>> From the browser side of things, 0-RTT is a solution to a very real
>> problem. We are excited about TLS 1.3 supporting 0-RTT (or 0-RTT resumption)
>> and converting QUIC to use the TLS 1.3 handshake as a result.
>
> ...
> TCP in the works? (does TCPCT work on the client side?). Do you have any
> human perception data; to people even notice the 3% at this point? (loading
> google seems remarkably fast!).  There's a very strong temptation to bias
> for what's easy to measure here.

We also lack statistics on the other costs associated with security
failures. The best I can tell, we have no idea of the impact if its
not in US Financial.

I wrote to the United Nations and Human Rights Watch a while back, and
they don't appear to collect statistics on human rights violations
after incidents like Diginotar.

I can't help but wonder how many folks would agree to controls like
Public Key Pinning with Overrides or 0-RTT if their well being and
their family's well being were at stake.

Jeff

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to