From: Paul Judge <paul(_dot_)judge(_at_)ciphertrust(_dot_)com>
...
1. consent expression
2. policy enforcement
3. source tracking (authentication/identification/non-repudiation)
...
I am seeking comments on the charter.
-does the consent-based communication viewpoint sufficiently generalizes the
problem?
-do the three components cover the requirements?
...
What is "consent expression"? If it is not a trivial boolean like
"I do [not] like spam," how can it not be a magnet for abuse ranging
from minor privacy violations to more spam to literal visits from
death squads reducing their political enemies?
Vernon Schryver vjs(_at_)rhyolite(_dot_)com
_______________________________________________
Asrg mailing list
Asrg(_at_)ietf(_dot_)org
https://www1.ietf.org/mailman/listinfo/asrg