• After 15+ years, we've made a big change: Android Forums is now Early Bird Club. Learn more here.

Question

Yep 9to5 nailed it, check with square -- no tablet would be "too slow" to run a credit card. It's a string of 16 numbers basically.... This is not sequencing the human genome or something :)

However, depending on the app, there might be some strange gotcha involved where they programmed it in a strange way -- best to use something officially supported if it's your business (IMHO).
 
Upvote 0
Yep 9to5 nailed it, check with square -- no tablet would be "too slow" to run a credit card. It's a string of 16 numbers basically.... This is not sequencing the human genome or something :)

That's really all it is, plus the credit card expiry date and the transaction amount. It gets encrypted, goes off to the merchant services back-end, comes back if the transaction is authorised or not. That's all there is to it I think. For a long time hand-held credit card terminals have been very low-powered devices, often Windows CE based.
 
Upvote 0
That's really all it is, plus the credit card expiry date and the transaction amount. It gets encrypted, goes off to the merchant services back-end, comes back if the transaction is authorised or not. That's all there is to it I think. For a long time hand-held credit card terminals have been very low-powered devices, often Windows CE based.
So your weak link is going to be the reliability of your wireless connection. If you never have connection problems, and the authentication server on the other end can be assumed to respond almost instantly, then I'd expect the whole process to be pretty quick.
 
  • Like
Reactions: mikedt
Upvote 0
So your weak link is going to be the reliability of your wireless connection. If you never have connection problems, and the authentication server on the other end can be assumed to respond almost instantly, then I'd expect the whole process to be pretty quick.

I think good system security is important as well..
TJ MAXX Update : Weak Wi-Fi Encryption (WEP) To Blame For The Security Breach

It appears that the root of all evil in TJ MAXX Marshalls security breach was the use of weak encryption (WEP) in wireless access points. Despite a market capitalization of almost $13bn, the company apparently couldn't afford to secure its Wi-Fi network with anything more robust than the sadly inadequate Wired Equivalent Privacy (WEP) protocol. (The much more secure Wi-Fi Protected Access has become standard on most routers for four years now.)

...ooops!!
 
  • Like
Reactions: BlueBiker
Upvote 0

BEST TECH IN 2023

We've been tracking upcoming products and ranking the best tech since 2007. Thanks for trusting our opinion: we get rewarded through affiliate links that earn us a commission and we invite you to learn more about us.

Smartphones