SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : George Gilder - Forbes ASAP -- Ignore unavailable to you. Want to Upgrade?


To: ftth who wrote (1508)5/11/1999 2:39:00 AM
From: Scott C. Lemon  Read Replies (1) | Respond to of 5853
 
Hello dave,

Ok ... so you have some very good questions here ... ;-)

> Let me ask you this: when you say "full encryption," what do you
> mean?

What I was trying to say is that the encryption would be done completely at your end of the link. And that the "holder", or remote server, of the information would not at all be involved in the encryption. If they try to access your data, all they have is an encrypted blob of data.

Examples of this type of capability are available from people like PGP or Sun today ...

> What is partial encryption?

Ok ... bad choice of terms. I'm trying to think about how to differentiate between the scenario where I perform the encryption completely on my end (on my PC) and then transfer the encrypted "blob" to the server for storage vs. where I send unencrypted data to a server where it is encrypted and stored.

> Maybe you mean "strong encryption," and if so what constitutes
> strong encryption in your mind and why?

I would expect that both scenarios would use "strong" encryption ... but obviously strong is only so strong. ;-) With enough CPU power and time ...

I'm thinking "strong-enough" ... currently I have been playing with 1000+ bit encryption and up ... which seens strong-enough for today ... but again, tommorow ... ;-)

> Another question out of curiosity: have you modified (i.e. limited)
> the cryptographic module settings within your browser(s)? And if
> so, would you mind sharing what you have changed them to?[I only
> ask because this will give me an idea of what you consider
> "safe."]

Hmmm ... I'm not sure what you mean by this. I have a variety of settings that I modify because of security perceptions. I don't use IE very much, don't allow ActiveX controls, or Java apps outside the sand-box. Don't take cookies, etc. I tend to use 128-bit SSL, and don't accept certs from other sources.

I'm also fully aware that there is a lot of information that I communicate that is "insecure" and that much of what I do can be easily traced and tracked. (I've worked in network management systems and software for quite a while ... ;-)

I've tried to learn about, and understand the various holes, and have written code to take advantage of them ... but I know that there are more that I have missed. ;-)

> On your later post regarding caching, do you feel the need for
> caching servers is primarily tied to current network bandwidth
> restrictions, and when we have our ubiquitous all-optical networks
> of the future, the need/market for caching servers evaporates?

No ... I'm not sure that I believe they will go away. I sincerely believe that Object Routing is the future, and that it provides benefits of more intelligent information routing, and reduces duplicate traffic for highly desirable content. It also allows for more intelligent infrastructure that can now utilize the content that is flowing through it. A packet is merely a fragment of a whole object. The fragment is probably useless without context. The whole object, if routed properly, is always usable as a whole.

I think that we are all stuck in a "layer 4" dilemma that is causing routing headaches and inefficiencies. How do you break through this barrier of end-to-end packets caused by the session layer? You make the leap to the next level ... and you face the fact that all of the applications that people are running are trying to access objects ... not packets. So how can the infrastructure be optimized for objects?

I think that we are just starting to recognize the values that proxy/cache server provide to the Internet ...

> (assuming the internet as we know it today becomes a limited-use
> frontage road that peers with the "real" internet of the future so
> there's no legacy baggage to content with)

I agree that there are going to be a variety of networks, and that depending on the type of content, there are a variety of solutions.

I think that Object Routers are going to show up (and have started to) and will be here to stay ... ;-)

> dh

Scott C. Lemon



To: ftth who wrote (1508)5/11/1999 12:15:00 PM
From: DOUG H  Read Replies (2) | Respond to of 5853
 
Dave and thread,
I am a semi frequent lurker on this and TLM thread.(very, very early in the education process). I was interested in your conversation regarding the security/reliability of offsite data storage and "online banking". I operate a small retail business(restaurant) and am in the process of upgrading our POS and back of house management systems. I recieve information from banks promoting their online banking products, however there is some reticence on my part to explore further due to possible hype-based fear. Can you share your views or recommendations on this subject.

Thank You D.H.