Skip to main content

Compendium Article 2: Unlocking Convenience - A Comprehensive Look at the Power of Cash App



 

Unlocking Convenience: A Comprehensive Look at the Power of Cashapp

A great majority of you have probably heard of the app Cashapp. Sending, receiving, and storing monetary transactions can all be accomplished through the service relatively easily (US and UK). Users can transfer funds to the accounts of other Cash App users by withdrawing money from their bank accounts and sending it to the accounts of other Cash App users.

 

Cash App: The Easy App to Send and Receive Money


A user only needs to enter a phone number, email address, or $ cash tag is required for users to send money to other users of the Cash App. The $ cash tag is where usernames are saved, and you can only alter it twice. When sending money to another user, the sender can leave a personalized message for the recipient. If you wish to transfer money from Cash App to a different bank account, you can either wait three to five business days or pay a fee of 1.5% if you want the money right away. The maximum amount that can be sent or received from an unverified account is $250 each week or $1,000 per month. After verification, a user can transmit up to $7,500 per week or $17,500 per month, depending on the most recent change. You will be required to furnish the app with your real name, date of birth, and, if you live in the United States, the last four digits of your social security number to create an account.

 

Cash App has proven to be a helpful alternative for many individuals who, either due to their past credit history or due to their desire to conceal their payments from nosy family members, are unable to obtain a standard bank account. It's especially great for buying and paying back small debts like lunch. It is also possible for an employer to deposit money whenever they become available. If you do not have a bank account but still want to deposit cash, you can do it at well-known businesses such as Walmart, 7-Eleven, and Dollar General. Cash App also provides customers with a reloadable debit card that can be customized, something a significant number of users have begun to take advantage of in recent months. Obtaining money from a person and avoiding the phrase "I owe you" both contribute to simplifying financial transactions. It is easier to use Cash App as opposed to PayPal and Venmo (especially when being overseas without using a VPN blocks your transactions often). In addition, investing in stocks—even fractional stocks—and cryptocurrencies is possible.


The Dark Side of Cash App: Uncovering the Disadvantages

 

While Cash App is versatile and valuable, especially for people without a bank account, many concerns have been raised about the app's trustworthiness, security, and ability to refund money in case of fraud and hacking. App suggestions include adding a transfer password or pin and better history tracking. For this reason, many have stopped using the app due to firsthand hacking incidences. The subpar level of customer care provided via telephone is one area that has to be improved. Another thing that I've noticed with the app is that it does not provide a "Are you sure?" option before sending funds. Recently, an excellent countermeasure that PayPal has that I could have fallen victim to was when a significant payment of $1.8K in Paypal was intended to pay for goods or services from a scammer using my credentials. However, a text message asked me ahead of whether I wanted to send the money or not. Another helpful enhancement would be to see how much you've sent a person and how much they've sent you to notice the difference since the app's simplistic design just displays sends and receives. If you could distinguish the difference, both parties can determine who owed whom and how much without argument. There is also no automatic payment option for folks who do not have bank accounts but have employment and use the app to attempt to reestablish themselves. With the small transaction fees, this could disrupt common banks that have account fees. Issues with taxes on money sent for betting purposes and buying crypto that is not actually on the blockchain also were concerns. One user mentions that scammers check your public wallet address on the blockchain explorer and send a tiny quantity of cryptocurrency to you to store their address on your account. The scammer gets your cryptocurrency since their transaction auto-fills the target wallet address. Finally, a user suggests that the cash app should establish a small credit line for those who have a direct deposit. Google Pay, Venmo, PayPal, and Zelle are similar alternatives to Cash App.

 

    Overall, most of these incidents I've found have come from phishing attacks targeting individuals hoping to gain fast profit, trustworthiness, and naivety, believing scammers were a part of the Cash App company and that their account was infiltrated. During research on how phishing techniques occur in Alaban's article, Phishing attacks survey: Types, vectors, and technical approaches - Future Internet, he broke down how social engineer attacks happened. He states that a social engineering attack's ultimate purpose is to prevent the victim from behaving logically and instead depend on emotions that can be controlled. This comprises feelings like Greed, Fear, Anger, Patriotism, Friendship, Sense of responsibility, Sense of belonging, Sense of authority, Philanthropy, and Vanity (Alabdan, 2020). By exploiting these emotions and preventing the target from behaving logically, a phisher may persuade a target into acting without proper consideration, ultimately obtaining sensitive information (Alabdan, 2020). 

 

    In conclusion, Cash App is a popular option for people who want to make money transfers easier. Users can send and receive money using a phone number, email address, or $cash tag. Its interface is easy to use. The app also has a debit card that can be reloaded, a way to deposit cash at popular stores, and even a way to invest in stocks and cryptocurrencies. Concerns have been raised, though, about how safe and trustworthy the app is and whether or not it can refund money in the case of fraud or hacking. Even with these worries, Cash App remains a useful tool for people who don't have a bank account and a convenient way to handle simple financial transactions.

 

References

Alabdan, R. (2020). Phishing attacks survey: Types, vectors, and technical approaches. Future Internet, 12(10), 168. https://doi.org/10.3390/fi12100168

 


Comments

Popular posts from this blog

Compendium Article 9: A Newbie's Introduction to Object-Oriented Programming, Java, and tutorial links to keep you motivated

            Hello fellow Java noobs! As my journey continues further into the world computing and specifically programming, we’ve now arrived at Object-Oriented Programming (OOP) and Java. The names alone sound intimidating, but don’t worry! I'm here to explain what Ive learn to your ------from one beginner to another. Getting Started 1.       Go to the Oracle website or OpenJDK to get the Java Development Kit (JDK). 2.       Pick the JDK version that matches your computer (Windows, macOS, Linux) and download it. 3.       Open the downloaded file and follow the on-screen setup instructions. 4.       To check if Java is installed, type java -version in your command prompt or terminal. If you see a version number, you're all set! 5.       For writing Java code, you'll need an IDE (a program where you’ll write the code)....

Compendium Article 4: Roots to Routes - Understanding How Your Requests are Traced and Analyzed

Tracing Your Requests: A Journey Through Ping and Trace Commands      For many years, network hops and latency have been measured by ping and traceroute. Network engineers and administrators have benefited from using these tools to analyze and track network performance. Information is now more accurate and current thanks to modern tools. Because both experts and everyday users use these tools to identify and resolve network problems, they are crucial to the infrastructure of the modern internet. What is Ping Routing and Trace Routing? Ping      A Ping measures packet round-trip time and IP host reachability. It sends the target host a request and waits for a reply. If the host responds, the round-trip time is determined. You can analyze internet connectivity (Hoffman, 2017). Traceroute      Traceroute shows how IP packets travel. A request is also sent from the host. When hosts send the message, IP addresses between the host and destination ...

Compendium Article 6: The Digital Guardian - Securing Information and Systems in the 21st Century

  Network Protection    Safeguarding confidential and sensitive information      Information and system security are vital for the success of any business or organization. To maintain a competitive edge as technology advances and the digital world becomes more interconnected, it is essential to safeguard private and sensitive information against unauthorized access and theft. Businesses must take a proactive approach to increase information and system security by developing a customized information security policy, developing secure and manageable passwords, remaining current on the latest technology security threats and vulnerabilities, configuring network security measures to prevent unauthorized access, infiltration, and data theft, and installing anti-virus software and other malware protection on all company-owned devices. This paper will present basic information on the importance of information and system security in today's digital age, as well as p...