OPINION: Internet traders are being held back by scare stories about credit card risks, protests Nick Rosen
The trailblazers who want to trade via the Net are being hampered by the weight of publicity stressing the dangers. The risks are minimal. Yet Joe Newbie is terrified to part with his credit card number over the Internet, even when dealing with well-known, legitimate businesses.

The computer security industry and the credit card companies have been getting away with self-serving scare stories about Internet security. "Russian hackers steal millions via the Internet", the Sunday Times reported recently, for example. Not a shred of proof was ever produced.

The security companies want to sell more security, and the credit card companies want to keep a stopper on Internet trading until their own Secure Electronic Trading (SET) standards have been finalised. This will not be before the final quarter of 1996.

Last year saw about $200m in Internet retailing. This year the figure could be $800m. The credit card companies particularly dislike the arrival of a dozen new, competing ways of doing business securely on the Net.

Many companies, including my own, have launched secure Internet trading services. The Intervid Commerce Server offers the facility to buy and sell over the Internet in a secure computer environment. No hacker will be able to steal your card number. Buyers can be sure that merchants are who they claim to be, and merchants can make the usual checks on customers. We accept Visa and Mastercard (with the knowledge and permission of our bank). We also accept Digicash, and E-cash and Cybercash. If we wanted we could even launch our own currency.

Yet the credit card companies advise their customers against doing business this way. They should be ignored. Different levels of security suit different products (or different people) at different times. We should resist the urge to set universal, expensively high security standards, and then impose them on the whole market. Eventually that would allow the card companies too much control.

The argument against systems such as ours is that they use a technology called Public Key Encryption with 40 bit encryption. The strongest version uses a 128 bit version, but the US Defense Department will not allow non- American companies to use this.

It is true that French hackers with a supercomputer managed to crack the 40 bit version after a week's solid processing. But for all practical purposes it is powerful enough. That is not to say the UK and EU should not lobby against the US restriction - perception is all, and most people would feel safer using the most sophisticated system there is.

Security is as weak as the weakest link in the chain, which often does not lie in the technology but in management decisions and human factors. The easiest way to penetrate our secure server would be to break in to the office and steal the password. And that is something a million bit encryption system could do nothing about.

Nick Rosen is managing director of Intervid. He can be contacted at nick@intervid.co.uk