{"draft":"draft-farrell-perpass-attack-06","doc_id":"RFC7258","title":"Pervasive Monitoring Is an Attack","authors":["S. Farrell","H. Tschofenig"],"format":["ASCII","HTML"],"page_count":"6","pub_status":"BEST CURRENT PRACTICE","status":"BEST CURRENT PRACTICE","source":"IETF - NON WORKING GROUP","abstract":"Pervasive monitoring is a technical attack that should be mitigated\r\nin the design of IETF protocols, where possible.","pub_date":"May 2014","keywords":["pervasive monitoring"],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":["BCP0188"],"doi":"10.17487\/RFC7258","errata_url":null}