On 09/10/2013 09:12 AM, t.p. wrote:
> It is a shame that this opportunity was not taken to highlight the need
> for authentication. Having a totally secure channel with perfect
> encryption is of little value if the other end of the channel is a
> hostile power.
True. But if strong authenticati
It is a shame that this opportunity was not taken to highlight the need
for authentication. Having a totally secure channel with perfect
encryption is of little value if the other end of the channel is a
hostile power.
RFC3365, which you cite, gets in right (of course!). It lists three
requireme
On 09/09/2013 01:24 AM, Jorge Amodio wrote:
> Will the discussion include the pervasive data mining from companies
> exploiting our Internet use for marketing and targeted advertising purposes
> ?
IMO the discussion should of course include that as one part
of a larger thing.
Corporate privacy-
Will the discussion include the pervasive data mining from companies
exploiting our Internet use for marketing and targeted advertising purposes
?
-J
On Sun, Sep 8, 2013 at 4:53 PM, IETF Chair wrote:
> Here are some thoughts on reports related to wide-spread monitoring and
> potential impacts
Here are some thoughts on reports related to wide-spread monitoring and
potential impacts on Internet standards, from me and Stephen Farrell:
http://www.ietf.org/blog/2013/09/security-and-pervasive-monitoring/
Comments appreciated, as always.
Jari & Stephen