@techreport{kent-opportunistic-security-01, number = {draft-kent-opportunistic-security-01}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-kent-opportunistic-security/01/}, author = {Stephen Kent}, title = {{Opportunistic Security as a Countermeasure to Pervasive Monitoring}}, pagetotal = 14, year = 2014, month = apr, day = 9, abstract = {This document was prepared as part of the IETF response to concerns about "pervasive monitoring" (PM) as articulated in {[}I-D.farrell-perpass-attack{]}. It begins by describing the current criteria (discussed at the STRINT workshop {[}STRINT{]}) for addressing concerns about PM. It then examines terminology that has been used in IETF standards (and in academic publications) to describe encryption and key management techniques, with a focus on authentication vs. anonymity. Based on this analysis, it propose a new term, "opportunistic security" to describe a goal for IETF security protocols, one countermeasure to pervasive monitoring.}, }