[10196] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

RE: Authenticating logos

daemon@ATHENA.MIT.EDU (Carl Ellison)
Sat Jan 19 18:42:25 2002

Message-Id: <3.0.5.32.20020119131909.01c94108@localhost>
Date: Sat, 19 Jan 2002 13:19:09 -0800
To: "Amir Herzberg" <amir@beesites.co.il>
From: Carl Ellison <cme@acm.org>
Cc: <Ron_Vered@3com.com>, <cryptography@wasabisystems.com>,
	"'SPKI Mailing List'" <spki@wasabisystems.com>
In-Reply-To: <001201c19f2c$d76b5ec0$323cfea9@newgenpay>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"

At 09:59 AM 1/17/2002 +0200, Amir Herzberg wrote:
>A very important goal of secure commerce is to provide alternate
>mechanisms in cyberspace. This is since when a hacker is using
>AT&T's logo in her website, it may not be feasible for AT&T to sue
>him (in
>particular he may reside in places where logos are not protected as
>well...). 

There's another problem, with the net.  The company may not be aware
of the mis-use of their logo.  It's not on a brick and mortar
building.  It's delivered to individuals.  It can also be put up and
taken down rapidly.  So, someone can mount an attack with misuse of a
logo, run the attack for a short time, and then drop use of that logo
before the company that owns it ever sees the misuse.




+------------------------------------------------------------------+
|Carl M. Ellison         cme@acm.org     http://world.std.com/~cme |
|    PGP: 08FF BA05 599B 49D2  23C6 6FFD 36BA D342                 |
+--Officer, officer, arrest that man. He's whistling a dirty song.-+



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post