Technical Summary
This document provides some analysis of threats against the geopriv
protocol architecture. It focuses on protocol threats, threats that
result from the storage of data by entities in the architecture, and
threats posed by the abuse of information yielded by geopriv. Some
security properties that meet these threats are enumerated as a
reference for geopriv requirements.
Working Group Summary
There was working group consensus to publish this document as
an informational RFC.
Protocol Quality
This document was reviewed for the IESG by Ted Hardie