5.1 Security Considerations for Implementers
This protocol has similar security concerns as those described in [IETFDRAFT-ICENAT-19] section 18. Additional considerations and mitigations pertaining to this protocol are listed in this section.
Tento prohlížeč se už nepodporuje.
Upgradujte na Microsoft Edge, abyste mohli využívat nejnovější funkce, aktualizace zabezpečení a technickou podporu.
This protocol has similar security concerns as those described in [IETFDRAFT-ICENAT-19] section 18. Additional considerations and mitigations pertaining to this protocol are listed in this section.