Mid 2013 I posted a summary about ongoing efforts on privacy in the IETF and I got a lots of good feedback. ISOC even published an extended version of the write-up at http://www.internetsociety.org/articles/ietf-privacy-update. Since summer 2013 a lot happened with regards to security and privacy. Here is another short update based on
Privacy Engineering or “Designing Privacy into Internet Protocols”
The privacy program of the Internet Architecture Board (IAB) has been working on a privacy tutorial for some time already and at the last IETF meeting in London I had the honor to present the work to the wider IETF community. The tutorial provided a sneak preview to a document
ACE BOF & Tutorials (about Kerberos, PKI, AAA, OAuth, and ABFAB)
At the last IETF meeting early March in London I had the pleasure to co-chair the Authentication and Authorization for Constrained Environments (ace) BOF with Kepeng. The picture of the flyer we distributed during the meeting should give you a rough idea what the topic is about. (We are also
Securing VoIP in the Presence of Pervasive Monitoring
Many have been wondering about government spying activities on Internet communication and of course everyone is puzzled what to do about it. More specifically, who should do what for certain applications (since the application behavior is quite different). I wrote down my thoughts in a presentation given to data protection
IETF#87 Update on Privacy
HTTP 2.0 The IETF is working on a new version of HTTP, called HTTP 2.0, in the HTTPbis working group already for some time. The Wiki page provides a bit of additional data about the goals. The working draft of HTTP 2.0 introduces some major changes to HTTP 1.1 and the possibility
Support our Next Generation 112 Interoperability Testing Efforts!
Those who have followed the work in the European Emergency Number Association (EENA) know that we have been trying to initiate interoperability testing events for some time now. Testing implementations of the next generation protocols developed by various major standardization organizations (e.g., IETF, 3GPP, IEEE, OMA, NENA, ETSI, and EENA)
Location, Location, Location …
At the EU Emergency Services Workshop 2013 a regulatory issues panel moderated by Tony O’Brien (Deputy Executive Director, EENA). The panel discussed a couple of topics, including the need for standards, performance indicators, and location. The location slot lead to a heated discussion with the following persons on the panel: Raed
Interview: Mark Fletcher interview about NG 112
Last week EENA organized their yearly EU emergency services workshop in Riga/Latvia. As in the past many emergency services authorities, regulators, vendors, and service providers showed up to discuss the hottest topics. I had the pleasure to meet Mark Fletcher again, who arrived in Riga with his podcasting equipment. Mark
Testing for Bufferbloat
In my previous post I summarize the ongoing activities regarding bufferbloat. Reading through the blog post you might have gotten interested to reproduce the results published in various papers, you might want to test your favorite networking gear, or you might just want to run some tests in your home
Bufferbloat
Wikipedia describes bufferbloat as “a phenomenon in a packet-switched computer network whereby excess buffering of packets inside the network causes high latency and jitter, as well as reducing the overall network throughput. The phenomenon was detailed at least as far back as 1985, but gained more widespread attention starting in