This document describes a mechanism that, through the use of opportunistic Transport Layer Security (TLS), enables encryption of
This document describes a mechanism that, through the use of opportunistic Transport Layer Security (TLS), enables encryption of