Pervasive Monitoring (PM)

Pervasive Monitoring (PM) is widespread (and often covert) surveillance through intrusive gathering of protocol artifacts, including application content or protocol metadata such as headers.

Active or passive wiretaps and traffic analysis (e.g., correlation, timing, or measuring packet sizes) or subverting the cryptographic keys used to secure protocols can also be used as part of pervasive monitoring.

PM is distinguished by being indiscriminate and very large scale rather than by introducing new types of technical compromise.

The IETF community’s technical assessment is that PM is an attack on the privacy of Internet users and organizations. The IETF community has strongly agreed that PM is an attack that needs to be mitigated where possible.”


See more here

Back to Glossary
Linkedin Icon Twitter Icon Facebook Icon E-mal Icon
Get in touch

Talk to us

Do you want to remove your IP/domain from one of our blocklists?
Please use our lookup-service and follow the instructions there in order to get that resolved.