Retargeting creates insecurity Service hijacking Hotel proxy retargets all requests for Pizza Hut to Domino’s Response identity Unanticipated respondent Establishment of security parameters Choosing keys for crypto when retargeting is possible Blacklist circumvention (“consent”) If I don’t want to be called by someone, why on earth would I want to call them? Transitivity Proliferation of intermediaries obscure trust and force UAs to operate on hearsay |