[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Key to the Future of E-Commerce



http://techweb.cmp.com/oem/docs/commerce.html

Breaking Into Electronic Commerce [Excerpts]

By Larry Lange

Internet commerce is a riddle wrapped in an enigma. At once the
biggest opportunity the computer and communications industries face in
the latter half of the 1990s, it also represents their biggest risk. ...

The L0pht is about what you'd expect in the way of headquarters for a
motley group of twentysomething computer hackers with Internet
names like Deth Vegtable, Brian Oblivion and Mudge. ...

Mudge and his ilk of brilliant break-in artists believe they play an 
important role as the underground angels of Internet commerce, 
minding the gates to the new digital marketplace. ...

Eric Hughes agrees. As a co-founder of Cypherpunks, Hughes is 
part of a virtual band of code crackers spun out of the Advanced 
Computer Lab at the University of California at Berkeley, connected 
by a regular listserv-group e-mail that reports as many as 60 
security breeches daily. The group's raison d'etre, says Hughes, is 
"evaluating security in the interest of the user.'' His frank appraisal 
of the state of the art in electronic-commerce products is a tonic for 
the hyperbole of the public-relations machine.

"I disagree with the characterization that electronic-security tools 
are in a high state of excellence,'' Hughes says. "In fact, I consider 
the state-of-shelf quite poor and not economical to deploy. Until 
platform security is drastically improved, these kinds of problems 
correctly lead to some queasiness over the widespread use of 
PCs to keep secrets.'' 

Like it or not, the Web denizens like Hughes and Mudge hold the 
key to the future of electronic commerce on the Internet, and 
everyone in the industry knows it. ...

Not all Internet companies are courting the cyber Robin Hoods, 
however. "We're trying to prove that cryptography is powerful and 
can make viable, attractive and commercial propositions, while at 
the same time protecting people's privacy,'' says David Chaum,
"The Cypherpunk approach is the opposite. It's 'We're gonna 
make and break systems and we're gonna debunk things by 
finding weakness in systems.''' 

[Snip balance of longish feature article]