Thanks for the review, Bjoern.

Ted

On Fri, Jan 9, 2015 at 5:08 PM, Bjoern Hoehrmann <derhoe...@gmx.net> wrote:

> * Ted Hardie wrote:
> >The program and authors would appreciate review of
> >draft-iab-privsec-confidentiality-threat-01.txt (
> >http://www.ietf.org/id/draft-iab-privsec-confidentiality-threat-01.txt).
> >Note that the text on mitigations to these threats has been split into a
> >second document which is forthcoming.  Reviews can be sent to this list or
> >the authors.
>
> Mostly editorial things on sections 1-3:
>
> Typo in Section 1 "attacket".
>
> In Section 2 I think the example for "Infererence" should be replaced by
> a much simpler one.
>
> I am not happy with using "Observation" with the specified meaning in
> this context. The word usually refers to the act, not the data, and here
> it may be easy to confuse it with, say, targeted surveillance as part of
> a justice system, perhaps especially for non-native readers. I encourage
> trying to find an alternative term.
>
> The definition for "Collaborator" seems to lack "deliberately". It might
> be a good idea to strike "(keys or data)" since it does not seem to
> clarify anything, and invites misinterpretations (say, keys and data are
> bad, but "meta data" is okay).
>
> The definition for "Unwitting Collaborator" as though an "Unwitting
> Collaborator" is a "Collaborator". That seems incorrect to me.
>
> I do not think "Key Exfiltration" depends on the presence of a
> "collaborator". Same for "Content Exfiltration".
>
> I think Section 3 would benefit from a short preface that explains, as
> the section title suggest, this is an "idealised" description, and
> explains how this is useful. Right now the section jumps right into
> describing something that is extremely implausible without qualifiers,
> and many readers might be unfamiliar with such descriptions.
>
> The claim that "The use of encryption to protect confidentiality is
> generally enough to prevent direct observation" seems incorrect or at
> least misleading to me (it might prevent direct observation of the
> unencrypted plaintext, but not all direct observation; that should be
> explicit).
>
> Typo "privascy" in 3.2.
>
> Putting "We note with some alarm ..." at the end of a long paragraph
> is probably not a good idea as it may easily be missed.
>
> In section 3.3 it's not immediately clear whether in "To illustrate how
> capable the attacker is even given its limitations" 'the attacker' is
> the idealised attacker introduced at the beginning, or some other one.
> The two "even"s make the first (very long) sentence hard to read for me.
>
> In section 3.3.2, given that the document already noted geoip databases,
> the reverse-dns example seems more harmful than useful.
>
> Section 3.3.7 should probably note that Wifi MACs have already been
> extensively mapped to locations, and I assume similar databases that
> map ethernet MACs to user identities also exist.
> --
> Björn Höhrmann · mailto:bjo...@hoehrmann.de · http://bjoern.hoehrmann.de
> D-10243 Berlin · PGP Pub. KeyID: 0xA4357E78 · http://www.bjoernsworld.de
>  Available for hire in Berlin (early 2015)  · http://www.websitedev.de/
>
_______________________________________________
perpass mailing list
perpass@ietf.org
https://www.ietf.org/mailman/listinfo/perpass

Reply via email to