On 12/19/18 4:27 PM, Andrew Newton wrote: > On Wed, Dec 19, 2018 at 6:47 AM Niels ten Oever > <li...@digitaldissidents.org> wrote: >> >> I think the unclarity here is about the nature of causation, and more >> specifically about the priority of events. Because the exchange of private >> data between a registrar and a VSP on the one hand, and the use of the >> verification code on the other hand, is of a necessary deterministic nature, >> I do think the considerations are applicable. > > Then the text should say that. As it stands, the current text makes it > sound like the IETF is enabling some new method for human rights abuse > that otherwise would not be available to an abusive authority, and > that is absolutely not true.
Everything is possible without the IETF: the Internet has open standards. So IETF is never solely responsible for anything. But IETF is setting a norm and thus normalizing and enabling this behavior. I think this is made clear in the text, and even clearer in the new text proposed by Gurshabad. Best, Niels > In fact, the text should be clearer on > the point that this mechanism does not give an abusive authority any > more leverage to violate human rights than they already posses. > > -andy > -- Niels ten Oever Researcher and PhD Candidate Datactive Research Group University of Amsterdam PGP fingerprint 2458 0B70 5C4A FD8A 9488 643A 0ED8 3F3A 468A C8B3 _______________________________________________ regext mailing list regext@ietf.org https://www.ietf.org/mailman/listinfo/regext