IRTF-PEARG / rfc-censorship-tech

Internet Draft for survey of technical mechanisms for censorship
Other
20 stars 16 forks source link

Stronger or weaker focus on censorship circumvention (Chelsea Komlo, David Oliver) #69

Closed teirdes closed 3 years ago

teirdes commented 4 years ago

In the last call, it was both raised that censorship circumvention techniques should be given a stronger role in the text, and that censorship circumvention techniques do not belong in the document at all.

Circumvention is mainly discussed in the "Trade-offs" sections of section 3.3.1 and 4.1.1, which contain the cost to the implementer of using a particular technique for the purpose of censorship. The only exception is section 3.3.2 Protocol Identification, which lists certain censorship circumvention tools as targets for identification (see section 1.1) by censors.

m4mb01t4l14n0 commented 4 years ago

While I did not review the entirety of the draft, I see that the most egregious examples of "here's how they censor and here's how we circumvent" have been removed. To me, this makes the draft align with its title and with its intended use (which is, or should be, to help the maintainers of existing protocols as well we designers of new ones avoid the techniques of censorship already in place).

josephlhall commented 3 years ago

This seems to have resolved itself... If I'm mistaken, feel free to re-open

chelseakomlo commented 3 years ago

Agreed that adding in a review of current censorship-circumvention techniques expands the scope of this document.