Hacker Timesnew | past | comments | ask | show | jobs | submitlogin

How easy is it to attack this by cutting the specific part of the note that releases the key but making it look like it's whole? Couldn't I cut the note in half and tape it together again and fool someone who doesn't know much about it? Or couldn't I cut the specific bit with an Xacto knife, take the funds and still circulate the bill?


My guess is that this is why the verification mobile app that scans the NFC code is going to be critically important.


But then that kind of invalidates the "offline" claim, I don't think they'd make it if they needed the app? Then again, maybe you need the app but it doesn't need network access.


I'm also unclear whether being cut is truly the only way to trigger the release. Could the note be damaged in other ways to get it to think it's been cut? The website is extremely light on details.




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: