[Previous] [Next] [Index] [Thread]

Re: what are realistic threats -Reply



So how DO we deal with security on the Internet for transactions, and
while we're at it, intellectual property?

While it's ineivitable and personally I'm for it, I see this as a very hard to
win situation.  Unlike most other kinds of both criminal and non-criminal
activity which usually takes some technical or procedural knowledge that
is special to what you are doing, this one has the potential of only
requiring knowledge of how to launch a program and use menus, etc. 
All the specific knowledge could be housed within the program with
minimal help from the user (depending on the complexity).  So, it's virus
construction kits with a lot more at stake.

If we thought the copy-protection wars of computing-past was a game
of cat and mouse:

Nathan Syfrig
nsyfrig@wppost.depaul.edu
(nathan-syfrig@nova.novanet.org)