Re: thoughts on pervasive monitoring

2013-09-10 Thread Stephen Farrell
On 09/10/2013 09:12 AM, t.p. wrote: > It is a shame that this opportunity was not taken to highlight the need > for authentication. Having a totally secure channel with perfect > encryption is of little value if the other end of the channel is a > hostile power. True. But if strong authenticati

Re: thoughts on pervasive monitoring

2013-09-10 Thread t . p .
It is a shame that this opportunity was not taken to highlight the need for authentication. Having a totally secure channel with perfect encryption is of little value if the other end of the channel is a hostile power. RFC3365, which you cite, gets in right (of course!). It lists three requireme

Re: thoughts on pervasive monitoring

2013-09-08 Thread Stephen Farrell
On 09/09/2013 01:24 AM, Jorge Amodio wrote: > Will the discussion include the pervasive data mining from companies > exploiting our Internet use for marketing and targeted advertising purposes > ? IMO the discussion should of course include that as one part of a larger thing. Corporate privacy-

Re: thoughts on pervasive monitoring

2013-09-08 Thread Jorge Amodio
Will the discussion include the pervasive data mining from companies exploiting our Internet use for marketing and targeted advertising purposes ? -J On Sun, Sep 8, 2013 at 4:53 PM, IETF Chair wrote: > Here are some thoughts on reports related to wide-spread monitoring and > potential impacts

thoughts on pervasive monitoring

2013-09-08 Thread IETF Chair
Here are some thoughts on reports related to wide-spread monitoring and potential impacts on Internet standards, from me and Stephen Farrell: http://www.ietf.org/blog/2013/09/security-and-pervasive-monitoring/ Comments appreciated, as always. Jari & Stephen