With the coming ability, in ParrotTalk, to detect initiation of encrypted connection negotiations, among many different protocols, along with the introduction of a redirect message, allows for implementation of a superb encrypted negotiation traffic analyzer. With connection control at the locally scoped naming services, the host domain of internal networks can be searched, managed & monitored.
a) No weakening encryption for the purposes of personal security.
We do not accept either the addition of back-doors or ghost protocols requiring group encryption negotiation, in order to eavesdrop in data-in-motion encryption, as it would result in the weakening of the encryption.
b) public security is limited to network traffffic analysis
We do allow that such a negotiation traffic analyzer, mentioned above, and monitoring of who is communicating with whom is of some value and acceptable state monitoring, by those authorized to monitor the local domain context.
It is the network authority‘s right to information to search & monitor this activity.