Hi Ted,

On 12/5/13 12:21 AM, Ted Lemon wrote:
> If your example for "harm the operation of the internet" is transparent 
> caching, that point has been answered: define a protocol for caching that is 
> not transparent, and allow the incentive structure around end users who 
> benefit from that caching to motivate them to use it, rather than simply 
> forcing them to use it in their own best interest.


It's fine to have aspirations, and establishing an architecture in which
intermediaries can be properly identified and authorized is important. 
However, let's not take aspirations that do not even exist in the form
of an Internet-Draft, assume them as fact, and dismiss those who live in
the real world where caching is a necessity in bandwidth-constrained
environments.

Please let's take this step by step.  A few drafts that get us there
seem in order.

Eliot
_______________________________________________
perpass mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/perpass

Reply via email to