istics of the phishing sites themselves; for example, links, images, lack of a SSL certificate,
or misdirection in the links. These variables are all under the control of the malicious
agent. In contrast, Net Trust uses features that are not under the control of the malicious
agent: user social network, user history and the history of the user’s social network. In
addition, the Net Trust toolbar takes advantage of a characteristic of phishing sites to
prevent one phishing victim from misdirecting others - the temporal history of phishing
sites. Phishing sites go up, are identified, and are taken down. Phishing sites do not stay
up over long periods of time. Therefore the impermanence of phishing sites is integrated
into the reputation system as described below.
Net Trust is a toolbar plug-in for a web browser. The toolbar will be the main source
of information to the user. The application has six primary components: the social net-
work, the reputation system, the third parties, the interface, and the data distribution
network.
Net Trust enables integration of information from trusted parties. These are not trusted
third parties, as is the tradition in security and cryptographic systems. The removal of the
word “third“ in the traditional trusted third party construct indicates that the individual
makes the final trust decision, not the trusted party. There is no root that determines which
parties are trusted. In trusted third party systems, the browser manufacturer, employer
or other third party often determines who is a trusted party. In Net Trust certificates
are self-signed, and users select trusted information providers. The Net Trust user, not
the distributor or developer, makes the final determination of which parties are trusted.
Compare this with SSL or Active X, where the user is provided a mechanism to place
trust in a third party. After the initial selection of the third party, the user’s decision is
implemented by technical fiat by accepting those the third party validates.
Net Trust integrates social network information. Individuals may have multiple social
networks: home, family, hobby, political or religious. Regardless of the level of overlap,
information from one social network may be inappropriate for another social network. Not
only do people share different information with different people but also different social net-
works are associated with different levels of trust. [10] For example, professional colleagues
can have much to offer in terms of evaluation of professional websites, but professional
interactions are not characterized by the same level of openness as family. Professional
networks are not systematically used to request intimate or religious information. Because
of these differences, overlapping contexts can cause a breach in privacy. In order to support
the construction of boundaries between one person’s various roles, the application allows a
user to have multiple identities (e.g., pseudonyms) coupled with multiple social networks.
Pseudonyms engage in disparate social networks. Members of that social network are called
“buddies“ both to indicate the similarity to other online connections and to indicate that
the standard for inclusion may vary. “Buddy“ is also sufficiently vague to communicate
that there is no standard for strength of the network tie. When a user leaves, departs,
9