[9746] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Fw: [ISN] Commentary: The Threat Of Microsofts .Net

daemon@ATHENA.MIT.EDU (JohnE37179@aol.com)
Wed Oct 31 17:10:45 2001

From: JohnE37179@aol.com
Message-ID: <5a.f9d302.2911c4b0@aol.com>
Date: Wed, 31 Oct 2001 16:18:40 EST
To: vertigo@panix.com, Jason.Gruber@btinternet.com
Cc: cryptography@wasabisystems.com, JohnE37179@aol.com
MIME-Version: 1.0
Content-Type: text/plain; charset="US-ASCII"
Content-Transfer-Encoding: 7bit


In a message dated 10/31/01 3:09:38 PM, vertigo@panix.com writes:

<< but do not "PKI, encryption, [and] digital certificates," de-
pending on their use, actually help to PROVE one's identity through reliable,
trusted, or otherwise authoritative third parties? >>

In closed systems, yes. However, even in those environments there is a 
substantial risk, because there really are no "trusted," or otherwise 
authoritative third parties, short of a full blown background check. 
Approximately 80% of all attacks are from those "trusted" insiders.

Remember 100% of embezzlers are trusted implicitly.

In a world of digital strangers the concept almost loses its meaning.

I've been around this business for nearly 20 years and I'm not sure who you 
could really classify as a "trusted third party." 

John Ellingson
CEO
Edentification, Inc.
608.833.6261
||||#
||||||
||||||



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post