Re: [Pearg] Research Group Last Call for "A Survey of Worldwide Censorship Techniques"

Eliot Lear <lear@cisco.com> Tue, 26 May 2020 10:02 UTC

Return-Path: <lear@cisco.com>
X-Original-To: pearg@ietfa.amsl.com
Delivered-To: pearg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F0E2C3A0DA0 for <pearg@ietfa.amsl.com>; Tue, 26 May 2020 03:02:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.601
X-Spam-Level:
X-Spam-Status: No, score=-9.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EXhK6tLdpsOX for <pearg@ietfa.amsl.com>; Tue, 26 May 2020 03:02:29 -0700 (PDT)
Received: from aer-iport-2.cisco.com (aer-iport-2.cisco.com [173.38.203.52]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6E1613A0D99 for <pearg@irtf.org>; Tue, 26 May 2020 03:02:29 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=1744; q=dns/txt; s=iport; t=1590487349; x=1591696949; h=mime-version:subject:from:in-reply-to:date:cc: content-transfer-encoding:message-id:references:to; bh=LUnqAFQ4hAHWpA6EBs2ZZvKMNCMArzUVZs3o0Lj2ovI=; b=XQ9Lto+jMVXM/x8IkEDcjczTA5IK/Pb3mTo8vbKjNE3whO1HEHtSVyuu ErTsFSz8SjBKIwJRnHR9qw76grtBV7KfmCqZcgJhCZX2mE4INc3puJyQ1 3N2Px7++rab+nj+JIZyw0p91I3bephzpKXfy2TXyiW+AUVT9o3N0/DMwa U=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AmAABL6Mxe/xbLJq1mHAEBAQEBAQcBARIBAQQEAQFAgTMHAQELAYNuASAShFGIIWChcoF8CwEBAQwBAS8EAQGERAKCMjQJDgIDAQELAQEFAQEBAgEFBG2FYoVzBhgFBjYgEAsODAImAgJXBoM5gn2ranaBMoVRhQyBDioBiXeCZoIAgREnHIFPUC4+hE6DFDOCLQSYK4pakCCCXoJ0i0OEZIVBHYMXjS+NPKpng0kCBAYFAhWBUjmBVjMaCBsVZQGCPz0SGA2QTBcVjhI/A2cCBgEHAQEDCY1VAQE
X-IronPort-AV: E=Sophos;i="5.73,436,1583193600"; d="scan'208";a="26520543"
Received: from aer-iport-nat.cisco.com (HELO aer-core-2.cisco.com) ([173.38.203.22]) by aer-iport-2.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 26 May 2020 10:02:25 +0000
Received: from [10.61.225.84] ([10.61.225.84]) by aer-core-2.cisco.com (8.15.2/8.15.2) with ESMTPS id 04QA2OmI009321 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Tue, 26 May 2020 10:02:24 GMT
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.80.23.2.2\))
From: Eliot Lear <lear@cisco.com>
In-Reply-To: <08f43a37-2b7b-418e-95a8-ed57484c66be@www.fastmail.com>
Date: Tue, 26 May 2020 12:02:24 +0200
Cc: pearg@irtf.org
Content-Transfer-Encoding: quoted-printable
Message-Id: <F466D238-BCC9-476B-A876-1A72E5B1EEFD@cisco.com>
References: <08f43a37-2b7b-418e-95a8-ed57484c66be@www.fastmail.com>
To: Christopher Wood <caw@heapingbits.net>
X-Mailer: Apple Mail (2.3608.80.23.2.2)
X-Outbound-SMTP-Client: 10.61.225.84, [10.61.225.84]
X-Outbound-Node: aer-core-2.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/pearg/3g2NXIfEDqK1OmKhJe-QKRvaJMQ>
Subject: Re: [Pearg] Research Group Last Call for "A Survey of Worldwide Censorship Techniques"
X-BeenThere: pearg@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Privacy Enhancements and Assessment Proposed RG <pearg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/pearg>, <mailto:pearg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pearg/>
List-Post: <mailto:pearg@irtf.org>
List-Help: <mailto:pearg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/pearg>, <mailto:pearg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 May 2020 10:02:33 -0000

Hi Chris,

Several points.

I have a concern about the use of the term “censorship”.  Is removal of fraudulent material censorship?  How about taking down a system that part of a DOS attack?  Is taking down a system that is attacking critical infrastructure censorship?  Is botnet disruption censorship?  Are FCC frequency rules against harmful interference censorship?  By the sweeping definition given, they are.  This  immediately diminishes the credibility of the work because it flies in the face of what normal people think censorship is.

I would propose a narrower definition, and at least some discussion to make clear that we are all handling double-edged swords.  I don’t think doing this invalidates the content that follows.  Even better would be for you to find a more value-neutral term that acknowledges the nature of the problem, although I would concede that I have no great suggestion.  

Also, it seems to me that a reference check is in order.  If we look at Sections 6.2 and 6.3 the authors are discussing various forms of takedowns, and a reference is made to [Anderson-2011].  To begin with, as a nit, the first person on that work is Murdoch, not Anderson.  Second, the chapter referenced doesn’t go into any detail about take downs.  There are better more specific references such as Moore and Clayton, and specifically “The Impact of Incentives on Notice and Take-down”, WEIS 2008, although I would imagine that there is even later work available.

Finally, did I miss the part where one discusses domain name takedowns by registry, or has that not been used as a form of censorship?

Eliot