A Threat Model for Pervasive Passive Surveillance

Document Type Expired Internet-Draft (individual)
Last updated 2014-05-17 (latest revision 2013-11-13)
Stream (None)
Intended RFC status (None)
Expired & archived
pdf htmlized (tools) htmlized bibtex
Stream Stream state (No stream defined)
Consensus Boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at


This document elaborates a threat model for pervasive surveillance. We assume an adversary with an interest in indiscriminate eavesdropping that can passively observe network traffic at every layer at every point in the network between the endpoints. It is intended to demonstrate to protocol designers and implementors the observability and inferability of information and metainformation transported over their respective protocols, to assist in the evaluation of the performance of these protocols and the effectiveness of their protection mechanisms under pervasive passive surveillance.


Brian Trammell (trammell@tik.ee.ethz.ch)
Daniel Borkmann (dborkman@redhat.com)
Christian Huitema (huitema@huitema.net)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)