to use two-factor authentication methods with "something you know" and "something you have", usually a combination of a plastic card and a PIN that you know. Older forms of online banking use TAN lists, and "something you have" is the paper list. Theoretically, you could argue that a TAN is something you can know, but in practice no one maintains a list of 100 TANs associated with their serial number in the head.

Recent online banking operations are based on the fact that most people own a smartphone and use the smartphone as "something you have". Benny Skogberg described one way to do this. My bank lets me register a cell phone number with them and then sends an mTAN valid for a single transaction to this number via SMS. This can be safer than a single factor, but is not foolproof.

The problem is as old as security itself: two factors are always more problematic than a single factor and ease of use is less. A single factor is not particularly secure and is often interrupted if the thief has the right motivation (e.g. access to a bank account or a celebrity's inbox). There are hundreds of ways to implement proper two-factor security, and most of them have the same ease of use as your online password-plus-TAN paper list. No variation for mobile devices can be more user-friendly and still remain secure by definition, since two factors apply:

  • You need a physical item that cannot be duplicated. You need to have it with you whenever you want access.
  • You need immense information with high entropy AND it must not be noted or stored near your physical object.

So you always have to either deal with the cognitive effort of remembering a long password, or carry an encrypted note with you on a note pad that is different from the one you use as a "I have something" factor. Both versions are characterized by low user friendliness and high security.

Examples of the uncertainty of modern fast two-factor systems:

  • It becomes a factor when the phone's browser stores passwords, which is the default, or when there is a banking app that does not require a PIN when starting a registered phone (which may be the case in Benny Skroberg's example ) don't get this detail). Imagine a thief stealing my phone, unlocking it by looking at the stains my finger left on the touchscreen, and launching the browser. If my online banking website is in the history and the password is saved, the mTAN is sent to the phone that the thief is holding.

  • In Germany there were cases in the past year in which fraudsters requested a second SIM card with the same phone number from the victim's mobile operator and had it delivered to their own address. You could then conduct online banking through the victim's account and use a phone with this second SIM card as a "something I have" factor (the password was shared with you through phishing, trojans and other common methods). This works because the mobile operator would accept a faxed request for a second SIM card without ensuring that it came from the legal owner of the wireless contract. Nothing was reimbursed to the victims because the bank said the mobile operator was responsible and the mobile operator said the bank was responsible.

Incidentally, the old TAN-on-paper system would not be secure for cell phones either, because if you have a list of TANs in your wallet, there is a high probability that anyone who steals your phone will also get your wallet.

So sad, if you want something reasonably safe, you have to give up a lot of usability. The banks seem ready to compromise on security instead.


Complemental description: There are actually three possible factors, not two. The third is "something you are". Although it is considered safer because it cannot be reproduced as "something you know", there are no commercially viable methods for use in automated environments with today's technology. Some solutions have been wasted as a niche technology for years and may still spread once they are mature and gain wide acceptance, as was the case with tablet computers. For example, I saw fingerprint readers in the wild. Not only are they expensive, they are also not precise enough. Face detection systems are notorious for false positives (hold a printed photo of your victim in front of the camera) as well as false negatives (imagine you wake up with a face swollen from a root canal infection and are unable to log into the highly secure system) – Because your healthcare provider's data protection system). Voice fingerprint technologies are also easy to mislead with records and refuse to enter if you have a bad cold. Currently, a living person has to confirm your identity by looking at the picture of your identity card. We are likely to get stuck on the other two factors for online banking for many years to come, which is sad because a fingerprint reader is much more useful than having to worry about a plastic card or keychain for one-time token generation (which is it modern, secure version of paper list TANs.

Requirements for customer-based anti-fraud solutions in online banking

There are a number of anti-fraud products that a bank can use to identify potential customer threats in its online banking portal or online banking app. Examples include reading device fingerprints and comparing these devices with a database of known perpetrators, detection mechanisms for storing malware on the client and detection of jail breaks – to name just a few.

When it comes to security products (e.g. antivirus, IPS), it is usually easy to find related standards from independent bodies (e.g. NIST, OWASP) that define basic requirements. So far I have not found anything for anti-fraud solutions.

Therefore I am looking for an independent standard, guideline or technical requirements catalog that defines which basic functions such a tool should have and what needs to be considered when evaluating different providers.