Deconstructing Apple Card: A Hacker’s Perspective