The new watchdogs of digital commerce
Article Abstract:
Ian Goldberg, David Wagner and Paul Gauthier under the direction of UC Berkeley Prof. Eric Brewer reveal Internet flaws that make the network unsuitable for electronic commerce, and they do it in a spirit of cooperation, not contention. The trio represents a new movement in the hacker community, which traditionally scrutinizes software and hardware to detect faults then releases the information. A typical example is the work the trio performed on the Satan program that identifies possible points of break-in on a corporate LAN, which was released across the Internet in a move many corporations found hostile. The Berkeley trio posts findings about security flaws to Internet bulletin boards. They are motivated by a desire to inform the public, rather than to challenge the establishment. This new spirit may be an acknowledgement that the Internet will become a commercial medium, despite the efforts of purists to preserve it as the academic tool.
Publication Name: The New York Times
Subject: Business, general
ISSN: 0362-4331
Year: 1995
User Contributions:
Comment about this article or add new information about this topic:
U.S. to urge a new policy on software: attempt at compromise on scrambling of data
Article Abstract:
The Clinton Administration announces it will propose a new data-encryption strategy. Currently, all hardware sold to the government must include a Clipper chip. The public has never been able to examine the chip, which observers believes allows the government unauthorized access. The government also insists that its agencies be given keys to encrypted software, so that a court order will release the keys to law enforcement. Government regulations of exported software require that the code be based on 40-bit information. Software makers want to be able to export stronger code, because the weaker code is hurting foreign sales. The government is considering allowing exportation of software with 64-bit encryption, provided that law enforcement is given the key. For domestic software, the government still wants encryption keys, but may allow a non-government company hold them.
Publication Name: The New York Times
Subject: Business, general
ISSN: 0362-4331
Year: 1995
User Contributions:
Comment about this article or add new information about this topic:
- Abstracts: Dismissal of security expert adds fuel to Internet debate. Hacker case underscores Internet's vulnerability. Data network is found open to new threat
- Abstracts: The talk of cyberspace. Market opening on Internet for pollution-credit trades. Forging links between inner cities and the Internet
- Abstracts: Compaq seeks to join U.S. computer industry's elite; No. 1 PC maker bets on servers to challenge the three mainframe giants
- Abstracts: New wrinkles at the on-line Big 3. On-line service ending its ban of sexual materials on Internet; Compuserve hands over control to subscribers
- Abstracts: The urge to merge; the cellular industry, facing competition from PCS, is in the midst of a major shake-up. PriCelullar agrees to be purchased by American Cellular for $811 million