SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Pastimes : Hack Attacks - The end of internet innocence?

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: LPS5 who wrote (1)2/9/2000 10:42:00 AM
From: Jon Tara  Read Replies (1) of 14
 
LOL! Of course, I was referring to the technical side, not the content side. :)

As a software engineer, I'm one of the ones who is amazed that it has held-up as well as it is. It's a testimony to the basic good of most people that it does.

The underlying protocols were not designed to resist intentional attempts to disrupt, forge, or mislead.

A simple example: you can use anything you want for a "return address" when you send an e-mail. Just go into your e-mail software and set your return address to something else. There is no widely-used mechanism in place that verifies that you are who you say you are. Anybody has the ability to claim that they are Bill Gates.

(Yes, there is information available in the e-mail headers that indicates where it's been, and that can suggest whether a return address is or isn't legitimate. For example, if "Bill Gates" mail originated at AOL, it's unlikely to be the genuine article... But, at least at the level that most of us examine our mail, it's very easy for anybody to commit forgery.)
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext