And in some cases, a tiny stack is an advantage. It shortens the path whose 
trustworthiness one has to assure.

Robin Wilton

Technical Outreach Director - Identity and Privacy

On 9 Dec 2013, at 21:04, Richard Barnes <[email protected]> wrote:

> On Mon, Dec 9, 2013 at 2:47 PM, Brian E Carpenter 
> <[email protected]> wrote:
> On 09/12/2013 11:04, Stewart Bryant (stbryant) wrote:
> (on a different list and under a differeny Subject header)
> ...
> 
> > Remembering of course that some platforms which wish
> > to use the Internet simply do not have the capability for
> > other than a very tiny very basic stack.
> >
> > I always use the PIC and the Arduino to remind myself what the
> > lower end of the franchise looks like.
> 
> It seems to me that perpass should think a little bit about
> privacy and anti-surveillance issues for devices with tiny
> stacks, and see if that calls for any specific IETF work items.
> 
> This is not unexplored territory.
> <http://tools.ietf.org/html/draft-ietf-core-coap-18>
> <http://tools.ietf.org/html/draft-aks-crypto-sensors-02>
> <http://tools.ietf.org/wg/dice/>
> 
> 
>  
> 
>     Brian
> _______________________________________________
> perpass mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/perpass
> 
> _______________________________________________
> perpass mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/perpass
_______________________________________________
perpass mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/perpass

Reply via email to