Skip to main content

Necessity of Network and Third Party Protection of Endpoints
draft-witten-protectingendpoints-00

Document Type Expired Internet-Draft (individual)
Expired & archived
Author Brian Witten
Last updated 2018-06-16 (Latest revision 2017-12-13)
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

This document describes the logic for third-party and network security to complement strong cryptographic protocols, and presents data, including independently verifiable data, helping scale the importance of blocking attacks that might be hiding in encrypted network traffic. This report includes data from multiple sources. Some of that data is verifiable.

Authors

Brian Witten

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)