I think this begs the question of whether currently known and
deployable security technologies are actually adequate to the task of
securing our networks and networked protocols.
well, yes, it quite explicitly begs to have such questions discussed, but in
their own forum and before Last Call for functions that use them, rather than
dcrocker a t ...
WE'VE MOVED to: www.bbiw.net
Ietf mailing list