A fine argument in the abstract, but reality bites.
Stephen Kent wrote:
sent" in this era of the Internet. Security is not black and white,
but the gray area we're discussing does bother me. If one cares
about knowing where the data originated, and that it has not been
altered, then one needs to make use of the tools provided to address
that concern. if one doesn't use the tools, then one does not care
very much, and the results may be surprising :-).
Who is "one", in your mind? Mail, web, WAP client application
writers? Or the poor end-user who gets the surprise without having
a clue what hit him?
As an end-user, I can be as aware as I like about the security issues,
but if client software doesn't support security, and/or my ISP, services
don't support it, there's nothing I can do.
I am not saying that security isn't the answer -- but I do think you're
looking at your chalkboard, not deployed reality, when you suggest
it isn't a problem because there are technologies for authenticating
packets.
Leslie.
--
-------------------------------------------------------------------
"My body obeys Aristotelian laws of physics."
-- ThinkingCat
Leslie Daigle
leslie(_at_)thinkingcat(_dot_)com
-------------------------------------------------------------------