I wouldn't dream of saying

"I didn't start it!  HE started it...! "
of course not

:-)
C
Neil J. McRae wrote:
> Interesting arms race you are creating here! Whilst I think the goal is
> honourable it looks very difficult and expensive to achieve but I do like
> a challenging problem.
>
> Regards,
> Neil.
>
>> -------- Original Message --------
>> Subject:     Fwd: W3C/IAB workshop on Strengthening the Internet Against
>> Pervasive Monitoring (STRINT)
>> Date:        Thu, 16 Jan 2014 13:33:31 +0000
>> From:        Christian de Larrinaga <[email protected]>
>> To:  [email protected] <[email protected]>
>>
>>
>>
>> Please pass this on to interested parties.
>>
>> The deadline for this has been extended until Monday 12:00 UTC.
>> Hope to see some of you there.
>>
>> Christian
>>
>> -------- Original Message --------
>> Subject:     W3C/IAB workshop on Strengthening the Internet Against
>> Pervasive Monitoring (STRINT)
>> Date:        Sun, 1 Dec 2013 10:48:15 -0500
>> From:        IAB Chair <[email protected]>
>> Reply-To:    [email protected]
>> To:  IETF Announce <[email protected]>
>> CC:  IAB <[email protected]>, IETF <[email protected]>
>>
>>
>>
>> W3C/IAB workshop on Strengthening the Internet
>> Against Pervasive Monitoring (STRINT)
>> ======================================
>>
>> Logistics/Dates:
>>
>> Submissions due: Jan 15 2014
>> Invitations issued: Jan 31 2014
>> Workshop Date: Feb 28 (pm) & Mar 1 (am) 2014
>>      To be Confirmed - could be all day Mar 1
>> Location: Central London, UK. IETF Hotel or nearby (TBC)
>> For queries, contact: [email protected], [email protected]
>> Send submissions to: [email protected]
>> Workshop web site: http://www.w3.org/2014/strint/
>>
>> The Vancouver IETF plenary concluded that pervasive monitoring
>> represents an attack on the Internet, and the IETF has begun to
>> carry out various of the more obvious actions [1] required to
>> try to handle this attack. However, there are additional much
>> more complex questions arising that need further consideration
>> before any additional concrete plans can be made.
>>
>> The W3C and IAB will therefore host a one-day workshop on the
>> topic of "Strengthening the Internet Against Pervasive
>> Monitoring" before IETF-89 in London in March 2014, with support
> >from the EU FP7 STREWS [2] project.
>> Pervasive monitoring targets protocol data that we also need for
>> network manageability and security. This data is captured and
>> correlated with other data. There is an open problem as to how
>> to enhance protocols so as to maintain network manageability and
>> security but still limit data capture and correlation.
>>
>> The overall goal of the workshop is to steer IETF and W3C work
>> so as to be able to improve or "strengthen" the Internet in the
>> face of pervasive monitoring.  A workshop report in the form of
>> an IAB RFC will be produced after the event.
>>
>> Technical questions for the workshop include:
>>
>> - What are the pervasive monitoring threat models, and what is
>>  their effect on web and Internet protocol security and privacy?
>> - What is needed so that web developers can better consider the
>>  pervasive monitoring context?
>> - How are WebRTC and IoT impacted, and how can they be better
>>  protected? Are other key Internet and web technologies
>>  potentially impacted?
>> - What gaps exist in current tool sets and operational best
>>  practices that could address some of these potential impacts?
>> - What trade-offs exist between strengthening measures, (e.g.
>>  more encryption) and performance, operational or network
>>  management issues?
>> - How do we guard against pervasive monitoring while maintaining
>>  network manageability?
>> - Can lower layer changes (e.g., to IPv6, LISP, MPLS) or
>>  additions to overlay networks help?
>> - How realistic is it to not be fingerprintable on the web and
>>  Internet?
>> - How can W3C, the IETF and the IRTF better deal with new
>>  cryptographic algorithm proposals in future?
>> - What are the practical benefits and limits of "opportunistic
>>  encryption"? 
>> - Can we deploy end-to-end crypto for email, SIP, the web, all
>>  TCP applications or other applications so that we mitigate
>>  pervasive monitoring usefully?
>> - How might pervasive monitoring take form or be addressed in
>>  embedded systems or different industrial verticals?
>> - How do we reconcile caching, proxies and other intermediaries
>>  with end-to-end encryption?
>> - Can we obfuscate metadata with less overhead than TOR?
>> - Considering meta-data: are there relevant differences between
>>  protocol artefacts, message sizes and patterns and payloads?
>>
>> Position papers (maximum of 5 pages using 10pt font or any
>> length Internet-Drafts) from academia, industry and others that
>> focus on the broader picture and that warrant the kind of
>> extended discussion that a full day workshop offers are the most
>> welcome. Papers that reflect experience based on running code
>> and deployed services are also very welcome. Papers that are
>> proposals for point-solutions are less useful in this context,
>> and can simply be submitted as Internet-Drafts and discussed on
>> relevant IETF or W3C lists, e.g. the IETF perpass list. [3]
>>
>> The workshop will be by invitation only. Those wishing to attend
>> should submit a position paper or Internet-Draft.  All inputs
>> submitted and considered relevant will be published on the
>> workshop web page. The organisers (STREWS project participants,
>> IAB and W3C staff) will decide whom to invite based on the
>> submissions received.  Sessions will be organized according to
>> content, and not every accepted submission or invited attendee
>> will have an opportunity to present as the intent is to foster
>> discussion and not simply to have a sequence of presentations.
>>
>> [1] http://down.dsg.cs.tcd.ie/misc/perpass.txt
>> [2] http://www.strews.eu/
>> [3] https://www.ietf.org/mailman/listinfo/perpass
>>
>>
>>
>
>

Reply via email to