Revision as of 4 September 2014 at 14:25. This is the thread's initial revision.
It is impossible to judge a protocol when we have no threat model/what goal the protocol is hoping to acheive. I think we should agree on that first, before discussing the protocol.