of the text. .pdf produced by
openoffice.)
I minorly reformated the below message for readability.
=JeffH
--- Forwarded Message
From: Steve Goldstein [EMAIL PROTECTED]
Sent: Thursday, March 20, 2008 10:59 AM
To: Dewayne Hendricks; David Farber
Subject: Paper: State of the Internet Challenges
[EMAIL PROTECTED] said:
With an opening sentence of:
...
The document does not set a very helpful stage.
Well, .. nevermind.
=JeffH
___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf
but rather is something that we'll
need to decide on a case-by-case on-going basis.
Regardless, this overall topic area is one we (the greater Internet/Web
community) needs to pay attention to.
HTH,
=JeffH
--
Internet Standards and Governance Team
PayPal Information Risk Management
-13], but they are not germane to this
specification.
how does that look?
thanks,
=JeffH
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf
fwiw, I concur with Peter's analysis and conclusions.
=JeffH
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf
Hey Richard ( Adam),
Thanks very much for the detailed thorough review, and to you both for
promptly resolving the raised issues.
=JeffH
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf
,
=JeffH
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf
fyi (technically, the 2nd last call ends tomorrow)...
Subject: [certid] version 12
From: Peter Saint-Andre stpe...@stpeter.im
Date: Mon, 13 Dec 2010 12:49:49 -0700 (11:49 PST)
To: IETF cert-based identity cer...@ietf.org
Cc: Ben Campbell b...@nostrum.com
Jeff and I have published version -12.
Subject: [www.ietf.org/rt #37575] transcript of IETF-80 tech plenary discussion?
From: Wanda Lo via RT age...@ietf.org
Date: Mon, 09 May 2011 10:28:23 -0700
To: jeff.hod...@kingsmountain.com
Hi Jeff,
http://www.ietf.org/proceedings/80/minutes/plenaryt.txt
The minutes are based on Renee's
going by)
Seems we can all just GetYourCensorOn ..or we can go after SOPA / ProtectIP
(PIPA):
http://getyourcensoron.com/
http://americancensorship.org/
HTH,
=JeffH
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf
, Certificate Usages for TLSA
Resource Records.
suggested modest revision for terminological consistency:
7.2. TLSA Certificate Usage Types
This document creates a new registry, TLSA Resource Record Certificate
Usage Types
HTH,
=JeffH
of cancer on 12-Jul-2012.
He is sorely missed, and IETF meetings/activities won't seem the same without
his most trenchant perspectives, observations, contributions, and camaraderie.
For more information and tributes, see..
https://spaces.internet2.edu/display/rlbob/
=JeffH
.
thanks again,
=JeffH
presume you actually mean not necessarily, which would then be correct,
unless I'm misunderstanding something.
If the requirement really that you SHOULD NOT (rather than MUST NOT) serve
unprotected content, then I think the original language is okay.
agreed.
thanks,
=JeffH
offline for the next several
days)
thanks,
=JeffH
--
Ben's minor items:
M1) update 2818 ?
-- Does this draft update any other RFCs (e.g. 2616 or 2818)?
Maybe 2818, but based on the informational status of 2818, websec wg
discussions, and discussions with Ben and EKR, there's no statement
.
The plain overall comments are to some degree take 'em or leave 'em depending
upon folks' sense of urgency to get the spec through the IETF pipeline, but the
degree likely depends upon the observer.
I hope this is helpful,
=JeffH
--
comments on draft-laurie-pki-sunlight-05
substantive
apologies for latency, many meetings and a conference in the last couple of
weeks.
BenL replied:
On 1 January 2013 21:50, =JeffH jeff.hod...@kingsmountain.com wrote:
[ in the below discussion:
the spec, this spec refers to draft-laurie-pki-sunlight-05.
TLS-CT client refers to a TLS client
services publish their lists
of acceptable root certificates ?
=JeffH
Apologies for responding to recent comments in random order: I'm
travelling and have accumulated something of a backlog.
no worries :)
thx again for your thoughts.
BenL replied:
On 22 January 2013 03:11, =JeffH jeff.hod...@kingsmountain.com wrote:
snip
- is there a
standard reference
Some interesting recent research/thinking around privacy law, obligations,
legal theories frameworks...
The FTC and the New Common Law of Privacy
by Daniel Solove * April 13, 2014
http://www.concurringopinions.com/archives/2014/04/the-ftc-and-the-new-common-law-of-privacy-2.html
10 Reasons
And, building upon Solove's work, there's this...
Big Data Ethics
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2384174
Neil M. Richards
Jonathan H. King
January 23, 2014
Wake Forest Law Review, 2014
Abstract:
We are on the cusp of a Big Data Revolution, in which increasingly large
21 matches
Mail list logo