On 12/19/18 4:27 PM, Andrew Newton wrote:
> On Wed, Dec 19, 2018 at 6:47 AM Niels ten Oever
> <[email protected]> wrote:
>>
>> I think the unclarity here is about the nature of causation, and more
>> specifically about the priority of events. Because the exchange of private
>> data between a registrar and a VSP on the one hand, and the use of the
>> verification code on the other hand, is of a necessary deterministic nature,
>> I do think the considerations are applicable.
>
> Then the text should say that. As it stands, the current text makes it
> sound like the IETF is enabling some new method for human rights abuse
> that otherwise would not be available to an abusive authority, and
> that is absolutely not true.
Everything is possible without the IETF: the Internet has open standards. So
IETF is never solely responsible for anything. But IETF is setting a norm and
thus normalizing and enabling this behavior. I think this is made clear in the
text, and even clearer in the new text proposed by Gurshabad.
Best,
Niels
> In fact, the text should be clearer on
> the point that this mechanism does not give an abusive authority any
> more leverage to violate human rights than they already posses.
>
> -andy
>
--
Niels ten Oever
Researcher and PhD Candidate
Datactive Research Group
University of Amsterdam
PGP fingerprint 2458 0B70 5C4A FD8A 9488
643A 0ED8 3F3A 468A C8B3
_______________________________________________
regext mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/regext