[159] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: what are realistic threats -Reply

daemon@ATHENA.MIT.EDU (nsyfrig@wppost.depaul.edu)
Thu Sep 29 20:27:02 1994

From: nsyfrig@wppost.depaul.edu
Date: Thu, 29 Sep 1994 10:37:28 -0600
To: dmk@allegra.att.com, mike@arl.mil
Cc: www-buyinfo@allegra.att.com, 76570.1102@compuserve.com,
        www-security@ns1.rutgers.edu
Reply-To: nsyfrig@wppost.depaul.edu

So how DO we deal with security on the Internet for transactions, and
while we're at it, intellectual property?

While it's ineivitable and personally I'm for it, I see this as a very hard to
win situation.  Unlike most other kinds of both criminal and non-criminal
activity which usually takes some technical or procedural knowledge that
is special to what you are doing, this one has the potential of only
requiring knowledge of how to launch a program and use menus, etc. 
All the specific knowledge could be housed within the program with
minimal help from the user (depending on the complexity).  So, it's virus
construction kits with a lot more at stake.

If we thought the copy-protection wars of computing-past was a game
of cat and mouse:

Nathan Syfrig
nsyfrig@wppost.depaul.edu
(nathan-syfrig@nova.novanet.org)


home help back first fref pref prev next nref lref last post