Techniques for presenting identification of a remote network entity to a
human user include determining one or more vectors of presentation
elements that are readily distinguishable and memorable to a user.
Message data is received from a remote process on the network and
includes a network identity that uniquely identifies an associated remote
entity. The network identity is input to a secure function to produce a
secure number. A secure function produces dissimilar output values for
similar input values. A particular presentation element is selected from
a vector based only on the secure number and presented to the user. Even
when the network identity is similar to that of a trusted entity, the
particular presentation element is expected to be dissimilar to one
associated with the trusted entity.