[10196] in cryptography@c2.net mail archive
RE: Authenticating logos
daemon@ATHENA.MIT.EDU (Carl Ellison)
Sat Jan 19 18:42:25 2002
Message-Id: <3.0.5.32.20020119131909.01c94108@localhost>
Date: Sat, 19 Jan 2002 13:19:09 -0800
To: "Amir Herzberg" <amir@beesites.co.il>
From: Carl Ellison <cme@acm.org>
Cc: <Ron_Vered@3com.com>, <cryptography@wasabisystems.com>,
"'SPKI Mailing List'" <spki@wasabisystems.com>
In-Reply-To: <001201c19f2c$d76b5ec0$323cfea9@newgenpay>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
At 09:59 AM 1/17/2002 +0200, Amir Herzberg wrote:
>A very important goal of secure commerce is to provide alternate
>mechanisms in cyberspace. This is since when a hacker is using
>AT&T's logo in her website, it may not be feasible for AT&T to sue
>him (in
>particular he may reside in places where logos are not protected as
>well...).
There's another problem, with the net. The company may not be aware
of the mis-use of their logo. It's not on a brick and mortar
building. It's delivered to individuals. It can also be put up and
taken down rapidly. So, someone can mount an attack with misuse of a
logo, run the attack for a short time, and then drop use of that logo
before the company that owns it ever sees the misuse.
+------------------------------------------------------------------+
|Carl M. Ellison cme@acm.org http://world.std.com/~cme |
| PGP: 08FF BA05 599B 49D2 23C6 6FFD 36BA D342 |
+--Officer, officer, arrest that man. He's whistling a dirty song.-+
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com