On Monday 18 August 2008 21:32, [EMAIL PROTECTED] wrote:
> I personally like that concept and especially the texts below very much,
> well done! They explain the current scope and a class where the user
> might find himself targetted.
> 
> Although I would like some more details what is done at which level; so,
> which precautins become active, what is changed between levels, etc,
> like it's done with the Physical Threat Level: tempfile encryption on
> (high and off (low). So examples would be, when is FOAF active? what
> informations are shared? what is active in other levels?
> 
> Maybe just too detailed would be an advanced view which displays
> affected configuration parameters, but I think the former, symptomatic
> description, is needed.

The detail is likely to change as we add more details e.g. tunnels, 
random-encrypted splitfiles, etc.

Attachment: pgppqXY1wwVFc.pgp
Description: PGP signature

_______________________________________________
Devl mailing list
[email protected]
http://emu.freenetproject.org/cgi-bin/mailman/listinfo/devl

Reply via email to