Re: [Pearg] Research Group Last Call for "A Survey of Worldwide Censorship Techniques"

Chelsea Komlo <chelsea.komlo@gmail.com> Tue, 02 June 2020 17:15 UTC

Return-Path: <chelsea.komlo@gmail.com>
X-Original-To: pearg@ietfa.amsl.com
Delivered-To: pearg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 623003A0CB2 for <pearg@ietfa.amsl.com>; Tue, 2 Jun 2020 10:15:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 99RIP-8Pzjqw for <pearg@ietfa.amsl.com>; Tue, 2 Jun 2020 10:15:11 -0700 (PDT)
Received: from mail-wm1-x333.google.com (mail-wm1-x333.google.com [IPv6:2a00:1450:4864:20::333]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CDA903A0CAF for <pearg@irtf.org>; Tue, 2 Jun 2020 10:15:10 -0700 (PDT)
Received: by mail-wm1-x333.google.com with SMTP id k26so3915656wmi.4 for <pearg@irtf.org>; Tue, 02 Jun 2020 10:15:10 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=iFz0kLaQv2z61T13dCqwZoNZdYhK1d1Ywq0nupsCoXk=; b=Om12rp86dIGUukDtpjFKngPXz4JKJ5mVain3Hpt7Vdr8AujUkDOzGRDlSZoPnPCMOm M8L+OecV5ZVeVByLRFpOv+bRWEMjJZaQgJ+nLr+xN0bDEqv/lU42GCjDYmd+1717WWi7 5O+jA+m7V3XO1PRslsHNpu9+fofHmhKYsOjL3QaqZor2fokae/AnAjzT4r067vAtNND8 NCemwN5DhPtoPeSxI/meu/Q6+Zx1W20S/1UVC2FPpnBljrhzkv20ESOPXA4Sz6yQ8kWJ mIq0Iys9DHfoJ0CVRn2hih1eHt0fH9LKce8Ozpge1jRqZ/JoOXMy2yMKmegLsayT2fRh QvOQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=iFz0kLaQv2z61T13dCqwZoNZdYhK1d1Ywq0nupsCoXk=; b=QuTI0UoREH/tOKsqT6oFx7tojB33QlMWk/vX5A5AFpyk+KlfqIrm7k/tMU4SpyMk4r 2pqvBOUKxxPdqLHQ6LAw/UpXquKyRMp8rt/WqDIZsT0BwF3R4mcQo6z3GCnsMziNZ+3k lrf8kk/2pOVGGmfL1yakgk/wjCS8+HcbpNyMIika5kY0aBvIeLlJ6gA8ExOE/DJ1Ziuy f9TT8JAt52oVre2eI2oHxajb+bKqckV54y3Ja/Lo9qEQmiwKZ21sN3/8iT58KboQ9KcX d8N7fL/JVNfiKm4Tn6IZkwscyiuEo2IopECa3uEwttq8x/DAClGEbcZIeHfZy00LcDz2 aV0w==
X-Gm-Message-State: AOAM5325meNmHXKafRb927Vc5lEfwxIKfv5OMoPz9knfkmfbCrxIcmGK EmnX/tatRW0ucuIgVLIX3Jag0ENVbGUOqYsqZvxt2g==
X-Google-Smtp-Source: ABdhPJwMBhmAmKm1sFf74Rkb/IX7Uuau1g4vLrdjDxEKmYj3UA/rGl0quFaMbpXBbs00FVrIOHUdrt8oCFCYHyoT5ws=
X-Received: by 2002:a1c:7fc5:: with SMTP id a188mr5317771wmd.59.1591118107785; Tue, 02 Jun 2020 10:15:07 -0700 (PDT)
MIME-Version: 1.0
References: <08f43a37-2b7b-418e-95a8-ed57484c66be@www.fastmail.com> <CAJoqpTLfjhbN7zYRcorJBD98hDgra=Q71RRNSsAKQgoWpT0eeA@mail.gmail.com> <CAEwkZ50xMUC68gbqPp-NS04e1xuArcUwA848ZP6wzviiL9rDNg@mail.gmail.com>
In-Reply-To: <CAEwkZ50xMUC68gbqPp-NS04e1xuArcUwA848ZP6wzviiL9rDNg@mail.gmail.com>
From: Chelsea Komlo <chelsea.komlo@gmail.com>
Date: Tue, 02 Jun 2020 11:14:55 -0600
Message-ID: <CAJoqpT+B9yhL4GhPp+j86N=Ag6ik8Ms+hmazhzt-W1oHt_o9EQ@mail.gmail.com>
To: David Oliver <david@guardianproject.info>
Cc: Christopher Wood <caw@heapingbits.net>, pearg@irtf.org
Content-Type: multipart/alternative; boundary="0000000000009c3e6005a71d0d8c"
Archived-At: <https://mailarchive.ietf.org/arch/msg/pearg/0gY-kW8uBSSJipofb2mBLifP31g>
Subject: Re: [Pearg] Research Group Last Call for "A Survey of Worldwide Censorship Techniques"
X-BeenThere: pearg@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Privacy Enhancements and Assessment Proposed RG <pearg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/pearg>, <mailto:pearg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pearg/>
List-Post: <mailto:pearg@irtf.org>
List-Help: <mailto:pearg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/pearg>, <mailto:pearg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Jun 2020 17:15:12 -0000

Hi David,

On Tue, Jun 2, 2020 at 8:59 AM David Oliver <david@guardianproject.info>
wrote:

> Chelsea, thanks for this.
>
> > First, I recommend improving the document organization to clearly
> differentiate
> >  between a specific censorship technique and corresponding methods to
> circumvent that technique.
>
> I'm still not understanding why - in a document defined to talk about
> censorship techniques - we're talking about circumvention methods. I
> believe it's particularly important to understand because, at least for the
> techniques I'm familiar with, these methods work "above the stack", not "in
> the stack" because we implementors can't have impact on "the stack"
> itself.  IETF addresses "the stack" so, in theory at least, IETF could use
> the understanding of censorship techniques to implement solutions there.
> Why would we (implementors) be engaging with IETF if we do not seek new "in
> the stack" methods of preventing censorship?
>
>
While yes, IETF can certainly address censorship techniques "down the
stack", it is still critical to understand how existing circumvention
techniques have or have not been successful in order to design for the
future. There is a learning curve to understanding how to design for
censorship circumvention and I would hate to see all of the same mistakes
made that are already known to practitioners building circumvention tools
higher up in the stack.

So in short, let's avoid re-learning lessons that have already been learned
in this space.

Chelsea