Re: Theft Attempt or LEO Sting?
e-golb.com resolves to 66.175.11.248. arin.net shows this as being in the netblk 66.175.0.0 - 66.175.63.255, belonging to Cedant Web Hosting, www.cedant.com, in Davis, CA, which is near Sacramento. At a minimum Cedant could be informed about this fraud, which is clearly outside of its AUP. You might even be able to get law enforcement involved, or perhaps contact the admin at Cedant and find out who has the address in question.
Ultimately it's impossible to have security where one side is a machine handling many live customers. Whatever central machine does can be emulated or simulated in human's eyes - by subverting the machine itself, the transport mechanism or the client machine/software. This is the ultimate limit of squeezing out middlemen (aka e-commerce.) The security is proportional to wetware cycles burned per transaction. ===== end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Yahoo! - Official partner of 2002 FIFA World Cup http://fifaworldcup.yahoo.com
On Sat, 15 Jun 2002, Morlock Elloi wrote:
Ultimately it's impossible to have security where one side is a machine handling many live customers. Whatever central machine does can be emulated or simulated in human's eyes - by subverting the machine itself, the transport mechanism or the client machine/software. This is the ultimate limit of squeezing out middlemen (aka e-commerce.)
You completely overlook distributed networks where there isn't a central server. That's the next wave. As to squeezing out middlemen, your argument actually argues for their elimination, they're a security/subversion point that isn't under control of either of the 'real' parties in the transaction. No, 'middle man' is a consequence of technology, or the lack of it. As the technology matures you'll see the market reduce to something more 'theoretical' in nature; the two parties to each transaction and a neutral third party to resolve disputes.
The security is proportional to wetware cycles burned per transaction.
Not even close. Consider cracking 802.11b for example. The trick to crack it isn't to focus on one transaction but to grab several million. Security isn't this simple to define. -- ____________________________________________________________________ When I die, I would like to be born again as me. Hugh Hefner ravage@ssz.com www.ssz.com jchoate@open-forge.org www.open-forge.org --------------------------------------------------------------------
At 12:21 AM -0700 on 6/15/02, Morlock Elloi wrote:
The security is proportional to wetware cycles burned per transaction.
I guess I don't think that's right. Sooner, hopefully rather than later, machines will be able to buy things from other machines using on-line cash. The risk will be absorbed by having a multitude of underwriters of cash instead of a single issuer for all cash, so you're partly right. But the point is, you can have an authenticated on-line transaction, at least at a risk low enough to move all kinds of money around safely. Cheers, RAH -- ----------------- R. A. Hettinga <mailto: rah@ibuc.com> The Internet Bearer Underwriting Corporation <http://www.ibuc.com/> 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
On Sat, 15 Jun 2002, R. A. Hettinga wrote:
At 12:21 AM -0700 on 6/15/02, Morlock Elloi wrote:
The security is proportional to wetware cycles burned per transaction.
I guess I don't think that's right.
Sooner, hopefully rather than later, machines will be able to buy things from other machines using on-line cash.
The risk will be absorbed by having a multitude of underwriters of cash instead of a single issuer for all cash, so you're partly right.
But the point is, you can have an authenticated on-line transaction, at least at a risk low enough to move all kinds of money around safely.
With all due respect, if this were [yet] true, I submit it would be happening.
Cheers, RAH
-- Yours, J.A. Terranson sysadmin@mfn.org If Governments really want us to behave like civilized human beings, they should give serious consideration towards setting a better example: Ruling by force, rather than consensus; the unrestrained application of unjust laws (which the victim-populations were never allowed input on in the first place); the State policy of justice only for the rich and elected; the intentional abuse and occassionally destruction of entire populations merely to distract an already apathetic and numb electorate... This type of demogoguery must surely wipe out the fascist United States as surely as it wiped out the fascist Union of Soviet Socialist Republics. The views expressed here are mine, and NOT those of my employers, associates, or others. Besides, if it *were* the opinion of all of those people, I doubt there would be a problem to bitch about in the first place... --------------------------------------------------------------------
At 7:30 PM -0500 on 6/15/02, measl@mfn.org wrote:
With all due respect, if this were [yet] true, I submit it would be happening.
What, "if we lived here, we'd be home now"? :-). Not necessarily. It just costs too much to do. Yet. That's why I say "risk adjusted transaction cost" so much. :-). Sooner or later, the accumulated code base, and falling semiconductor prices will overcome the lawyer's threats, and the banker's fear, greed will set in, and nature will take its course. Be nice to make it happen faster, though, certainly. Cheers, RAH -- ----------------- R. A. Hettinga <mailto: rah@ibuc.com> The Internet Bearer Underwriting Corporation <http://www.ibuc.com/> 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
participants (5)
-
Jim Choate
-
measl@mfn.org
-
Morlock Elloi
-
Nomen Nescio
-
R. A. Hettinga