eckelcu / draft-ietf-shmoo-hackathon

IETF SHMOO working group draft on running an IETF Hackathon
Other
1 stars 3 forks source link

can the network/special networking capabilities provided for the hackathon be exploited? #17

Closed eckelcu closed 2 years ago

eckelcu commented 2 years ago

Hi Chairs, Charles,

Excellent document! Fully support - READY with a few nits!

Thanks! Dhruv

eckelcu commented 2 years ago

Sean shared, "Just about any network can be exploited. With this experiment we have put in some security but the idea it to have as open of a network as we can just like at an in person meeting. A user has to have a data tracker account to make use of the network and we expect people to respect it just a we would an in person meeting. If something is exploited address it just as we would at a meeting. "

eckelcu commented 2 years ago

Addressed by #21