1. Introduction
  2. The IETF
    1. New Working Groups
    2. Birds of a Feather (BOFs)
      1. Authenticated Transfer(atp)
      2. Web Bot Auth(webbotauth)
      3. PKI, Logs, And Tree SignaturesBoF(plants)
    3. General Area
      1. Moderation Procedures(modpod)
    4. Applications and Real-Time Area
      1. More Instant Messaging Interoperability (mimi)
      2. Registration Protocols Extensions (regext)
      3. RESTful Provisioning Protocol(rpp)
      4. Secure Telephony Identity Revisited (stir)
      5. Virtualized Conversations(vcon)
      6. Workload Identity in Multi System Environments (wimse)
    5. Internet Area
      1. Adaptive DNS Discovery (add)
      2. DNS Delegation(deleg)
      3. Taking IP To Other Planets(tiptop)
    6. Operations and Management Area
      1. Getting Ready for Energy Efficient Networking (green)
      2. Network Inventory YANG(ivy)
      3. SRv6 Operations
    7. Security Area
      1. Detecting Unwanted Location Trackers (dult)
      2. Messaging Layer Security (mls)
      3. Post-Quantum Use In Protocols (pquip)
      4. Remote ATtestation ProcedureS (rats)
      5. Secure Patterns for Internet CrEdentials (spice)
      6. Security Dispatch (secdispatch)
      7. Secure Evidence and Attestation Transport (seat)
      8. Software Updates for Internet of Things (suit)
      9. Supply Chain Integrity, Transparency, and Trust (scitt)
    8. Web and Internet Transport
      1. AI preferences
      2. Multiplexed Application Substrate over QUIC Encryption (masque)
      3. Standard Communication with Network Elements (scone)
  3. The IRTF
    1. Research Groups
      1. Crypto Forum (cfrc)
      2. Decentralization of the Internet Research Group (dinrg)
      3. Global Access to the Internet for All (gaia)
      4. Human Rights Protocol Considerations
      5. Quantum Internet Research Group(qirg)
      6. Sustainability and the Internet Proposed Research Group (sustain)
  4. The IAB
    1. IAB Open
  5. During an IETF meeting
  6. Appendix About this document