Re: [Pearg] Research Group Last Call for "A Survey of Worldwide Censorship Techniques"

Carsten Bormann <cabo@tzi.org> Sat, 30 May 2020 07:41 UTC

Return-Path: <cabo@tzi.org>
X-Original-To: pearg@ietfa.amsl.com
Delivered-To: pearg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 722163A07DD for <pearg@ietfa.amsl.com>; Sat, 30 May 2020 00:41:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id j5FXvoyxqvHb for <pearg@ietfa.amsl.com>; Sat, 30 May 2020 00:41:14 -0700 (PDT)
Received: from gabriel-vm-2.zfn.uni-bremen.de (gabriel-vm-2.zfn.uni-bremen.de [134.102.50.17]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 80A333A07B9 for <pearg@irtf.org>; Sat, 30 May 2020 00:41:13 -0700 (PDT)
Received: from [172.16.42.112] (p5089ae91.dip0.t-ipconnect.de [80.137.174.145]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by gabriel-vm-2.zfn.uni-bremen.de (Postfix) with ESMTPSA id 49YtfH71RKzyvv; Sat, 30 May 2020 09:41:11 +0200 (CEST)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.80.23.2.2\))
From: Carsten Bormann <cabo@tzi.org>
In-Reply-To: <a4622e97-0be0-a141-cedc-6f2a0e9d880d@digitaldissidents.org>
Date: Sat, 30 May 2020 09:41:11 +0200
Cc: pearg@irtf.org
X-Mao-Original-Outgoing-Id: 612517271.608041-1188c16a14cadd8acb8680ee1a1f264c
Content-Transfer-Encoding: quoted-printable
Message-Id: <0329C9F5-DA49-479C-B277-4FF9C7E96ADD@tzi.org>
References: <08f43a37-2b7b-418e-95a8-ed57484c66be@www.fastmail.com> <F466D238-BCC9-476B-A876-1A72E5B1EEFD@cisco.com> <455744305.5725.1590658172742@appsuite-gw2.open-xchange.com> <75c0bcb0-d4ae-4d5c-2aac-0c16962841a9@digitaldissidents.org> <1579895595.5892.1590660934957@appsuite-gw2.open-xchange.com> <353091b8-c84c-e02d-c7e0-c524070135b1@digitaldissidents.org> <1066566227.7990.1590749300790@appsuite-gw1.open-xchange.com> <a4622e97-0be0-a141-cedc-6f2a0e9d880d@digitaldissidents.org>
To: Niels ten Oever <lists@digitaldissidents.org>
X-Mailer: Apple Mail (2.3608.80.23.2.2)
Archived-At: <https://mailarchive.ietf.org/arch/msg/pearg/uNT8iZquDg4gRb6E_SMm1GgerQA>
Subject: Re: [Pearg] Research Group Last Call for "A Survey of Worldwide Censorship Techniques"
X-BeenThere: pearg@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Privacy Enhancements and Assessment Proposed RG <pearg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/pearg>, <mailto:pearg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pearg/>
List-Post: <mailto:pearg@irtf.org>
List-Help: <mailto:pearg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/pearg>, <mailto:pearg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Sat, 30 May 2020 07:41:23 -0000

On 2020-05-29, at 13:08, Niels ten Oever <lists@digitaldissidents.org> wrote:
> 
> This document does not say that every time such a technique is used, it is called censorship.

That’s not what the title suggests.

“Censorship techniques” to me strongly suggests it is about techniques specifically applied for censorship.  Maybe that misunderstanding is easily fixed, e.g. “techniques employed for censorship”.

> It also does not say whether it is right or wrong. 

Outside of a small set of people who have really thought about the problem (and probably even among those), “censorship” is a rather pejorative term; it always applies wrongdoing in common usage.

That is why it usually is reserved for state-controlled suppression of information, and typically only for those cases where that suppression is not necessitated by violation of other basic rights.

On 2020-05-27, at 01:56, Joseph Lorenzo Hall <hall@isoc.org> wrote:
> 
> entities adversarially messing with information flows is censorship

That is certainly not a definition that comes to mind among intellectuals in my country, many of which would have a hard time with categorizing, e.g., privacy laws under censorship (unless they are actually also employed for censorship, but I don’t want to open the whole can here).


I’m writing this because I think such a document is very useful, and I don’t want to see it devalued by terminology that will be seen by many as distorted beyond recognition by mindless activism.

Grüße, Carsten