It's an infinite loop if you think about it: the hackers will always attack, and the defenders will always hide. Soon enough; our statues as defenders would mean "more and more freedoms gone from the internet".
Just like real life, authentication is a must before any interaction. So the key should be authentication.
Take the Clinton example:
-Clinton's guy signs in. Is this the right site? provide proof, please.
-Site takes John's request. Is this the right man? provide proof, please.
This simple authentication is carried on with bank accounts. Why isn't it carried out in crucial places on the internet on demand?
Google provides sign-in through the mobile phone now. That is a nice way to execute the authentication test between google and the user.
Aren't there private channels for these people to use ? I mean like a VPN?
Just like real life, authentication is a must before any interaction. So the key should be authentication.
Take the Clinton example:
-Clinton's guy signs in. Is this the right site? provide proof, please.
-Site takes John's request. Is this the right man? provide proof, please.
This simple authentication is carried on with bank accounts. Why isn't it carried out in crucial places on the internet on demand?
Google provides sign-in through the mobile phone now. That is a nice way to execute the authentication test between google and the user.
Aren't there private channels for these people to use ? I mean like a VPN?