On Fri, Apr 17, 2015 at 7:29 AM, Stephen Farrell <stephen.farr...@cs.tcd.ie> wrote: > Please discuss those here and/or send 'em to the IESG or to some > random AD or to me. But discussing 'em on this list is way better, > and of course even betterer is to write an I-D (and please do point > again at ones you've written, just to refresh folks' minds).
Heya, We've authored and will be updating soon an I-D on technical methods used to accomplish censorship: https://tools.ietf.org/html/draft-hall-censorship-tech-00 I'm going to be updating that within the next week and will have an academic co-author. I'm looking to generate a series of documents like these that cover topics that IETF engineers might find valuable when doing protocol or implementation work if they'd like to avoid unanticipated and potentially problematic uses of their protocols. The next subject to tackle (and it may be better to break down further) in my mind is traffic analysis, which can be a bear of a topic (i.e., very hard). Since there is no natural WG for this work, but I'm hopeful it could be valuable work, I was hoping perpass would be a great place to have discussion about these kinds of cross-WG topics in pervasive monitoring (and maybe a few will make the cut and garner AD sponsorship... but that seems a ways off!). best, Joe -- Joseph Lorenzo Hall Chief Technologist Center for Democracy & Technology 1634 I ST NW STE 1100 Washington DC 20006-4011 (p) 202-407-8825 (f) 202-637-0968 j...@cdt.org PGP: https://josephhall.org/gpg-key fingerprint: 3CA2 8D7B 9F6D DBD3 4B10 1607 5F86 6987 40A9 A871 _______________________________________________ perpass mailing list perpass@ietf.org https://www.ietf.org/mailman/listinfo/perpass