The Register: The IETF has taken the next small step down the long, long road of protecting user traffic from spooks, snoops and attackers, setting down the basic architectural principle that new protocols should resist monitoring. It’s not going to be a trivial undertaking: practically every layer of the Internet protocol stack has its origins in a more innocent era.
It’s not going to be a trivial undertaking: practically every layer of the Internet protocol stack has its origins in a more innocent era.