Re: [Pearg] Research Group Last Call for "A Survey of Worldwide Censorship Techniques"

Vittorio Bertola <vittorio.bertola@open-xchange.com> Thu, 28 May 2020 09:29 UTC

Return-Path: <vittorio.bertola@open-xchange.com>
X-Original-To: pearg@ietfa.amsl.com
Delivered-To: pearg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BB5AD3A0CE7 for <pearg@ietfa.amsl.com>; Thu, 28 May 2020 02:29:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.957
X-Spam-Level:
X-Spam-Status: No, score=0.957 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, GB_PHARMACY=1, ONLINE_PHARMACY=0.65, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, TVD_VISIT_PHARMA=1.406, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=open-xchange.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EhSTaFSlOmrV for <pearg@ietfa.amsl.com>; Thu, 28 May 2020 02:29:36 -0700 (PDT)
Received: from mx3.open-xchange.com (alcatraz.open-xchange.com [87.191.39.187]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 157783A0CEB for <pearg@irtf.org>; Thu, 28 May 2020 02:29:36 -0700 (PDT)
Received: from open-xchange.com (imap.open-xchange.com [10.20.30.10]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx3.open-xchange.com (Postfix) with ESMTPS id DB65B6A305; Thu, 28 May 2020 11:29:32 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=open-xchange.com; s=201705; t=1590658172; bh=0uKF9ZtVbcoXsHtAFMoAUNrE9TRlJKI88rDWouI2vM4=; h=Date:From:To:Cc:In-Reply-To:References:Subject:From; b=dyAaht1bna/dvIw5hV12Y7m62v/I/UdDt3pE42DM8Jdove0jB+7kk4SeeDpyPxwvz dchrUP+lwxM73+urV0xFhKsR/WPUp9qa92KCkZQKirQppaY9MZSYFtemPEUauNXzmJ pFw/nmCOp76hA0Kt1I9lEZpJ08mXXSCe+FYtG78X6cAd0RAGpcMlG24jcPfBjZ7Jkv V8wkX0MQVHHZIW1h/xNnUxGWVBbW8PUEbpMWZhZWHQayCSJDmdQtx2YBya4+2dH3Xv r/9IQU6YcdHOQAA3uP7fK5X6GyjepiasNnvM3y9z4cXmb7kpwM3rm1sk4COpiTvEH6 MBMgTE+uN5suA==
Received: from appsuite-gw2.open-xchange.com (appsuite-gw2.open-xchange.com [10.20.28.82]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by open-xchange.com (Postfix) with ESMTPSA id CD5C73C01B9; Thu, 28 May 2020 11:29:32 +0200 (CEST)
Date: Thu, 28 May 2020 11:29:32 +0200
From: Vittorio Bertola <vittorio.bertola@open-xchange.com>
To: Eliot Lear <lear=40cisco.com@dmarc.ietf.org>
Cc: pearg@irtf.org
Message-ID: <455744305.5725.1590658172742@appsuite-gw2.open-xchange.com>
In-Reply-To: <F466D238-BCC9-476B-A876-1A72E5B1EEFD@cisco.com>
References: <08f43a37-2b7b-418e-95a8-ed57484c66be@www.fastmail.com> <F466D238-BCC9-476B-A876-1A72E5B1EEFD@cisco.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Priority: 3
Importance: Normal
X-Mailer: Open-Xchange Mailer v7.10.3-Rev13
X-Originating-Client: open-xchange-appsuite
Autocrypt: addr=vittorio.bertola@open-xchange.com; prefer-encrypt=mutual; keydata= mQENBFhFR+UBCACfoywFKBRfzasiiR9/6dwY36eLePXcdScumDMR8qoXvRS55QYDjp5bs+yMq41qWV9 xp/cqryY9jnvHbeF3TsE5yEazpD1dleRbkpElUBpPwXqkrSP8uXO9KkS9KoX6gdml6M4L+F82WpqYC1 uTzOE6HPmhmQ4cGSgoia2jolxAhRpzoYN99/BwpvoZeTSLP5K6yPlMPYkMev/uZlAkMMhelli9IN6yA yxcC0AeHSnOAcNKUr13yXyMlTyi1cdMJ4sk88zIbefxwg3PAtYjkz3wgvP96cNVwAgSt4+j/ZuVaENP pgVuM512m051j9SlspWDHtzrci5pBKKFsibnTelrABEBAAG0NUJlcnRvbGEsIFZpdHRvcmlvIDx2aXR 0b3Jpby5iZXJ0b2xhQG9wZW4teGNoYW5nZS5jb20+iQFABBMBAgAqBAsJCAcGFQoJCAsCBRYCAwEAAp 4BAhsDBYkSzAMABQMAAAAABYJYRUflAAoJEIU2cHmzj8qNaG0H/ROY+suCP86hoN+9RIV66Ej8b3sb8 UgwFJOJMupZfeb9yTIJwE4VQT5lTt146CcJJ5jvxD6FZn1Htw9y4/45pPAF7xLE066jg3OqRvzeWRZ3 IDUfJJIiM5YGk1xWxDqppSwhnKcMOuI72iioWxX0nGQrWxpnWJsjt08IEEwuYucDkul1PHsrLJbTd58 fiMKLVwag+IE1SPHOwkPF6arZQZIfB5ThtOZV+36Jn8Hok9XfeXWBVyPkiWCQYVX39QsIbr0JNR9kQy 4g2ZFexOcTe8Jo12jPRL7V8OqStdDes3cje9lWFLnX05nrfLuE0l0JKWEg8akN+McFXc+oV68h7nu5A Q0EWEVH5QEIAIDKanNBe1uRfk8AjLirflZO291VNkOAeUu+dIhecGnZeQW6htlDinlYOnXhtsY1mK9W PUu+xshDq7lXn2G0LxldYwyJYZaJtDgIKqVqwxfA34Lj27oqPuXwcvGhdCgt0SW/YcalRdAi0/AzUCu 5GSaj2kaGUSnBYYUP4szGJXjaK2psP5toQSCtx2pfSXQ6MaqPK9Zzy+D5xc6VWQRp/iRImodAcPf8fg JJvRyJ8Jla3lKWyvBBzJDg6MOf6Fts78bJSt23X0uPp93g7GgbYkuRMnFI4RGoTVkxjD/HBEJ0CNg22 hoHJondhmKnZVrHEluFuSnW0wBEIYomcPSPB+cAEQEAAYkBMQQYAQIAGwUCWEVH5QIbDAQLCQgHBhUK CQgLAgUJEswDAAAKCRCFNnB5s4/KjdO8B/wNpvWtOpLdotR/Xh4fu08Fd63nnNfbIGIETWsVi0Sbr8i E5duuGaaWIcMmUvgKe/BM0Fpj9X01Zjm90uoPrlVVuQWrf+vFlbalUYVZr51gl5UyUFHk+iAZCAA0WB rsmACKvuV1P7GuiX3UV9b59T9taYJxN3dNFuftrEuvsqHimFtlekUjUwoCekTJdncFusBhwz2OrKhHr WWrEsXkfh0+pURWYAlKlTxvXuI7gAfHEQM+6OnrWvXYtlhd0M1sBPnCjbyG63Qws7Rek9bEWKtH6dA6 dmT2FQT+g1S9Mdf0WkPTQNX0x24dm8IoHuD3KYwX7Svx43Xa17aZnXqUjtj1
Archived-At: <https://mailarchive.ietf.org/arch/msg/pearg/cfoAdau5RY6re8DegvUtu0KbunI>
Subject: Re: [Pearg] Research Group Last Call for "A Survey of Worldwide Censorship Techniques"
X-BeenThere: pearg@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Privacy Enhancements and Assessment Proposed RG <pearg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/pearg>, <mailto:pearg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pearg/>
List-Post: <mailto:pearg@irtf.org>
List-Help: <mailto:pearg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/pearg>, <mailto:pearg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 May 2020 09:29:38 -0000

> Il 26/05/2020 12:02 Eliot Lear <lear=40cisco.com@dmarc.ietf.org> ha scritto:
> 
> I have a concern about the use of the term “censorship”.  Is removal of fraudulent material censorship?  How about taking down a system that part of a DOS attack?  Is taking down a system that is attacking critical infrastructure censorship?  Is botnet disruption censorship?  Are FCC frequency rules against harmful interference censorship?  By the sweeping definition given, they are.  This  immediately diminishes the credibility of the work because it flies in the face of what normal people think censorship is.

Sorry for missing this thread in the last couple of days. I made this same objection a year ago or so. This pretty maximalist definition of censorship (by the way, sourced from Wikipedia) is IMHO still a big problem with this document. 

Almost no one outside of digital rights activism circles would say that blocking a DDoS attack or taking down a botnet-infected server is censorship. Many would also not say that removing an unlicensed online pharmacy or an illegal gambling website is censorship. Censorship is when communication is blocked based on the opinions it carries - and even in that case, many people actually find some instances of censorship justified, such as blocking terrorist or Nazi propaganda, even in democratic countries. 

I think that the document conflates two things: one is a technical analysis of communication-blocking mechanisms, which can be used for "censorship in the narrow sense" or for other purposes that require interference with communications. Another one is an ethical stance on the fact that these mechanisms are always bad and are to be considered "censorship" in any case. 

The first thing is fine, but the second is not, as then values come into play and there are different views on the subject; and I'm not even sure that deciding whether censorship is good or bad, or what censorship is or is not, fits the charter of this group.

So, I think that the document should use other terms than "censorship" and "censors" everywhere, and add an initial discussion on the fact that there are different purposes for which these techniques are used, and while some people think that they are always bad, and some people (i.e. authoritarian regimes) think that they are always good, the broad majority of the planet would say that they are sometimes bad and sometimes good, requiring a more specific assessment before taking a decision on whether a protocol should support, circumvent or ignore them.

-- 
Vittorio Bertola | Head of Policy & Innovation, Open-Xchange
vittorio.bertola@open-xchange.com 
Office @ Via Treviso 12, 10144 Torino, Italy