Agree. Very interesting and significant Avri. Anriette On 22/08/2015 18:32, Seun Ojedeji wrote: > +1 this will indeed be enlightening and educating to internet users. > > Thanks for sharing. > > Regards > > Sent from my Asus Zenfone2 > Kindly excuse brevity and typos. > > On 22 Aug 2015 15:15, "Avri Doria" <[log in to unmask] <mailto:[log in to unmask]>> > wrote: > > Thought this might be interesting/useful to several efforts. > > avri > > > -------- Forwarded Message -------- > Subject: RFC 7624 on Confidentiality in the Face of Pervasive > Surveillance: A Threat Model and Problem Statement > Date: Thu, 20 Aug 2015 15:34:38 -0700 (PDT) > From: [log in to unmask] <mailto:[log in to unmask]> > To: [log in to unmask] <mailto:[log in to unmask]>, > [log in to unmask] <mailto:[log in to unmask]> > CC: [log in to unmask] <mailto:[log in to unmask]> > > A new Request for Comments is now available in online RFC libraries. > > > RFC 7624 > > Title: Confidentiality in the Face of > Pervasive Surveillance: A Threat Model and > Problem Statement > Author: R. Barnes, B. Schneier, > C. Jennings, T. Hardie, > B. Trammell, C. Huitema, > D. Borkmann > Status: Informational > Stream: IAB > Date: August 2015 > Mailbox: [log in to unmask], > [log in to unmask] > <mailto:[log in to unmask]>, > [log in to unmask] <mailto:[log in to unmask]>, > [log in to unmask] <mailto:[log in to unmask]>, > [log in to unmask] <mailto:[log in to unmask]>, > [log in to unmask] <mailto:[log in to unmask]>, > [log in to unmask] <mailto:[log in to unmask]> > Pages: 24 > Characters: 62260 > Updates/Obsoletes/SeeAlso: None > > I-D Tag: draft-iab-privsec-confidentiality-threat-07.txt > > URL: https://www.rfc-editor.org/info/rfc7624 > > DOI: http://dx.doi.org/10.17487/RFC7624 > > Since the initial revelations of pervasive surveillance in 2013, > several classes of attacks on Internet communications have been > discovered. In this document, we develop a threat model that > describes these attacks on Internet confidentiality. We assume an > attacker that is interested in undetected, indiscriminate > eavesdropping. The threat model is based on published, verified > attacks. > > This document is a product of the Internet Architecture Board. > > > INFORMATIONAL: This memo provides information for the Internet > community. > It does not specify an Internet standard of any kind. Distribution of > this memo is unlimited. > > This announcement is sent to the IETF-Announce and rfc-dist lists. > To subscribe or unsubscribe, see > https://www.ietf.org/mailman/listinfo/ietf-announce > https://mailman.rfc-editor.org/mailman/listinfo/rfc-dist > > For searching the RFC series, see https://www.rfc-editor.org/search > For downloading RFCs, see https://www.rfc-editor.org/rfc.html > > Requests for special distribution should be addressed to either the > author of the RFC in question, or to [log in to unmask] > <mailto:[log in to unmask]>. Unless > specifically noted otherwise on the RFC itself, all RFCs are for > unlimited distribution. > > > The RFC Editor Team > Association Management Solutions, LLC > > > > > > --- > This email has been checked for viruses by Avast antivirus software. > https://www.avast.com/antivirus > -- ----------------------------------------- Anriette Esterhuysen Executive Director Association for Progressive Communications [log in to unmask] www.apc.org IM: ae_apc