» from archive
RFC 7258 - Pervasive Monitoring Is an Attack -
2014-07-01 18:58:27 GMT
"The IETF will work to mitigate the technical aspects of PM, just as we do for protocol vulnerabilities in general. The ways in which IETF protocols mitigate PM will change over time as mitigation and attack techniques evolve and so are not described here. Those developing IETF specifications need to be able to describe how they have considered PM, and, if the attack is relevant to the work to be published, be able to justify related design decisions."
Best of Mokum