Jefsey says it is a faked case.
He calls it JFC 3683.
He says it is commercial competition.
He says ad hominems answer his technical points.
He says he won.
He says it is to the IESG and IAB to say how.
The matter is important.
I wanted to know and I spent time.
I checked reading WG-ltru,
This can be argued both ways. (The most productive meeting I think
that I ever went to
was a physics standardization meeting in a castle in the South of
England with nothing of note within 20 miles, and not even a pub
within 10 miles. All we could do is work, meet and bond. And raid the
Hi,
This conversation of the IETF65 location started with an issue of
security.
I'd like to get this discussion back on track.
What are the security requirements for a distributed burrito
processing protocol?
If you are traveling from the conference hotel to a restaurant and are
mugged, is that
On Saturday, January 28, 2006 01:11:38 PM -0500 David B Harrington
[EMAIL PROTECTED] wrote:
This conversation of the IETF65 location started with an issue of
security.
I'd like to get this discussion back on track.
What are the security requirements for a distributed burrito
processing