>We need some diagrams that we can all agree upon, and we need to name the >different observers. > >Each thing defends against different kinds of observers, and not all >observers can see all things.
Observer may be the wrong term, the more standard term is attack scenario. Some attacks are passively observing the network, but many attacks are more complex than that. For example, an application may phone home, an attacker may actively probe a network, an attacker may combine different pieces of information. _______________________________________________ homenet mailing list homenet@ietf.org https://www.ietf.org/mailman/listinfo/homenet