If we had a threat model document, it would be easier to determine which kinds 
of threats and uses are in-scope and out of scope.

Oh wait, …  https://datatracker.ietf.org/doc/draft-ietf-trans-threat-analysis/

I again ask the Chairs to determine the consensus and advance this document.

--
Senior Architect, Akamai Technologies
Member, OpenSSL Dev Team
IM: [email protected] Twitter: RichSalz
_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans

Reply via email to