Hi Ted, On 12/5/13 12:21 AM, Ted Lemon wrote: > If your example for "harm the operation of the internet" is transparent > caching, that point has been answered: define a protocol for caching that is > not transparent, and allow the incentive structure around end users who > benefit from that caching to motivate them to use it, rather than simply > forcing them to use it in their own best interest.
It's fine to have aspirations, and establishing an architecture in which intermediaries can be properly identified and authorized is important. However, let's not take aspirations that do not even exist in the form of an Internet-Draft, assume them as fact, and dismiss those who live in the real world where caching is a necessity in bandwidth-constrained environments. Please let's take this step by step. A few drafts that get us there seem in order. Eliot _______________________________________________ perpass mailing list [email protected] https://www.ietf.org/mailman/listinfo/perpass
