On Jan 07, 2014, at 02:15, Linus Nordberg <[email protected]> wrote:

> Richard Barnes <[email protected]> wrote
> Mon, 6 Jan 2014 22:01:03 -0500:
> 
> | I also wonder to what degree this is a "pervasive attack" issue.  If the
> | attack involves being physically close to the victim, it's hard to see how
> | the attacker would achieve a pervasive scale.
> 
> An attacker could control a large number of "home routers".
> 
> Do we need stronger indications that's actually being done at a large
> scale before we consider strengthening L2 protocols and best practices?
> If so, what is "large scale" and "pervasive”?

I’m in the camp that we don’t.

spt

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
perpass mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/perpass

Reply via email to