Authenticating logos
Carl Ellison
cme at acm.org
Sat Jan 19 16:19:09 EST 2002
At 09:59 AM 1/17/2002 +0200, Amir Herzberg wrote:
>A very important goal of secure commerce is to provide alternate
>mechanisms in cyberspace. This is since when a hacker is using
>AT&T's logo in her website, it may not be feasible for AT&T to sue
>him (in
>particular he may reside in places where logos are not protected as
>well...).
There's another problem, with the net. The company may not be aware
of the mis-use of their logo. It's not on a brick and mortar
building. It's delivered to individuals. It can also be put up and
taken down rapidly. So, someone can mount an attack with misuse of a
logo, run the attack for a short time, and then drop use of that logo
before the company that owns it ever sees the misuse.
+------------------------------------------------------------------+
|Carl M. Ellison cme at acm.org http://world.std.com/~cme |
| PGP: 08FF BA05 599B 49D2 23C6 6FFD 36BA D342 |
+--Officer, officer, arrest that man. He's whistling a dirty song.-+
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com
More information about the cryptography
mailing list