[perpass] Draft describing how to evaluate trust models in the age of PRISM
Phillip Hallam-Baker <hallam@gmail.com> Thu, 17 October 2013 02:35 UTC
Return-Path: <hallam@gmail.com>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BF96221F9A10 for <perpass@ietfa.amsl.com>; Wed, 16 Oct 2013 19:35:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.591
X-Spam-Level:
X-Spam-Status: No, score=-2.591 tagged_above=-999 required=5 tests=[AWL=0.008, BAYES_00=-2.599, HTML_MESSAGE=0.001, NO_RELAYS=-0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6EQ8Al3CbhNw for <perpass@ietfa.amsl.com>; Wed, 16 Oct 2013 19:35:10 -0700 (PDT)
Received: from mail-la0-x22b.google.com (mail-la0-x22b.google.com [IPv6:2a00:1450:4010:c03::22b]) by ietfa.amsl.com (Postfix) with ESMTP id 831DD21F9D0F for <perpass@ietf.org>; Wed, 16 Oct 2013 19:35:09 -0700 (PDT)
Received: by mail-la0-f43.google.com with SMTP id ec20so1248999lab.2 for <perpass@ietf.org>; Wed, 16 Oct 2013 19:35:08 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:date:message-id:subject:from:to:content-type; bh=Xg8y564erRMpRDzW7Ggg3eVXYaZShondq3jRdju0l1k=; b=foLfgC1cRnI5YypnY/UvrulW6BhFO55I4iwLOvNxXQtjUf0+WCdA9uoLEKlDTzGxtI WiqlXQOg1rnLnJf+23FJgoror2oJiSxtranVmMxtPYqFgm4ltYm/Vzs3PZF85YMAWeEy GVCQNTNFABEBu5pChMCswThb83LSLkHDgYw5P344ob94eqVZHLMyNd5MyjqDWcl6ZlL3 /SRy62E94WdNQdMm4CpiS+Fx1J3tJTMBJMVe3S/BuSQBsQbKR4jlYI6IL6jkCK42VAbX jjn9OTElGaf5KLE3zM+DFHvd1FzvoFunbJak6VvjNgFdToquojvDB6ea+1rzdFOBGc/k A37g==
MIME-Version: 1.0
X-Received: by 10.152.171.72 with SMTP id as8mr324439lac.33.1381977308282; Wed, 16 Oct 2013 19:35:08 -0700 (PDT)
Received: by 10.112.148.165 with HTTP; Wed, 16 Oct 2013 19:35:08 -0700 (PDT)
Date: Wed, 16 Oct 2013 22:35:08 -0400
Message-ID: <CAMm+Lwj4sxeyvW-hdiM-qZdxx-FeFu3SV+kfdqO8cyAADo89oA@mail.gmail.com>
From: Phillip Hallam-Baker <hallam@gmail.com>
To: perpass <perpass@ietf.org>
Content-Type: multipart/alternative; boundary="001a1135e5a48c449404e8e6aa75"
Subject: [perpass] Draft describing how to evaluate trust models in the age of PRISM
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "The perpass list is for discussion of the privacy properties of IETF protocols and concrete ways in which those could be improved. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 17 Oct 2013 02:35:12 -0000
http://tools.ietf.org/html/draft-hallambaker-prismproof-trust-00 I would like to spend a lot longer getting this right but don't have time to do that and write code. The work factor measures may be of general interest. In particular introducing the time element has interesting effects. -- Website: http://hallambaker.com/
- [perpass] Draft describing how to evaluate trust … Phillip Hallam-Baker