[10163] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Authenticating logos

daemon@ATHENA.MIT.EDU (Carl Ellison)
Thu Jan 17 14:59:56 2002

Message-Id: <3.0.5.32.20020116213944.01ccb0d0@localhost>
Date: Wed, 16 Jan 2002 21:39:44 -0800
To: Ron_Vered@3com.com
From: Carl Ellison <cme@acm.org>
Cc: <cryptography@wasabisystems.com>,
	SPKI Mailing List <spki@wasabisystems.com>
In-Reply-To: <OF126C1874.5D771874-ON88256B43.00656A71@3com.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"

At 10:35 AM 1/16/2002 -0800, Ron_Vered@3com.com wrote:
>
>
>While valid claims (decision about trust is made based on logo,
>etc.), similar things happen outside of "cyberspace".
>A person goes to AT&T store, with a big logo in front, eventually
>gives his credit card information to the person sitting there. That
>person, maybe an employee of a dealer / franchise store owner
>(similar to the Palm case). Does that person trust the employee?
>probably not. Does he trust the store owner? Maybe not. He made his
>decision based on the logo in front, which may turn out to be fake.
>

Yes, he's trusting the logo.  It could be fake, but the assumption is
that if it's there for very long, it's less likely to be fake because
the real logo owner would have had it brought to his attention and he
would have threatened legal action to get it removed.

..seems there ought to be something similar in cyberspace...




+------------------------------------------------------------------+
|Carl M. Ellison         cme@acm.org     http://world.std.com/~cme |
|    PGP: 08FF BA05 599B 49D2  23C6 6FFD 36BA D342                 |
+--Officer, officer, arrest that man. He's whistling a dirty song.-+



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post