Tony,

Since it's not plausible to assume you aren't aware of RFC 2804, I have to 
wonder whether some of your comments below aren't just meant to be deliberately 
provocative.

Best wishes,

Robin

Robin Wilton

Technical Outreach Director - Identity and Privacy

On 11 Nov 2013, at 19:10, Tony Rutkowski <[email protected]> wrote:

> On 11/11/2013 12:56 PM, Stephen Farrell wrote:
>> IETF specifications need to be designed to protect against
>> pervasive monitoring where possible.  This list is intended
>> for technical discussions attempting to meet that goal.
> Where "possible," or where "appropriate."
> 
> Surely you are not inferring that every "specification"
> needs to be so designed?  It seems context dependent.
>> Discussion is limited to specific technical proposals for
>> improvements in IETF protocols and to IETF process changes
>> aiming to increase the liklihood that implementation and
>> deployment of IETF protocols results in better mitigation
>> for pervasive monitoring.
> What if one believes that mitigation is not
> appropriate, or that it pervasive monitoring
> should be enhanced?  Those apostates should
> go somewhere else?
> 
> Guess you don't want discuss improving the
> protocols to enhance DPI or data retention. :-)
> 
> cheers,
> tony
> _______________________________________________
> perpass mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/perpass
_______________________________________________
perpass mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/perpass

Reply via email to