On Jan 07, 2014, at 02:15, Linus Nordberg <[email protected]> wrote: > Richard Barnes <[email protected]> wrote > Mon, 6 Jan 2014 22:01:03 -0500: > > | I also wonder to what degree this is a "pervasive attack" issue. If the > | attack involves being physically close to the victim, it's hard to see how > | the attacker would achieve a pervasive scale. > > An attacker could control a large number of "home routers". > > Do we need stronger indications that's actually being done at a large > scale before we consider strengthening L2 protocols and best practices? > If so, what is "large scale" and "pervasive”?
I’m in the camp that we don’t. spt
smime.p7s
Description: S/MIME cryptographic signature
_______________________________________________ perpass mailing list [email protected] https://www.ietf.org/mailman/listinfo/perpass
