* Stephen Farrell wrote:
>Some folks (me included to be honest) wonder if the current
>situation argues for raising the bar there somewhat on the
>basis that MTI security features are frequently turned off
>or not sufficiently well tested to be usable. (Pick your
>favourite example, mine are usually rfc4744 or Diameter
>being run in clear.) And an upshot from that is that that
>helps those who want to pervasively monitor everything.
>
>Others argue that that'd be the IETF straying into the
>space of policy - all we should do is define how to use
>strong security features and make sure the code is there so
>they can be turned on and the rest is policy.

I need to monitor everything that comes in and out of my computer
systems and networks so I can detect exfiltrations and intrusions,
like when the latest operating system update comes with a helpful
default-on automatic cloud backup solution for my encryption keys,
or detailed information about nearby radio signals and microwaves
collected over prolonged periods of time by my smartphone. Lacking
a mandate to allow the user to effectively disable any "security"
mechanism would also help those who want to "pervasively monitor
everything", but "mandatory-to-use" digital repression mechanisms
are being deployed faster than I can track them. That would seem
to belong to this debate aswell.
-- 
Björn Höhrmann · mailto:bjo...@hoehrmann.de · http://bjoern.hoehrmann.de
Am Badedeich 7 · Telefon: +49(0)160/4415681 · http://www.bjoernsworld.de
25899 Dagebüll · PGP Pub. KeyID: 0xA4357E78 · http://www.websitedev.de/ 
_______________________________________________
perpass mailing list
perpass@ietf.org
https://www.ietf.org/mailman/listinfo/perpass

Reply via email to