If we had a threat model document, it would be easier to determine which kinds of threats and uses are in-scope and out of scope.
Oh wait, … https://datatracker.ietf.org/doc/draft-ietf-trans-threat-analysis/ I again ask the Chairs to determine the consensus and advance this document. -- Senior Architect, Akamai Technologies Member, OpenSSL Dev Team IM: [email protected] Twitter: RichSalz
_______________________________________________ Trans mailing list [email protected] https://www.ietf.org/mailman/listinfo/trans
