Amazines Free Article Archive
www.amazines.com - Saturday, November 28, 2020
Read about the most recent changes and happenings at Amazines.com
Log into your account or register as a new author. Start submitting your articles right now!
Search our database for articles.
Subscribe to receive articles emailed straight to your email account. You may choose multiple categories.
View our newest articles submitted by our authors.
View our most top rated articles rated by our visitors.
* Please note that this is NOT the ARTICLE manager
Add a new EZINE, or manage your EZINE submission.
Add fresh, free web content to your site such as newest articles, web tools, and quotes with a single piece of code!
Home What's New? Submit/Manage Articles Latest Posts Top Rated Article Search
Google
Subscriptions Manage Ezines
CATEGORIES
 Article Archive
 Advertising (133434)
 Advice (161170)
 Affiliate Programs (34757)
 Art and Culture (73748)
 Automotive (145650)
 Blogs (75216)
 Boating (9844)
 Books (17221)
 Buddhism (4128)
 Business (1329020)
 Business News (426382)
 Business Opportunities (366351)
 Camping (10967)
 Career (72752)
 Christianity (15849)
 Collecting (11638)
 Communication (115068)
 Computers (241942)
 Construction (38921)
 Consumer (49685)
 Cooking (17067)
 Copywriting (6653)
 Crafts (18205)
 Cuisine (7543)
 Current Affairs (20419)
 Dating (45889)
 EBooks (19696)
 E-Commerce (48224)
 Education (185303)
 Electronics (83506)
 Email (6407)
 Entertainment (159838)
 Environment (28927)
 Ezine (3039)
 Ezine Publishing (5451)
 Ezine Sites (1550)
 Family & Parenting (110929)
 Fashion & Cosmetics (196424)
 Female Entrepreneurs (11847)
 Feng Shui (131)
 Finance & Investment (310446)
 Fitness (106332)
 Food & Beverages (62917)
 Free Web Resources (7940)
 Gambling (30223)
 Gardening (25149)
 Government (10532)
 Health (629685)
 Hinduism (2206)
 Hobbies (44055)
 Home Business (91582)
 Home Improvement (251105)
 Home Repair (46177)
 Humor (4832)
 Import - Export (5453)
 Insurance (45105)
 Interior Design (29585)
 International Property (3485)
 Internet (191005)
 Internet Marketing (146475)
 Investment (22848)
 Islam (1167)
 Judaism (1356)
 Law (80453)
 Link Popularity (4595)
 Manufacturing (20857)
 Marketing (98998)
 MLM (14136)
 Motivation (18221)
 Music (27012)
 New to the Internet (9496)
 Non-Profit Organizations (4048)
 Online Shopping (129631)
 Organizing (7805)
 Party Ideas (11852)
 Pets (38069)
 Poetry (2234)
 Press Release (12683)
 Public Speaking (5635)
 Publishing (7528)
 Quotes (2407)
 Real Estate (126636)
 Recreation & Leisure (95397)
 Relationships (87678)
 Research (16170)
 Sales (80337)
 Science & Technology (110257)
 Search Engines (23488)
 Self Improvement (153226)
 Seniors (6236)
 Sexuality (35949)
 Small Business (49283)
 Software (83015)
 Spiritual (23475)
 Sports (116085)
 Tax (7659)
 Telecommuting (34067)
 Travel & Tourism (307864)
 UK Property Investment (3121)
 Video Games (13428)
 Web Traffic (11747)
 Website Design (56838)
 Website Promotion (36595)
 World News (1000+)
 Writing (35790)
Author Spotlight
ELLISEN WANG

I'm Ellisen, nice to meet you! Obviously you're here because you want to know who I am. Wel...more
ANISH SAH

My Name is Anish Sah, I am an Internet Marketing and SEO Expert, Social Media Guru and young Entrepr...more
CACEY TAYLOR

Im just a man who likes to be happy and see others happy. Im into home business, sports, family, and...more
DANICA EVANS

Danica Evans is an experienced author and online content writer. She has done her major in psycholog...more
SHOVON JOARDER

Shovon Joarder has been working as Freelance Marketing Project Manager for over four years. He also ...more


5 reasons why the proposed id scheme for internet users is a bad idea - Slate 8 Inch Android Touch by icdenta icdenta





Article Author Biography
5 reasons why the proposed id scheme for internet users is a bad idea - Slate 8 Inch Android Touch by
Article Posted: 05/24/2012
Article Views: 56
Articles Written: 1096
Word Count: 1129
Article Votes: 0
AddThis Social Bookmark Button

5 reasons why the proposed id scheme for internet users is a bad idea - Slate 8 Inch Android Touch


 
Business,Business News,Business Opportunities
Imagine waking up in a world, where you would need to use two-factor authentication/biometric based ID, in order to do anything online. The reason for this? Accountability and supposedly, prevention of cybercrime. This may well sound like the long-term reality, but Kaspersky’s CEO Eugene Kaspersky has been pushing the idea for years. According to a recently published article, he still believes that the time has come for a mass adoption of hardware IDs affecting every Internet user. Here are five reasons why I think this is a bad idea, if not one that is virtually impossible to implement.

“To prevent the misuse of social networking accounts, Kaspersky is pushing the idea of government IDs as a prerequisite for all computer users. “I’ve been talking about this for four years already, that we need to have a secure design for the (entire) internet,” he says.

In Kaspersky’s perfect world, all digital citizens would carry some form of ID to go online, hopefully creating greater hurdles for malware creators - but creating a nightmare for privacy advocates.” “When you buy a car, the car is registered and you have a drivers licence. If you want to have a gun, the same thing - it’s registered to the person who bought it. The question is why? Because it’s dangerous.

With computers, you can make much more harm than with a gun or car.” At first, the proposed ID scheme seems pretty logic in terms of accountability. Here are five points on what’s wrong with it. Privacy vs Security for the sake of accountability - Interestingly, Kaspersky isn’t claiming that the ID scheme would somehow lead to more privacy being sacrificed on behalf of the users. Instead, he argues that privacy is already dead, and that your ISP already knows everything about you, therefore the use of hardware IDs shouldn’t really have an impact on the end user, since he’s losing nothing.

If privacy is already dead, and an ISP somewhere across the globe always knows everything about the activities of its customers, then what’s the point of having a hardware based ID to authenticate something that’s (supposedly) already known? There isn’t. Which leads us to the best possible solution to the problem of tracking down the source of a cybercriminal - cross-border/cross-agency threat intelligence sharing. Mass adoption of two-factor authentication is no proof that it works, exactly the opposite - Using the “success” of two-factor authentication for E-banking as an example on the usefulness of the proposed IDs is partially incorrect.

How did cybercriminals manage to undermine the myth of the hardware based authentication? Not by attempting to attack it directly, but by bypassing it entirely in the sense of patiently and automatically waiting for the now authenticated victim to start interacting with the E-banking provider. Neither a SSL connection, nor a two-factor authentication device would prevent a crimeware-infected host from having its owner victimized by cybercriminal on the other side of the world. In the worst case, it would offer the user a false feeling of security.

Hardware IDs would not solve the problem, since a malware infected host will be used to commit the same crimes - The article claims that the ID scheme would create some sort of hurdle for malware authors, which is totally untrue. How come? Even if we assume that the end user would be unplugging himself/herself from the Internet and connectivity would be disabled unless he authenticates himself again, botnet masters would continue operating with the bots whose users are online, taking advantage of the different time zones. With or without the hardware ID, the malware-infected host would continue forwarding the responsibility for the actions of the actual cybercriminal, to the owner of the host, unless it’s proven the same has been compromised. Long gone are the days when a cybercriminal would use his own host to commit the crimes, unless we exclude the Mariposa botnet masters of course, who got caught by doing exactly the same.

By authenticating yourself on a PC that’s not yours, you automatically inherit its reputation - A quote from the article - “Kaspersky says that in Dubai “they are going to introduce regulations that in public places, to get access to public WiFi, you have to present your ID.” The idea is that whenever a phishing attack is launched from a particular host, using the proposed ID scheme would allow law enforcement to find out the person that’s supposedly behind the campaign based on the fact that he’s already authenticated himself. In reality though, even when you’re using a public computer, the malicious campaigns that were going on in the background would continue taking place, with numerous users identifying themselves, and none of them would theoretically have anything to do with these background processed maintained by someone on the other side of the world. Budgeting the idea on an international scale is off base - In order for this ID scheme to get even close to being of any use, would be its mass adoption.

Otherwise, certain countries that deny, do not have the resources, or don’t even believe in the idea, wouldn’t bother implementing this. The real problem with fighting cybercrime has never been about the lack of technologies or knowledge on how the ecosystem really works. It’s always been about the lack of mass adoption for these technologies, and the lack of active cooperation among countries.

Even if we assume that in a perfect world, this scheme gets implemented, just like photoshop-ed IDs sent to domain registrars in Russia and China in order to comply with new regulations, biometric passports have been under fire since day one. It would be totally naive to assume that the same wouldn’t happen to these IDs as well. Do you think the pros of the proposed hardware based ID scheme — if any — are worth the loss of privacy? Do you still believe privacy exists online? Are you willing to sacrifice even the left overs of it, with the idea to improve accountability over the Internet, and supposedly limit cybercrime? How long before cybercriminals undermine the ID scheme as well, and wouldn’t a potential flaw in it lead us the same situation we’re into today - millions of end users still susceptible to outdated 3rd party application flaws and vulnerable browser plugins, given the fact that only a small number of the hardware ID users would even know they’re susceptible to impersonation based on the flaw? Talkback. Cartoon courtesy of Clay Bennett..

We are high quality suppliers, our products such as Slate 8 Inch Android Touch Tablet , China Tablet Protective Case for oversee buyer. To know more, please visits Slate 8 Inch Android Touch Tablet.

Related Articles - Slate 8 Inch Android Touch Tablet, China Tablet Protective Case,

Email this Article to a Friend!

Receive Articles like this one direct to your email box!
Subscribe for free today!

 Rate This Article  
Completely useless, should be removed from directory.
Minimal useful information.
Decent and informative.
Great article, very informative and helpful.
A 'Must Read'.

 

Do you Agree or Disagree? Have a Comment? POST IT!

 Reader Opinions 
Submit your comments and they will be posted here.
Make this comment or to the Author only:
Name:
Email:
*Your email will NOT be posted. This is for administrative purposes only.
Comments: *Your Comments WILL be posted to the AUTHOR ONLY if you select PRIVATE and to this PUBLIC PAGE if you select PUBLIC, so write accordingly.
 
Please enter the code in the image:



 Author Login 
LOGIN
Register for Author Account

 

Advertiser Login

 

ADVERTISE HERE NOW!
   Limited Time $60 Offer!
   90  Days-1.5 Million Views  

 

Great Paranormal Romance


DAMIAN POWELL

Demonstrated exceptional leadership in the government and private sector at an executive level. Skil...more
XTAGE XIXTEEN

My name is Kingsley Chihozie. Am from the western part of Africa, Nigerian. Am a graduate of Abia St...more
LAURA JEEVES

At LeadGenerators, we specialise in content-led Online Marketing Strategies for our clients in the t...more
CHRIS BURTON

I am an International Corporate Consultant specialising in the bespoke formation of offshore compani...more
TIM FAY

I am not a writer nor am I trying to become a writer. I am an average person with average intelligen...more
STEVERT MCKENZIE

Stevert Mckenzie, Travel Enthusiast. ...more
SUSAN FRIESEN

Susan Friesen, founder of the award-winning web development and digital marketing firm eVision Media...more
JASON NG

Jason Ng has a huge passion for the health and fitness industry as he strongly believes that having ...more
GENE MYERS

Author of four books and two screenplays; frequent magazine contributor. I have four other books "in...more
STEPHEN BYE

Steve Bye is currently a fiction writer, who published his first novel, ‘Looking Forward Through The...more

HomeLinksAbout UsContact UsTerms of UsePrivacy PolicyFAQResources
Copyright © 2020, All rights reserved.
Some pages may contain portions of text relating to certain topics obtained from wikipedia.org under the GNU FDL license