On 12/19/18 4:27 PM, Andrew Newton wrote:
> On Wed, Dec 19, 2018 at 6:47 AM Niels ten Oever
> <li...@digitaldissidents.org> wrote:
>>
>> I think the unclarity here is about the nature of causation, and more 
>> specifically about the priority of events. Because the exchange of private 
>> data between a registrar and a VSP on the one hand, and the use of the 
>> verification code on the other hand, is of a necessary deterministic nature, 
>> I do think the considerations are applicable.
> 
> Then the text should say that. As it stands, the current text makes it
> sound like the IETF is enabling some new method for human rights abuse
> that otherwise would not be available to an abusive authority, and
> that is absolutely not true. 

Everything is possible without the IETF: the Internet has open standards. So 
IETF is never solely responsible for anything. But IETF is setting a norm and 
thus normalizing and enabling this behavior. I think this is made clear in the 
text, and even clearer in the new text proposed by Gurshabad. 

Best,

Niels

> In fact, the text should be clearer on
> the point that this mechanism does not give an abusive authority any
> more leverage to violate human rights than they already posses.



> 
> -andy
> 

-- 
Niels ten Oever
Researcher and PhD Candidate
Datactive Research Group
University of Amsterdam

PGP fingerprint    2458 0B70 5C4A FD8A 9488  
                   643A 0ED8 3F3A 468A C8B3

_______________________________________________
regext mailing list
regext@ietf.org
https://www.ietf.org/mailman/listinfo/regext

Reply via email to