Is it possible to make a common PC bluetooth card identify itself as headset? [closed]

My objective would be to make an application that makes the computer identify as a headset, so I can connect my phone to it and route the audio of the calls to the computer.

I think this is highly related to security. I’m talking about the ability to make a device identify as something else, think about the USB rubber ducky, now replace "USB" with "Bluetooth".

That’s why I posted here. The purpose of doing this would not be anything malicious, I just want to connect my phone to the PC so I can hear the voice of the person calling me on my phone, through the headset connected to my PC:

Phone -> Bluetooth -> Computer -> Headset

Craigslist type site for domain/website asks for my selfie with identification card – Unsafe?

Flippa is a website that lets sellers of domains and website list their properties for sale. They do not handle funds, escrow d0t com and/or paypal handles the sales. After taking my money for listing (250) I was able to sell my website. When it came to finish sale, told me that in order to proceed to escrow d0t com that I must: Upload selfie with my govt id, scan both sides of id, AND also do a "liveness video." I was a bit alarmed and looked in the their partner. They use a company that does KYC verification. Find it strange flippa, a non-financial company, is using KYC. Anyway the company they use claims to be based out of London. Which is is not true, their address in London is paid virtual business office. They are a Russian company, with russian founders and employees. No hate on Russia but as an American I am not comfortable uploading all this private info JUST to complete a website sale!

Is this even legal for Flippa to do? Flippa also says they store the information I sent them. I don’t like that they only ask me to complete this AFTER they have my money.

TL;DR A company that offers listing service for domains wants my selfie with my govt id. They use verification service that obscures that they’re based in Russia. Is this safe?

Is it legal for a retailer to share credit card numbers with Nielsen/Billboard (USA)

Lately, in the music world, there is a big uproar over how fans purchase artist’s merchandise. It was set off when rapper 6ix9 accused Ariana Grande of cheating on sales because, as he claims, 60,000 of her merchandise bundle sales were purchased by just 5 credit cards. In reply to that, her manager, music mogul, Scooter Braun replied via Instagram that Billboard audits sales and anything over 4 sales per credit card will be thrown out.

There is a lot of background, but I will keep it brief.

  1. Neilsen (who collects music data on behalf of Billboard via Soundscan) has a point of sale system for brick and mortar physical music seller, but insists that "bundled" sales (music that sells as a download while buying non music merchandise) are handled through a musician’s personal website, with a latest reporting time of Friday afternoon for the prior week’s sales.
  2. Nielsen does impose a maximum of 4 sales of a particular bundled merchandise item per transaction. rules on reporting per shopify Billboard-Nielsen full details (January 2020)
  3. Shopify seems to be the go to site for most musician sites for selling merchandise.
  4. Shopify claims to report all sales automatically (electronically?) the next day to Neilsen Soundscan.
  5. Most musicians have their merchandise storefronts stop an end user from purchasing more than 4 of an item per transaction, but allows the user to buy more merchandise or song downloads after completing a transaction on the same card.
  6. No shops that I tested stopped a card from being used to purchase the exact same thing again.

That is a lot to unpack, I know, but I will stop here with my questions. As I am not sure who to believe, I am wondering if it is legal to submit the credit card number to Nielsen, a 3rd party? If not, could there have been a mistake in Scooter Braun’s word choice (credit card/transaction)? If credit card numbers are being passed to Billboard, wouldn’t musicians also have their developer code a restriction against reusing the same credit card? I don’t know, something doesn’t quite sync.

Thanks Tas

What is the difference between a multi-use and a single-use credit card token [closed]

We are a large e-commerce website trying to introduce a feature by which customers can save their credit card details securely. We are aware of the need for PCI compliance and working out the necessary security aspects. Will be great to know the difference between a single-use and a multi-use payment tokens. Examples of websites that use these types will be very useful.

Best bank card for a copywriter

Hey there! I have been working in copywriting for several years and I found a good option to get payment. That's Blackcatcard. The issue is that i live outside Europe and my clients sometimes have doubts about sending money to my local account. So I opened an european account for free, the card was sent to my address for free as well. I can use the card in any shop and withdraw cash at any ATM with a 2% fee (min 1,5 euro) wherever Mastercard is accepted. For Europeans the conditions are more…

Best bank card for a copywriter

GnuPG – connecting to specific card reader when multiple reader available

Currently I can use

$   gpg --card-status 

to interact with smartcards that run the OpenPGP applet. Through trial-and-error, it seems that only the first card reader will interact with gpg. Using options that pass to scdaemon seem to be deprecated:

$   gpg --reader-port  1 --card-status gpg: WARNING: "--reader-port" is an obsolete option - it has no effect except on scdaemon 

Is there a way to interact with an OpenPGP smartcard that is not connected to the first card reader?

Are web worker / service worker secure environments to store a password, credit card information, access tokens?

If there is a case where I wish to store sensitive data like a password, credit card information, or access tokens:

Are web workers / service workers a secure environment, where such data can not be compromised? If so, what to do to really secure it? If not so, why not exactly?