On Fri, Apr 17, 2015 at 7:29 AM, Stephen Farrell
<stephen.farr...@cs.tcd.ie> wrote:
> Please discuss those here and/or send 'em to the IESG or to some
> random AD or to me. But discussing 'em on this list is way better,
> and of course even betterer is to write an I-D (and please do point
> again at ones you've written, just to refresh folks' minds).

Heya,

We've authored and will be updating soon an I-D on technical methods
used to accomplish censorship:

https://tools.ietf.org/html/draft-hall-censorship-tech-00

I'm going to be updating that within the next week and will have an
academic co-author.

I'm looking to generate a series of documents like these that cover
topics that IETF engineers might find valuable when doing protocol or
implementation work if they'd like to avoid unanticipated and
potentially problematic uses of their protocols. The next subject to
tackle (and it may be better to break down further) in my mind is
traffic analysis, which can be a bear of a topic (i.e., very hard).

Since there is no natural WG for this work, but I'm hopeful it could
be valuable work, I was hoping perpass would be a great place to have
discussion about these kinds of cross-WG topics in pervasive
monitoring (and maybe a few will make the cut and garner AD
sponsorship... but that seems a ways off!).

best, Joe

-- 
Joseph Lorenzo Hall
Chief Technologist
Center for Democracy & Technology
1634 I ST NW STE 1100
Washington DC 20006-4011
(p) 202-407-8825
(f) 202-637-0968
j...@cdt.org
PGP: https://josephhall.org/gpg-key
fingerprint: 3CA2 8D7B 9F6D DBD3 4B10  1607 5F86 6987 40A9 A871

_______________________________________________
perpass mailing list
perpass@ietf.org
https://www.ietf.org/mailman/listinfo/perpass

Reply via email to