>We need some diagrams that we can all agree upon, and we need to name the
>different observers.
>
>Each thing defends against different kinds of observers, and not all
>observers can see all things.

Observer may be the wrong term, the more standard term is attack scenario.

Some attacks are passively observing the network, but many attacks are
more complex than that. For example, an application may phone home, an
attacker may actively probe a network, an attacker may combine different
pieces of information.

_______________________________________________
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet

Reply via email to