Comments: e-gold to track Cisco extortioner

Payment systems that claim to honor court orders are not really allowing the intent of the law to be carried out . The ease of establishing a Paypal or for that matter any bank account allows theft to go unchecked in every manner imaginable. So regardless of e-gold honors or does not honor a court order does not limit the ability of a criminal to open hundreds of accounts at various firms to recieve payment. The question is has Cisco damaged itself by allowing the information to leak? The way one could avoid detection is have Cisco purchase online currency from a dealer that has a financial interest in the deal. Perhaps the relationship of the payment system to the source code should be examined? If a payment system where to require an invoice to be logged against the incoming cash then linkage could be shown and Cisco would have to accept this prior to payment. If they agree then they have allowed themselves to pay black mail. So if the hacker where to send thru e-gold an invoice that was coded for his purposes and Cisco where to accept it then their payment would be proof of its understanding. If Cisco refused then the payment system would simply have an invoice with no identity involved. So a proposed invoice with not direct contract gets paid when the hacker gets the money then the crime is perfected. So by using an undefined invoicing structure with a suggested payment for unstated services would allow a hacker to get closer to escaping the long arm of the law. What is in place now is crude and blunt if invoices could be sent without being confirmed by those being billed the criminality can be determined later.

Posted by Jimbo at November 6, 2004 05:21 AM
MT::App::Comments=HASH(0x55dfa2a84520) Subroutine MT::Blog::SUPER::site_url redefined at /home/iang/www/fc/cgi-bin/mt/lib/MT/ line 125.