sip-12----Page:2
1  2  3  4  5 

Retargeting creates insecurity
Service hijacking
Hotel proxy retargets all requests for Pizza Hut to Domino’s
Response identity
Unanticipated respondent
Establishment of security parameters
Choosing keys for crypto when retargeting is possible
Blacklist circumvention (“consent”)
If I don’t want to be called by someone, why on earth would I want to call them?
Transitivity
Proliferation of intermediaries obscure trust and force UAs to operate on hearsay


PPT Version