> Or are you simply trying to delay the inevitable?
I'm open to any solution which meets the stated requirements & is
deployable & usable on real-world
production networks, without necessitating a total redesign of said
networks & the complete social
reorganization of the entities in question.
;>
It’s not the networks that need to be “totally redesigned”, but the mechanism
to do surveillance. And only for some kinds of traffic (that uses TLS 1.3).
And we are not talking about “complete” “social reorganization” of the entities
(if you mean endpoints) – most of them already carry all that’s necessary (and
more) to perform surveillance from inside the endpoint.
There's some very constructive discussion taking place now about the
relative merits of various approaches, & I'm following it quite keenly.
So am I. ;>
-----------------------------------
Roland Dobbins <[email protected]>
smime.p7s
Description: S/MIME cryptographic signature
_______________________________________________ TLS mailing list [email protected] https://www.ietf.org/mailman/listinfo/tls
