In my vision of a more secure computing environment, the malicious hackers and programs wouldn’t exist because we would be able to immediately identify their sources. And yes, there are bound to be vulnerabilities and errors — the system is made by humans, after all. But with the new structure, once you close the newfound vulnerability, you also close off all forms of malicious hacking at once. Today, we have the exact opposite situation: Close one vulnerability and you stop just one malicious vector.
Of course, if you hate the idea of this new Internet's default authentication and the loss of anonymity, you could continue to use the old Internet. But in order to send me e-mail and send packets to my server, you would have to be authenticated by default. If I don’t know exactly who you are and what you sent, I don’t need your information — that's the risk I’m willing to take to stop malicious hackers.
Business and monetary concerns dictate that we implement an evolutionary process when a revolution is needed. So until I see the government or business request for a proposal that begins, “We are requesting proposals to rebuild computers and the Internet from the ground up in order to guarantee a more secure environment…,” I’m going to politely dismiss any thought that anyone is doing anything that will lead to real security.