Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits. Anti-spam check. Do not fill this in!== Vulnerabilities == Existing Internet protocols were not designed for today’s [[Internet]], where the [[trustworthiness]] of [[user]]s cannot be assumed and where high-stakes, [[mission-critical]] [[application]]s increasingly reside. Malicious users exploit the weakness of existing Internet protocols to achieve [[anonymity]] and use that [[anonymity]] as a safe haven from which to launch repeated [[attack]]s on their victims. Summary: Please note that all contributions to the The IT Law Wiki are considered to be released under the CC-BY-SA Cancel Editing help (opens in new window) Retrieved from "https://itlaw.wikia.org/wiki/Internet_Protocol"