<?xml version="1.0" encoding="UTF-8"?>
<reference anchor="I-D.iab-privsec-confidentiality-threat" target="https://datatracker.ietf.org/doc/html/draft-iab-privsec-confidentiality-threat-00">
   <front>
      <title>Confidentiality in the Face of Pervasive Surveillance: A Threat Model and Problem Statement</title>
      <author initials="R." surname="Barnes" fullname="Richard Barnes">
         </author>
      <author initials="B." surname="Schneier" fullname="Bruce Schneier">
         </author>
      <author initials="C. F." surname="Jennings" fullname="Cullen Fluffy Jennings">
         </author>
      <author initials="T." surname="Hardie" fullname="Ted Hardie">
         </author>
      <author initials="B." surname="Trammell" fullname="Brian Trammell">
         </author>
      <author initials="C." surname="Huitema" fullname="Christian Huitema">
         </author>
      <author initials="D." surname="Borkmann" fullname="Daniel Borkmann">
         </author>
      <date month="September" day="14" year="2014" />
      <abstract>
	 <t>   Documents published in 2013 have revealed several classes of
   &quot;pervasive&quot; attack on Internet communications.  In this document we
   develop a threat model that describes these pervasive attacks.  We
   start by assuming a completely passive adversary with an interest in
   indiscriminate eavesdropping that can observe network traffic, then
   expand the threat model with a set of verified attacks that have been
   published.  Based on this threat model, we discuss the techniques
   that can be employed in Internet protocol design to increase the
   protocols robustness to pervasive attacks.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-iab-privsec-confidentiality-threat-00" />
   
</reference>
