[obscurity-interest] New Non-WG Mailing List: obscurity-interest -- Discussion of communications obscurity and real-time communications

IETF Secretariat <ietf-secretariat@ietf.org> Thu, 17 March 2011 01:04 UTC

Return-Path: <wwwrun@core3.amsl.com>
X-Original-To: obscurity-interest@ietf.org
Delivered-To: obscurity-interest@core3.amsl.com
Received: by core3.amsl.com (Postfix, from userid 30) id 67F983A69CD; Wed, 16 Mar 2011 18:04:17 -0700 (PDT)
From: IETF Secretariat <ietf-secretariat@ietf.org>
To: IETF Announcement list <ietf-announce@ietf.org>
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0
Message-Id: <20110317010417.67F983A69CD@core3.amsl.com>
Date: Wed, 16 Mar 2011 18:04:17 -0700
Cc: obscurity-interest@ietf.org
Subject: [obscurity-interest] New Non-WG Mailing List: obscurity-interest -- Discussion of communications obscurity and real-time communications
X-BeenThere: obscurity-interest@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "Discussion of communications obscurity and real-time communications." <obscurity-interest.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/obscurity-interest>, <mailto:obscurity-interest-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/obscurity-interest>
List-Post: <mailto:obscurity-interest@ietf.org>
List-Help: <mailto:obscurity-interest-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/obscurity-interest>, <mailto:obscurity-interest-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 17 Mar 2011 01:04:17 -0000

A new IETF non-working group email list has been created.

List address: obscurity-interest@ietf.org
Archive: http://www.ietf.org/mail-archive/web/obscurity-interest/
To subscribe: https://www.ietf.org/mailman/listinfo/obscurity-interest

Description:  This list is for discussion of the requirements and
technology for enabling communications, especially near or real-time,
between persons subject to high levels of counter-communication
interception. The requirements are believed to relate to privacy, data
integrity, unlinkability, and the general intercept (lawful or otherwise)
problem, which is broader than the "privacy" problem considered by IETF.
This list intended to focus on practical requirement and actionable work
rather than general theory. Discussion may lead to new protocol action,
enhanced guidance for "security considerations" sections in IETF
specifications, and further research inside or outside of the IETF. 

For additional information, please contact the list administrators.