[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Internal WG Review: Centralized Conferencing(xcon)




--On 4. august 2003 11:15 -0400 iesg-secretary@ietf.org wrote:

 Privacy, security, and authorization mechanisms are integral to the
 solution generated by the working group. This includes allowing
 participants to be completely invisible or to be visible but participate
 anonymously with respect to some or all of the other participants.
this caught my eye:
isn't "completely invisible participant" equivalent to "wiretap"?

If it means "invisible to everyone but the one who granted access to the conference", I don't have a problem with it. And I don't think you should change the charter to address this concern.

But it's the kind of thing that comes back and haunts you if you're not careful.

Harald, who participated in the RAVEN wiretap discussions