Re: Agenda, security, and monitoring
2014-02-03 13:16:35
From: John C Klensin <john-ietf(_at_)jck(_dot_)com>
After looking through the agenda and thinking about end to end
confidentiality mechanisms, a few questions/suggestions:
The recent news reports that I have seen are that the NSA's pervasive
monitoring focuses on "metatada", "who is talking to whom". And the
trouble with end-to-end confidentiality mechanisms is that they do not
hide the destination address; indeed they can't. And it seems to me
that almost no confidentiality systems have been focused on
confidentiality of message destinations.
So I think some thought needs to be put into what can be done to
thwart pervasive monitoring when the information to be concealed is
the identity of the endpoints.
Dale
<Prev in Thread] |
Current Thread |
[Next in Thread>
|
- Re: Agenda, security, and monitoring, (continued)
- Re: Agenda, security, and monitoring, Theodore Ts'o
- Re: Agenda, security, and monitoring, Phillip Hallam-Baker
- Re: Agenda, security, and monitoring, John C Klensin
- Re: Agenda, security, and monitoring, Phillip Hallam-Baker
- Re: Agenda, security, and monitoring, t.p.
- Re: Agenda, security, and monitoring, Dave Crocker
- Re: Agenda, security, and monitoring, Alessandro Vesely
Re: Agenda, security, and monitoring, Joseph Lorenzo Hall
Re: Agenda, security, and monitoring,
Dale R. Worley <=
|
Previous by Date: |
Re: Email header randon(?) changes, Brian E Carpenter |
Next by Date: |
Re: Agenda, security, and monitoring, Brian E Carpenter |
Previous by Thread: |
Re: Agenda, security, and monitoring, Joseph Lorenzo Hall |
Next by Thread: |
Re: Agenda, security, and monitoring, John C Klensin |
Indexes: |
[Date]
[Thread]
[Top]
[All Lists] |
|
|