] The ability to have a presence should of course be ] available to anyone; but the ability to act in cyberspace ] - for example, to collect someone's personal ] information or their money - should be accompanied ] by some accountability. Esther Dyson's take on how to solve the phishing problems. Be sure to read the comments. Tom makes an appearance pointing out that what begins with the DNS system and the location bar, might end with SSL certificates, and better handling of the elements (UI and otherwise) surrounding their usage and certification. The Accountable Net: Who Should Be Accountable? |