On 04/27/2013 09:47 PM, Christian Huitema wrote:
>> * second one: correlation of node activities within the same
>> network. In many cases, no matter whether you change your
>> addresses, it won't be solved.
>
> That's largely true, because hosts leak tons of information on the
> network they conn
> There are essentially three privacy issues:
>
> * main one: IIDs that are constant across networks (this is the one that is
> very harmful)
I think outlining that issue is perhaps the most important aspect of Fernando's
draft. The logic of automatic address configuration is that a host gets an
Hi Fernando,
I owe you an apology as one of the comments I made on this thread may
be misinterpreted. You responded to all the comments I read.
Regards,
-sm
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative
On 04/27/2013 01:51 PM, SM wrote:
> Hi Fernando,
> At 12:13 26-04-2013, Fernando Gont wrote:
>> In some scenarios, that's impossible. Trivial example: If you have a
>> network with a single host attached to it, no matter whether you change
>> your address periodically (*), it will be possible to co
Hosnieh,
On 04/27/2013 04:20 PM, Hosnieh Rafiee wrote:
> I do not think repeating what I explained before will be of much help. I
> never received any responses from my last discussions with Fernando so I am
> not going to continue that discourse.
FWIW, I responded to your messages. However, most
I do not think repeating what I explained before will be of much help. I
never received any responses from my last discussions with Fernando so I am
not going to continue that discourse. But here is a brief summary of I
tried to explain.
I agree with the part where he focuses on an algorithm for
Hi Hosnieh,
At 09:51 27-04-2013, Hosnieh Rafiee wrote:
I mentioned this comment in the first versions of this draft, but nobody
seemed to agree with me at that time so I stopped with the dialogue.
I gather that would be in the message at
http://www.ietf.org/mail-archive/web/ipv6/current/msg168
Biggest Fake Conference in Computer Science
We are researchers from different parts of the world and conducted a study on
the world’s biggest bogus computer science conference WORLDCOMP
( http://sites.google.com/site/worlddump1 ) organized by Prof. Hamid Arabnia
from University of Georgia, US
At 14:32 25-04-2013, Alissa Cooper wrote:
>One comment and one nit below.
[snip]
>This implication seems misguided. Providing the ability to track and
>correlate the communications of a device that never leaves a single
>network is a significant concern. It is one concern among several that
>
Hi Fernando,
At 12:13 26-04-2013, Fernando Gont wrote:
In some scenarios, that's impossible. Trivial example: If you have a
network with a single host attached to it, no matter whether you change
your address periodically (*), it will be possible to correlate the
hosts' activities.
(*) That of c
At 14:32 25-04-2013, Alissa Cooper wrote:
One comment and one nit below.
[snip]
This implication seems misguided. Providing the ability to track and
correlate the communications of a device that never leaves a single
network is a significant concern. It is one concern among several
that the
11 matches
Mail list logo