Iiw and crypto subversion

Is a reference to a document whose content describes how lots of americans (mostly) were cooperating to define a path for identity management using, so-called, community consensus processes.

Under the assumption that the “would if we could” sector of America representing natsec interests will have subverted such processes to suborn them (probably covertly), we might ask: who in the iiw process is (secretly) an nsa/fbi/dod/cia/etc subversive?

Not all standards related groups need subversion. Iesg has no problem being infiltrated by parties whose goals are at odds with stated positions. Ansi security committees are well known for being openly stuffed with stooges, who openly flaunt their loyalty ti us natsec interests.


About home_pw

Computer Programmer who often does network administration with focus on security servers. Sometimes plays at slot machine programming.
This entry was posted in coding theory. Bookmark the permalink.