Acknowledgments
Acknowledgments
The author would like to thank all those that provided design insights and editorial review of this document, including Richard Barnes, Ryan Hurst, Adam Langley, Ryan Sleevi, Jacob Hoffman-Andrews, Daniel McCarney, Marcin Walas, Martin Thomson, and especially Frans Rosen, who discovered the vulnerability in the TLS SNI method that necessitated the writing of this specification.