In the examples here to verify a buyer:
It’s suggesting that personal information can be exposed. Imagine a hacker going into a store where payments are processed by square then when the credit card boxes pop up, he views the HTML source code.
If he finds information like this:
billingContact: {
addressLines: ['123 Main Street', 'Apartment 1'],
familyName: 'Doe',
givenName: 'John',
email: '[email protected]',
countryCode: 'GB',
phone: '3214563987',
state: 'LND',
city: 'London',
},
surely he would try to scam the customer.
Such a scenario would be likely in shops where the seller wants to save the customer’s information in advance before making the payment.
A customer doesn’t want to enter the same information many times to complete payment.
In my case, I create customers with the Square API and I receive a customer ID. Can I somehow inject that ID into the VerifyBuyer function then square’s datacenter can convert the ID behind the scenes into the actual customer data? That way, no personal info will be exposed (even in HTML code) when it comes to entering credit card information.