From owner-doc-jp@jp.FreeBSD.org Wed Feb 18 03:32:35 2009
Received: (from daemon@localhost)
	by castle.jp.FreeBSD.org (8.11.6p2+3.4W/8.11.3) id n1HIWZ376058;
	Wed, 18 Feb 2009 03:32:35 +0900 (JST)
	(envelope-from owner-doc-jp@jp.FreeBSD.org)
Received: from discus (78-56-107-153.static.zebra.lt [78.56.107.153])
	by castle.jp.FreeBSD.org (8.11.6p2+3.4W/8.11.3) with SMTP/inet id n1HIWWq76050
	for <doc-jp@jp.freebsd.org>; Wed, 18 Feb 2009 03:32:32 +0900 (JST)
	(envelope-from user@domain.com)
Message-Id: <200902171832.n1HIWWq76050@castle.jp.FreeBSD.org>
x-mailer: qualcomm windows eudora version 7.1.0.9
To: <doc-jp@jp.FreeBSD.org>
from: Nancy <Nancy06@wideopenwest.com>
mime-version: 1.0
content-type: text/plain; charset="us-ascii"; format=flowed
Reply-To: doc-jp@jp.FreeBSD.org
Precedence: list
Date: Tue, 17 Feb 2009 18:32:22 GMT
X-Sequence: doc-jp 65433
Subject: [doc-jp 65433] Perfect Relief Facilitation
Sender: owner-doc-jp@jp.FreeBSD.org
X-Originator: Nancy06@wideopenwest.com
X-Distribute: distribute version 2.1 (Alpha) patchlevel 24e+060209

Tue, 17 Feb 2009 18:32:22 GMT
Re: Splendid Substance Alternatives

http://pionpick.com?TrrRO
























--
Ignore all Below This Line Random Gibberish :)
--

A more secure network is one that would almost certainly offer less anonymity and privacy. That is likely to be the great tradeoff for the designers of the next Internet. One idea, for example, would be to require the equivalent of drivers' licenses to permit someone to connect to a public computer network. But that runs against the deeply held libertarian ethos of the Internet.Proving identity is likely to remain remarkably difficult in a world where it is trivial to take over someone's computer from half a world away and operate it as your own. As long as that remains true, building a completely trustable system will remain virtually impossible.

The Stanford Clean Slate project won't by itself solve all the main security issues of the Internet, but it will equip software and hardware designers with a toolkit to make security features a more integral part of the network and ultimately give law enforcement officials more effective ways of tracking criminals through cyberspace. That alone may provide a deterrent.

