... is far simpler, and Gale's solution works perfectly. For credit card processing, using secure terminals, some data is returned and needs to be retained. It does not benefit a hacker because it's only relative to the transaction, not the card, or cardholder. In addition, a small image of the ...