Nobody You’re allowed to include those words, it is quite unclear what you mean as you left out words.
Could you rephrase this perhaps?
As right now I think you mean this:
So your theory is that you can either use infected computers that store billing information as a proxy to use the card with?
If so, this is already done in some scenarios. Just not often talked about.
Did I get that right?