Hi Bjoern,

On 02/24/2014 04:20 PM, Bjoern Hoehrmann wrote:
>> >What can I do to help kill that proposal?
> Understanding https://tools.ietf.org/html/rfc2804 will be useful. Also
> note that increasingly proxies that break through end-to-end encryption
> are the only means of self-defense available against applications exfil-
> trating user data without user consent from heavily timbled computer
> systems that do not permit inspecting memory and system calls in other
> ways as part of some digital repression mechanism.

That is a valid comment.

But please, let's not re-start the technical
discussion here, it belongs on the httpbis list.

Thanks,
S.

_______________________________________________
perpass mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/perpass

Reply via email to