Authenticating logos

Carl Ellison cme at acm.org
Sat Jan 19 16:19:09 EST 2002


At 09:59 AM 1/17/2002 +0200, Amir Herzberg wrote:
>A very important goal of secure commerce is to provide alternate
>mechanisms in cyberspace. This is since when a hacker is using
>AT&T's logo in her website, it may not be feasible for AT&T to sue
>him (in
>particular he may reside in places where logos are not protected as
>well...). 

There's another problem, with the net.  The company may not be aware
of the mis-use of their logo.  It's not on a brick and mortar
building.  It's delivered to individuals.  It can also be put up and
taken down rapidly.  So, someone can mount an attack with misuse of a
logo, run the attack for a short time, and then drop use of that logo
before the company that owns it ever sees the misuse.




+------------------------------------------------------------------+
|Carl M. Ellison         cme at acm.org     http://world.std.com/~cme |
|    PGP: 08FF BA05 599B 49D2  23C6 6FFD 36BA D342                 |
+--Officer, officer, arrest that man. He's whistling a dirty song.-+



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com




More information about the cryptography mailing list