Tony, Since it's not plausible to assume you aren't aware of RFC 2804, I have to wonder whether some of your comments below aren't just meant to be deliberately provocative.
Best wishes, Robin Robin Wilton Technical Outreach Director - Identity and Privacy On 11 Nov 2013, at 19:10, Tony Rutkowski <[email protected]> wrote: > On 11/11/2013 12:56 PM, Stephen Farrell wrote: >> IETF specifications need to be designed to protect against >> pervasive monitoring where possible. This list is intended >> for technical discussions attempting to meet that goal. > Where "possible," or where "appropriate." > > Surely you are not inferring that every "specification" > needs to be so designed? It seems context dependent. >> Discussion is limited to specific technical proposals for >> improvements in IETF protocols and to IETF process changes >> aiming to increase the liklihood that implementation and >> deployment of IETF protocols results in better mitigation >> for pervasive monitoring. > What if one believes that mitigation is not > appropriate, or that it pervasive monitoring > should be enhanced? Those apostates should > go somewhere else? > > Guess you don't want discuss improving the > protocols to enhance DPI or data retention. :-) > > cheers, > tony > _______________________________________________ > perpass mailing list > [email protected] > https://www.ietf.org/mailman/listinfo/perpass _______________________________________________ perpass mailing list [email protected] https://www.ietf.org/mailman/listinfo/perpass
