[9746] in cryptography@c2.net mail archive
Re: Fw: [ISN] Commentary: The Threat Of Microsofts .Net
daemon@ATHENA.MIT.EDU (JohnE37179@aol.com)
Wed Oct 31 17:10:45 2001
From: JohnE37179@aol.com
Message-ID: <5a.f9d302.2911c4b0@aol.com>
Date: Wed, 31 Oct 2001 16:18:40 EST
To: vertigo@panix.com, Jason.Gruber@btinternet.com
Cc: cryptography@wasabisystems.com, JohnE37179@aol.com
MIME-Version: 1.0
Content-Type: text/plain; charset="US-ASCII"
Content-Transfer-Encoding: 7bit
In a message dated 10/31/01 3:09:38 PM, vertigo@panix.com writes:
<< but do not "PKI, encryption, [and] digital certificates," de-
pending on their use, actually help to PROVE one's identity through reliable,
trusted, or otherwise authoritative third parties? >>
In closed systems, yes. However, even in those environments there is a
substantial risk, because there really are no "trusted," or otherwise
authoritative third parties, short of a full blown background check.
Approximately 80% of all attacks are from those "trusted" insiders.
Remember 100% of embezzlers are trusted implicitly.
In a world of digital strangers the concept almost loses its meaning.
I've been around this business for nearly 20 years and I'm not sure who you
could really classify as a "trusted third party."
John Ellingson
CEO
Edentification, Inc.
608.833.6261
||||#
||||||
||||||
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com