On 19 Sep 2014, at 21:59, Ted Lemon mel...@fugue.com wrote:
On Sep 19, 2014, at 4:54 PM, Michael Thomas m...@mtcc.com wrote:
I guess that's kind of what I've been getting at: should we capture all of
this in a threats document?
I'm a little uncomfortable with the formality, but I'm even
Am 20.09.2014 um 09:17 schrieb Tim Chown:
I think it would be useful to do, and needn't hold up progress. It would give
us a common understanding - hopefully - of which threats are being covered and
which are not. And which are handled by layers/protocols outside the scope of
homenet's