I think documenting this sort of thing would be useful.  I think it is
more often called covert channel analysis or examined under the
heading of privacy implications of protocols.

I do not have time to actively work on the project, but I do think
that we could significantly benefit from work in this area.


_______________________________________________
Ietf mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/ietf

Reply via email to