
Eduardo Borges
13.3K posts

Eduardo Borges
@duborges
digital entrepreneur since 1997 ≫ blogs ≫ saas ≫ apps ≫ bots ≫ hardware ≫ fintech ≫ neobank ≫ founder @ https://t.co/nOM83Us6pF


In 2011, 29-year-old Australian bartender Dan Saunders was down to his last $3. Late one night after a shift, he tried to withdraw cash from an ATM. To his shock, the machine spat out the money even though his balance was almost zero. Curious, he started experimenting and discovered there was a glitch that let him withdraw unlimited cash with his balance never changing. So Dan went all in. Over the next 5 months, he spent $1.6 million. He threw parties, chartered private jets, flew mates around Australia, stayed in 5-star hotels, took luxury vacations abroad, and even paid off all his friends’ university fees. But after months of living the high life, the guilt slowly ate away at him. Eventually Dan turned himself in… and confessed everything on national TV. In 2015, Dan was sentenced to 1 year in jail and ordered to pay back $250K.







after this post all fintech CEO’s started to follow me not sure they are looking for entertainment watching my drama or are willing to offer me lower fees to end it either way, you are all very welcome and yes, we can schedule that call


‼️🚨 BREAKING: A new npm supply-chain attack uses a dead-man's switch. The payload plants a watcher on your machine that nukes your home directory the second you revoke the GitHub token it stole from you. The compromise happened today, across 42 official tanstack npm packages, 84 malicious versions in total. tanstack/react-router alone pulls more than 12 million weekly downloads. The attacker forked TanStack's repository and pushed a single hidden commit. From there, they tricked TanStack's own release system into signing the malicious packages as if they were the real thing. To npm, and to anyone checking the cryptographic proof of origin (SLSA provenance), the poisoned versions looked 100% legitimate. Maintainer Tanner Linsley confirmed the whole team had 2FA enabled. It didn't matter. This is the first documented npm worm in history that ships with a valid, signed certificate of authenticity, the same one defenders rely on to know a package wasn't tampered with.

it’s insane how everything is becoming hackable even password managers! we are not ready for this not even the hackers






i worked with Fraud Prevention at Citigroup for a few years and I can answer this question: “why hotels still ask for a physical credit card at check-in?” 1) verify cardholder identity: helps confirm the guest actually owns the card used 2) security/incidental deposit: hotels place a temporary hold for extra charges during the stay 3) cover damages or fees: protects against smoking fees, minibar use, broken items, etc 4) reduce fraud & chargebacks: physical chip cards lower the risk of stolen-card disputes 5) virtual cards often fail: some prepaid or app-generated cards can’t handle hotel holds 6) corporate/franchise policy: many hotel chains require it under brand or accounting rules 7) guarantee extended stays: gives the hotel a payment method if the guest stays longer 8) match ID + reservation + card: helps prevent unauthorized bookings and reselling scams 9) debit cards are messy: refunds and released holds can take days to return to customers 10) old hotel systems: many property-management systems were built around physical card processing, unlike airbnb so if you are staying at a hotel or renting a car, make sure to bring a real Physical Credit card (not debit) or you might not be able to check-in

I give the hotel my credit card in advance to reserve the room. If I don't show up, they charge the card anyway, and I pay for it. But, if I DO SHOW UP, they need to have the physical card and my signature, or I can't have the room. Make it make sense









