*Looks at conference attendee sheet*
Oh look, a new no-fly list.
The IETF has taken the next small step down the long, long road of protecting user traffic from spooks, snoops and attackers, setting down the basic architectural principle that new protocols should resist monitoring. It's not going to be a trivial undertaking: practically every layer of the Internet protocol stack has its …
Or a saboteur.
Or simply enough knowledge of the protocols that they can perform side channel attacks. Put bluntly, there's a demand for efficiency in data transmission. But in doing so, you necessarily make your data more unique compared to everything else and easier to identify. It's like a line of balls rolling down a rack. You have a choice. You can make your ball a unique shape or size so you can easily pick it out when it comes along, but then anyone else can do the same. Or you can make your ball the same size and shape as the other balls. They can't pick them out, but then neither can you. Pick your poison.
I remember having fun with X.25 in the days before there was a public internet. X.121 was rather error prone. Mistyping the NTN could end up connecting to unexpected places.
Unless I am missing something rather obvious it wouldn't really change anything. Your traffic would still most likely travere multiple networks. It still wouldn't be point to point. And the PADs would without doubt be compromised (at least in the US they would most likely fall under CALEA).
put a trojan/virus on their offical gov website (such as tax returns etc), force you to do tax returns online and infect your computer that way. Who cares if the protocol is encrypted, it just means you can't check your own data pipes and see if data is being slurped to naughtyHQ
But how do they stop detectors for such being built and distributed through networks outside their control such as foreign countries, TOR, i2p, Freenet, and the like?
Heck, given the level of paranoia, what's stopping the gov from requiring an exploit vector be planted in every single piece of a vital piece of hardware (like a video or network card) that's traded in the US? A ubiquitous hardware exploit with direct memory access would be about as good as the NSA types could get it: OS-agnostic and impossible to get around. Some of the mobile paranoids say that's how the NSA taps your mobile conversations: not at the OS but at the radio chip.