Richard Barnes <[email protected]> wrote
Mon, 6 Jan 2014 22:01:03 -0500:

| I also wonder to what degree this is a "pervasive attack" issue.  If the
| attack involves being physically close to the victim, it's hard to see how
| the attacker would achieve a pervasive scale.

An attacker could control a large number of "home routers".

Do we need stronger indications that's actually being done at a large
scale before we consider strengthening L2 protocols and best practices?
If so, what is "large scale" and "pervasive"?
_______________________________________________
perpass mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/perpass

Reply via email to