5.1 Security Considerations for Implementers
This protocol has similar security concerns as those described in [IETFDRAFT-ICENAT-19] section 18. Additional considerations and mitigations pertaining to this protocol are listed in this section.
Этот браузер больше не поддерживается.
Выполните обновление до Microsoft Edge, чтобы воспользоваться новейшими функциями, обновлениями для системы безопасности и технической поддержкой.
This protocol has similar security concerns as those described in [IETFDRAFT-ICENAT-19] section 18. Additional considerations and mitigations pertaining to this protocol are listed in this section.