Richard Bennett wrote:
Not to be too flip about it, but It's not clear to me that helping people break the law falls in the scope of the requirements for this working group or of the IETF in general.
What is "breaking the law" in one place is "supporting the human rights of the oppressed" in another.

But there's also corporate applications where there may be IT policy in place that restricts employees from sending lists of IP addresses of other users of that application in plaintext.

I admit that in both cases traffic analysis can be used to find *some* of the participating nodes, but a system where larger numbers of candidate nodes are transmitted to the ISP for ranking in plaintext is clearly not as safe as one where candidate nodes are transmitted to a trusted ISP for ranking in a secure form and that is not as safe as one where a trusted third party can anonymize the requests prior to having them ranked.

Given my position, I'm not really able to go on speculating more about what specific types of applications users might develop on top of the overlay network I implement for them, as it is important that my design be as generic as possible and not tailored to any specific use, particularly a use which might not be legal somewhere. What I can do it point out that a requirement that has come to me is that if I have my overlay use something like ALTO in order to build a more optimal overlay, some developers don't want node information being transmitted in plaintext, and others don't want it being transmitted at all.

Matthew Kaufman
_______________________________________________
alto mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/alto

Reply via email to