Re: [Pearg] Research Group Last Call for "A Survey of Worldwide Censorship Techniques"

Mallory Knodel <mknodel@cdt.org> Tue, 26 May 2020 17:04 UTC

Return-Path: <mknodel@cdt.org>
X-Original-To: pearg@ietfa.amsl.com
Delivered-To: pearg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 384943A0B79 for <pearg@ietfa.amsl.com>; Tue, 26 May 2020 10:04:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cdt.org
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HzHbXFuHs30R for <pearg@ietfa.amsl.com>; Tue, 26 May 2020 10:04:39 -0700 (PDT)
Received: from mail-qv1-xf2f.google.com (mail-qv1-xf2f.google.com [IPv6:2607:f8b0:4864:20::f2f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9504A3A0B52 for <pearg@irtf.org>; Tue, 26 May 2020 10:04:30 -0700 (PDT)
Received: by mail-qv1-xf2f.google.com with SMTP id er16so9805842qvb.0 for <pearg@irtf.org>; Tue, 26 May 2020 10:04:30 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cdt.org; s=google; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-transfer-encoding:content-language; bh=GiykULt6dtWWt5gM9rNg4JfZMItV/Z/F/ye45la+dew=; b=Jx/fxW7/URJs1iF1nyXhsZfY+LSIWlnOhFsSebezBvGvO16L9DMWVGXbH8IiewCiS0 Y4v42lYXv5iVy+WXxeGzh1oMQHWiHayMPaQA8PpThXGkeTihvG2Y403t4l+/EfGCA3IY CZKC5SdsMRA4tE0mc4WLul4cGC9Zcb6vrQn7s=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-transfer-encoding :content-language; bh=GiykULt6dtWWt5gM9rNg4JfZMItV/Z/F/ye45la+dew=; b=BzTHybWnK+v0sRQ1LvkpjnKqoCMhXD0B759VtzwzG9I3YyhLT3JO1ZP2zVseTzssk/ OeMf8Z61EJsTLAFCWTTS417eoqf/KENzSd1CCCbOSaptyPP+BjnsDEIHa/eFQkdjDivT Zd0wzrD8irvW5cGNb6W1OCFg8Ky0MahQyyN4N5WbfJPC5BQuX8ds5T1A9lD3O7bA09OE m2L1gCr0NLD07wByzX+X5L5MBbPpO/4CHEjt2LOi6uu4HYF5TVwiqy+E8hjTS2BRpph2 ryiGc52eIMg04zoW2RWAtfd2Gq06xXotBvzyLDBwBuKkbTwCHuOGpdq7UdqO68DY5h8D dpjw==
X-Gm-Message-State: AOAM532/wXLwvVADqWRja4aDsXo+guQTqL70qHQejeKYeWELG95RuKMP JxEoejm04mixlztIr7pJEwRiUPefUmU=
X-Google-Smtp-Source: ABdhPJyNImPXS8LRHwpuF/dytkCAEihntRJiB46aH2LLzKGWzBqwGUSB2DCOnQr/7NrKTY58vjf5vg==
X-Received: by 2002:a0c:a8cf:: with SMTP id h15mr3935460qvc.104.1590512668471; Tue, 26 May 2020 10:04:28 -0700 (PDT)
Received: from Mallorys-MacBook-Air.local (c-73-163-188-207.hsd1.dc.comcast.net. [73.163.188.207]) by smtp.gmail.com with ESMTPSA id q34sm187401qtd.89.2020.05.26.10.04.27 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Tue, 26 May 2020 10:04:27 -0700 (PDT)
To: Eliot Lear <lear=40cisco.com@dmarc.ietf.org>, Christopher Wood <caw@heapingbits.net>
Cc: pearg@irtf.org
References: <08f43a37-2b7b-418e-95a8-ed57484c66be@www.fastmail.com> <F466D238-BCC9-476B-A876-1A72E5B1EEFD@cisco.com>
From: Mallory Knodel <mknodel@cdt.org>
Message-ID: <ebe16a45-6c16-89f9-3757-67e42d240037@cdt.org>
Date: Tue, 26 May 2020 13:04:27 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:77.0) Gecko/20100101 Thunderbird/77.0
MIME-Version: 1.0
In-Reply-To: <F466D238-BCC9-476B-A876-1A72E5B1EEFD@cisco.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Content-Language: en-US
Archived-At: <https://mailarchive.ietf.org/arch/msg/pearg/_gg_HJQREbwuNIwoxmTjaDKw6zs>
Subject: Re: [Pearg] Research Group Last Call for "A Survey of Worldwide Censorship Techniques"
X-BeenThere: pearg@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Privacy Enhancements and Assessment Proposed RG <pearg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/pearg>, <mailto:pearg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pearg/>
List-Post: <mailto:pearg@irtf.org>
List-Help: <mailto:pearg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/pearg>, <mailto:pearg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 May 2020 17:04:47 -0000

Hi Eliot,

On 5/26/20 6:02 AM, Eliot Lear wrote:
> I have a concern about the use of the term “censorship”.  Is removal of fraudulent material censorship?  How about taking down a system that part of a DOS attack?  Is taking down a system that is attacking critical infrastructure censorship?  Is botnet disruption censorship?  Are FCC frequency rules against harmful interference censorship?  By the sweeping definition given, they are.  This  immediately diminishes the credibility of the work because it flies in the face of what normal people think censorship is.

It's important to remember two things: Not all governments and decision 
makers operate in good faith, or with the same legal and moral 
frameworks, so the legality of censorship can't be relied upon to define 
what is censorship. Second it is strategic to define censorship as any 
restriction on content so as to raise the cost. Because while there are 
indeed recognized legal, legitimate and proportional reasons why the 
rights to free expression and to access information should be violated, 
censorship measures should not be taken without careful consideration as 
it is a human rights matter.

This is roughly what anyone working on free expression and censorship 
would say and I'm happy to have backup from those folks on this list.

> I would propose a narrower definition, and at least some discussion to make clear that we are all handling double-edged swords.  I don’t think doing this invalidates the content that follows.  Even better would be for you to find a more value-neutral term that acknowledges the nature of the problem, although I would concede that I have no great suggestion.

Before responding a re-read the introduction to this draft and I think 
it does an excellent job of framing and narrowing the draft to exactly 
what it does and not more. Well done, Joe!

-Mallory