Recently there has been reports in newspapers about powerful organisations that
can sniff on wires and has paid for backdoors and compromising cryptographic
implementations.
Would it be a good idea to make a document describing best practices trying
to protect against such actions, to guide implemetors and service providers?
best regards
keld
_______________________________________________
ietf-smtp mailing list
ietf-smtp(_at_)ietf(_dot_)org
https://www.ietf.org/mailman/listinfo/ietf-smtp