On Wed, Dec 19, 2018 at 6:47 AM Niels ten Oever <li...@digitaldissidents.org> wrote: > > I think the unclarity here is about the nature of causation, and more > specifically about the priority of events. Because the exchange of private > data between a registrar and a VSP on the one hand, and the use of the > verification code on the other hand, is of a necessary deterministic nature, > I do think the considerations are applicable.
Then the text should say that. As it stands, the current text makes it sound like the IETF is enabling some new method for human rights abuse that otherwise would not be available to an abusive authority, and that is absolutely not true. In fact, the text should be clearer on the point that this mechanism does not give an abusive authority any more leverage to violate human rights than they already posses. -andy _______________________________________________ regext mailing list regext@ietf.org https://www.ietf.org/mailman/listinfo/regext