Speaker
Description
“Networking in the Dark”
Networks have a unique ability to determine who is communicating with whom, and even the topic of the communication. In using the network we are trusting the network not to betray us and leak this information to others. A decade ago it becme apparent that this trust had been betrayed. The reaction from the protocol and application folk in the IETF was to view all forms of network monitoriong as an attack on users’ privacy, and took steps to apply encryption to as much of the protocol space ass they could. A decade later what does this look like? Have the application space succeeded in their objective to withhold all information from the network, and strip networks down to an undistinguished commodity carrier role?
Estimated presentation duration | 15-20 mins |
---|