On Aug 6, 2020, at 8:18 AM, Ben Schwartz <[email protected]> wrote: > > I think opportunistic or unauthenticated encryption is worth pursuing.
Thanks. > However, your quote also says "use authentication when possible", and I > agree. I would like to avoid selecting an opportunistic encryption design > that doesn't match well with our authenticated encryption design, so I think > that means we need to develop them together. Fully agree. For every use case we adopt, the instantiation of it should not prevent other use cases from working well. --Paul Hoffman
smime.p7s
Description: S/MIME cryptographic signature
_______________________________________________ dns-privacy mailing list [email protected] https://www.ietf.org/mailman/listinfo/dns-privacy
