Hi Bjoern, On 02/24/2014 04:20 PM, Bjoern Hoehrmann wrote: >> >What can I do to help kill that proposal? > Understanding https://tools.ietf.org/html/rfc2804 will be useful. Also > note that increasingly proxies that break through end-to-end encryption > are the only means of self-defense available against applications exfil- > trating user data without user consent from heavily timbled computer > systems that do not permit inspecting memory and system calls in other > ways as part of some digital repression mechanism.
That is a valid comment. But please, let's not re-start the technical discussion here, it belongs on the httpbis list. Thanks, S. _______________________________________________ perpass mailing list [email protected] https://www.ietf.org/mailman/listinfo/perpass
