RE: IETF65 hotel location

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 





On Saturday, January 28, 2006 01:11:38 PM -0500 David B Harrington <ietfdbh@xxxxxxxxxxx> wrote:

This conversation of the IETF65 location started with an issue of
security.

I'd like to get this discussion back on track.
What are the security requirements for a distributed burrito
processing protocol?
If you are traveling from the conference hotel to a restaurant and are
mugged, is that considered a man-in-the-middle attack?

That would, of course, depend on the gender of the mugger. However, the important thing to note is that such attacks can be prevented by the use of strong end-to-end security, such as an armored car, or perhaps a tank. Of course, there is always a tradeoff to be made in these situations. For example, I'm given to understand that tanks tend to be a bit trickier to drive than cars...



_______________________________________________

Ietf@xxxxxxxx
https://www1.ietf.org/mailman/listinfo/ietf

[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Fedora Users]