And in some cases, a tiny stack is an advantage. It shortens the path whose trustworthiness one has to assure.
Robin Wilton Technical Outreach Director - Identity and Privacy On 9 Dec 2013, at 21:04, Richard Barnes <[email protected]> wrote: > On Mon, Dec 9, 2013 at 2:47 PM, Brian E Carpenter > <[email protected]> wrote: > On 09/12/2013 11:04, Stewart Bryant (stbryant) wrote: > (on a different list and under a differeny Subject header) > ... > > > Remembering of course that some platforms which wish > > to use the Internet simply do not have the capability for > > other than a very tiny very basic stack. > > > > I always use the PIC and the Arduino to remind myself what the > > lower end of the franchise looks like. > > It seems to me that perpass should think a little bit about > privacy and anti-surveillance issues for devices with tiny > stacks, and see if that calls for any specific IETF work items. > > This is not unexplored territory. > <http://tools.ietf.org/html/draft-ietf-core-coap-18> > <http://tools.ietf.org/html/draft-aks-crypto-sensors-02> > <http://tools.ietf.org/wg/dice/> > > > > > Brian > _______________________________________________ > perpass mailing list > [email protected] > https://www.ietf.org/mailman/listinfo/perpass > > _______________________________________________ > perpass mailing list > [email protected] > https://www.ietf.org/mailman/listinfo/perpass
_______________________________________________ perpass mailing list [email protected] https://www.ietf.org/mailman/listinfo/perpass
