Hi Iljitsch,
At 1:56 PM +0100 12/1/04, Iljitsch van Beijnum wrote:
Page 32:
- Third trusted party. A third party establishes that a given
"Identifier" is defined very differently from the use of "ULID" in the
more recent DT drafts, to the degree that an ULID can't be an
identifier according to this document's definition.
I think that this is a good point...
I am not sure that all of the threats related to redirection exist when
you use ULIDs vs. a pure ID/Loc split.
Are there other places in the document where the threat model would be
different for ULIDs than for IDs that are not also usable as locators?