Tackling Pervasive Surveillance or How to improve Security of the Internet?
draft-tschofenig-perpass-surveillance-01
Document | Type |
Expired Internet-Draft
(individual)
Expired & archived
|
|
---|---|---|---|
Author | Hannes Tschofenig | ||
Last updated | 2014-05-08 (Latest revision 2013-11-04) | ||
RFC stream | (None) | ||
Intended RFC status | (None) | ||
Formats | |||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
Surveillance is the observation or monitoring of an individual's communications or activities. Surveillance is one of several privacy /security threats engineers try to take into account in their designs. The reports about pervasive monitoring of Internet traffic have, however, surprised many since the scale was not envisaged during the design of many Internet protocols even though the ambition to offer end-to-end security on the Internet dates back even to the 70ies. The approach to get access to meta-data as well as to communication content has taken forms that are largely indistinguishable from ordinary attacks. This document explains the attacks in context of the larger Internet eco-system.
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)