rfc9707.original.xml | rfc9707.xml | |||
---|---|---|---|---|
<?xml version='1.0' encoding='utf-8'?> | <?xml version='1.0' encoding='utf-8'?> | |||
<!DOCTYPE rfc [ | <!DOCTYPE rfc [ | |||
<!ENTITY nbsp " "> | <!ENTITY nbsp " "> | |||
<!ENTITY zwsp "​"> | <!ENTITY zwsp "​"> | |||
<!ENTITY nbhy "‑"> | <!ENTITY nbhy "‑"> | |||
<!ENTITY wj "⁠"> | <!ENTITY wj "⁠"> | |||
]> | ]> | |||
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?> | ||||
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.0. | <rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft | |||
2) --> | -iab-bias-workshop-report-02" number="9707" updates="" obsoletes="" category="in | |||
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft | fo" consensus="true" submissionType="IAB" tocInclude="true" sortRefs="true" symR | |||
-iab-bias-workshop-report-02" category="info" consensus="true" submissionType="I | efs="true" version="3" xml:lang="en"> | |||
AB" tocInclude="true" sortRefs="true" symRefs="true" version="3"> | ||||
<!-- xml2rfc v2v3 conversion 3.21.0 --> | ||||
<front> | <front> | |||
<title abbrev="BIAS Workshop Report">IAB Barriers to Internet Access of Serv ices (BIAS) Workshop Report</title> | <title abbrev="BIAS Workshop Report">IAB Barriers to Internet Access of Serv ices (BIAS) Workshop Report</title> | |||
<seriesInfo name="Internet-Draft" value="draft-iab-bias-workshop-report-02"/ | ||||
> | <!-- [rfced] We see that post-8073 IAB RFCs that discuss workshops | |||
use a different title format - along the lines of either "Report from | ||||
the IAB Workshop on ..." (fairly common) or "IAB Workshop Report: | ||||
Measuring Network Quality for End-Users" (RFC 9318 only). May we | ||||
update the document title as follows? | ||||
Original: | ||||
IAB Barriers to Internet Access of Services (BIAS) Workshop Report | ||||
Suggested: | ||||
Report from the IAB Workshop on Barriers to Internet Access of | ||||
Services (BIAS) | ||||
--> | ||||
<seriesInfo name="RFC" value="9707"/> | ||||
<author fullname="Mirja Kühlewind"> | <author fullname="Mirja Kühlewind"> | |||
<organization/> | <organization/> | |||
<address> | <address> | |||
<email>ietf@kuehlewind.net</email> | <email>ietf@kuehlewind.net</email> | |||
</address> | </address> | |||
</author> | </author> | |||
<author fullname="Dhruv Dhody"> | <author fullname="Dhruv Dhody"> | |||
<organization/> | <organization/> | |||
<address> | <address> | |||
<email>dd@dhruvdhody.com</email> | <email>dd@dhruvdhody.com</email> | |||
</address> | </address> | |||
</author> | </author> | |||
<author fullname="Mallory Knodel"> | <author fullname="Mallory Knodel"> | |||
<organization/> | <organization/> | |||
<address> | <address> | |||
<email>mknodel@cdt.org</email> | <email>mknodel@cdt.org</email> | |||
</address> | </address> | |||
</author> | </author> | |||
<date year="2024" month="June" day="20"/> | <date year="2024" month="December"/> | |||
<keyword>Internet Access</keyword> | <keyword>Internet Access</keyword> | |||
<keyword>Censorship</keyword> | <keyword>Censorship</keyword> | |||
<keyword>community networks</keyword> | <keyword>Community Networks</keyword> | |||
<keyword>digital divide</keyword> | <keyword>digital divide</keyword> | |||
<abstract> | <abstract> | |||
<?line 218?> | <t>The "Barriers to Internet Access of Services (BIAS)" workshop was convened by the Internet Architecture Board (IAB) from January 15-17, 2024 as a three-day o nline meeting. Based on the submitted position papers, the workshop covered thr ee areas of interest: the role of Community Networks in Internet Access of Servi ces, reports and comments on the observed digital divide, and measurements of ce nsorship and censorship circumvention. This report summarizes the workshop's dis cussions and serves as a reference for reports on the current barriers to Intern et Access. | |||
<t>The "Barriers for Internet Access of Services (BIAS)" workshop was convened b | <!-- [rfced] Abstract: We changed "Barriers for" to "Barriers to" | |||
y the Internet Architecture Board (IAB) from January 15-17, 2024 as a three-day | per the document title and | |||
online meeting. Based on the submitted position papers, the workshop covered th | <https://datatracker.ietf.org/group/biasws/about/>. Please let us | |||
ree areas of interest: the role of community networks in Internet Access of Serv | know any concerns. | |||
ices; reports and comments on the observed digital divide; and measurements of c | ||||
ensorship and censorship circumvention. This report summarizes the workshop's di | Original: | |||
scussion and serves as a reference for reports on the current barriers to Intern | The "Barriers for Internet Access of Services (BIAS)" workshop was | |||
et Access.</t> | convened by the Internet Architecture Board (IAB) from January 15-17, | |||
<t>Note that this document is a report on the proceedings of the workshop. | 2024 as a three-day online meeting. | |||
The views and positions documented in this report were expressed during the wo | ||||
rkshop by participants and do not necessarily reflect IAB's views and positions. | Currently: | |||
</t> | The "Barriers to Internet Access of Services (BIAS)" workshop was | |||
convened by the Internet Architecture Board (IAB) from January 15-17, | ||||
2024 as a three-day online meeting. --> | ||||
</t> | ||||
<t>Note that this document is a report on the proceedings of the workshop. | ||||
The views and positions documented in this report were expressed during the wo | ||||
rkshop by participants and do not necessarily reflect the IAB's views and positi | ||||
ons.</t> | ||||
</abstract> | </abstract> | |||
<note removeInRFC="true"> | ||||
<name>About This Document</name> | ||||
<t> | ||||
The latest revision of this draft can be found at <eref target="https:// | ||||
intarchboard.github.io/draft-iab-bias-workshop-report/draft-iab-bias-workshop-re | ||||
port.html"/>. | ||||
Status information for this document may be found at <eref target="https | ||||
://datatracker.ietf.org/doc/draft-iab-bias-workshop-report/"/>. | ||||
</t> | ||||
<t>Source for this draft and an issue tracker can be found at | ||||
<eref target="https://github.com/intarchboard/draft-iab-bias-workshop-re | ||||
port"/>.</t> | ||||
</note> | ||||
</front> | </front> | |||
<middle> | <middle> | |||
<?line 224?> | ||||
<section anchor="introduction"> | <section anchor="introduction"> | |||
<name>Introduction</name> | <name>Introduction</name> | |||
<t>The Internet as part of the critical infrastructure affects many aspect | ||||
s of our society significantly, although it impacts different parts of society d | <!-- [rfced] Please review the guidance for IAB documents | |||
ifferently. The Internet is an important tool to reach the Sustainable Developme | (https://www.rfc-editor.org/materials/iab-format.txt) | |||
nt Goals (SDG) <xref target="SDG"/> and to globally support human rights. Conseq | and let us know if any changes are needed. Specifically, | |||
uently, the lack of meaningful access to digital infrastructure and services is | would you like to add this paragraph to the introduction? | |||
also a form of disenfranchisement.</t> | ||||
"The following boilerplate paragraph SHOULD appear in the introduction: | ||||
The Internet Architecture Board (IAB) holds occasional workshops | ||||
designed to consider long-term issues and strategies for the | ||||
Internet, and to suggest future directions for the Internet | ||||
architecture. This long-term planning function of the IAB is | ||||
complementary to the ongoing engineering efforts performed by working | ||||
groups of the Internet Engineering Task Force (IETF)." | ||||
--> | ||||
<t>The Internet as part of the critical infrastructure affects many aspect | ||||
s of our society significantly, although it impacts different parts of society d | ||||
ifferently. The Internet is an important tool for reaching the Sustainable Devel | ||||
opment Goals (SDGs) listed in <xref target="SDGs"/> and for globally supporting | ||||
human rights. Consequently, the lack of meaningful access to digital infrastruct | ||||
ure and services is also a form of disenfranchisement.</t> | ||||
<t>Solely having Internet access is not enough. At the same time as we wor k to connect the next billion people and reduce the digital divide, it is also i mportant to understand persistent and novel inequalities in the digital age when accessing content and services. There are more and more barriers to meaningful access to the services and applications that run on the Internet. Even if Intern et connectivity is available, information and service access may remain challeng ed and unequal.</t> | <t>Solely having Internet access is not enough. At the same time as we wor k to connect the next billion people and reduce the digital divide, it is also i mportant to understand persistent and novel inequalities in the digital age when accessing content and services. There are more and more barriers to meaningful access to the services and applications that run on the Internet. Even if Intern et connectivity is available, information and service access may remain challeng ed and unequal.</t> | |||
<t>This IAB workshop has aimed</t> | <t>This IAB workshop aimed to</t> | |||
<ul spacing="normal"> | <ul spacing="normal"> | |||
<li> | <li> | |||
<t>to collect reports about barriers to accessing content and services | <t>collect reports about barriers to accessing content and services on | |||
on the Internet, e.g. based on filtering, and blocking as well as due to genera | the Internet, e.g., based on filtering, and blocking as well as due to general | |||
l inequality of technological capabilities, like device or protocol limitations. | inequality of technological capabilities, like device or protocol limitations. | |||
</t> | ||||
<!-- [rfced] Section 1: We had trouble parsing this sentence. To | ||||
what does "based on" refer? Also, please clarify "as well as due to". | ||||
Original: | ||||
This IAB workshop has aimed | ||||
* to collect reports about barriers to accessing content and | ||||
services on the Internet, e.g. based on filtering, and blocking as | ||||
well as due to general inequality of technological capabilities, | ||||
like device or protocol limitations. | ||||
Possibly (we changed "has aimed" to "aimed", as the workshop took | ||||
place about a year ago): | ||||
This IAB workshop aimed to collect reports about barriers to | ||||
accessing content and services on the Internet. For example, | ||||
* based on filtering | ||||
* based on blocking | ||||
* due to general inequality of technological capabilities, e.g., | ||||
device or protocol limitations. --> | ||||
</t> | ||||
</li> | </li> | |||
<li> | <li> | |||
<t>to help the Internet community get a better understanding of how th e Internet functions in different parts of the world and which technology or tec hniques need to be used to gain access to content.</t> | <t>help the Internet community get a better understanding of how the I nternet functions in different parts of the world and which technology or techni ques need to be used to gain access to content.</t> | |||
</li> | </li> | |||
<li> | <li> | |||
<t>to build an understanding of what "being connected" to the Internet means: What is the Internet to users? What is needed to be meaningfully connect ed? What are the minimum requirements to be able to access certain parts of the content and services provided over the Internet?</t> | <t>build an understanding of what "being connected" to the Internet me ans: What is the Internet to users? What is needed to be meaningfully connected? What are the minimum requirements to be able to access certain parts of the con tent and services provided over the Internet?</t> | |||
</li> | </li> | |||
</ul> | </ul> | |||
<section anchor="about-this-workshop-report-content"> | <section anchor="about-this-workshop-report-content"> | |||
<name>About this workshop report content</name> | <name>About the Content of This Workshop Report</name> | |||
<t>This document is a report on the proceedings of the workshop. The vie | <t>This document is a report on the proceedings of the workshop. The vie | |||
ws and positions documented in this report are expressed during the workshop by | ws and positions documented in this report were expressed during the workshop by | |||
participants and do not necessarily reflect IAB's views and positions.</t> | participants and do not necessarily reflect the IAB's views and positions.</t> | |||
<t>Furthermore, the content of the report comes from presentations given by workshop participants and notes taken during the discussions, without interp retation or validation. Thus, the content of this report follows the flow and d ialogue of the workshop but does not attempt to capture a consensus.</t> | <t>Furthermore, the content of the report comes from presentations given by workshop participants and notes taken during the discussions, without interp retation or validation. Thus, the content of this report follows the flow and d ialogue of the workshop but does not attempt to capture a consensus.</t> | |||
</section> | </section> | |||
</section> | </section> | |||
<section anchor="workshop-scope-and-discussion"> | <section anchor="workshop-scope-and-discussion"> | |||
<name>Workshop Scope and Discussion</name> | <name>Workshop Scope and Discussion</name> | |||
<t>The workshop was organized across three days with all-group discussion slots, one per day. The following topic areas were identified and the program co mmittee organized paper submissions into three main themes for each of the three discussion slots. During each discussion, those papers were presented sequentia lly with open discussion held at the end of each day.</t> | <t>The workshop was organized across three days with all-group discussion slots, one per day. The following topic areas were identified, and the program c ommittee organized paper submissions into three main themes for each of the thre e discussion slots. During each discussion, those papers were presented sequenti ally with open discussion held at the end of each day.</t> | |||
<section anchor="session-1-community-networks-their-role-in-internet-acces s-of-services"> | <section anchor="session-1-community-networks-their-role-in-internet-acces s-of-services"> | |||
<name>Session 1: Community Networks - Their Role in Internet Access of S ervices</name> | <name>Session 1: Community Networks - Their Role in Internet Access of S ervices</name> | |||
<t>The first day of the workshop focused on the role of Community Networ ks <xref target="RFC7962"/> as a way to overcome the barriers to Internet Access . Community Networks are self-organized networks wholly owned by the community a nd thus provide an alternative mechanism to bring connectivity and internet serv ices to those places that lack commercial interest.</t> | <t>The first day of the workshop focused on the role of Community Networ ks <xref target="RFC7962"/> as a way to overcome the barriers to Internet Access . Community Networks are self-organized networks wholly owned by the community a nd thus provide an alternative mechanism to bring connectivity and internet serv ices to those places that lack commercial interest.</t> | |||
<t>Presentations ranged from highlighting the need for measuring Quality of Experience (QoE) for Community Networks, to the potential role the Content D elivery Network (CDN) can play in Community Networks, to the role of Satellite N etworks, and finally, to the vital role of the spectrum in this space.</t> | <t>Presentations ranged from highlighting the need for measuring Quality of Experience (QoE) for Community Networks, to the potential role the Content D elivery Network (CDN) can play in Community Networks, to the role of Satellite N etworks, and finally, to the vital role of the spectrum in this space.</t> | |||
<section anchor="the-quality-of-community-networks"> | <section anchor="the-quality-of-community-networks"> | |||
<name>The Quality of Community Networks</name> | <name>The Quality of Community Networks</name> | |||
<t><xref target="MARTINEZ"/> highlighted the need to address Quality o | <t><xref target="MARTINEZ"/> highlighted the need to address QoE in di | |||
f Experience (QoE) in discussions around Community Networks. As a community-driv | scussions around Community Networks. As a community-driven deployment, the knowl | |||
en deployment, the knowledge and involvement of individuals can vary; therefore, | edge and involvement of individuals can vary; therefore, there are no guarantees | |||
there are no guarantees of connectivity or quality of service. There is a need | of connectivity or quality of service. There is a need to focus on user expecta | |||
to focus on user expectations and how they translate to measurable performance i | tions and how they translate to measurable performance indicators. Further, it a | |||
ndicators. Further, it asks for better documenting best practices in deploying c | sks for better documentation of best practices in deploying Community Networks a | |||
ommunity networks as well as considering manageability considerations for commun | s well as careful thought regarding manageability considerations for Community N | |||
ity networks in protocol development. <xref target="GUIFI"/> as an example Commu | etworks in protocol development. <xref target="GUIFI"/> as an example Community | |||
nity Network was discussed and some existing resources for Community Networks (< | Network was discussed, and some existing resources for Community Networks <xref | |||
xref target="APC"/>, <xref target="ISOC"/>, and <xref target="TBB"/>) were share | target="APC"/> <xref target="ISOC"/> <xref target="TBB"/> were shared by the par | |||
d by the participants.</t> | ticipants.</t> | |||
<t>The inconsistent quality and performance of Satellite Internet is a | <t>The inconsistent quality and performance of Satellite Internet resu | |||
gap for community networks that rely on non-terrestrial networks (NTNs) for int | lt in a connectivity gap for Community Networks that rely on non-terrestrial net | |||
ernet access <xref target="HU"/>.</t> | works (NTNs) for internet access <xref target="HU"/>.</t> | |||
</section> | </section> | |||
<section anchor="strengthening-community-networks"> | <section anchor="strengthening-community-networks"> | |||
<name>Strengthening Community Networks</name> | <name>Strengthening Community Networks</name> | |||
<t><xref target="BENSON"/> focused on the prohibitive cost of the tran | <t><xref target="BENSON"/> focused on the prohibitive cost of transit | |||
sit and Internet service for Community Networks and argued for Content Delivery | and Internet services for Community Networks and argued for CDNs to provide tran | |||
Networks (CDNs) to provide transit-like and Internet services at no more than at | sit-like and Internet services, at no more than at-cost, in a mutually beneficia | |||
-cost in a mutually beneficial way. Community networks still need backhaul to an | l way. Community Networks still need backhaul to and from the CDN's point of pre | |||
d from the CDN's point of presence and models for community-backhaul and open-so | sence, and models for community-backhaul and open-source CDNs were highlighted. | |||
urce CDNs were highlighted. Discussion included <xref target="PANGEA"/> project | Discussion included the status of Project PANGEA <xref target="PANGEA"/> as well | |||
status as well as legal and commercial considerations in such use of CDNs.</t> | as legal and commercial considerations related to such use of CDNs.</t> | |||
<t><xref target="HU"/> highlighted that Satellite Internet provided by | <t><xref target="HU"/> highlighted that Satellite Internet provided by | |||
advanced LEO satellite constellations can play a pivotal role in closing the co | advanced low-Earth orbit (LEO) satellite constellations can play a pivotal role | |||
nnectivity gap in the urban-rural digital divide via Satellite-dependent communi | in closing the connectivity gap in the urban-rural digital divide via Satellite | |||
ty networks. These existing known performance and management gaps need focus to | -dependent Community Networks. These existing known performance and management g | |||
enable Satellite Internet to resolve the divide. Further, research directions su | aps need to be focused on, to enable Satellite Internet to resolve the divide. F | |||
ch as multi-layer satellite networking, autonomous maintenance, and integration | urther, research directions such as multi-layer satellite networking, autonomous | |||
between Terrestrial and Non-Terrestrial networks were suggested.</t> | maintenance, and integration between terrestrial networks and NTNs were suggest | |||
<t><xref target="RENNO"/> called attention to the coveted 6GHz (part o | ed. | |||
f the C-band with a desirable mix of coverage and capacity) as a prime choice fo | ||||
r International Mobile Telecommunication (IMT) for 5G technology while it is in | <!-- [rfced] Section 2.1.2: For ease of the reader, we expanded | |||
common unlicensed use in the community networks (and small ISPs). Spectrum alloc | "LEO" as "low-Earth orbit" here, per [HU]. Please let us know | |||
ations directly impact industries and market access with ramifications for commu | any concerns. | |||
nity networks. Further, there was a discussion on the geopolitical tension becau | ||||
se of it.</t> | Original: | |||
[HU] highlighted that Satellite Internet provided by advanced LEO | ||||
satellite constellations can play a pivotal role in closing the | ||||
connectivity gap in the urban-rural digital divide via Satellite- | ||||
dependent community networks. | ||||
Currently: | ||||
[HU] highlighted that Satellite Internet provided by advanced low- | ||||
Earth orbit (LEO) satellite constellations can play a pivotal role in | ||||
closing the connectivity gap in the urban-rural digital divide via | ||||
Satellite-dependent Community Networks. --> | ||||
</t> | ||||
<t><xref target="RENNO"/> called attention to the coveted 6 GHz (part | ||||
of the C-band with a desirable mix of coverage and capacity) as a prime choice f | ||||
or International Mobile Telecommunication (IMT) for 5G technology while it is in | ||||
common unlicensed use in Community Networks (and small ISPs). Spectrum allocati | ||||
ons directly impact industries and market access with ramifications for Communit | ||||
y Networks. Further, there was a discussion on geopolitical tensions because of | ||||
it. | ||||
<!-- [rfced] Section 2.1.2: To what does "it" refer in this | ||||
sentence? | ||||
Original (the previous sentence is included for context): | ||||
Spectrum allocations directly impact industries and market | ||||
access with ramifications for community networks. Further, there was | ||||
a discussion on the geopolitical tension because of it. --> | ||||
</t> | ||||
</section> | </section> | |||
<section anchor="discussion"> | <section anchor="discussion"> | |||
<name>Discussion</name> | <name>Discussion</name> | |||
<t>How can the technical community address the management gap and impr ove best practices for Community Networks? Is the increasing complexity of the I nternet making it more challenging to establish secure connections, and should t his be taken into account in the design of the Internet? What steps need to be t aken to make sure Community Networks are secure? Should the manageability consid eration be expanded to explicitly consider Community Networks? Global Access to the Internet for All (GAIA) <xref target="GAIA"/> research group could be a venu e for further discussion and research. Further discussion highlighted the need f or readily available knowledge and tools for community networks as well as the t ussle with market forces when commercial networks compete with community network s. Also, there is a lack of operational inputs from community network operators in the IETF/IRTF.</t> | <t>How can the technical community address the management gaps and imp rove best practices for Community Networks? Is the increasing complexity of the Internet making it more challenging to establish secure connections, and should this be taken into account in the design of the Internet? What steps need to be taken to make sure Community Networks are secure? Should manageability considera tions be expanded to explicitly consider Community Networks? The Global Access t o the Internet for All (GAIA) Research Group <xref target="GAIA"/> could be a ve nue for further discussion and research. Further discussion highlighted the need for readily available knowledge and tools for Community Networks as well as the tussle with market forces when commercial networks compete with Community Netwo rks. Also, there is a lack of operational inputs from Community Network operator s in the IETF/IRTF.</t> | |||
</section> | </section> | |||
</section> | </section> | |||
<section anchor="session-2-digital-divide-reports-and-comments"> | <section anchor="session-2-digital-divide-reports-and-comments"> | |||
<name>Session 2: Digital Divide - Reports and Comments</name> | <name>Session 2: Digital Divide - Reports and Comments</name> | |||
<t>Critical internet infrastructure affects many aspects of our society | <t>Critical internet infrastructure affects many aspects of our society | |||
significantly, although differently, the inequitable aspects of which are typica | significantly, although differently, the inequitable aspects of which are typica | |||
lly referred to as "digital inclusion" signifying that in efforts to digitalise | lly referred to as "digital inclusion" signifying that in efforts to digitalize | |||
society, there are those left out due to what is typically called the "digital d | society, there are those left out due to what is typically called the "digital d | |||
ivide", a related term specific to access to the Internet. These concepts togeth | ivide", a related term specific to access to the Internet. These concepts togeth | |||
er demonstrate that even if Internet connectivity is available, for some there w | er demonstrate that even if Internet connectivity is available, for some there w | |||
ill remain challenges towards achieving equality. This becomes especially signif | ill remain challenges towards achieving equality. This becomes especially signif | |||
icant as governments view the Internet as an important tool to help them reach t | icant as governments view the Internet as an important tool for helping them rea | |||
he Sustainable Development Goals (SDG) <xref target="SDG"/> and to globally supp | ch the SDGs listed in <xref target="SDGs"/> and for globally supporting human ri | |||
ort human rights.</t> | ghts. | |||
<t>The second day of workshops was essential to understanding the nature | ||||
of the digital divide. Presentations of reports interrogated at least three key | <!-- [rfced] Section 2.2: This sentence is a bit unwieldy and | |||
aspects of the digital divide, though there is recognition that there may be mo | difficult to follow. May we update as suggested? | |||
re technical aspects of the digital divide that were not present. Those were: di | ||||
fferences between population demographics in the provision of online resources b | Original: | |||
y governments, inequality in the use of multilingualized domains and email addre | Critical internet infrastructure affects many aspects of our society | |||
sses, and increased costs for end-user downloads of contemporary websites' sizes | significantly, although differently, the inequitable aspects of which | |||
.</t> | are typically referred to as "digital inclusion" signifying that in | |||
efforts to digitalise society, there are those left out due to what | ||||
is typically called the "digital divide", a related term specific to | ||||
access to the Internet. | ||||
Suggested: | ||||
Critical Internet infrastructure affects many aspects of our society | ||||
significantly, although it impacts different parts of society | ||||
differently. The inequitable aspects are typically referred to as | ||||
"digital inclusion"; these aspects signify that in efforts to | ||||
digitalize society, there are those left out due to what is | ||||
typically called the "digital divide", a related term specific to | ||||
access to the Internet. --> | ||||
</t> | ||||
<t>The second day of workshops was essential to understanding the nature | ||||
of the digital divide. Presentations of reports interrogated at least three key | ||||
aspects of the digital divide, though it is recognized that there may be more t | ||||
echnical aspects of the digital divide that were not present. Those were differe | ||||
nces between population demographics in the provision of online resources by gov | ||||
ernments, inequality in the use of multilingualized domains and email addresses, | ||||
and increased costs for end-user downloads of contemporary websites' sizes. | ||||
<!-- [rfced] Section 2.2: We found "at least three" and "Those were" | ||||
a bit confusing, as only three aspects are listed. Also, as written, | ||||
the third sentence indicates that sizes are downloaded. May we | ||||
update as suggested? If not, please clarify the text. | ||||
Original: | ||||
Presentations of reports interrogated at | ||||
least three key aspects of the digital divide, though there is | ||||
recognition that there may be more technical aspects of the digital | ||||
divide that were not present. Those were: differences between | ||||
population demographics in the provision of online resources by | ||||
governments, inequality in the use of multilingualized domains and | ||||
email addresses, and increased costs for end-user downloads of | ||||
contemporary websites' sizes. | ||||
Suggested: | ||||
Presentations of reports interrogated at | ||||
least three key aspects of the digital divide, though it is | ||||
recognized that there may be more technical aspects of the digital | ||||
divide that were not addressed. Three of those aspects were: | ||||
* differences between population demographics in the provision | ||||
of online resources by governments. | ||||
* inequality in the use of multilingualized domains and email | ||||
addresses. | ||||
* increased costs for end-user downloads of websites of | ||||
contemporary sizes. | ||||
--> | ||||
</t> | ||||
<section anchor="disparities-in-service-provision"> | <section anchor="disparities-in-service-provision"> | |||
<name>Disparities in service provision</name> | <name>Disparities in Service Provisioning</name> | |||
<t>Ralph Holz presented research that exposes the more limited DNS-med | <!-- DNE "evidence that ..." text below from [HOLZ]; verified and corrected --> | |||
iated access to government websites by Indigenous communities in Australia as co | <t>Ralph Holz presented research that exposes the more limited DNS-med | |||
mpared to less disadvantaged users in the same population in "Evidence for a dig | iated access to government websites by Indigenous communities in Australia as co | |||
ital divide? Measuring DNS dependencies in the context of the Indigenous populat | mpared to less disadvantaged users in the same population in "Evidence for a dig | |||
ion of Australia". <xref target="HOLZ"/> DNS dependency trends were analysed bet | ital divide? Measuring DNS dependencies in the context of the indigenous populat | |||
ween two lists of domains serving Australian government sites for Indigenous use | ion of Australia" <xref target="HOLZ"/>. DNS dependency trends were analyzed bet | |||
rs and the general population. Researchers found, "evidence that dependencies fo | ween two lists of domains serving Australian government sites for Indigenous use | |||
r the Indigenous population are indeed differently configured," indicative of a | rs and the general population. Researchers found "evidence that dependencies for | |||
difference in service provisioning. However qualitative follow-up research is ne | the indigenous population are indeed differently configured," indicative of a d | |||
eded to interrogate both the potential reasons for these differences and whether | ifference in service provisioning. However, qualitative follow-up research is ne | |||
the differences contribute to a "digital divide" that is tangible for Indigenou | eded to interrogate both the potential reasons for these differences and whether | |||
s users.</t> | the differences contribute to a digital divide that is tangible for Indigenous | |||
users.</t> | ||||
</section> | </section> | |||
<section anchor="lack-of-consistent-acceptance-of-language-scripts"> | <section anchor="lack-of-consistent-acceptance-of-language-scripts"> | |||
<name>Lack of consistent acceptance of language scripts</name> | <name>Lack of Consistent Acceptance of Language Scripts</name> | |||
<t>On the topic of availability of Internet services and content in mu | <t>On the topic of availability of Internet services and content in mu | |||
ltiple languages "Universal Acceptance of Domain Names and Email Addresses: A Ke | ltiple languages, "Universal Acceptance of Domain Names and Email Addresses: A K | |||
y to Digital Inclusion" was presented by Sarmad Hussain of ICANN. <xref target=" | ey to Digital Inclusion" was presented by Sarmad Hussain of ICANN <xref target=" | |||
HUSSAIN"/> The ICANN community has increased the options for multilingual identi | HUSSAIN"/>. The ICANN community has increased the options for multilingual ident | |||
fiers through the expansion of the Internet's DNS for use in domains and email a | ifiers through the expansion of the Internet's DNS for use in domains and email | |||
ddresses. However, while the work of technical specification and policy recommen | addresses. However, while the work of technical specifications and policy recomm | |||
dations is complete, much work remains to deploy a multiligualized internet. Tod | endations is complete, much work remains to deploy a multilingualized internet. | |||
ay there are around 150 internationalised domain names (IDNs) but the barriers t | Today, there are around 150 internationalized domain names (IDNs), but | |||
o equal rollout of these scripts at the domain level are hindered primarily by s | equal rollout of these scripts at the domain level is hindered primarily by soft | |||
oftware and applications that do not yet recognise these new scripts. "Universal | ware and applications that do not yet recognize these new scripts. "Universal Ac | |||
Acceptance" is a programme of action for the internet community at large that c | ceptance" is a program of action for the internet community at large that can en | |||
an ensure IDNs are accepted and treated consistently.</t> | sure that IDNs are accepted and treated consistently. | |||
<!-- [rfced] Section 2.2.2: This sentence as written indicated that | ||||
the barriers, as opposed to equal rollout, were hindered. We updated | ||||
to indicate that the equal rollout is hindered. Please review, and | ||||
let us know if anything is incorrect. | ||||
Original: | ||||
Today there are around 150 internationalised domain names (IDNs) but | ||||
the barriers to equal rollout of these scripts at the domain level | ||||
are hindered primarily by software and applications that do not yet | ||||
recognise these new scripts. | ||||
Currently: | ||||
Today, there are around 150 internationalized domain names (IDNs), | ||||
but equal rollout of these scripts at the domain level is hindered | ||||
primarily by software and applications that do not yet recognize | ||||
these new scripts. --> | ||||
</t> | ||||
</section> | </section> | |||
<section anchor="web-affordability-and-inclusiveness"> | <section anchor="web-affordability-and-inclusiveness"> | |||
<name>Web Affordability and Inclusiveness</name> | <name>Web Affordability and Inclusiveness</name> | |||
<t>In "A Framework for Improving Web Affordability and Inclusiveness" | <!-- [LB] "geographic variations in ..." is quoted from [HABIB] (verified) --> | |||
Rumaisa Habib presented research on the connection between website size and cost | <t>In "A Framework for Improving Web Affordability and Inclusiveness", | |||
to end users. <xref target="HABIB"/> This critical inquiry presents access in t | Rumaisa Habib presented research on the connection between website size and cos | |||
erms of affordability and through measurement demonstrates that the material cos | t to end users <xref target="HABIB"/>. This critical inquiry presents access in | |||
ts to end users who pay for their connection based on the volume of data they do | terms of affordability and through measurement demonstrates that the material co | |||
wnload and upload have risen as the complexity of the web grows. Their research | sts to end users who pay for their connection based on the volume of data they d | |||
provides a framework for optimisation based on end-user affordability. This fram | ownload and upload have risen as the complexity of the Web grows. Their research | |||
ework is anchored to reality: it proposes a fairness metric and suggests systema | provides a framework for optimization based on end-user affordability. This fra | |||
tic adaptations to Web complexity based on "geographic variations in mobile broa | mework is anchored in reality: <xref target="HABIB"/> proposes a fairness metric | |||
dband prices and income levels."</t> | and suggests systematic adaptations to complexity of the Web based on "geograph | |||
ic variations in mobile broadband prices and income levels."</t> | ||||
</section> | </section> | |||
<section anchor="discussion-1"> | <section anchor="discussion-1"> | |||
<name>Discussion</name> | <name>Discussion</name> | |||
<t>These three reports discuss very different aspects of current inequ | <t>These three reports discuss very different aspects of current inequ | |||
alities in Internet access in various parts of the world: service provision, ava | alities in Internet access in various parts of the world: service provisioning, | |||
ilability, and economic costs. Notably, the reports discuss trends that exacerba | availability, and economic costs. Notably, the reports discuss trends that exace | |||
te the digital divide beyond the question of connectivity or whether users have | rbate the digital divide beyond the question of connectivity or whether users ha | |||
access to the Internet, potentially bringing concrete ways that the IETF communi | ve access to the Internet, potentially yielding concrete ways that the IETF comm | |||
ty can address digital inclusion within its remit.</t> | unity can address digital inclusion within its remit.</t> | |||
<t>Discussants noted that while there are some interesting aspects to | <t>Discussants noted that while there are some interesting aspects to | |||
the problem of the digital divide, such as measurements and frameworks, most of | the problem of the digital divide, such as measurements and frameworks, most of | |||
the work is getting this work to the right people at the policy layer so there i | the work involves getting this work to the appropriate people at the policy leve | |||
s an importance of communicating this technical evidence to the right people. Th | l; therefore, it is important to communicate this technical evidence to the appr | |||
e IETF's role could be to build consensus on the proper solutions presented to d | opriate people. The IETF's role could be to build consensus on the proper soluti | |||
ecision-makers that put research and measurement not only in context but also in | ons presented to decision-makers that put research and measurement not only in c | |||
a consensus-driven solution space. Another method to better communicate this re | ontext but also in a consensus-driven solution space. Another method to better c | |||
search is by telling stories of end users in more relatable and relevant terms, | ommunicate this research is by telling stories of end users in more relatable an | |||
which is often a challenge for the technical level and a role for more diverse s | d relevant terms; this is often a challenge at the technical level and a role fo | |||
takeholders at the more local level.</t> | r more diverse stakeholders at the more local level.</t> | |||
</section> | </section> | |||
</section> | </section> | |||
<section anchor="session-3-censorship-reports-and-circumvention"> | <section anchor="session-3-censorship-reports-and-circumvention"> | |||
<name>Session 3: Censorship - Reports and Circumvention</name> | <name>Session 3: Censorship - Reports and Circumvention</name> | |||
<t>This session focused on reports of censorship as observed during rece | <t>This session focused on reports of censorship as observed in recent y | |||
nt years in different parts of the world, as well as on the use of and expectati | ears in different parts of the world; it also focused on the use of, and expecta | |||
on on censorship circumvention tools, mainly the use of secure VPN services.</t> | tions for, censorship circumvention tools, mainly the use of secure VPN services | |||
<t>The censorship reports, with a focus on Asia, and specifically India, | .</t> | |||
as well as Russia, as an example where censorship has changed significantly rec | <t>The censorship reports, with a focus on Asia, and specifically India, | |||
ently, discussed the legal frameworks and court acts that put legal obligations | as well as Russia, as an example where censorship has changed significantly rec | |||
on regional network providers to block traffic. Further, measurements to validat | ently, discussed the legal frameworks and court actions that put legal obligatio | |||
e the blocking as well as analyses of how blocking is implemented were discussed | ns on regional network providers to block traffic. Further, measurements to vali | |||
, i.e. which protocols are used but also which kind of devices are used to confi | date the blocking as well as analyses of how blocking is implemented were discus | |||
gure the blocking rules and where are they deployed.</t> | sed, i.e., which protocols are used but also which kinds of devices are used to | |||
configure the blocking rules and where they are deployed. | ||||
<!-- [rfced] Section 2.3: We cannot determine what "specifically" | ||||
and "example" refer to in this sentence. If the suggested text is | ||||
not correct, please clarify the use of "specifically" and "example". | ||||
Original: | ||||
The censorship reports, with a focus on Asia, and specifically India, | ||||
as well as Russia, as an example where censorship has changed | ||||
significantly recently, discussed the legal frameworks and court acts | ||||
that put legal obligations on regional network providers to block | ||||
traffic. | ||||
Suggested (assuming that "specifically" refers to India only and | ||||
that "example" refers to Russia only): | ||||
The censorship reports - with a focus on Asia and (specifically) | ||||
India, as well as Russia (which provides an example of where | ||||
censorship has changed significantly recently) - discussed the legal | ||||
frameworks and court actions that put legal obligations on regional | ||||
network providers to block traffic. --> | ||||
</t> | ||||
<section anchor="censorship-orders-measurements-and-device-analysis"> | <section anchor="censorship-orders-measurements-and-device-analysis"> | |||
<name>Censorship Orders, Measurements, and Device Analysis</name> | <name>Censorship Orders, Measurements, and Device Analysis</name> | |||
<t><xref target="SAMSUDIN"/> reported on confirmed blocking from 10 co | <t><xref target="SAMSUDIN"/> reported on confirmed blocking from 10 co | |||
untries (Cambodia, Hong Kong (China), India, Indonesia, Malaysia, Myanmar, Phili | untries (Cambodia, Hong Kong (China), India, Indonesia, Malaysia, Myanmar, Phili | |||
ppines, Thailand, Timor-Leste, Vietnam) in the period from 1 July 2022 to 30 Jun | ppines, Thailand, Timor-Leste, and Vietnam) in the period from 1 July 2022 to 30 | |||
e 2023. The blocking was either confirmed by OONI measurements for existing bloc | June 2023. The blocking was either confirmed by Open Observatory of | |||
king fingerprints, heuristics, i.e. for new blocking fingerprints as well as new | Network Interference (OONI) measurements for existing blocking fingerprints, heu | |||
s reports of blocking orders, or user experiences. Most of these countries block | ristics, i.e., for new blocking fingerprints as well as news reports of blocking | |||
specific content such as porn, gambling, or certain news pages. Interestingly t | orders, or user experiences. Most of these countries block specific content suc | |||
he blocking in Hong Kong and Myanmar is focused on the military and governmental | h as porn, gambling, or certain news pages. Interestingly, the blocking in Hong | |||
pages of foreign countries. Blocking is often realized by either DNS tampering | Kong and Myanmar is focused on the military and governmental pages of foreign co | |||
or HTTP tampering. For DNS, either a decided IP address, a bogon IP address (127 | untries. Blocking is often realized by either DNS tampering or HTTP tampering. F | |||
.0.0.1), or an empty domain (nxdomain) is used. In case of DNS tampering using a | or DNS, either a chosen IP address, a bogon IP address (127.0.0.1), or an empty | |||
decided IP address or HTTP tampering some countries provide a block page that e | domain (NXDOMAIN) is used. In the case of DNS tampering using a chosen IP addres | |||
xposes the blocking, however, more transparency about blocking is requested by c | s or HTTP tampering, some countries provide a block page that exposes the blocki | |||
ivil society organizations and the iMAP project.</t> | ng; however, more transparency related to blocking is requested by civil society | |||
<t><xref target="GROVER"/> further focused the discussion on online ce | organizations and the Internet Monitoring Action Project (iMAP). | |||
nsorship in India, Pakistan, and Indonesia. In India, where providers are respon | ||||
sible for implementing the blocking but no method is mandated, the six major ISP | <!-- [rfced] Section 2.3.1: | |||
s (covering 98.82% of all subscribers) were tested on 4379 blocked websites (bas | ||||
ed on court orders, user reports, and publicly available or leaked government or | a) It is not clear what "either" refers to in this sentence. Also, | |||
ders) on DNS poisoning/injection or HTTP/SNI-based censorship. Used censorship t | we defined "OONI" as "Open Observatory of Network Interference" per | |||
echniques and websites blocked were different across ISPs. Multiple ISPs used tw | <https://ooni.org/>. | |||
o different techniques (depending on the website), and all but one provided cens | ||||
orship notices. Providers blocked between 1892 to 3721 (of 4379) pages with only | If the suggested text regarding "either" and the definition of "OONI" | |||
1115 (27.64%) of pages blocked by all ISPs. <xref target="Singh2020"/> In contr | are not correct, please clarify the text. | |||
ast, in Pakistan, the government can also order the IPSs to perform blocking and | ||||
blocking has even been observed in the past on the IXP level. Since 2020, there | Original: | |||
has also been a central Web Monitoring System deployed at lines of internationa | The blocking was either confirmed by OONI | |||
l connectivity. In Indonesia, initially, the government guided ISPs in how to pe | measurements for existing blocking fingerprints, heuristics, i.e. for | |||
rform the blocking. The regulations were updated in 2020 to allow Indonesian ISP | new blocking fingerprints as well as news reports of blocking orders, | |||
s to block websites at their discretion. In 2022, there was a proposal by intern | or user experiences. | |||
et service providers to centralise DNS. In Indonesia, a partial block list is pu | ||||
blicly available, but without any indication of why something is blocked. <xref | Suggested: | |||
target="Grover2023"/></t> | The blocking was confirmed by either (1) Open | |||
<t><xref target="BASSO"/> reported that for Russia a high increase in | Observatory of Network Interference (OONI) measurements for existing | |||
additions to the Roskomnadzor's block list was observed in March 2022 as well as | blocking fingerprints or heuristics (i.e., for new blocking | |||
in December 2022, foremost covering news pages but also covering human rights o | fingerprints as well as news reports of blocking orders) or (2) user | |||
rganizations and social media, where more than 3500 blocking orders were added t | experiences. | |||
o the list by an "Unknown body". Further, blocking of domains that are not in th | ||||
e official Roskomnadzor's list has been observed as well.</t> | b) Per Internet searches, a bogon address could be any one of a | |||
<t>An invited talk presented the work in <xref target="WANG"/> on loca | number of inappropriate addresses and is not necessarily 127.0.0.1. | |||
ting censorship devices by using HTTP and TLS traceroutes, identifying device ve | However, is 127.0.0.1 the only possible bogon address when discussing | |||
ndors through fingerprinting, and reverse-engineering censorship triggers by the | DNS? If not, should "(127.0.0.1)" be "(e.g., 127.0.0.1)"? | |||
use of fuzzing. E.g. for the case of Azerbaijan and Kazakhstan, they showed tha | ||||
t a significant portion of measurements from remote countries are blocked at the | Original: | |||
endpoint, indicating local policies but connection resets are also happening in | For DNS, either a decided | |||
Belarus and Russia. Further, they could identify a set of commercial network de | IP address, a bogon IP address (127.0.0.1), or an empty domain | |||
vices (with filtering techniques such as firewalls) that are used in these count | (nxdomain) is used. --> | |||
ries for censorship and show how fuzzing can be used to fingerprint and cluster | ||||
behaviours as well as potentially circumvent the deployed methods.</t> | </t> | |||
<t>All speakers called for more transparency by requiring blocking mes | <t><xref target="GROVER"/> further focused the discussion on online ce | |||
sages as well as publication and auditing of blocklists. Potentially even standa | nsorship in India, Pakistan, and Indonesia. In India, where providers are respon | |||
rdization could help.</t> | sible for implementing the blocking but no method is mandated, the six major ISP | |||
s (covering 98.82% of all subscribers) were tested on 4379 blocked websites (bas | ||||
ed on court orders, user reports, and publicly available or leaked government or | ||||
ders) on DNS poisoning/injection or HTTP/SNI-based censorship. The censorship te | ||||
chniques used and websites blocked were different across ISPs. Multiple ISPs use | ||||
d two different techniques (depending on the website), and all but one provided | ||||
censorship notices. Providers blocked between 1892 and 3721 (of 4379) pages with | ||||
only 1115 pages (27.64%) blocked by all ISPs <xref target="Singh2020"/>. In con | ||||
trast, in Pakistan, the government can also order the ISPs to perform blocking, | ||||
and blocking has even been observed in the past at the Internet Exchange Point ( | ||||
IXP) level. Since 2020, there has also been a central Web Monitoring System depl | ||||
oyed at lines of international connectivity. In Indonesia, initially, the govern | ||||
ment guided ISPs in how to perform the blocking. The regulations were updated in | ||||
2020 to allow Indonesian ISPs to block websites at their discretion. In 2022, t | ||||
here was a proposal by ISPs to centralize DNS. In Indonesia, a partial blocklist | ||||
is publicly available, but without any indication of why something is blocked < | ||||
xref target="Grover2023"/>. | ||||
<!-- [rfced] Section 2.3.1: We had trouble following these | ||||
sentences, in part because the text related to the citation for | ||||
[Singh2020]* has some issues. | ||||
* We consulted <https://arxiv.org/pdf/1912.08590>, which provides the | ||||
full [Singh2020] paper, and found that "27.64%" in the current text | ||||
seems to be out of "4379", which is not correct. (The full paper | ||||
mentions "only 1115 websites out of the 4033 (just 27.64%)"). | ||||
(We have an item later in our list of questions for you, where we ask | ||||
if we can update the URL for the reference listing so that readers | ||||
can access the full Singh paper at no cost.) | ||||
May we update the text as suggested? If not, please | ||||
* clarify what "tested on" refers to | ||||
* provide the correct definitions of "SNI", "IPSs" (noting that for | ||||
now we changed "IPSs" to "ISPs"), and "IXP" | ||||
* review the numbers provided in [Singh2020] and correct the | ||||
numbers as needed. For example, because 1115 is 27.64% of 4033, we | ||||
added "4033" to the suggested text below, per | ||||
<https://arxiv.org/pdf/1912.08590>. | ||||
Original: | ||||
[GROVER] further focused the discussion on online censorship in | ||||
India, Pakistan, and Indonesia. In India, where providers are | ||||
responsible for implementing the blocking but no method is mandated, | ||||
the six major ISPs (covering 98.82% of all subscribers) were tested | ||||
on 4379 blocked websites (based on court orders, user reports, and | ||||
publicly available or leaked government orders) on DNS poisoning/ | ||||
injection or HTTP/SNI-based censorship. Used censorship techniques | ||||
and websites blocked were different across ISPs. Multiple ISPs used | ||||
two different techniques (depending on the website), and all but one | ||||
provided censorship notices. Providers blocked between 1892 to 3721 | ||||
(of 4379) pages with only 1115 (27.64%) of pages blocked by all ISPs. | ||||
[Singh2020] In contrast, in Pakistan, the government can also order | ||||
the IPSs to perform blocking and blocking has even been observed in | ||||
the past on the IXP level. | ||||
Suggested (also assuming that "tested on" refers to DNS | ||||
poisoning/injection or on censorship using HTTP or SNI): | ||||
[GROVER] further focused the discussion on online censorship in | ||||
India, Pakistan, and Indonesia. | ||||
As discussed in [Singh2020], in India, where providers are | ||||
responsible for implementing the blocking but no method is | ||||
mandated, the six major ISPs (covering 98.82% of all subscribers) | ||||
were tested on a total of 4379 blocked websites (based on court | ||||
orders, user reports, and publicly available or leaked government | ||||
orders) by using DNS poisoning/injection or using censorship based | ||||
on HTTP or the Server Name Indication (SNI). The censorship | ||||
techniques used and websites blocked were different across ISPs. | ||||
Multiple ISPs used two different techniques (depending on the | ||||
website), and all but one provided censorship notices. A list of | ||||
4379 potentially blocked websites was tested; 4033 of those websites | ||||
appeared in at least one ISP's blocklist. Providers blocked between | ||||
1892 and 3721 of the 4033 websites, with only 1115 websites (27.64%) | ||||
blocked by all six ISPs. | ||||
In contrast, in Pakistan, the government can also order the ISPs to | ||||
perform blocking, and blocking has even been observed in the past at | ||||
the Internet Exchange Point (IXP) level. --> | ||||
</t> | ||||
<t><xref target="BASSO"/> reported that for Russia a large increase in | ||||
additions to Roskomnadzor's blocklist was observed in March 2022 as well as in | ||||
December 2022, foremost covering news pages but also covering human rights organ | ||||
izations and social media, where more than 3500 blocking orders were added to th | ||||
e list by an "Unknown body". Further, blocking of domains that are not in the of | ||||
ficial Roskomnadzor blocklist has been observed as well.</t> | ||||
<t>An invited talk included a presentation of the work in <xref target | ||||
="WANG"/> on locating censorship devices by using HTTP and TLS traceroutes, iden | ||||
tifying device vendors through fingerprinting, and reverse-engineering censorshi | ||||
p triggers by the use of fuzzing. For example, in the case of Azerbaijan and Kaz | ||||
akhstan, they showed that a significant portion of measurements from remote coun | ||||
tries is blocked at the endpoint, indicating local policies, but showed that con | ||||
nection resets are also happening in Belarus and Russia. Further, they could ide | ||||
ntify a set of commercial network devices (with filtering techniques such as fir | ||||
ewalls) that are used in these countries for censorship and show how fuzzing can | ||||
be used to fingerprint and cluster behaviors as well as potentially circumvent | ||||
the deployed methods.</t> | ||||
<t>All speakers called for more transparency by requiring blocking mes | ||||
sages as well as publication and auditing of blocklists. Potentially, even stand | ||||
ardization could help.</t> | ||||
</section> | </section> | |||
<section anchor="use-of-vpns-for-censorship-circumvents-and-user-expecta tions"> | <section anchor="use-of-vpns-for-censorship-circumvents-and-user-expecta tions"> | |||
<name>Use of VPNs for Censorship Circumvents and User Expectations</na me> | <name>Use of VPNs for Censorship Circumvents and User Expectations</na me> | |||
<t>Further on in the session, the possibility and prevalence of using | <t>Further on in the session, the possibility and prevalence of using | |||
VPNs for circumvention has been discussed including user expectations and an ana | VPNs for circumvention were discussed, including user expectations and an analys | |||
lysis of security shortcomings of commercial VPN services. The analysis presente | is of security shortcomings of commercial VPN services. The analysis presented i | |||
d in <xref target="RAMESH"/> has shown various problems that lead to data leaks | n <xref target="RAMESH"/> has shown various problems that lead to data leaks suc | |||
such as leakage of IPv6 traffic, non-browser traffic, or tunnel failure, not uph | h as leakage of IPv6 traffic, non-browser traffic, or tunnel failure, not uphold | |||
olding user expectations, especially when used in authoritarian regimes for cens | ing user expectations, especially when used in authoritarian regimes for censors | |||
orship circumvention or private communication.</t> | hip circumvention or private communication. | |||
<t>The question of how common the use of VPNs for circumvention is and | ||||
its legal implications, as VPNs are illegal in a few countries, has been discus | <!-- [rfced] Section 2.3.2: In this sentence as written, it is not | |||
sed. E.g. VPNs are not officially banned in India but VPN providers need to stor | clear what "not upholding user expectations" refers to. It appears | |||
e log data and those, who haven't complied, stopped serving India. However, more | that in [RAMESH], "user expectations" is treated as a separate | |||
data on VPN use and blocking might be needed.</t> | concept. May we update this sentence as suggested? | |||
Original: | ||||
The analysis presented in [RAMESH] has shown various problems that | ||||
lead to data leaks such as leakage of IPv6 traffic, non-browser | ||||
traffic, or tunnel failure, not upholding user expectations, | ||||
especially when used in authoritarian regimes for censorship | ||||
circumvention or private communication. | ||||
Suggested: | ||||
The analysis presented in [RAMESH] has shown various problems that | ||||
lead to data leaks, such as (1) leakage of IPv6 traffic, | ||||
(2) non-browser traffic, or (3) tunnel failure, in addition to | ||||
failing to uphold user expectations, especially when used in | ||||
authoritarian regimes for censorship circumvention or private | ||||
communication. --> | ||||
</t> | ||||
<t>The question of how common the use of VPNs for circumvention is and | ||||
its legal implications, as VPNs are illegal in a few countries, was discussed. | ||||
For example, VPNs are not officially banned in India, but VPN providers need to | ||||
store log data and those who haven't complied stopped serving India. However, mo | ||||
re data on VPN use and blocking might be needed.</t> | ||||
</section> | </section> | |||
<section anchor="discussion-2"> | <section anchor="discussion-2"> | |||
<name>Discussion</name> | <name>Discussion</name> | |||
<t>After all, there is a cat-and-mouse game between censors and circum vents, however, continued work on protocol enhancements that protect user privac y is essential.</t> | <t>After all, there is a cat-and-mouse game between censors and circum vents; however, continued work on protocol enhancements that protect user privac y is essential.</t> | |||
</section> | </section> | |||
</section> | </section> | |||
<section anchor="key-take-aways"> | <section anchor="key-take-aways"> | |||
<name>Key Take Aways</name> | <name>Key Takeaways</name> | |||
<t>Some key takeaways from the workshop are -</t> | <t>Some key takeaways from the workshop are as follows:</t> | |||
<ul spacing="normal"> | <ul spacing="normal"> | |||
<li> | <li> | |||
<t>There is a need for the technical community to address the manage ment gaps in operating Community Networks.</t> | <t>There is a need for the technical community to address the manage ment gaps in operating Community Networks.</t> | |||
</li> | </li> | |||
<li> | <li> | |||
<t>Work should be done in documenting best practices for operating C ommunity Networks.</t> | <t>Work should be done to document best practices for operating Comm unity Networks.</t> | |||
</li> | </li> | |||
<li> | <li> | |||
<t>During the development of protocols, explicit manageability consi derations related to Community Networks should be considered.</t> | <t>During the development of protocols, explicit manageability consi derations related to Community Networks should be carefully thought out.</t> | |||
</li> | </li> | |||
<li> | <li> | |||
<t>Build consensus on solutions that have the most significant impac t in fostering digital inclusion. Further, promoting these solutions ensures tha t efforts to bridge the digital divide are effective and inclusive.</t> | <t>Build consensus on solutions that have the most significant impac t in fostering digital inclusion. Further, promoting these solutions ensures tha t efforts to bridge the digital divide are effective and inclusive.</t> | |||
</li> | </li> | |||
<li> | <li> | |||
<t>Further work to enhance protocols ensuring user privacy should co ntinue.</t> | <t>Further work should be done to enhance protocols, ensuring that u ser privacy is preserved.</t> | |||
</li> | </li> | |||
<li> | <li> | |||
<t>Develop further protocols (or extensions to existing protocols) t hat enable more transparency on filtering and promote their use and deployment.< /t> | <t>Develop further protocols (or extensions to existing protocols) t hat enable more transparency on filtering, and promote their use and deployment. </t> | |||
</li> | </li> | |||
<li> | <li> | |||
<t>Develop new VPN-like services and potentially support measurement s to understand their deployment and use.</t> | <t>Develop new VPN-like services and potentially support measurement s to understand their deployment and use.</t> | |||
</li> | </li> | |||
<li> | <li> | |||
<t>Further discussion of these topics could happen in GAIA, HRPC, PE ARG, and MAPRG based on the relevance to the research group. The management and operations-related discussion can be taken to OPSAWG. The community could also e xplore if a censorship (and its circumvention) focused group could be created.</ t> | <t>Further discussion of these topics could happen in the GAIA Resea rch Group, the Human Rights Protocol Considerations (HRPC) Research Group, the P rivacy Enhancements and Assessments Research Group (PEARG), and the Measurement and Analysis for Protocols Research Group (MAPRG), based on relevance to the res earch group. Management-related and operations-related discussions can be taken to the IETF Operations and Management Area Working Group (OPSAWG). The community could also explore whether a group focused on censorship (and its circumvention ) could be created.</t> | |||
</li> | </li> | |||
</ul> | </ul> | |||
</section> | </section> | |||
</section> | </section> | |||
<section><name>IANA Considerations</name> | ||||
<t>This document has no IANA actions.</t> | ||||
</section> | ||||
<!-- [rfced] [Document Shepherd] We see that this document does not | ||||
contain a Security Considerations section. Please see Section 4.8.5 | ||||
of RFC 7322 (https://www.rfc-editor.org/info/rfc7322). Also, please | ||||
provide appropriate text for this document. For example, should | ||||
"security shortcomings" in Section 2.3.2 be mentioned/addressed? | ||||
If you verify that security considerations do not apply to this | ||||
document, we could add something like the following (as done in | ||||
IAB RFCs 8700 ("Fifty Years of RFCs") and 9419 ("Considerations on | ||||
Application - Network Collaboration Using Path Signals")): | ||||
4. Security Considerations | ||||
This document has no security considerations. | ||||
Please review and advise. --> | ||||
</middle> | </middle> | |||
<back> | <back> | |||
<references anchor="sec-informative-references"> | <references anchor="sec-informative-references"> | |||
<name>Informative References</name> | <name>Informative References</name> | |||
<reference anchor="RFC7962"> | ||||
<front> | <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.796 | |||
<title>Alternative Network Deployments: Taxonomy, Characterization, Te | 2.xml"/> | |||
chnologies, and Architectures</title> | ||||
<author fullname="J. Saldana" initials="J." role="editor" surname="Sal | <reference anchor="SDGs" target="https://sdgs.un.org/goals"> | |||
dana"/> | ||||
<author fullname="A. Arcia-Moret" initials="A." surname="Arcia-Moret"/ | ||||
> | ||||
<author fullname="B. Braem" initials="B." surname="Braem"/> | ||||
<author fullname="E. Pietrosemoli" initials="E." surname="Pietrosemoli | ||||
"/> | ||||
<author fullname="A. Sathiaseelan" initials="A." surname="Sathiaseelan | ||||
"/> | ||||
<author fullname="M. Zennaro" initials="M." surname="Zennaro"/> | ||||
<date month="August" year="2016"/> | ||||
<abstract> | ||||
<t>This document presents a taxonomy of a set of "Alternative Networ | ||||
k Deployments" that emerged in the last decade with the aim of bringing Internet | ||||
connectivity to people or providing a local communication infrastructure to ser | ||||
ve various complementary needs and objectives. They employ architectures and top | ||||
ologies different from those of mainstream networks and rely on alternative gove | ||||
rnance and business models.</t> | ||||
<t>The document also surveys the technologies deployed in these netw | ||||
orks, and their differing architectural characteristics, including a set of defi | ||||
nitions and shared properties.</t> | ||||
<t>The classification considers models such as Community Networks, W | ||||
ireless Internet Service Providers (WISPs), networks owned by individuals but le | ||||
ased out to network operators who use them as a low-cost medium to reach the und | ||||
erserved population, networks that provide connectivity by sharing wireless reso | ||||
urces of the users, and rural utility cooperatives.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="7962"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC7962"/> | ||||
</reference> | ||||
<reference anchor="SDG" target="https://sdgs.un.org/goals"> | ||||
<front> | <front> | |||
<title>Sustainable Development Goals</title> | <title>The 17 Goals</title> | |||
<author> | <author> | |||
<organization/> | <organization>United Nations Department of Economic and Social Affai rs - Sustainable Development</organization> | |||
</author> | </author> | |||
<date>n.d.</date> | ||||
</front> | </front> | |||
</reference> | </reference> | |||
<reference anchor="MARTINEZ" target="https://www.ietf.org/slides/slides-bi asws-community-networks-and-the-quest-for-quality-00.pdf"> | <reference anchor="MARTINEZ" target="https://www.ietf.org/slides/slides-bi asws-community-networks-and-the-quest-for-quality-00.pdf"> | |||
<front> | <front> | |||
<title>Community Networks and the Quest for Quality</title> | <title>Community Networks and the Quest for Quality</title> | |||
<author initials="L. M." surname="Martínez-Cervantes" fullname="Luis M iguel Martínez Cervantes"> | <author initials="L. M." surname="Martínez-Cervantes" fullname="Luis M iguel Martínez Cervantes"> | |||
<organization/> | <organization/> | |||
</author> | </author> | |||
<author initials="R." surname="Guevara-Martínez" fullname="Rolando Gue vara Martínez"> | <author initials="R." surname="Guevara-Martínez" fullname="Rolando Gue vara Martínez"> | |||
<organization/> | <organization/> | |||
</author> | </author> | |||
<date year="2024" month="January"/> | <date year="2024" month="January"/> | |||
skipping to change at line 221 ¶ | skipping to change at line 539 ¶ | |||
<title>Community Networks and the Quest for Quality</title> | <title>Community Networks and the Quest for Quality</title> | |||
<author initials="L. M." surname="Martínez-Cervantes" fullname="Luis M iguel Martínez Cervantes"> | <author initials="L. M." surname="Martínez-Cervantes" fullname="Luis M iguel Martínez Cervantes"> | |||
<organization/> | <organization/> | |||
</author> | </author> | |||
<author initials="R." surname="Guevara-Martínez" fullname="Rolando Gue vara Martínez"> | <author initials="R." surname="Guevara-Martínez" fullname="Rolando Gue vara Martínez"> | |||
<organization/> | <organization/> | |||
</author> | </author> | |||
<date year="2024" month="January"/> | <date year="2024" month="January"/> | |||
</front> | </front> | |||
</reference> | </reference> | |||
<reference anchor="GUIFI" target="https://guifi.net/en"> | <reference anchor="GUIFI" target="https://guifi.net/en"> | |||
<front> | <front> | |||
<title>Guifi.net</title> | <title>guifi.net</title> | |||
<author> | <author> | |||
<organization/> | <organization/> | |||
</author> | </author> | |||
<date>n.d.</date> | ||||
</front> | </front> | |||
</reference> | </reference> | |||
<reference anchor="APC" target="https://www.apc.org/"> | <reference anchor="APC" target="https://www.apc.org/"> | |||
<front> | <front> | |||
<title>The Association for Progressive Communications (APC)</title> | <title>The Association for Progressive Communications (APC)</title> | |||
<author> | <author> | |||
<organization/> | <organization/> | |||
</author> | </author> | |||
<date>n.d.</date> | ||||
</front> | </front> | |||
</reference> | </reference> | |||
<reference anchor="ISOC" target="https://www.internetsociety.org/action-pl an/community-networks/"> | <reference anchor="ISOC" target="https://www.internetsociety.org/action-pl an/community-networks/"> | |||
<front> | <front> | |||
<title>Community networks help bridge the connectivity gap</title> | <title>Connecting the Unconnected: Community networks help bridge the connectivity gap</title> | |||
<author> | <author> | |||
<organization/> | <organization>Internet Society</organization> | |||
</author> | </author> | |||
<date>n.d.</date> | ||||
</front> | </front> | |||
</reference> | </reference> | |||
<reference anchor="TBB" target="https://tribalbroadbandbootcamp.org/"> | <reference anchor="TBB" target="https://tribalbroadbandbootcamp.org/"> | |||
<front> | <front> | |||
<title>Tribal Broadband Bootcamp</title> | <title>Tribal Broadband Bootcamp</title> | |||
<author> | <author> | |||
<organization/> | <organization/> | |||
</author> | </author> | |||
<date>n.d.</date> | ||||
</front> | </front> | |||
</reference> | </reference> | |||
<reference anchor="BENSON" target="https://www.ietf.org/slides/slides-bias ws-a-c-in-cdn-access-service-to-and-from-the-internet-at-cost-for-community-netw orks-00.pdf"> | <reference anchor="BENSON" target="https://www.ietf.org/slides/slides-bias ws-a-c-in-cdn-access-service-to-and-from-the-internet-at-cost-for-community-netw orks-00.pdf"> | |||
<front> | <front> | |||
<title>A 'C' in CDN - Access service to and from the Internet at cost for community networks</title> | <title>A 'C' in CDN: Access service to and from the Internet at cost f or community networks</title> | |||
<author initials="T. A." surname="Benson" fullname="Theophilus A. Bens on"> | <author initials="T. A." surname="Benson" fullname="Theophilus A. Bens on"> | |||
<organization/> | <organization/> | |||
</author> | </author> | |||
<author initials="M." surname="Fayed" fullname="Marwan Fayed"> | <author initials="M." surname="Fayed" fullname="Marwan Fayed"> | |||
<organization/> | <organization/> | |||
</author> | </author> | |||
<date year="2024" month="January"/> | <date year="2024" month="January"/> | |||
</front> | </front> | |||
</reference> | </reference> | |||
<reference anchor="PANGEA" target="https://www.cloudflare.com/en-gb/pangea /"> | <reference anchor="PANGEA" target="https://www.cloudflare.com/en-gb/pangea /"> | |||
<front> | <front> | |||
<title>Project Pangea from Cloudflare</title> | <title>Project Pangea: Helping underserved communities expand access t o the Internet for free</title> | |||
<author> | <author> | |||
<organization/> | <organization>Cloudflare</organization> | |||
</author> | </author> | |||
<date>n.d.</date> | ||||
</front> | </front> | |||
</reference> | </reference> | |||
<reference anchor="HU" target="https://www.ietf.org/slides/slides-biasws-c losing-the-performance-and-management-gaps-with-satellite-internet-challenges-ap proaches-and-future-directions-01.pdf"> | <reference anchor="HU" target="https://www.ietf.org/slides/slides-biasws-c losing-the-performance-and-management-gaps-with-satellite-internet-challenges-ap proaches-and-future-directions-01.pdf"> | |||
<front> | <front> | |||
<title>Closing the Performance and Management Gaps with Satellite Inte rnet - Challenges, Approaches, and Future Directions</title> | <title>Closing the Performance and Management Gaps with Satellite Inte rnet: Challenges, Approaches, and Future Directions</title> | |||
<author initials="P." surname="Hu" fullname="Peng Hu"> | <author initials="P." surname="Hu" fullname="Peng Hu"> | |||
<organization/> | <organization/> | |||
</author> | </author> | |||
<date year="2024" month="January"/> | <date year="2024" month="January"/> | |||
</front> | </front> | |||
</reference> | </reference> | |||
<reference anchor="RENNO" target="https://www.ietf.org/slides/slides-biasw s-position-paper-by-raquel-renno-01.pdf"> | <reference anchor="RENNO" target="https://www.ietf.org/slides/slides-biasw s-position-paper-by-raquel-renno-01.pdf"> | |||
<front> | <front> | |||
<title>Maximising Connectivity - The Spectrum's Vital Role in Technolo gy Access</title> | <title>Maximising Connectivity: The Spectrum's Vital Role in Technolog y Access</title> | |||
<author initials="R." surname="Rennó" fullname="Raquel Rennó"> | <author initials="R." surname="Rennó" fullname="Raquel Rennó"> | |||
<organization/> | <organization/> | |||
</author> | </author> | |||
<date year="2024" month="January"/> | <date year="2024" month="January"/> | |||
</front> | </front> | |||
</reference> | </reference> | |||
<reference anchor="GAIA" target="https://www.irtf.org/gaia.html"> | <reference anchor="GAIA" target="https://www.irtf.org/gaia.html"> | |||
<front> | <front> | |||
<title>Global Access to the Internet for All Research Group</title> | <title>Global Access to the Internet for All Research Group (GAIA)</ti tle> | |||
<author> | <author> | |||
<organization/> | <organization/> | |||
</author> | </author> | |||
<date>n.d.</date> | ||||
</front> | </front> | |||
</reference> | </reference> | |||
<reference anchor="SAMSUDIN" target="https://www.ietf.org/slides/slides-bi | ||||
asws-position-paper-by-raquel-renno-01.pdf"> | <reference anchor="SAMSUDIN" target="https://www.ietf.org/slides/slides-bi | |||
asws-imap-internet-monitoring-action-project-internet-censorship-report-02.pdf"> | ||||
<front> | <front> | |||
<title>iMAP (Internet Monitoring Action Project) 2023 Internet Censors hip Report</title> | <title>iMAP (Internet Monitoring Action Project) 2023 Internet Censors hip Report</title> | |||
<author initials="S." surname="Samsudin" fullname="Siti Nurliza Samsud in"> | <author initials="S." surname="Samsudin" fullname="Siti Nurliza Samsud in"> | |||
<organization/> | <organization/> | |||
</author> | </author> | |||
<date year="2024" month="January"/> | <date year="2024" month="January"/> | |||
</front> | </front> | |||
</reference> | </reference> | |||
<reference anchor="GROVER" target="https://datatracker.ietf.org/meeting/in terim-2024-biasws-03/materials/slides-interim-2024-biasws-03-sessa-online-censor ship-in-india-pakistan-and-indonesia-00"> | <reference anchor="GROVER" target="https://datatracker.ietf.org/meeting/in terim-2024-biasws-03/materials/slides-interim-2024-biasws-03-sessa-online-censor ship-in-india-pakistan-and-indonesia-00"> | |||
<front> | <front> | |||
<title>Online censorship in India, Pakistan and Indonesia</title> | <title>Online censorship in India, Pakistan and Indonesia</title> | |||
<author initials="G." surname="Grover" fullname="Gurshabad Grover"> | <author initials="G." surname="Grover" fullname="Gurshabad Grover"> | |||
<organization/> | <organization/> | |||
</author> | </author> | |||
<date year="2024" month="January"/> | <date year="2024" month="January"/> | |||
</front> | </front> | |||
</reference> | </reference> | |||
<reference anchor="Grover2023" target="https://archive.org/details/eaten-b y-the-internet/"> | <reference anchor="Grover2023" target="https://archive.org/details/eaten-b y-the-internet/"> | |||
<front> | <front> | |||
<title>The infrastructure of censorship in Asia</title> | <title>The infrastructure of censorship in Asia</title> | |||
<author initials="G." surname="Grover" fullname="Gurshabad Grover"> | <author initials="G." surname="Grover" fullname="Gurshabad Grover"> | |||
<organization/> | <organization/> | |||
</author> | </author> | |||
<author initials="C." surname="Cath" fullname="Corinne Cath (ed.)"> | ||||
<organization/> | ||||
</author> | ||||
<date year="2023" month="October"/> | <date year="2023" month="October"/> | |||
</front> | </front> | |||
<refcontent>in "Eaten by the Internet", ed. Corinne Cath, pp. | ||||
75-81</refcontent> | ||||
<refcontent>Internet Archive, Meatspace Press</refcontent> | ||||
</reference> | </reference> | |||
<reference anchor="Singh2020" target="https://dl.acm.org/doi/abs/10.1145/3 394231.3397891"> | <reference anchor="Singh2020" target="https://dl.acm.org/doi/abs/10.1145/3 394231.3397891"> | |||
<front> | <front> | |||
<title>How India Censors the Web</title> | <title>How India Censors the Web</title> | |||
<author initials="K." surname="Singh" fullname="Kushagra Singh"> | <author initials="K." surname="Singh" fullname="Kushagra Singh"> | |||
<organization/> | <organization/> | |||
</author> | </author> | |||
<author initials="G." surname="Grover" fullname="Gurshabad Grover"> | <author initials="G." surname="Grover" fullname="Gurshabad Grover"> | |||
<organization/> | <organization/> | |||
</author> | </author> | |||
<author initials="V." surname="Bansal" fullname="Varun Bansal"> | <author initials="V." surname="Bansal" fullname="Varun Bansal"> | |||
<organization/> | <organization/> | |||
</author> | </author> | |||
<date year="2020" month="July"/> | <date year="2020" month="July"/> | |||
</front> | </front> | |||
<refcontent>WebSci '20: Proceedings of the 12th ACM Conference on Web Sc | ||||
ience, pp. 21-28</refcontent> | ||||
<seriesInfo name="DOI" value="10.1145/3394231.3397891"/> | ||||
</reference> | </reference> | |||
<reference anchor="BASSO" target="https://datatracker.ietf.org/meeting/int | ||||
erim-2024-biasws-03/materials/slides-interim-2024-biasws-03-sessa-online-censors | <!-- [rfced] References: The provided URL for [Singh2020] only | |||
hip-in-india-pakistan-and-indonesia-00"> | provides the Abstract. May we update this listing as follows, so | |||
that readers may access the full article at no cost? | ||||
Original: | ||||
[Singh2020] | ||||
Singh, K., Grover, G., and V. Bansal, "How India Censors | ||||
the Web", July 2020, | ||||
<https://dl.acm.org/doi/abs/10.1145/3394231.3397891>. | ||||
Suggested: | ||||
[Singh2020] | ||||
Singh, K., Grover, G., and V. Bansal, "How India Censors | ||||
the Web", WebSci '20: Proceedings of the 12th ACM | ||||
Conference on Web Science, DOI 10.1145/3394231.3397891, | ||||
July 2020, | ||||
<https://arxiv.org/pdf/1912.08590>. --> | ||||
<reference anchor="BASSO" target="https://datatracker.ietf.org/meeting/int | ||||
erim-2024-biasws-03/materials/slides-interim-2024-biasws-03-sessa-slide-how-inte | ||||
rnet-censorship-changed-in-russia-during-the-1st-year-of-military-conflict-in-uk | ||||
raine-00.pdf"> | ||||
<front> | <front> | |||
<title>How Internet censorship changed in Russia during the 1st year o f military conflict in Ukraine</title> | <title>How Internet censorship changed in Russia during the 1st year o f military conflict in Ukraine</title> | |||
<author initials="S." surname="Basso" fullname="Simone Basso"> | <author initials="S." surname="Basso" fullname="Simone Basso"> | |||
<organization/> | <organization/> | |||
</author> | </author> | |||
<date year="2024" month="January"/> | <date year="2024" month="January"/> | |||
</front> | </front> | |||
</reference> | </reference> | |||
<reference anchor="WANG" target="https://datatracker.ietf.org/meeting/inte | ||||
rim-2024-biasws-03/materials/slides-interim-2024-biasws-03-sessa-online-censorsh | <reference anchor="WANG" target="https://datatracker.ietf.org/meeting/inte | |||
ip-in-india-pakistan-and-indonesia-00"> | rim-2024-biasws-03/materials/slides-interim-2024-biasws-03-sessa-network-measure | |||
ment-methods-for-locating-and-examining-censorship-devices-00.pdf"> | ||||
<front> | <front> | |||
<title>Network Measurement Methods for Locating and Examining Censorsh ip Devices</title> | <title>Network Measurement Methods for Locating and Examining Censorsh ip Devices</title> | |||
<author initials="R. S." surname="Raman" fullname="Ram Sundara Raman"> | <author initials="R. S." surname="Raman" fullname="Ram Sundara Raman"> | |||
<organization/> | <organization/> | |||
</author> | </author> | |||
<author initials="M." surname="Wang" fullname="Mona Wang"> | <author initials="M." surname="Wang" fullname="Mona Wang"> | |||
<organization/> | <organization/> | |||
</author> | </author> | |||
<author initials="J." surname="Dalek" fullname="Jakub Dalek"> | <author initials="J." surname="Dalek" fullname="Jakub Dalek"> | |||
<organization/> | <organization/> | |||
skipping to change at line 407 ¶ | skipping to change at line 755 ¶ | |||
</author> | </author> | |||
<author initials="O." surname="Tavallaie" fullname="Omid Tavallaie"> | <author initials="O." surname="Tavallaie" fullname="Omid Tavallaie"> | |||
<organization/> | <organization/> | |||
</author> | </author> | |||
<author initials="A. Y." surname="Zomaya" fullname="Albert Y. Zomaya"> | <author initials="A. Y." surname="Zomaya" fullname="Albert Y. Zomaya"> | |||
<organization/> | <organization/> | |||
</author> | </author> | |||
<date year="2023"/> | <date year="2023"/> | |||
</front> | </front> | |||
</reference> | </reference> | |||
<reference anchor="HUSSAIN" target="https://www.ietf.org/slides/slides-bia sws-universal-acceptance-of-domain-names-and-email-addresses-a-key-to-digital-in clusion-01.pdf"> | <reference anchor="HUSSAIN" target="https://www.ietf.org/slides/slides-bia sws-universal-acceptance-of-domain-names-and-email-addresses-a-key-to-digital-in clusion-01.pdf"> | |||
<front> | <front> | |||
<title>Universal Acceptance of Domain Names and Email Addresses - A Ke | <title>Universal Acceptance of Domain Names and Email Addresses: A Key | |||
y to Digital Inclusion</title> | to Digital Inclusion</title> | |||
<author initials="S." surname="Hussain" fullname="Sarmad Husain"> | <author initials="S." surname="Hussain" fullname="Sarmad Hussain"> | |||
<organization/> | <organization/> | |||
</author> | </author> | |||
<date year="2023"/> | <date year="2023"/> | |||
</front> | </front> | |||
</reference> | </reference> | |||
<!-- Used <https://dl.acm.org/doi/10.1145/3603269.3604872> to verify | ||||
the author list --> | ||||
<reference anchor="HABIB" target="https://www.ietf.org/slides/slides-biasw s-a-framework-for-improving-web-affordability-and-inclusiveness-00.pdf"> | <reference anchor="HABIB" target="https://www.ietf.org/slides/slides-biasw s-a-framework-for-improving-web-affordability-and-inclusiveness-00.pdf"> | |||
<front> | <front> | |||
<title>A Framework for Improving Web Affordability and Inclusiveness</ title> | <title>A Framework for Improving Web Affordability and Inclusiveness</ title> | |||
<author initials="R." surname="Habib" fullname="Rumaisa Habib"> | <author initials="R." surname="Habib" fullname="Rumaisa Habib"> | |||
<organization/> | <organization/> | |||
</author> | </author> | |||
<author initials="S." surname="Tanveer" fullname="Sarah Tanveer"> | <author initials="S." surname="Tanveer" fullname="Sarah Tanveer"> | |||
<organization/> | <organization/> | |||
</author> | </author> | |||
<author initials="A." surname="Inam" fullname="Aimen Inam"> | <author initials="A." surname="Inam" fullname="Aimen Inam"> | |||
<organization/> | <organization/> | |||
</author> | </author> | |||
<author initials="H." surname="Ahmed" fullname="Haseeb Ahmed"> | <author initials="H." surname="Ahmed" fullname="Haseeb Ahmed"> | |||
<organization/> | <organization/> | |||
</author> | </author> | |||
<author initials="A." surname="Ali" fullname="Ayesha Ali"> | <author initials="A." surname="Ali" fullname="Ayesha Ali"> | |||
<organization/> | <organization/> | |||
</author> | </author> | |||
<author initials="Z. A." surname="Uzmi" fullname="Zartash Afzal Uzmi"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="Z. A." surname="Qazi" fullname="Zafar Ayyub Qazi"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="I. A." surname="Qazi" fullname="Ihsan Ayyub Qazi"> | ||||
<organization/> | ||||
</author> | ||||
<date year="2023" month="September"/> | <date year="2023" month="September"/> | |||
</front> | </front> | |||
<refcontent>ACM SIGCOMM '23, pp. 592-607</refcontent> | ||||
<seriesInfo name="DOI" value="10.1145/3603269.3604872"/> | ||||
</reference> | </reference> | |||
</references> | </references> | |||
<?line 336?> | ||||
<section anchor="position-papers"> | <section anchor="position-papers"> | |||
<name>Position Papers</name> | <name>Position Papers</name> | |||
<t>19 position papers were submitted to the workshop call for papers. 11 w | <t>Nineteen position papers were submitted to the workshop call for papers | |||
ere selected for publication. Papers that were not published either (1) only pro | . Eleven were selected for publication. Papers that were not published either (1 | |||
vided a very prelimited analysis of an idea that was felt to be incomprehensive | ) only provided a very prelimited analysis of an idea that was felt to be i | |||
for discussion at the workshop, or (2) addressed problems that were beyond the s | ncomprehensive for discussion at the workshop or (2) addressed problems tha | |||
cope as dedicated for the workshop discussion e.g. discussing cyber security thr | t were considered "beyond scope" as dedicated for the workshop discussion, e.g., | |||
eads as a barrier for participation or implication of technology in regulation t | discussing cybersecurity threats as a barrier to participation or implication o | |||
hat imposes blocking. Both of these topics pose a potentially severe risk on the | f technology in a regulation that imposes blocking. Both of these topics pose a | |||
open Internet, however, these risks might provide a high risk for all Internet | potentially severe risk for the open Internet; however, these risks might pose a | |||
users but do not necessarily imply an unbalance.</t> | high risk for all Internet users but do not necessarily imply an unbalance. | |||
<t>All accepted papers are available at: https://datatracker.ietf.org/grou | ||||
p/biasws/materials/</t> | <!-- [rfced] Appendix A: We see a list of twelve published papers | |||
under "This is the list of all published papers", but this sentence | ||||
indicates eleven. Should we update to "twelve"? If not, should the | ||||
M-Lab paper be placed in a separate category even though it's | ||||
included in the list of accepted papers? | ||||
Looking at <https://datatracker.ietf.org/group/biasws/materials/>, | ||||
we see 26 (twenty-six) papers listed with "interim-2024-biasws-<##>", | ||||
so "19 position papers" in the current text is also unclear to us. | ||||
Please review, and let us know if any updates are needed. | ||||
Original: | ||||
19 position papers were submitted to the workshop call for papers. 11 | ||||
were selected for publication. --> | ||||
<!-- [rfced] Appendix A: We had trouble following this sentence | ||||
and updated it as noted below. Please review, and let us know if | ||||
anything is incorrect. | ||||
Also, please note that we changed "threads" to "threats" here. Please | ||||
let us know if this is incorrect. | ||||
In addition, please confirm that "prelimited"* is the correct word | ||||
here and that "scope as dedicated for the workshop discussion" will | ||||
be clear to readers; we do not understand the meaning of "dedicated | ||||
for ..." | ||||
* Please see <https://www.merriam-webster.com/dictionary/prelimited>. | ||||
Original: | ||||
Papers that were not published either | ||||
(1) only provided a very prelimited analysis of an idea that was felt | ||||
to be incomprehensive for discussion at the workshop, or (2) | ||||
addressed problems that were beyond the scope as dedicated for the | ||||
workshop discussion e.g. discussing cyber security threads as a | ||||
barrier for participation or implication of technology in regulation | ||||
that imposes blocking. | ||||
Currently: | ||||
Papers that were not | ||||
published either (1) only provided a very prelimited analysis of an | ||||
idea that was felt to be incomprehensive for discussion at the | ||||
workshop or (2) addressed problems that were considered "beyond | ||||
scope" as dedicated for the workshop discussion, e.g., discussing | ||||
cybersecurity threats as a barrier to participation or implication | ||||
of technology in a regulation that imposes blocking. | ||||
Possibly: | ||||
Papers that were not | ||||
published either (1) only provided a very prelimited analysis of an | ||||
idea that was felt to be incomprehensive for discussion at the | ||||
workshop or (2) addressed problems that were considered beyond the | ||||
scope of the workshop discussions, e.g., discussing cybersecurity | ||||
threats as a barrier to participation or implication of technology | ||||
in a regulation that imposes blocking. --> | ||||
<!-- [rfced] Appendix A: "risks might provide a high risk" reads | ||||
oddly. May we update as suggested (assuming that "these risks" | ||||
means "these scenarios")? | ||||
Original: | ||||
Both of these topics pose a potentially | ||||
severe risk on the open Internet, however, these risks might provide | ||||
a high risk for all Internet users but do not necessarily imply an | ||||
unbalance. | ||||
Suggested: | ||||
Both of these | ||||
scenarios pose a potentially severe risk for the open Internet; | ||||
however, they might pose a high risk for all Internet users but do | ||||
not necessarily imply an unbalance. --> | ||||
</t> | ||||
<t>All accepted papers are available at <eref target="https://datatracker. | ||||
ietf.org/group/biasws/materials/" brackets="angle"/>.</t> | ||||
<t>This is the list of all published papers:</t> | <t>This is the list of all published papers:</t> | |||
<t>Community Networks:</t> | <t>Community Networks:</t> | |||
<ul spacing="normal"> | <ul spacing="normal"> | |||
<li> | <li> | |||
<t>L. M. Martínez-Cervantes, R. Guevara-Martínez: Community Network | <t>Martínez-Cervantes, L. M. and R. Guevara-Martínez: Commun | |||
s and the Quest for Quality <xref target="MARTINEZ"/></t> | ity Networks and the Quest for | |||
Quality <xref target="MARTINEZ"/></t> | ||||
</li> | </li> | |||
<li> | <li> | |||
<t>T. Benson, M. Fayed: A ‘C’ in CDN: Access service to and from the Internet for community networks at-cost <xref target="BENSON"/></t> | <t>Benson, T. A. and M. Fayed: A 'C' in CDN: Access service to and from the Internet at cost for community networks <xref target="BENSON"/>< /t> | |||
</li> | </li> | |||
<li> | <li> | |||
<t>P. Hu: Closing the Performance and Management Gaps with Satellit | <t>Hu, P.: Closing the Performance and Management Gaps with Satellite | |||
e Internet: Challenges, Approaches, and Future Directions <xref target="HU"/></t | Internet: | |||
> | Challenges, Approaches, and Future Directions <xref target="HU"/></t> | |||
</li> | </li> | |||
<li> | <li> | |||
<t>R. Rennó: Maximising Connectivity: The Spectrum's Vital Role in Tec | <t>Rennó, R.: Maximising Connectivity: The Spectrum's Vital Role in Te | |||
hnology Access <xref target="RENNO"/></t> | chnology Access <xref | |||
target="RENNO"/></t> | ||||
</li> | </li> | |||
</ul> | </ul> | |||
<t>Digital Divide:</t> | <t>Digital Divide:</t> | |||
<ul spacing="normal"> | <ul spacing="normal"> | |||
<li> | <li> | |||
<t>R. Holz, N. Nazemi, O. Tavallaie, A.Y. Zomaya: Evidence for a di | <t>Holz, R., Nazemi, N., Tavallaie, O., and A. Y. Zomaya: Ev | |||
gital divide? Measuring DNS dependencies in the context of the indigenous popula | idence for a digital divide? | |||
tion of Australia <xref target="HOLZ"/></t> | Measuring DNS dependencies in the context of the indigenous population of Austra | |||
lia <xref | ||||
target="HOLZ"/></t> | ||||
</li> | </li> | |||
<li> | <li> | |||
<t>S. Hussain: Universal Acceptance of Domain Names and Email Addres | <t>Hussain, S.: Universal Acceptance of Domain Names and Email Address | |||
ses: A Key to Digital Inclusion <xref target="HUSSAIN"/></t> | es: A Key to | |||
Digital Inclusion <xref target="HUSSAIN"/></t> | ||||
</li> | </li> | |||
<li> | <li> | |||
<t>R. Habib, S. Tanveer, A. Inam, H. Ahmed, A. Ali, Z.A. Uzmi, Z.A. Qa zi, I.A. Qazi: A Framework for Improving Web Affordability and Inclusiveness <xr ef target="HABIB"/></t> | <t>Habib, R., Tanveer, S., Inam, A., Ahmed, H., Ali, A., Uzmi, Z.  ;A., Qazi, Z. A., and I. A. Qazi: A Framework for Improving Web A ffordability and Inclusiveness <xref target="HABIB"/></t> | |||
</li> | </li> | |||
<li> | <li> | |||
<t>J. Ott, G. Bartolomeo, M.M. Bese, R. Bose, M. Bosk, D. Guzman, L. K ärkkäinen, M. Kosek, N. Mohan: The Internet: Only for the Fast (and Furious)?</t > | <t>Ott, J., Bartolomeo, G., Bese, M.M., Bose, R., Bosk, M., Guzman, D. , Kärkkäinen, L., Kosek, M., and N. Mohan: The Internet: Only for the Fast (and Furious)?</t> | |||
</li> | </li> | |||
<li> | <li> | |||
<t>L.Y. Ohlsen: BIAS workshop - M-Lab Position Paper submission</t> | <t>Ohlsen, L.Y.: BIAS workshop - M-Lab Position Paper submission | |||
<!-- [rfced] Appendix A: Would you like to add references for these | ||||
two papers? We note other papers in this section have corresponding | ||||
references. | ||||
Current: | ||||
* Ott, J., Bartolomeo, G., Bese, M.M., Bose, R., Bosk, M., Guzman, | ||||
D., Kärkkäinen, L., Kosek, M., and N. Mohan: The Internet: Only | ||||
for the Fast (and Furious)? | ||||
* Ohlsen, L.Y.: BIAS workshop - M-Lab Position Paper submission | ||||
Perhaps: | ||||
* Ott, J., Bartolomeo, G., Bese, M.M., Bose, R., Bosk, M., Guzman, | ||||
D., Kärkkäinen, L., Kosek, M., and N. Mohan: The Internet: Only | ||||
for the Fast (and Furious)? [OTT] | ||||
* Ohlsen, L.Y.: BIAS workshop - M-Lab Position Paper submission | ||||
[OHLSEN] | ||||
where in the References section: | ||||
[OTT] Ott, J., Bartolomeo, G., Bese, M.M., Bose, R., Bosk, M., Guzman, | ||||
D., Kärkkäinen, L., Kosek, M., and N. Mohan, "The Internet: Only | ||||
for the Fast (and Furious)?", January 2024, | ||||
<https://www.ietf.org/slides/slides-biasws-the-internet-only-for-the-fast- | ||||
00.pdf>. | ||||
[OHLSEN] Ohlsen, L.Y., "BIAS workshop - M-Lab Position Paper submission", | ||||
[Date], <https://www.ietf.org/slides/slides-biasws-m-lab-position-paper | ||||
-00.pdf>. | ||||
NOTE: The PDF at that URL is errored and needs to be replaced. This has been rep | ||||
orted | ||||
to support@ietf.org. | ||||
--> | ||||
</t> | ||||
</li> | </li> | |||
</ul> | </ul> | |||
<t>Censorship:</t> | <t>Censorship:</t> | |||
<ul spacing="normal"> | <ul spacing="normal"> | |||
<li> | <li> | |||
<t>S. Nurliza Samsudin: iMAP (Internet Monitoring Action Project) 202 | <t>Samsudin, S.: iMAP (Internet Monitoring Action Project) 2023 Intern | |||
3 Internet Censorship Report <xref target="SAMSUDIN"/></t> | et | |||
Censorship Report <xref target="SAMSUDIN"/></t> | ||||
</li> | </li> | |||
<li> | <li> | |||
<t>G. Grover: The infrastructure of censorship in Asia <xref target ="Grover2023"/></t> | <t>Grover, G.: The infrastructure of censorship in Asia <xref target=" Grover2023"/></t> | |||
</li> | </li> | |||
<li> | <li> | |||
<t>S. Basso: How Internet censorship changed in Russia during the 1st | <t>Basso, S.: How Internet censorship changed in Russia during the 1st | |||
year of military conflict in Ukraine <xref target="BASSO"/></t> | year of military | |||
conflict in Ukraine <xref target="BASSO"/></t> | ||||
</li> | </li> | |||
</ul> | </ul> | |||
<t>In addition to the submitted paper two invited talks were presented bas ed on published papers:</t> | <t>In addition to the submitted papers, two invited talks were included, b ased on published papers:</t> | |||
<ul spacing="normal"> | <ul spacing="normal"> | |||
<li> | <li>Raman, R. S., Wang, M., Dalek, J., Mayer, J., and R. Ens | |||
<t>R. Sundara Raman, M. Wang, J. Dalek, J. Mayer, R. Ensafi: Network M | afi: Network Measurement Methods for Locating and Examining Censorship Devices < | |||
easurement Methods for Locating and Examining Censorship Devices <xref target="W | xref target="WANG"/></li> | |||
ANG"/></t> | <li>Ramesh, R., Vyas, A., and R. Ensafi: "All of them claim to be | |||
</li> | the best": Multi-perspective study of VPN users and VPN providers</li> | |||
<li> | ||||
<t>R. Ramesh, A. Vyas, R. Ensafi: “All of them claim to be the best | <!-- [rfced] Appendix A: We found this URL for this additional | |||
”: A multi-perspective study of VPN users and VPN providers</t> | Ramesh paper: <https://www.usenix.org/conference/usenixsecurity23/ | |||
</li> | presentation/ramesh-vpn>. | |||
We suggest that it be cited here and included in the References | ||||
section. | ||||
Would it be acceptable to change [RAMESH] to [RAMESH-1] and use | ||||
[RAMESH-2] for this paper? | ||||
Original: | ||||
* R. Ramesh, A. Vyas, R. Ensafi: "All of them claim to be the | ||||
best": A multi-perspective study of VPN users and VPN providers | ||||
Suggested: | ||||
* Ramesh, R., Vyas, A., and R. Ensafi: "All of them claim to be the | ||||
best: Multi-perspective study of VPN users and VPN providers" | ||||
[RAMESH-2] | ||||
In the References section: | ||||
[RAMESH-2] Ramesh, R., Vyas, A., and R. Ensafi, "'All of them | ||||
claim to be the best': Multi-perspective study of VPN | ||||
users and VPN providers", 32nd USENIX Security | ||||
Symposium (USENIX Security '23), 2023, | ||||
<https://www.usenix.org/conference/usenixsecurity23/ | ||||
presentation/ramesh-vpn>. --> | ||||
</ul> | </ul> | |||
</section> | </section> | |||
<section anchor="workshop-participants"> | <section anchor="workshop-participants"> | |||
<name>Workshop Participants</name> | <name>Workshop Participants</name> | |||
<t>The workshop participants were Arnaud Taddei, Carlos Pignataro, Carsten | <t>The workshop participants were <contact fullname="Arnaud Taddei"/>, | |||
Bormann, Cindy Morgan, Colin Perkins, Cory Myers, Dan Sexton, David Guzman, Dav | <contact fullname="Carlos Pignataro"/>, <contact fullname="Carsten | |||
id Millman, David Schinazi, Dhruv Dhody, Gurshabad Grover, Hanna Kreitem, Jane C | Bormann"/>, <contact fullname="Cindy Morgan"/>, <contact fullname="Colin | |||
offin, Jiankang Yao, Jörg Ott, Juan Peirano, Lai Yi Ohlsen, Luis Martinez, Mallo | Perkins"/>, <contact fullname="Cory Myers"/>, <contact fullname="Dan | |||
ry Knodel, Marwan Fayed, Matthew Bocci, Michael Welzl, Michuki Mwangi, Mirja Küh | Sexton"/>, <contact fullname="David Guzman"/>, <contact fullname="David | |||
lewind, Mona Wang, Peng Hu, Ralph Holz, Raquel Renno, Reethika Ramesh, Rumaisa H | Millman"/>, <contact fullname="David Schinazi"/>, <contact | |||
abib, Sarmad Hussain, Simone Basso, Siti Nurliza Samsudin, Suresh Krishnan, Theo | fullname="Dhruv Dhody"/>, <contact fullname="Gurshabad Grover"/>, | |||
philus Benson, Tirumaleswar Reddy, Tommy Pauly, Vesna Manojlovic, and Wes Hardak | <contact fullname="Hanna Kreitem"/>, <contact fullname="Jane Coffin"/>, | |||
er.</t> | <contact fullname="Jiankang Yao"/>, <contact fullname="Jörg Ott"/>, | |||
<contact fullname="Juan Peirano"/>, <contact fullname="Lai Yi Ohlsen"/>, | ||||
<contact fullname="Luis Martinez"/>, <contact fullname="Mallory | ||||
Knodel"/>, <contact fullname="Marwan Fayed"/>, <contact | ||||
fullname="Matthew Bocci"/>, <contact fullname="Michael Welzl"/>, | ||||
<contact fullname="Michuki Mwangi"/>, <contact fullname="Mirja | ||||
Kühlewind"/>, <contact fullname="Mona Wang"/>, <contact fullname="Peng | ||||
Hu"/>, <contact fullname="Ralph Holz"/>, <contact fullname="Raquel | ||||
Rennó"/>, <contact fullname="Reethika Ramesh"/>, <contact | ||||
fullname="Rumaisa Habib"/>, <contact fullname="Sarmad Hussain"/>, | ||||
<contact fullname="Simone Basso"/>, <contact fullname="Siti Nurliza | ||||
Samsudin"/>, <contact fullname="Suresh Krishnan"/>, <contact | ||||
fullname="Theophilus Benson"/>, <contact fullname="Tirumaleswar | ||||
Reddy.K"/>, <contact fullname="Tommy Pauly"/>, <contact fullname="Vesna | ||||
Manojlovic"/>, and <contact fullname="Wes Hardaker"/>.</t> | ||||
</section> | </section> | |||
<section anchor="workshop-program-committee"> | <section anchor="workshop-program-committee"> | |||
<name>Workshop Program Committee</name> | <name>Workshop Program Committee</name> | |||
<t>The workshop program committee members were Christopher Wood (IAB, Clou dflare), Dhruv Dhody (IAB, Huawei), Mallory Knodel (IAB, Center for Democracy an d Technology), Mirja Kühlewind (IAB, Ericsson), and Tommy Pauly (IAB, Apple).</t > | <t>The workshop program committee members were <contact fullname="Christop her Wood"/> (IAB, Cloudflare), <contact fullname="Dhruv Dhody"/> (IAB, Huawei), <contact fullname="Mallory Knodel"/> (IAB, Center for Democracy and Technology), <contact fullname="Mirja Kühlewind"/> (IAB, Ericsson), and <contact fullname="T ommy Pauly"/> (IAB, Apple).</t> | |||
</section> | </section> | |||
<section numbered="false" anchor="iab-members-at-the-time-of-approval"> | <section numbered="false" anchor="iab-members-at-the-time-of-approval"> | |||
<name>IAB Members at the Time of Approval</name> | <name>IAB Members at the Time of Approval</name> | |||
<t>Internet Architecture Board members at the time this document was appro | <t>Internet Architecture Board members at the time this document was appro | |||
ved for publication were: TODO</t> | ved for publication were: TODO | |||
<!-- [rfced] IAB Members at the Time of Approval: Please provide the | ||||
list of IAB members at the time this document was approved for | ||||
publication. | ||||
Original: | ||||
Internet Architecture Board members at the time this document was | ||||
approved for publication were: TODO --> | ||||
</t> | ||||
</section> | </section> | |||
<section numbered="false" anchor="acknowledgments"> | <section numbered="false" anchor="acknowledgments"> | |||
<name>Acknowledgments</name> | <name>Acknowledgments</name> | |||
<t>Thanks to Arnaud Taddei for helpful suggestions to improve this report. </t> | <t>Thanks to <contact fullname="Arnaud Taddei"/> for helpful suggestions t o improve this report.</t> | |||
</section> | </section> | |||
</back> | </back> | |||
<!-- ##markdown-source: | ||||
H4sIAAAAAAAAA9V9W3NbR3buO35FF6dSQ6YASJTs8ZhTpzwgKUu0xMuQlJ2Z | ||||
twZ2A2hzXzD7QghSqco/I6lK3vKap1TlKW/+J/4lWd9a3b17b4CS7PHknDOZ | ||||
jEDs3bfV6/KtSzdGo9GgtnVqjtTe2eRYHeuytKasVF2os7w2ZW5qNZnNTFWp | ||||
Yq5uTHlv6Q+1f3w2uTlQ3xXlXbUsVurarIqy3hvo6bQ099QZnm8/nunaLIpy | ||||
c6RsPi8Gg6SY5TqjwZNSz+uR1dPR1OpqtHYNRyU3HD1+MqiaaWaryhZ5vVlR | ||||
C5rtIG+yqSmPBgl1ezSYFXll8qqpjlRdNmZA03g6uDMb6iw5GqhRf0H46oQa | ||||
FGW1tCv8NSuyrMltvVH0Fs8B3yZ2YWud0r/3NqFuTd7QaErRt8tmSmu1ea3L | ||||
2XJa6DJ59OGV7FG7lGZb1dRuWder6ujRo7j9WHod2+IjPX3k8XhZZ+neYKCb | ||||
elmUWD6NrNS8SVOh+N65Lb/X6uWP/71MzdrmyR6/YDJtU6zJ1PM/3jXGPRwT | ||||
QfZ2dHK6LJt7dboskk23fZL8McGzBI/GRNhdrc91mhI3qJd5kZi020F2x1/+ | ||||
cZbU46Jc0FLyosx0be+J+AOwT/hLqeuvT7748ndP8PHm9PkRd0Q0XRgis6dy | ||||
lSyqcZOjs0eLQqeVvCXMf9NUtba5nqZGnZp7kxarzOS1eu5ePJ9c355dPPvL | ||||
7q7X6/UYBOO+q5S4pHL/8N6sq1HgrJHnrJHOk1G9NKO/NsQNI1oOfdIpXnn8 | ||||
eLxK5vH0TgJjXrjmiporaq7+hOaKmtMnbs7twrbzf0buX0ViR9KhXo3VOf1X | ||||
l/WP/5Gbt6MTEmtNwlGF92SDXjW2Uud20Zi0fVv13+73fj1Wzxtzr0s9Co16 | ||||
HV8XKc2/8O+p7nsszuobnTeamOPJ4yef0dfPX599fbab/IvGzi049JHJY6o9 | ||||
99/Tl5Ork4f3Tq9mvHVx41ui7aSqipklLitypvBVWSxK0hzEdX5LZvyUFCIN | ||||
cEDtz24uPzCQdRoI3Zp6w4PqGXoYrYgij7bZ5NFuNvCP1dKkKzUtbbIwzA6k | ||||
BHNDPd7jrYUmtaZuj493z6gu7VSn07LQyZS2Y1oU9Uxnq21S8Hvq2L+ojt2b | ||||
9NLxs4uby4tfKhZ6NBvZfDRL8pFmnTyqxMKM6oIFZF4WGUuJp9xI1yRMTmB2 | ||||
SNW27EzUTz/888lPP/wLsac6Ob0gje4MmhsLtg6rwlhMw2AndK0wFu/9Ltvw | ||||
UUG7HavJWB3DyOQ9ESD+KlZLmzbV1iv9XkhWv9Ybk/R6IKFZ6zx6tFNuriYX | ||||
z59NHt6gWVo0yTzVpYGWJgkaLaaPVjpfGN1hAuL974mx1BU/EmKdhLb05ovX | ||||
v1g5pkVl8wXv88qUrNlz4gEwAH3SCwNdPCJuJjNH5nFU0UJT0nURW8yWZEsM | ||||
TY2YarUiTp0tjejYeVM3pRkltjQsacQjh1v6VWbAu3/VzoDZ4jzMQD2nGSjM | ||||
QN34GbTMQmAizGGoJmESQ+7la56FOg2z+ATuuRqrF01v06+of//tzv2+fnZx | ||||
cflLd2JFZBBtpGkjRtPNqNRkn1ICFXle7CDcuX5jCZaBdiex5hmx/rxZ0Rdl | ||||
k/22Ut8yhCK9byCGt2a2zIu0WGwCFvsoNcisXNMsfvzPvi3hGcbPdtuPydkH | ||||
pMCWjiwLbTVjp44hSQsoQKc2SF10tAS0wyTFDCoDHKeel0UD3XgzOb95fXr2 | ||||
i7Xjz94Nez65UvthYucF6auixOZMmOm8EB+AKE/bFbQo2CH1T9iOmzH9v86q | ||||
JrF91XZDs1YXTZnat7r7zu6dub789tn1biJRA12XenZnypZYmTE1LeoRC7/N | ||||
RujH0+zx00cEC+lrwm2enLvfI1NTVXpU5KnNzWgWSACDRIjXaiL7nSVYmLMa | ||||
oa+K3FT09ePHMc0vub1q24O/z9B+SLpSOmANcOY7+ATiPh+Die5N2aPs84aG | ||||
0FOdxI93E5WfY5t3ExaMSjCG6ZkYwr5ELkMd5WCz2OBugSKC3qWuSKxnrNHI | ||||
K+yuffJ3WOJ285OxOtH1stf4BNxOu4FHat8k44OIQpezuiB3kXkf0kkstKTP | ||||
jx/gvHSsZ5nQp7CP9LR6dPh4fHj42eePnj798rMnTw/H9O8Xv//yMCbQi2It | ||||
m+9lilXFd2b6CRR5OZY59db0siF6LAgkxw9/ZWp+SwhE55VOe82/1WWTx48c | ||||
rzUpMxoE4Xhyc/OAvfl/X3hlu5wWjNiY0ASZ8QTsfN0Q3tcqaUoPEA4JEW5I | ||||
04P1M0sgAGJHuHueWsJH1OT1XUm+pPk0JXqsycnYUqAZTTd6tFPEvyNk9/8r | ||||
4Z0bq86NrkiLMLo6N0SqpGJ7+qqAY0UEh+Z89kZnNmeM0W4ReemIRH0acCA6 | ||||
X2uCdFvQISPPP0/ggsbPdwDw74gh+vi7yHX8fb/VN2N1qlNz12v2jb5rpp0n | ||||
OxqeE6jvy/I3NF5NjNl5uGOxz0ha53bL497o+Ilw1AXphCzSideT82c3L/5v | ||||
MZXN701V2wXvPBuh+1U+MuSCbarawA8kYLVY8hPC2dWomFPLGUkmeYCr0t7r | ||||
2Ya5rqn01LpQSsx1Z/EALMvfXl2oZ34A5QbgJxhAQp4yAFlzGUHw/Gs/xCci | ||||
V9qEqq/Zr4l4S3un46c7Jf3F5atfHHkyCFrCm4LDrEcumDmSYOYoY/kDuROi | ||||
Z2JWJsfblreKCU2KrTZvatBaYAH1YPKiATxdNSmHP/BQN4QJdMqS3selz9wc | ||||
WLR1L6D6lVMC2JLTixsVTwLa1EU1MAnsR80QxE9CtZPAw4mfxMd3hTblRZFu | ||||
BaZ0ulrGD3qtLsbqQr81WV+8LmwBM9192Gt7OVa3+p5cRG1Nr/llZpOth73m | ||||
k7H681j9pcj0RveaT1KS4br3WDjJCfaL1zc3k1/uiTQ5YcWSQACHaVY1u+e0 | ||||
6QkNR3yCWYizzdHbkU4ShMnw3ejObBDM8Xxn81naIIq/w3157UdhT0tGwa6e | ||||
8ihEWxpFDAJGURM/CiI66qXZwDM7dbx15sf5OCfcwM0m/bPtx+gyI+RED3XH | ||||
f/E0nRyfPRBZ+5TIF6HozMAIsmTabEUADYK4NtORntN3iVdiYkh5PfcmR5Rs | ||||
V5Tra98fS9mZ7w/gU03i/pw3EvX3adJCzad9cWloJyrdebZN3VtNenfLnBF1 | ||||
9bL3bJvlz+jlPrdbggvxg16rF2M1WWZb4bIXujIgRfSoPxwJUl+wJxsDufYP | ||||
hAFuiDkjuzkYjUaKHARYx3owgJO0FxJpvBkfzaTtKZ+/UWtdQd9hZxI13XRj | ||||
DRO4bbUR1+sYCSPy9yfHBxKP82bj8PPR4RdDth6KetMwbMaMEr1RAtyUs9vk | ||||
wxPIpHEK0bOcZKtr+sLHHhTHHqohPw5znMGXMIn0q3RJChyLYuvOuS28XSLY | ||||
A/dwO2rNLvKDNPmDkhyWCDuaEzys/ByLKeK2NHjXjPyBX85aPFn1XFPuK4L4 | ||||
tpw1GVEZqyQeXdrKDUtUyDJd2rem6qz6txUNVc0aTkJydzyRSkhcmjmt3Rs5 | ||||
vwA3Z4IQJSDu9OH06ngwuChqBPF1Tf9Ds0kKmiBaWemf5+Y6JOGeGZPQFlbe | ||||
KPpp0p6CA++tWQsB/Va2PYpnU0dLXtPclXmzYoWaxN5O2HNixZUuazuzK527 | ||||
vUkKlRc17StWQCQjt5DokCJOTFxJBNsxi7HIC1m8JDWDwW9AiLJIGo5QifS0 | ||||
AfiKx/RLnBEQszPa8l4MgtQlDVkpQvCk3aoV/0FtiqZULtWiKrvI7Zxa53UK | ||||
DJeStgPWs0TfbKXRIrFz3sOaB+UefOvwKN2MVWeK2JwcXRAZqW/a2SLF9pJM | ||||
zARJfjC3qPZvTp8fqHfv6J/37yWrV6gFBxyJmlWz4v1ZkqLNVWkXy7oaI9Ra | ||||
mb82RpbCaJVwOfujRsNRmjep0iFa6QWlTzXHwayGsIy0KojREPxGV8TrBg1y | ||||
0jgVSxTt3A3JNE1rqdm0tPskY1EnYAcgs8WStHAtSoUUKZkp+h/azrVwFKbl | ||||
UlX8Tg50R+YpZZVjilUq8yMl08wks9UV9yFvnJt0TH1F/hxJWM08Rx/IFwWx | ||||
8WdOWgtUMJJojfCl71svaHpLsi6yIKyRoafrwFOLWaBkxaeywpGSP8QCvnMv | ||||
mCCe6GimV6s0ZBFZ+BFycWLuCUxOHWkqZedRtCIOt4MQ94SJwGNDFZLjkZpC | ||||
nsvNghAi0ZUhVciaJPxiI6QZQwqpSxSEBPFfQstZ2M7BP8rupSznQVVPi6ar | ||||
4D5Mw/4Sh8qMyR5NvTma2xSuYr4Qf2uaFrM7DgiAh9IU/yYN5+7IEzCljjZ2 | ||||
w/rCpxhYYcz0StCPRUImtXe05xxAUKSsSZnWBa2Hvifrp72W4mVyfrVjgltz | ||||
tgDnq6khg1lGbIdZ0gSWxbqXJ2hySf2A63boGqdtU9mL9dJCf7SJEpoo/2VR | ||||
MEACY1hTTI1qKvm4wI62nOaI7hcybSz3vD3RNZjupx/+dWrcXoGvTPLTD/+2 | ||||
leoASxNQ+g4tbNV9BtGjza2+Co8xxzDLVhrSTTuIexmChM4Q5smajJjqr431 | ||||
Zlzas/oMXEWWvIRS7VJvJ58xDsY8gFk6U/6KrM9v1IQZl41hYHZnFV1/Thx+ | ||||
sT3++eZY/29a46+bkrouob+GHTK6hQRiwP1inImJ0QtOaS3gRWBCYXJbM6Np | ||||
AUzpO3oxWk0Lp0gokVfFTjCIpBFq59WXitxim2jBaUTMptoxzZZ2c1JMxVqY | ||||
c06fhDRWkxA1pr85JBY10c2I4dIkydmKWZkUhhhJFcrKxgAroaTtZlasRPGf | ||||
hlUIeukgeXIAie/fQsHOygKSyZCZoLjLJJMCHi2QMIzBZZUWNa0SQWCyYXhb | ||||
uEjWxuQrVnbmkDeDN0RYagI4TpU7plyQU8gaC6jeRLNhWK/aojooJZZ2zI5t | ||||
A/XAG04bwFDGUc7NvzfXsTqVbeVX26fYqaIyzouQmTruMZBRBjGWoQ5Tg2ia | ||||
x52T+k2UFoxgaFk0CRmBKMLSe2PkxcOdRVKchrZlyDt/wOmQvZtbUo2KHaUe | ||||
o8xJWCNPyTs3OwZ9986VowHPQVWsNYcmoH8gRNz+Q57AznKvErghnY/aLQze | ||||
1HpZgIDFOvIYWysl3NAERQgboGFbcy6fI8WMbIetMla0ZWQDBFugvU8GtlqV | ||||
eYV3lqCncciFUSj7a+XMskUWf5C26qqjMkpJr7AyWRKoTQFsvVZg0wa2C8FJ | ||||
X9oGgj97Q5xk2dHa/1Px7IDf3CbY0NuuVVELi8mW4asTpzhOTYqAU2ik9k9O | ||||
Lw5I9HOsasP1Qg937DmgLQVpX+FyIoL8KeNzef+eEaZvxTjQlUcE7V+RH2KY | ||||
r3/D4h4te3sig8G7d74skTgtkNEkLRVhLyVK9kES2ljmwGsFgYQdQxKkr1gj | ||||
+rKrpGTdn5hVWmxgykQz3+XFOjUoSRPmuS/Se8nxcJCAEXwD5wekvtfl5g9o | ||||
RrbKmyCHrXMCNY0uUWxoxJ2PGZP2PcJ7jjM9NGcb7WnAsgvJBUCBYaU+HCdi | ||||
gg6pkeDQUBXKcx18J+5j2BEVJfH0Ca4XJVHDWU72RXR1J8rS4UFv3MG+U5Ro | ||||
rhAdEl/LU0xkbSs6EkFcGB+SWRYCKYXyQTz/xK1jd4kahgroNml9zzEpKS6o | ||||
dCoqJ6LoDE7X1qazFXPc4WxLBSVm3pBnhWkRd5GfPXOmYofq2n/3bnJ18v79 | ||||
kAZFeSQ+oZt3726Pj9+/PxCrUC112aqvGEGMRTXbnJcs7pzfeOflhd3pyGPH | ||||
R0cx5ENUErcLji3xSF7kI2oHvYXUVfvW/sXtRSX6xvYc33fvXrx+/95J7k1N | ||||
uH5Bq5CU5U7BlbJJon7PrNBmLe3UsmLm0kNvdcGZtnah264yfoju7F2WBHoS | ||||
98ZurVex2qOFEc97E+GGG7GjtGvMCkaZxJOdXk5KurpMcJxWWVM3bNSn5JvN | ||||
LRuDNUDMjgpW4qI0FVGdkv1Y6ibdqsikCf70w78g22NFiQiGmHnPOzFpTwRG | ||||
oS+8AVgxEjZFXw6IRCpzHKE4xbF2eAzv3kn1JO3TypU/kuNUNx0RTc1Cp22k | ||||
UixfTzqJKFVDsIW2mpU5TWEMNgDX9DQ30XUHBwcnhuRDJ/fg9US9enapQikk | ||||
D4nPbshgxbRa2fsi2B54/VG1Y79e2EdEmnKq81HZlBxxiSMvZMh0O8WQM6x3 | ||||
CBYr4yrSFTAMeUdgef/aCkvUeHoAAJ1NjGAkcraDKBxlq2BbnDeB6UVaufQF | ||||
eW3tp2wD7VrWpLUdpcikRzR0E5eoQ1MXeZEhyQg8TLKDCQ8DHlrI5kLfr41B | ||||
TWOrM/DOBemR2116RNRds1jQE+I88AEXbRIrzBCOSdgP4bi0xw6It4M9fvf8 | ||||
xVu1H4dET0ZckS2uBKn4yorJyuwbMZgk6toZYgRBZrQ/BwJLVyVicrNl4XWI | ||||
EJZXRfM9L8jSGFoWOZBxrbvaPzu/FTX4+fM4QLFe4n0Jy4HLqBFMbp5ahN1p | ||||
9uD+kNDd0gP7bFoyooA6u7mqDsahfBQ+UuFDZLKXpFokagt7jKSvdeG0TJd3 | ||||
rV5mspALxIHfDxnKiGsEfqyZRJEn4hT0whSrInVhaNqlSlhgpp1o29pZgdgr | ||||
RJkR5JE1OcdwOCbVQnSH0TgE0hEG4TbO5Zk+jNit9r9SZ5VLks/gHTqMQbb9 | ||||
jY+MdSI6mqNqtGusyn1AUFxMRQMSN9lqqbjOolUX7LHzhpHPniYCX6fGufjs | ||||
StIWEIysQ4jVIALfH9/Ff0gQVp2YlvQDFEYfFFI6DztFmNhX6sZPxHwIKKFv | ||||
wn80cxmKPhN72jpt39tJ00+rAN5HkTGC+fiXxDkoIHHwZzxDxLIUHyLjdnPh | ||||
u35qyTcNjNnxindhfUk76QRhnxAM7kFxJCcexIqRTWNGpcGoAxYhJ1XUEIzH | ||||
EfLI2IUewGekp6TNLiGbpFXhJYxBmc9bkIEuveKx+aqpXaRpqxP3JiorHWOd | ||||
Pbv9+tHZ9e3X3YDAk6NQC3AqdmvkiptFUZy4tOJgcNJmlTxe/PXSS1HiaOjE | ||||
ErHNmjcn6kvCvRwH3awwGwnewX6IG1epvTaP42ob9tywG7HmmoXNINdfx4kf | ||||
S6rJzTP2rsR/T82cjAmiYBJNX/vYbpiGM0qY/F4XCuwNORAKj4memzJjlxZk | ||||
iCK1PWHxmIDEDTUeeL4wwuAmA4Qptc+Cmp+R8wBPVy64AvUNTNlPcmCstS4T | ||||
ajhbWsMpLJ8ycBngqZEwp+GFSAqu3VnswgIWNZfINOKpvRNDD2QDfRoh+3vm | ||||
BcVPIoVYIOIpMSwfv6rYoiGeLMGQTqIsRF60L+neTriNVTeEQy/51A/LTVks | ||||
mA0QBiKzU7tA4Z3piMyuRJ6TlKAVyL4XRHLBP5INxxOkraYu39Ya0Q/2Lc0Z | ||||
byG86wKP2GpwPr4/CgIKxeahXFRUBqYkpLci8Qwah8F45UrOXEFF6wUTQo94 | ||||
ZBinpTy2FqjAEJQaL/AUAT2pphL1xIVUKhRSedjJJt0k7Bu62CzXO3LAYZ2n | ||||
hU58oASh7KJEOcjaTMmZM9VviZffmqoFKAQkQxrUO5NhcYO2Fi4K2QaTJhL6 | ||||
ZlVUrkyCN4YzaPTa6cXNKDOJFZYIiqAlTJgU6HXW1vN5he9mFQr6JBhCkM/p | ||||
wxQ9kklkZ6jWC4GXrVXgpHO0j/T13q9dhnj20TLEPQRaUL1JItzpFLEm+uSc | ||||
AcIr6Qbb6hmQTB2RshK+9mzBO4SzPL73PKanEFNgfJiWkMTnA3yitJ3sOBxa | ||||
klIlUglDtedLRmWPO4RA/w8vHVaF8Ljh4pxg97g23i5IsyTDPR8/Q4CD1qYj | ||||
+dvJhVykRPjZIHknciSNJRUyalYtS3ZSjpFSUtOiXvaDwbTZ3h2o2SDFikAS | ||||
sGKWRK20z8AEpZ02EiXUWzbRGWKkuwhHQ7nv2hQnhK8c/olCW7pT+5hq6AeC | ||||
b9WstGQuB5fOjeD8DygoNtD6OOiOSA2HJiT4QyRmtYNQn++akMUvrbw8+kDh | ||||
5R5bnFZzkJy3BZWoqOTZnkwuLlhIpECV5ISra/B1BP5QfNAqP64CW7XuXKxI | ||||
2zwYn71p67kZ9XulHdtsDixBONGVc1E/oIkDNw6dw+uzRKHogO2SB0JtFQbc | ||||
xtmGrRuQZ+JDQ5Vzz2oyhRmiE9yZYBdBcRwr5qgarzPYC9tCqgLmvoV2LoJ/ | ||||
+Plj95LD1rYKZobrGwlmnHHsb9rUW2kpNlsIGqWAh0K1KjCiz8q53lIAGB57 | ||||
CQ0ALY34gmShaeurYl6vtSuV2a55canrjam9+a+MGy8njOXGHO/m1D3xJVy6 | ||||
MxPFMgun9gV1b1VvcL6qXDgtB/ccWV6aISgiVOQRfEK1NGzMWklNN06IP6XC | ||||
9ozsz99Uo7vXLbbdZZKLYKWcjx7siTO2bP+dPqhqCa45u8kyiIJmlkAwZesV | ||||
oRZj4wesQrFXzpCfTZTemrsXvaggMwb4VUB2yp8RcZgmnhQym2pFnO220Zad | ||||
xcWVq/dF2sjO45yKpHM8IpLaphV/XGqyHSVK27yfux0cIWrBY19L/NKWLYVd | ||||
GBbcNu9sJdRRRpvTnVjAZh36OFej7YBLCGfLwkEbYjS8doSgDA0oCIsG1LbM | ||||
uX7LkP2ZSfRFooiEDfgACw1P3yd65UE69QbWipYY5ra3MB7YIgVn20h1JoG/ | ||||
cC8EBNnbESRhMiPSXo33tkNd4twJ9vf+gYtcKM46tIVPEXT39bH92rytAkNO | ||||
F1qGHVtlU0fb6GHYMY8CouEeFRmtmvltrC4KOOPOO+9P2aE0B3b1zJRTcU+3 | ||||
XI2p2RQOZ/GNLs7S9DOWHlUIfzM37vaThy1YgQYFLnWpeTKDiLGggiQIEYIg | ||||
kW6DNvNBxa2oAYdniJK2hq+VccTSbSEX7KBYx2UigoVzdoU9bJ/Vl2o82UOf | ||||
bC8LAjzZQ55eCL7HVdqS6HGyQI5OFqW9vHgsTO3KA1yVVkjCw/MNBaO1A3ls | ||||
aF1sv4jCTa1nPosr02e67by14C0K3h7K1QAT0X9bSVolxPZCqV2oG4pye1xz | ||||
Q5pKZK1V4WzlZ8yyI0Q8S7e1q6ZulU+vvp0NJnmfGwm2i2cCOy4lsXlcuuQT | ||||
9X5sV2mgJtQHuDHjo5cSe+XsdUsZo1xxVQuykaNFwoRoVuF+AcnNt1qbdUhp | ||||
JDIkgS6OaJLW4JgIrMbQRbws2taGZ+vjNMFqt5vh4AWwg9CbcR8GSRgPGCTm | ||||
7syySBP2eOrIJS1CB90I4dOj+DxpLzoYnw5w9X+VaxelbEOZf/ekQRUdUhCP | ||||
kkANtgzHhj9a/jmMI7FFJ2TA+qstX8DTh440SKx3yLmrdBN34kL5OPoYCpol | ||||
dBT15VY29JmlUEKB4/0u9O8hLhSUu/EgmrkcnB726gvWLIzRQID2/rh1J4jq | ||||
aAbN3JYfYBmScG1VhgM0DeomWRd5yZEXSSPxiU8OWmHLFhJm9gFlZ9MF83KZ | ||||
MdLfc5pGlBTqaCx6z5UkulquHbXJzqWvfCVweAfJMVDCFX6y/x/WN1R2TGIp | ||||
ouELNwSMMssF8ZY3qEMuiZNS5ug9Kf8Vp7s7xbJJW/82BIIBltjL4HwkbHok | ||||
GZdlwieAorPaLh4lZ7BJi2Ctlgsb/J0nnP0AC4mg8GzKzESF3BzfP3ysOEvE | ||||
SmT/RGfTgvnoRUFvvMT/7J+QrdIHQ89h4RoNmpAmHS+fNjonX2Oorshg2dWK | ||||
cARN8XYJ24+Qxq0lVTB6hYTrUH1rTU3Oz0EI5xH8LFyxwWG42+AJiPj0Mf2d | ||||
Gz7mJTo/TJ/DqZa1Z7S4jbq8vDjrsgtH6XwGvF0+/Q/qXC1Tc2lIT9Abs8qx | ||||
ABrB89n5fsxoOUp6Iz0UGhRu28SrlbInqfoi0HPeGlmOxfstEP4PUXwfNvCG | ||||
m0YhTLWgbUo5R45EkivE5nmsEE4YC4YRhOBUT8v+ebS3fL2SbB3kolcLE+5W | ||||
wGttpAsBLI5a0PRRMIasYljAWB1HgiaWhfH0W9kdt2Nw92tSSFJYRat4cXt7 | ||||
1X5Dgl/wS0PfQLN9Rmjp7MojKyQ/psWCZtt+p/YPn3wxfkz/d3jA5IHqy1Y4 | ||||
QSR+8n7+Rj4dYIJYLshFgE10c3diDWdvd429PWfBZu1OhmpPt6eg2XbQ1u/L | ||||
EEpKohoSYEcBEIKtCFW6ox0RYVGfz9ULoOmM0F0aEmGuPjUqr2P/GzcTuRoa | ||||
rniQS39QAOXSm37z605duOL/fvyGnWH3ih2mqXtF9Fyr5TUjk2oFP95H54JG | ||||
9pmQsFhoXNQ5CUCynASE4k/EX6jsG/rmezjzN1e0+1xvgXZf/n78+yf/wDab | ||||
5LRqpghhTGl8V+5WC/loeZ89/eJLGY/NgYuK7wdHTSybl2YW5WCc2TtrSBhn | ||||
naQvTSc1Gv1FAWLp4QBdgstWha04vPrI5t87j9ox1aObi7ORjN8Sfaxed7+I | ||||
T6OwPQkB/bCW0sTuntS/g06kf3wQkskmG78uorejzvclAs2SmnsHHUMdCAFA | ||||
YGwTV8v7OqlonoRx5dDWVeABP0UfHzn8/Zei7794cqj2adOwKQdOz0hhOkDU | ||||
4eHh52qfBPx3n/3DAZeh8Quht43y1SsIp4QLhojLzwSiI6uMjFDEtxyYb3eJ | ||||
PTdYeN4u8e2ubhhzuLKpCG7E56KAozhhOsWCAv70Ng4ZOX/i6p+uHBzGlUIz | ||||
tm6PfWKYj3lhfO5Gg45INnAYIbpP7EYuzPCggYNpMLrhFHAoI4odYC+W3oBb | ||||
JHpckXSXDItGFB64g5bAFbotBWIJFbNMqK7xlW/Md82KpRSNsTwO1SNh0A6f | ||||
S+8B9AX+FefBSsUF+dqcJznjfp50y4MkOkOLnG62SuS7uNKREVFNEr4+HbTU | ||||
u6IjngpSP9A126I9ZE73R2VQj+DzKRJuWC83bAjg4LOmdrzJBb/hSrD377kG | ||||
FTc3xTiNrQPUobvzSHOhSQi8s0+ZJDaElrAN10V1V2S5Tt4WJUfSoxWsY0fI | ||||
4t4aOJCMrSIAQw9OCen74/RPOJdvOAoQtGkLLloIHB7GOfAd5oevcE0VZyO9 | ||||
NWjLVp9+/vhxHzO5pFziMknsc2A9kO8cIWgpY5zi0uPIR2h7aXN2tT/dBmfd | ||||
yWIxdxWxW7TjUSCBXRl2xCK7OUEi854zrISD7uIIQoiW5LTVuBqKdpZ4IvUX | ||||
KUUK0bsLtB5BGIwkQKvbVzcw/YTpiL0AoV02hQtM3IFJ0jFJESVXImAaTmuW | ||||
hp3yEVeSGdmm2HLQZi1YD3cc03nz9i1L9DOcBPVBAA+NJm8RfLPfu+v0Xuq3 | ||||
+m4ZdOgGlWhrz8S6U7UB9nby0QXmQPxgtToGTtgtr9Hbk0dceTwM0kbrkbgC | ||||
B5us48soOI2NqV0aAdy61KuVFITTBh2bVJeNsKfIWrf+cOPCSZ76WI+pfcSq | ||||
W3UVdnOf7VQ4NhtbUA/fyUsxa1KDKPb2jMm2Vziz4wlwkVj39gRQmFWx2yg2 | ||||
VtEB1IgTxCdPmwrBpKnBeXGCMR3HJQ5vtpELwX/erAjsQngC5XXklkhszFUk | ||||
hRhQB61ON+74aMfdynAkcmG6M2D12mbodAPlJgLMDTkFT7ghmimbWC6a0WXi | ||||
9IzbLdT4OO/5tbDst1cXrkyzJWQbWarcRVJEoWfRkZRwIFNJ2QLDTBNO0yG+ | ||||
SX9EqRZSAvc6NS6mKRIdRu7GhIJuaSMqUuwu3sauwzEsbuLfh+ARRiZmKGti | ||||
R3/kNeLMTmSJzXPooVVYrKfkvjHUwNPEwF5RfF9Cyf5kmdESJUVyB9i2ZWr8 | ||||
Bd8G2eSr+9/54M2QD3JMkcYBjvJfQqk0JKUp8ilpg/NGUM3NCqHDnVQYxsVg | ||||
XProRUZuzIGPCjSBwFK2LTjdDeDT5vZe10Z1iqpdAC7OHEDQXA11pCMf2Fjr | ||||
0jO1P48Aj8anWDkGxw25QCN1bwDezc26lfnhDv5wyji05qCzM2DIS+g8F2LI | ||||
rZfQgtj+Fvz4ol5EihGMXcgeimNIfuiQk3xIhORkA2vJVVn4V9SCdGYS6l54 | ||||
hCj9LuFfdEYEwKAgUQcTZxyynxpXFrKjMnsyh4KipXSqUolucvl0gS4XKCXy | ||||
noLbWdFvrShH/jNwvs1x6kaqAqITWCZfIvXgoogcpqRHOFbCXOeusMMcQqGe | ||||
hKxRY3GLSugJ0j64hiOT0joEvTWngsJZmXBiFds1GgxGWyfitsPrbeYoOjFY | ||||
b1WjM1hzpbo7jzaNaTSckPZl4VPUB+SupOLB83CSQP1wr6fRqfGoVpKPArkw | ||||
6TBUc3/4qFwoWC121ZS3M/fNwDgjdbyd1GkzObyXnMyTtENVdwBIOKpAS62c | ||||
ed5Ky0UQgJZEoMStl4t3/UBSouATkm2lb/QLAL28JF8lwAXMqJpyOVwpK8Cy | ||||
vK3xSTXHolHwmYcMmtHzqCOTZ3beItmXENFpu9jnCKg7LSEpfh8PDS85SOJO | ||||
+2yb9fhKEGf2ikwuTIKv5mW/PYoaTwmRVNIQcp6tUxgVoxBfVNsP9kc3yjjH | ||||
MAwipQVVh5Rx9MpHWLlcq/JAgbEg2AHnBIbqxfXVyVBdPZtcPxf4fD65un7e | ||||
rW9w2bMoHdk5WyBmNpJWd+rN8fzI83w0NwfewkmLy6ubyXfPpaMok8wzZggL | ||||
6cK22LnEBbyF2/eWp2OSDkJEr3f4YSaFNO4aKBzTw70KV/6+sSu+KWAwOPyy | ||||
fweZPzjlryhzhGgvJUPwBbpEXh+rw0PXBEeYaqf4ItA3doOpXplww0de6H0X | ||||
/N0/PJD4T4guaallIDTjC15jjIQ8c2K06xa426S1O9jCBRTUbglhuJfoY3z0 | ||||
o+6sifHK/pODUH6W9HARTzoqPajkVoqKWJQdlUjbBzpFw/GVO/5vAPoNvPCA | ||||
8VDGgYJiDna40jBHYXc814OaCG50Lt/h5HQbnHG1kZkEoNsQzjEKNPvCgpcQ | ||||
GoklFCaW63fuwnVwK5NHRRPBDEtXeLNyOKCNiHNYgzvhSmDE7Hz0RjLYcivI | ||||
1m0qWOVG7tCZ6hTS6DyTUCnmOJXdvhCO1R+7RZcl5JHcDBndmevyzu6iHQ4O | ||||
uHhyy6Iy4NFgsG3KjnDzz4M/9TPc+Ts9R7jk8Of82pCKLyGg8W79b5kMw8+W | ||||
UJ/932A5+uSfYHnorJI7bdyepKax+fcyZAV/++95HP28n/NwR8BpFuF3Kh78 | ||||
dYyjn/njGCocEEWhTnymibfY3WQ7bC+nHXbumqXZj8PVsEye//37eEMZPM23 | ||||
vW8Vk/l7lB7H9cSOQKiZHEaXkQ795aLDcF8ofzVJiXp/GdOn128z//FP+i19 | ||||
PPMf/8bbVttKS5rbN2N1WZPeeo6b4Muatj0zBWTnHIIE9+ga6hEfzvnD3VCd | ||||
QnDfZoh8kXi//PHfy7u7H//d5kaE7iW9fcfccF4QmDvq3FfIP1gRCipJQEmI | ||||
9oWj2e8++IqVBvHL5TIlqEtbxD/lF6zHSJ2PXulpz2BHNwmRKgrYgPmTiN7/ | ||||
MRDq9Vf7rRIVFx3QcOGnEJjVb5ef9osV/fj4P4a7+f/OvxKgQiB+gCJhH2AP | ||||
dwW2N7IynZEli0PAW3cqBdS4w0awKHQuvB/6u+2H4br6Ybh/ftjeJv8r3tgf | ||||
wtNOV/Ld5yx732501RmT/vPTD/8KAyuKJlMzUmiZPyO8lCPRP/3wb5BIOdGP | ||||
la6cs1PVTbJxQZPoKEwnPtG50+squnWkd5dX50ozJvmkzHWDW7uTxJB2ONEl | ||||
GR11RW4fmfiy4G9QJ05CC+tDpD4hPbkhTkeKgv4qUiQCDa4bqPAn8cf5hpO8 | ||||
pwQxbki/woqeappokHf569ymafTnzQwlMlBR0c8xDrd++4M0HU1Dq5cl4VpD | ||||
iu8bjZ9KQTSHuvrG6vyOGEH9WdPcv/nxv8qFaKZvGo1pWnLG6MErbdWfrVMO | ||||
Q/cLgaANgQeuyIl+0HHY+Yky/FXTnq2JILMZTfbckgAZpBbTt6n82dxZdb7G | ||||
uRn83f19ymH7gwtD/zNYw+jC9mH8S1A0097t+sNu/fywdxhl2PnRjeHu3zCi | ||||
r+F9L4mEJFk5duC2/Rk3j3tuLVl1kqRqTdJ/bRLsxS1BmA3xV4Nc57emyvGb | ||||
h3nxfUpsOBNI8R2JxgtNdgPQsMuW7h63E3+PW583t+55yzid5hj1ZInSIpol | ||||
qY/vikJujB5GP9520GEc9/hFo9fGHvT31DeGshFf4NRkxaxETIAzSAG8HGxv | ||||
oWv8rCR4T6Ry+fuINu4FQlupOWAi4A7Sc7ca5xzdWin0Z0xGGGfw7kh+CNYk | ||||
/2dvTsDZ7LEuffjK7KzbId9N271ymfO73P+22+gOjt5enl5ihpOZP2Mv58l3 | ||||
zuaWTMUdBxM6aoO7Rt4Al8S6Yn4fIvG3PkR3G44H/wMeXMhYsHcAAA== | ||||
<!-- [rfced] Although this document discusses inclusiveness | ||||
extensively, as part of our process we still need to ask you to | ||||
review the "Inclusive Language" portion of the online Style Guide at | ||||
<https://www.rfc-editor.org/styleguide/part2/#inclusive_language> | ||||
and let us know if any changes are needed. Updates of this nature | ||||
typically result in more precise language, which is helpful for | ||||
readers. | ||||
Note that our script did not flag any words in particular, but this | ||||
should still be reviewed as a best practice. --> | ||||
<!-- [rfced] Please let us know if any changes are needed for the | ||||
following: | ||||
a) The following terms were used inconsistently in this document. | ||||
We chose to use the latter forms. Please let us know any objections. | ||||
block list / blocklist (Section 2.3.1) | ||||
community network(s) (12 instances in text) / | ||||
Community Network(s) (14 instances in text) (per RFC 7962) | ||||
(Non-)Terrestrial / (non-)terrestrial | ||||
b) The following terms appear to be used inconsistently in this | ||||
document. Please let us know which form is preferred. | ||||
internet / Internet (used generally, e.g., "the Internet community", | ||||
"the internet community") | ||||
internet access (1 instance) / Internet Access (2 instances) / | ||||
Internet access (2 instances) (in text; used generally) | ||||
(We also see "in Internet Access of Services" in the Abstract.) | ||||
satellite / Satellite (e.g., "satellite constellations", | ||||
"via Satellite-dependent community networks") | ||||
c) Please let us know how/if the following should be made consistent | ||||
(asking because "circumvents" is normally a verb; please see | ||||
<https://www.merriam-webster.com/dictionary/circumvents>): | ||||
circumvents (noun) / circumvention (noun) --> | ||||
</rfc> | </rfc> | |||
End of changes. 101 change blocks. | ||||
607 lines changed or deleted | 912 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. |