Access Restriction

Author Neville-Neil, George
Source ACM Digital Library
Content type Text
Publisher Association for Computing Machinery (ACM)
File Format PDF
Language English
Abstract Dear KV, Suppose I'm a customer of Sincere-and-Authentic's (KodeVicious Battles On, April 2005:15-17), and suppose the sysadmin atmy ISP is an unscrupulous, albeit music-loving, geek. He figuredout that I have an account with Sincere-and-Authentic. He put in afilter in the access router to log all packets belonging to asession between me and S&A. He would later mine the logs andretrieve the music--without paying for it. I know this is afar-fetched scenario, but if S&A wants his business secured aswatertight as possible, shouldn't he be contemplating addressingit, too? Yes, of course, S&A will have to weigh the riskagainst the cost of mitigating it, and he may well decide to livewith the risk. But I think your correspondents suggestion is atleast worthy of a summary debate--not something that should drawdisgusted looks! There is, in fact, another advantage to encryptingthe payload, assuming that IPsec (Internet Protocol security) isn'tbeing used: decryption will require special clients, and that willprotect S&A that much more against the theft ofmerchandise.
Description Affiliation: ACM QUEUE, New York, NY (Neville-Neil, George)
Age Range 18 to 22 years ♦ above 22 year
Educational Use Research
Education Level UG and PG
Learning Resource Type Article
Publisher Date 2010-04-01
Publisher Place New York
Journal Queue (QUEUE)
Volume Number 3
Issue Number 7
Page Count 3
Starting Page 12
Ending Page 14

Open content in new tab

   Open content in new tab
Source: ACM Digital Library