Closed teirdes closed 3 years ago
While I did not review the entirety of the draft, I see that the most egregious examples of "here's how they censor and here's how we circumvent" have been removed. To me, this makes the draft align with its title and with its intended use (which is, or should be, to help the maintainers of existing protocols as well we designers of new ones avoid the techniques of censorship already in place).
This seems to have resolved itself... If I'm mistaken, feel free to re-open
Agreed that adding in a review of current censorship-circumvention techniques expands the scope of this document.
In the last call, it was both raised that censorship circumvention techniques should be given a stronger role in the text, and that censorship circumvention techniques do not belong in the document at all.
Circumvention is mainly discussed in the "Trade-offs" sections of section 3.3.1 and 4.1.1, which contain the cost to the implementer of using a particular technique for the purpose of censorship. The only exception is section 3.3.2 Protocol Identification, which lists certain censorship circumvention tools as targets for identification (see section 1.1) by censors.