Home / Blogs

Summary Report Now Posted of W3C/IAB “Strengthening The Internet (STRINT)” Workshop

STRINT Workshop Report (Available Here)Given that I’ve written here about the original call for papers for the W3C/IAB “Strengthening The Internet Against Pervasive Monitoring (STRINT)” Workshop and then subsequently that the STRINT submitted papers were publicly available, I feel compelled to close the loop and note that a report about the STRINT workshop has been publicly published as an Internet-draft. It is available at:
https://tools.ietf.org/html/draft-iab-strint-report

The authors of the workshop report include members of both the W3C and IAB who were active in the workshop. As the abstract states:

The STRINT workshop assembled one hundred participants in London for two days in early 2014 to discuss how the technical community, and in particular the IETF and the W3C, should react to Pervasive Monitoring and more generally how to strengthen the Internet in the face of such attacks. The discussions covered issues of terminology, the role of user interfaces, classes of mitigation, some specific use cases, transition strategies (including opportunistic encryption), and more. The workshop ended with a few high-level recommendations, which it is believed could be implemented and which could help strengthen the Internet.

The document goes on to summarize the recommendations of the workshop, outline the goals and structure and then dives into reporting on the various topic areas covered during the workshop. The document concludes with several appendices including the workshop agenda, a description of all the submitted papers, and a list of all the participants. The document is a first draft that was published on April 28, 2014, and so you can expect to see updates made as other participants have a chance to see the text and correct any errors or omissions. Stephen Farrell is maintaining the document on Github and so you can look there for the latest text in development.

If you are interested in how the technical community believes the Internet should be strengthened against pervasive large-scale monitoring, the workshop report is definitely worth a read.

IETF89, Strengthening The Internet – An Interview with Security Area Director Stephen Farrell (Watch)P.S. I’ll also note that at the IETF 89 meeting in London in March, I had a chance to record a video interview with IETF Security Area Director Stephen Farrell, one of the authors of this STRINT workshop report, where he spoke about what had happened at the STRINT workshop and where that work is going next. You may find that 5 minute video a useful complement to the larger report.

By Dan York, Author and Speaker on Internet technologies - and on staff of Internet Society

Dan is the Director, Online Content, for the Internet Society but opinions posted on CircleID are his own. View more of Dan’s writing and audio here.

Visit Page

Filed Under

CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

I make a point of reading CircleID. There is no getting around the utility of knowing what thoughtful people are thinking and saying about our industry.

VINTON CERF
Co-designer of the TCP/IP Protocols & the Architecture of the Internet

Comments

Comment Title:

  Notify me of follow-up comments

We encourage you to post comments and engage in discussions that advance this post through relevant opinion, anecdotes, links and data. If you see a comment that you believe is irrelevant or inappropriate, you can report it using the link at the end of each comment. Views expressed in the comments do not represent those of CircleID. For more information on our comment policy, see Codes of Conduct.

Related

Topics

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC