On Jul 31, 2008, at 11:22 AM, Jonathan Rosenberg wrote:
Is this an ATTACK though? I don't think it is.
If the end user can't tell the difference between a malicious application of the technique and a beneficial application of the technique, then the technique itself is an attack vector and should be eliminated from the protocol.
-- Dean _______________________________________________ Sip mailing list https://www.ietf.org/mailman/listinfo/sip This list is for NEW development of the core SIP Protocol Use [EMAIL PROTECTED] for questions on current sip Use [EMAIL PROTECTED] for new developments on the application of sip
