» from archive
- Pervasive Monitoring Is an Attack -
2014-07-01 18:58:27 GMT
Copy URL to clipboard
"The IETF will work to mitigate the technical aspects of PM, just as we do for protocol vulnerabilities in general. The ways in which IETF protocols mitigate PM will change over time as mitigation and attack techniques evolve and so are not described here. Those developing IETF specifications need to be able to describe how they have considered PM, and, if the attack is relevant to the work to be published, be able to justify related design decisions."
Best of Mokum