Skip to main content

POST The US is Different

The US Treasury's report on "Nonbank Financials, Fintech, and Innovation" prepared in response to Mr. Trump's "Executive Order 13772 on Core Principles for Regulating the United States Financial System" is, I have to say, most comprehensive.

Payments Treasury recommends that the states work to harmonize money transmitter requirements for licensing and supervisory examinations, and urges the Bureau to provide more flexibility regarding the issuance of remittance disclosures. Treasury encourages the Federal Reserve to move quickly in facilitating a faster retail payments system, such as through the development of a real-time settlement service that would allow for more efficient and widespread access to innovative payment capabilities. Such a system should take into account the ability of smaller financial institutions, such as community banks and credit unions, to access innovative technologies and payment services.

Comments

Popular posts from this blog

We could fix mobile security, you know. We don't, but we could

Earlier in the week I blogged about mobile banking security , and I said that in design terms it is best to assume that the internet is in the hands of your enemies. In case you think I was exaggerating… The thieves also provided “free” wireless connections in public places to secretly mine users’ personal information. From Gone in minutes: Chinese cybertheft gangs mine smartphones for bank card data | South China Morning Post Personally, I always use an SSL VPN when connected by wifi (even at home!) but I doubt that most people would ever go to this trouble or take the time to configure a VPN and such like. Anyway, the point is that the internet isn’t secure. And actually SMS isn’t much better, which is why it shouldn’t really be used for securing anything as important as home banking. The report also described how gangs stole mobile security codes – which banks automatically send to card holders’ registered mobile phones to verify online transactions – by using either a Trojan...