ietf
[Top] [All Lists]

Re: Agenda, security, and monitoring

2014-02-03 13:52:48


--On Monday, February 03, 2014 14:02 -0500 "Dale R. Worley"
<worley(_at_)ariadne(_dot_)com> wrote:

...
So I think some thought needs to be put into what can be done
to thwart pervasive monitoring when the information to be
concealed is the identity of the endpoints.

I completely agree.  I just think it is a mistake to become so
obsessed with metadata monitoring (what in PSTN land was often
known as "pen registers" that we ignore data confidentiality.
Similarly, I think it would be a mistake to become so concerned
about the Final Ultimate Solution To Confidentiality Problems
that we stop doing what we can to make known, existing, strong
confidentiality from working effectively and/or better.

In the particular case of metadata/ pen register data it is
probably worth remembering that the most common reason for
collecting such data is to figure out which conversations to try
to capture in more depth, i.e., actually intercept and review
content.  Let's not ignore either threat.

    john





<Prev in Thread] Current Thread [Next in Thread>