Threat model

Revision as of 4 September 2014 at 14:25.
This is the thread's initial revision.

It is impossible to judge a protocol when we have no threat model/what goal the protocol is hoping to acheive. I think we should agree on that first, before discussing the protocol.

    Vmon (talk)14:25, 4 September 2014