On Thu, Feb 24, 2005 at 08:35:43PM -0800, Doug Ewell <[EMAIL PROTECTED]> wrote a message of 26 lines which said:
> Is it really possible that we spent a year and a half, two years on > putting together an IDN architecture, and during all that time > nobody ever gave the slightest thought to the possibility of someone > using IDNs for spoofing purposes, This is absolutely wrong. The issue has been discussed at length. See the "Security Considerations" of RFC 3490. > and now that one or two well-publicized spoofing examples have > appeared, Pure marketing, BTW. Nothing new in the recent announces, just sensation papers. > Is there even enough solid information to begin writing anything, or > just a general feeling that Something Needs To Be Done? The Powers Above require that Something should be done (they will forget about it in a few weeks) but, technically speaking, there is indeed nothing now.
