At 12:28 PM -0800 2/7/02, John Hudson wrote: >1. The software industry has already devised mechanisms to protect >against e-mail forgery, e.g. private-public key encryption. >
And nobody uses them because they're too complex. >2. What you describe is criminal fraud and there are laws to protect >against such 'spoofing' and to punish those who perpetrate it. > Yes, there are. And there are laws to protect against spam and denial of service attacks and cracking systems. For that matter there are laws to protect against burglary, but I still have locks on my front door. Laws are no substitute for prevention. -- +-----------------------+------------------------+-------------------+ | Elliotte Rusty Harold | [EMAIL PROTECTED] | Writer/Programmer | +-----------------------+------------------------+-------------------+ | The XML Bible, 2nd Edition (Hungry Minds, 2001) | | http://www.ibiblio.org/xml/books/bible2/ | | http://www.amazon.com/exec/obidos/ISBN=0764547607/cafeaulaitA/ | +----------------------------------+---------------------------------+ | Read Cafe au Lait for Java News: http://www.cafeaulait.org/ | | Read Cafe con Leche for XML News: http://www.ibiblio.org/xml/ | +----------------------------------+---------------------------------+