Hi Tobias
The abstract does say that "The memo describes a possible deployment
model suitable", the keyword being "a". I agree that the title is a bit
broad but that is because in section 13 and 14, we discuss some broader
trade offs of doing security at the different layers of the protocol
s
Hey Mohit,
I see your point and that it is out of scope for the document. However, I feel
the title and the abstract is then a bit misleading and should say that this
document discusses security architectures and cryptographic functions for
authentication/signing only?
Just a thought to avoid mi