On 11/11/2013 12:56 PM, Stephen Farrell wrote:
IETF specifications need to be designed to protect against
pervasive monitoring where possible.  This list is intended
for technical discussions attempting to meet that goal.
Where "possible," or where "appropriate."

Surely you are not inferring that every "specification"
needs to be so designed?  It seems context dependent.
Discussion is limited to specific technical proposals for
improvements in IETF protocols and to IETF process changes
aiming to increase the liklihood that implementation and
deployment of IETF protocols results in better mitigation
for pervasive monitoring.
What if one believes that mitigation is not
appropriate, or that it pervasive monitoring
should be enhanced?  Those apostates should
go somewhere else?

Guess you don't want discuss improving the
protocols to enhance DPI or data retention. :-)

cheers,
tony
_______________________________________________
perpass mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/perpass

Reply via email to