Human Rights Protocol Considerations Research Group | N. ten Oever |
Internet-Draft | Article19 |
Intended status: Informational | February 06, 2017 |
Expires: August 10, 2017 |
Anonymity, Human Rights and Internet Protocols
draft-tenoever-hrpc-anonymity-00
Anonymity is less discussed topic in the IETF than for instance security [RFC3552] or privacy [RFC6973]. This can be attributed to the fact anonymity is a hard technical problem or that anonymizing user data is not of specific market interest. It remains a fact that ‘most internet users would like to be anonymous online at least occasionally’ [Pew].
This document aims to break down the different meanings and implications of anonymity on a mediated computer network.
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."
This Internet-Draft will expire on August 10, 2017.
Copyright (c) 2017 IETF Trust and the persons identified as the document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.
There seems to be a clear need for anonymity when harassment on the Internet on the increase [Pew2] and the UN Special Rapporteur for Freedom of Expression call anonymity ‘necessary for the exercise of the right to freedom of opinion and expression in the digital age’ [UNHRC2015].
Nonetheless anonymity is not getting much discussion at the IETF, providing anonymity does not seem a (semi-)objective for many protocols, even though several documents contribute to improving anonymity such as [RFC7258], [RFC7626], [RFC7858].
There are initiatives on the Internet to improve end users anonymity, most notably [torproject], but this all relies on adding encryption in the application layer.
This document aims to break down the different meanings and implications of anonymity on a mediated computer network and to see whether (some parts of) anonymity should be taken into consideration in protocol development.
Concepts in this draft currently strongly hinges on [AnonTerm]
Premise: activity on the network has the ability for is to be anonymous or authenticated
While analyzing protocols for their impact on users anonymity, would it make sense to ask the following questions:
As this draft concerns a research document, there are no security considerations.
This document has no actions for IANA.
The discussion list for the IRTF Human Rights Protocol Considerations proposed working group is located at the e-mail address hrpc@ietf.org. Information on the group and information on how to subscribe to the list is at https://www.irtf.org/mailman/listinfo/hrpc
Archives of the list can be found at: https://www.irtf.org/mail-archive/web/hrpc/current/index.html