<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version  -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc rfcedstyle="yes"?>
<?rfc toc="yes"?>
<?rfc tocindent="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="-o*+"?>

<rfc ipr="trust200902" docName="draft-irtf-hrpc-association-06" category="info">

  <front>
    <title abbrev="FoA">Freedom of Association on the Internet</title>

    <author initials="N." surname="ten Oever" fullname="Niels ten Oever">
      <organization>Univeristy of Amsterdam &amp; Texas A&amp;M University</organization>
      <address>
        <email>mail@nielstenoever.net</email>
      </address>
    </author>
    <author initials="G." surname="Perez de Acha" fullname="Gisela Perez de Acha">
      <organization>Derechos Digitales</organization>
      <address>
        <email>gisela@derechosdigitales.org</email>
      </address>
    </author>
    <author initials="S." surname="Couture" fullname="Stéphane Couture">
      <organization>University de Montreal</organization>
      <address>
        <email>stephane.couture@umontreal.ca</email>
      </address>
    </author>
    <author initials="M." surname="Knodel" fullname="Mallory Knodel">
      <organization>Center for Democracy &amp; Technology</organization>
      <address>
        <email>mknodel@cdt.org</email>
      </address>
    </author>

    <date year="2020" month="November" day="02"/>

    <area>IRTF</area>
    <workgroup>Human Rights Protocol Considerations Research Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document discusses the relationships between the Internet architecture and the ability of people to exercise their right to freedom of assembly and association online. The Internet increasingly mediates our lives, our relationships, and our ability to exercise our human rights. As a global forum, the Internet provides a public space, yet it is predominantly built on private infrastructure. Since Internet protocols play a central role in the management, development, and use of the Internet, we analyze the relation between protocols and the rights to assemble and associate to mitigate infringements on those rights.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>“In the digital age, the exercise of the rights of peaceful assembly and association has become largely dependent on business enterprises, whose legal obligations, policies, technical standards, financial models and algorithms can affect these freedoms”.</t>

<figure><artwork><![CDATA[
- Annual Report to the UN Human Rights Council by the Special Rapporteur 
on the rights to freedom of peaceful assembly and of association (2019).


We shape our tools and, thereafter, our tools shape us. 
     - John Culkin (1967)
]]></artwork></figure>

<t>The current draft continues the work started in “Research into Human Rights Protocol Considerations” <xref target="RFC8280"/> by investigating the impact of Internet protocols on a specific set of human rights, namely the right to freedom of assembly and association. Taking into consideration the international human rights framework regarding the human right to freedom of assembly and association, the present document seeks to deepen the relationship between this human right and Internet architecture, protocols, and standards. In that way, we continue the work of the Human Rights Protocol Consideration Research Group, as laid out in its charter, where one of the research aims is “to expose the relation between protocols and human rights, with a focus on the rights to freedom of expression and freedom of assembly” <xref target="HRPC-charter"/>. The conclusions may inform the development of new guidelines for protocol developers in draft-irtf-hrpc-guidelines.</t>

<t>The research question of this document is: what are the protocol development considerations for freedom of assembly and association?</t>

</section>
<section anchor="vocabulary-used" title="Vocabulary used">

<t><list style="hanging">
  <t hangText='Architecture'>
  The design of a structure</t>
  <t hangText='Autonomous System (AS)'>
  Autonomous Systems are the unit of routing policy in the modern world of exterior routing <xref target="RFC1930"/>.</t>
  <t>Within the Internet, an autonomous system (AS) is a collection of connected Internet Protocol (IP) routing prefixes under the control of one or more network operators on behalf of a single administrative entity or domain that presents a common, clearly defined routing policy to the Internet <xref target="RFC1930"/>.</t>
  <t>The classic definition of an Autonomous System is a set of routers under a single technical administration, using an interior gateway protocol and common metrics to route packets within the AS, and using an exterior gateway protocol to route packets to other ASs
<xref target="RFC1771"/>.</t>
  <t hangText='Border Gateway Protocol (BGP)'>
  An inter-Autonomous System routing protocol <xref target="RFC4271"/>.</t>
  <t hangText='Connectivity'>
  The extent to which a device or network is able to reach other devices or networks to exchange data. The Internet is the tool for providing global connectivity <xref target="RFC1958"/>. Different types of connectivity are further specified in <xref target="RFC4084"/>. The combination of the end-to-end principle, interoperability, distributed architecture, resilience, reliability and robustness are the enabling factors that result in connectivity to and on the Internet.</t>
  <t hangText='Decentralization'>
  Implementation or deployment of standards, protocols or systems without one single point of control.</t>
  <t hangText='Distributed system'>
  A system with multiple components that have their behavior co-ordinated via message passing. These components are usually
spatially separated and communicate using a network, and may be managed by a single root of trust or authority. <xref target="Troncosoetal"/></t>
  <t hangText='Infrastructure'>
  Underlying basis or structure for a functioning society, organization or community. Because infrastructure is a precondition
for other activities it has a procedural, rather than static, nature due to its social and cultural embeddedness <xref target="PipekWulf"/>
<xref target="Bloketal"/>. This means that infrastructure is always relational: infrastructure always develops in relation to something or someone <xref target="Bowker"/>.</t>
  <t hangText='Internet'>
  The Network of networks, that consists of Autonomous Systems that are connected through the Internet Protocol (IP).</t>
  <t>A persistent socio-technical system over which services are delivered <xref target="Mainwaringetal"/>,</t>
  <t>A techno-social assemblage of devices, users, sensors, networks, routers, governance, administrators, operators and protocols</t>
  <t>An emergent-process-driven thing that is born from the collections of the ASes that happen to be gathered together at any given time. The fact that they tend to interact at any given time means it is an emergent property that happens because they use the protocols defined at IETF.</t>
</list></t>

</section>
<section anchor="research-question" title="Research question">

<t>The research question of this document is: what are the protocol development considerations for freedom of assembly and association?</t>

</section>
<section anchor="methodology" title="Methodology">

<t>The point of departure of the present work <xref target="RFC8280"/> is an initial effort to expose the relationship between human rights and the Internet architecture, specifically protocols and standards. As such, <xref target="RFC8280"/> was inductive and explorative in nature. The methodology in this previous work was based on the discourse analysis of RFCs, interviews with members of the IETF community, and participant observation in IETF working groups, with the goal to identify technical concepts that relate to human rights. This work resulted in the proposal of guidelines to describe a relationship between the right to freedom of assembly and association and connectivity, security, censorship resistance, anonymity, pseudonymity, accessibility, decentralization, adaptability, and outcome transparency.</t>

<t>In this document, we deepen our exploration of human rights and protocols by assessing one specific set of human rights: freedom of association and assembly, abbreviated here as FAA. Our methodology for doing so is the following: first, we provide a brief twofold literature review addressing the philosophical and legal definitions of FAA and how this right has already been interpreted or analyzed concerning the digital. This literature review is not exhaustive nor systematic but aims at providing some lines of questioning that could later be used for protocol development. The second part of our methodology looks at some cases of Internet protocols that are relevant to the sub-questions highlighted in the literature review, and analyze how these protocols facilitate and inhibit the right to assembly and association.</t>

</section>
<section anchor="literature-review" title="Literature Review">

<section anchor="faa-definition-and-core-treaties" title="FAA definition and core treaties">

<t>The rights to freedom of association and assembly are defined and guaranteed in national law and international treaties. Article 20 of the Universal Declaration of Human Rights <xref target="UDHR"/> states for instance that “Everyone has the right to freedom of peaceful assembly and association” and that “No one may be compelled to belong to an association”. Article 23 further guarantees that “Everyone has the right to form and to join trade unions for the protection of his interests”. In the International Covenant on Civil and Political Rights, article 21 stipulates that “The right of peaceful assembly shall be recognized” and that “No restrictions may be placed on the exercise of this right other than those imposed in conformity with the law and which are necessary in a democratic society in the interests of national security or public safety, public order (ordre public), the protection of public health or morals or the protection of the rights and freedoms of others” while article 22 states that “Everyone shall have the right to freedom of association with others, including the right to form and join trade unions”. Other treaties are sometimes cited as the source and framework to the right to freedom of association and assembly. The Australian government <xref target="Australia"/> for instance refers to Article 5 of the Convention on the Elimination of All Forms of Racial Discrimination <xref target="CERD"/> which stipulates freedom of peaceful assembly and association should be guaranteed “without discrimination as to race, colour, national or ethnic origin”; Article 15 of the Convention on the Rights of the Child <xref target="CRC"/> which recognises to child pending the restrictions cited above; and Article 21 of the Convention on the Rights of Persons with Disabilities <xref target="CRPD"/> which insist on usable and accessible formats and technologies appropriate for persons with different kinds of disabilities.</t>

<t>From a more philosophical perspective, Brownlee and Jenkins <xref target="Stanford"/> make some interesting distinctions in particular regarding the concepts of association, assembly and interaction. On one end, “interaction” refers to any kind of interpersonal and often incidental engagements in daily life, like encountering strangers on a bus. Interaction is seen as a “prerequisite” for association. Assembly on the other end, has a more political connotation and is often used to refer to activists, protesters, or members of a group in a deliberating event. In between the two, association refers to more “persistent connections” that are not necessarily political in nature. The authors thus distinguish between intimate associations, like friendship, love, or family, and collective association like trade unions, commercial business, or “expressive associations” like civil rights organizations or LGBTQIA associations. For Brownlee and Jenkins <xref target="Stanford"/>, the right to association is linked to different relative freedoms: permission (to associate or dissociate), claim-right (to oppose others interfering with our conduct), power (to alter the status of our association), immunity (from other people interfering in our right). Freedom of association and assembly thus refers both to the individual right to join or leave a group and to the collective right to form or dissolve a group and to organize itself.  These rights, however, are relative and not absolute. Parents, for instance, have limited rights to exclude their underage child from family households. Excluding someone from an association based on its sex, race or other individual characteristic is also often contentious if not illegal. Restrictions on freedom of association can be imposed by states, but only if this is lawful and proportionate. States must document how these limitations are necessary in the interests of national security or public safety, public order, the protection of public health or morals, or the protection of the rights and freedoms of others. Finally, states must also protect participants against possible abuses by non-State actors.</t>

<t>In international law, the right to freedom of assembly and association protects any collective, gathered either permanently or temporarily for “peaceful” purposes. It is important to underline the property of “freedom” because the right to freedom of association and assembly is voluntary and uncoerced: anyone can join or leave a group of choice, which in turn means one should not be forced to either join, stay or leave. The difference between freedom of assembly and freedom of association is merely a gradual one: the former tends to have an informal and ephemeral nature, whereas the latter refers to established and permanent bodies with specific objectives. Nonetheless, both are protected to the same degree. Where an assembly is an intentional and temporary gathering of a collective in a private or public space for a specific purpose: demonstrations, indoor meetings, strikes, processions, rallies, or even sits-in <xref target="UNHRC"/>; association has a more formal and established nature. It refers to a group of individuals or legal entities brought together in order to collectively act, express, pursue, or defend a field of common interests <xref target="UNGA"/>. Think about civil society organizations, clubs, cooperatives, NGOs, religious associations, political parties, trade unions, or foundations.</t>

<t>When talking about the human right of freedom of association and assembly, one should always take into account that ‘all human rights are indivisible, interrelated, unalienable, universal, and mutually reinforcing’ <xref target="ViennaDeclaration"/>. This means that in the analysis of the impact of a certain variable on freedom of association and assembly one should take other human rights into account too. When devising an approach to mitigate a possible negative influence on this right, one should also always take into account the possible impact this might have on other rights. For example, the following rights are often impacted in conjunction with freedom of association and assembly: the right to political participation, the right to (group) privacy, the right to freedom of expression, and access to information. For instance, when the right to political participation is hampered, this often happens in conjunction with a limitation of the freedom of association and assembly because political participation is often done collectively. When the right to privacy is hampered, this privacy of particular groups is also impacted (so-called ‘group privacy’ <xref target="Loi"/>, which potentially has consequences for the right to association and assembly. Where the freedom of expression of a group is hampered, such as in protests or through Internet shutdowns, this both hampers other people’s ability to receive the information of the group, and impact the right to assembly of the people who seek to express themselves as a group <xref target="Nyokabi"/>.</t>

<t>Finally, if the right to association and assembly is limited by national law, this does not mean it is consistent with international human rights law. In such a case, the national law would therefore not be legitimate <xref target="Glasius"/>.</t>

</section>
<section anchor="faa-in-the-digital-era" title="FAA in the digital era">

<t>Before discussion freedom of association and assembly as it pertains to digital environments, we must first recognize that the United Nations Human Rights Council adopted Resolution 20/8 2012, which was later adopted by the United Nations General Assembly <xref target="UNHRC2016"/>, which affirms “… that the same rights that people have offline must also be protected online …”. Therefore the digital environment is no exception to application of this right by any means. The questions that remain, however, are how these rights should be conceptualized and implemented in different parts and levels of digital environments.</t>

<t>The right to freedom of assembly and association is the subject of increasing discussions and analysis. In 2016, the Council of Europe published a report, “Report by the Committee of experts on cross-border flow of Internet traffic and Internet freedom on Freedom of assembly and association on the Internet” <xref target="CoE"/> which noted that while the Internet and technologies are not explicitly mentioned in international treaties, these treaties nevertheless apply to “the online environment”. The report argue the “Internet is the public sphere of the 21st century”, something demonstrated by the fact that informal associations can be gathered at scale in a matter of hours on the Internet, and that digital communication tools often serve to facilitate, publicize or otherwise enable presential associations or assemblies, like a protest or demonstration. They note, on the other hand, the negative ways in which the Internet can also be used to promote or facilitate terrorism, urban violence and hate speech, thus insisting on the “extremely important and urgent” need to fight online terrorist activities such as recruitment or mobilization, while at the same time respecting the right to peaceful assembly and association of other users. The report mentions the following use cases that could be help further our reflection:</t>

<t><list style="symbols">
  <t>Instances of network shutdowns in the Arab Spring, to prevent people from organising themselves or assembling</t>
  <t>California’s Bay Area Rapid Transit (BART) shutdown of mobile phone service, to avoid protester violence and disruption of service</t>
  <t>The wholesale blocking of Google as a violation of freedom of expression</t>
  <t>Telus, a telecom company which blocked customers’ access to websites critical of Telus during a Telecommunications Workers Union strike against it</t>
  <t>The targeting of social media users who call for or organise protests though the Internet in Turkey’s Gezi Park protests</t>
  <t>Mass surveillance or other interferences with privacy in the context of law enforcement and national security</t>
  <t>Use of VPNs (Virtual Private Networks) to the TOR network to ensure anonymity</t>
  <t>Distributed Denial of Service attacks (DDoS) as civil disobedience.</t>
</list></t>

<t>More recently, the 2019 Annual Report addressed to the UN Human Rights Council by the Special Rapporteur on the rights to freedom of peaceful assembly and of association, also notes the opportunities and challenges posed by digital networks to the rights to freedom of peaceful assembly and of association.  The report recommends that international human rights norms and principles should also be used as a framework “that guides digital technology companies’ design, control and governance of digital technologies”. The report states that “technical standards” in particular can affect the freedom of association and assembly, and makes some recommendations on which the following could be relevant to our discussion here:</t>

<t><list style="symbols">
  <t>“[Undertake] human rights impact assessments which incorporate the rights to freedom of peaceful assembly and of association when developing or modifying their products and services,”</t>
  <t>“increase the quality of participation in and implementation of existing multi-stakeholder initiatives,”</t>
  <t>“collaborate with governments and civil society to develop technology that promotes and strengthens human rights,”</t>
  <t>“support the research and development of appropriate technological solutions to online harassment, disinformation and propaganda, including tools to detect and identify State-linked accounts and bots,” and</t>
  <t>“adopt monitoring indicators that include specific concerns related to freedom of peaceful assembly and association.”</t>
</list></t>

<t>In one of their “training kits” <xref target="APCtraining"/>, the Association of Progressive Communications addressed different impacts of the internet on association and assembly and raised three particular issues worthy to note here:</t>

<t><list style="numbers">
  <t>Organization of protests. Internet and social media are enablers of protests, such as it was seen in the “Arab Spring”. Some of these protests - like online petitions or campaigns - are similar to offline association and assembly, but other protest forms are inherent to the Internet capacity like hacking, DDOS and are subject to controversy within the Internet community, some people finding it legitimate, and others not.</t>
  <t>Surveillance. While the Internet facilitates association, the association in turn leaves a lot of traces that can be used in turn for law enforcement but also for repressing political dissents. As they note, even the threat of surveillance can have deter facilitation.</t>
  <t>Anonymity and pseudonymity can be useful protection mechanism for those who’d like to attend legitimate association without facing retribution. On the other hand, anonymity can be used to harm society, such as in online fraud or sexual predation.</t>
</list></t>

<t>Online association and assembly are the starting point of group to mobilization in modern democracies, and even more so where physical gatherings have been impossible or dangerous <xref target="APC"/>. Throughout the world -from the Arab Spring to Latin American student movements and the #WomensMarch- the Internet has played a crucial role by providing means for the fast dissemination of information otherwise mediated by the press, or even forbidden by the government <xref target="Pensado"/>. According to Hussain and Howard the Internet helped to “build solidarity networks and identification of collective identities and goals, extend the range of local coverage to international broadcast networks” and as platform for contestation for “the future of civil society and information infrastructure” <xref target="HussainHoward"/>. The IETF itself, defined as an ‘open global community’ of network designers, operators, vendors, and researchers <xref target="RFC3233"/> is also protected by freedom of assembly and association . Discussions, comments and consensus around RFCs are possible because of the collective expression that freedom of association and assembly allow. The very word “protocol” found its way into the language of computer networking based on the need for collective agreement among a group of assembled network users <xref target="HafnerandLyon"/>.</t>

<t><xref target="RFC8280"/> is a paper by the Human Rights Protocol Consideration Resarch Group in the Internet Research Taskforce on internet protocols and human rights that discusses issues of FAA, specifically:</t>

<t><list style="symbols">
  <t>The expansion of DNS for generic namespace as an enabler of association for minorities. The paper argues that specifically the expansion of the DNS to allow for new generic Top Level Domains (gTLDs) can have negative impacts on freedom of association because of restrictive policies by some registries and registrars, on the other hand could gTLDs also enable communities to build clearly identifiable spaces for association (such as .gay).</t>
  <t>The impact of Distributed Denial of Service attacks on freedom of association. Whereas DDoS has been used as a tool for protest, in many cases this is infringing on other parties freedom of expression. Furthermore,  often devices (such as IoT devices and routers) are inscribed in such DDoS attacks whereas the owner or user did not consent to this. Thus they do not have the possibility to exit this assembly. Therefore the draft concluded that that IETF ”should try to ensure that their protocols cannot be used for DDoS attacks”</t>
  <t>The impact of middleboxes on the ability of users to connect to the Internet and therefore their ability to exercise their right to freedom of association and assembly. The lack of connectivity can significantly impact freedom of assembly and association of a user. Especially if this is done in a way that is not knowable for the user and if there is no possibility to for the user to have access to due process to dispute the lack of (secure or private) connectivity in general or to a specific service.</t>
</list></t>

<t>In the 2020 report by the United Nations Special Rapporteur on Human Rights <xref target="UN44-24"/> it is concluded that technologies can be enablers of FAA, but technology is also significantly used to interfere with the ability of people to exercise their right to freedom association and assembly. Specifically, the report mentions network shutdowns, the usage of technology to surveil protests and users. This includes facial recognition, and the uses of other ways to violate the (group) privacy of people engaged in an assembly or association. The report makes it explicit that companies play a significant role enabling, for instance by developing, providing or selling the technology, but also by directly exercising these violations.</t>

</section>
<section anchor="specific-questions-raised-from-the-literature-review" title="Specific questions raised from the literature review">

<t>Here are some questions raised from the literature review that can have implications for protocol design:</t>

<t><list style="numbers">
  <t>Should protocols be designed to enable legitimate limitations on association in the interests of “national security or public safety, public order (ordre public), the protection of public health or morals or the protection of the rights and freedoms of others”, as stated in the ICCPR article 21 <xref target="ICCPR"/>? Where in the stack do we care for FAS?</t>
  <t>Can protocols facilitate agency of membership in associations, assemblies and interactions?</t>
  <t>What are the features of protocols that enable freedom of association and assembly?</t>
  <t>Does protocol development sufficiently consider usable and accessible formats and technologies appropriate for all persons, including those with different kinds of disabilities?</t>
  <t>Can a protocol be designed to legitimately exclude someone from an association?</t>
</list></t>

<t>In the following sections we attempt to answer these questions with specific examples of standardized protocols in the IETF.</t>

</section>
</section>
<section anchor="cases-and-examples" title="Cases and examples">

<t>As the Internet mediates collective action and collaboration, it impacts on freedom of association and assembly. To answer our research question regarding how internet architecture enable and/or inhibits such human right, we researched several independent and typical cases related to protocols that have been either adopted by the IETF, or are widely used on the Internet.  Our goal is to figure out whether they facilitate freedom of assembly and association, or whether they inhibit it through their design or implementation.</t>

<t>We are aware that some of the following examples go beyond the use of Internet protocols and flow over into the application layer or examples in the offline world whereas the purpose of the current document is to break down the relationship between Internet protocols and the right to freedom of assembly and association. Nonetheless, we do recognize that in some cases the line between them and applications, implementations, policies and offline realities are often blurred and hard -if not impossible- to differentiate.</t>

<t>We use the literature review to guide our process of inquiry for each case, and to dive deeper in what can be found interesting about each case as it relates to freedom of association.</t>

<section anchor="got-no-peace-spam-and-ddos" title="Got No Peace: Spam and DDoS">
<figure><artwork><![CDATA[
Should protocols be designed to enable legitimate limitations on 
association in the interests of “national security or public safety, 
public order (ordre public), the protection of public health or morals 
or the protection of the rights and freedoms of others”, as stated in 
the ICCPR article 21{ICCPR}}? Where in the stack do we care for FAA?
]]></artwork></figure>

<t>The 2020 report by the United Nations Special Rapporteur on Human Rights <xref target="UN44-24"/> described how technology is often used to limit freedom of assembly and association, such as for instance through network shutdowns and the surveillance of groups. Because access to the Internet is crucial not only for freedom of association and assembly, but also for the right to development, and the right to freedom of expression and information <xref target="Nyokabi"/>, the United Nation Special Rapporteur argues that:</t>

<figure><artwork><![CDATA[
(b) Avoid resorting to disruptions and shutdowns of Internet or 
telecommunications networks at all times and particularly during 
assemblies, including those taking place in electoral contexts 
and during times of unrest;
]]></artwork></figure>

<t>Whereas the states have the obligation to protect human rights, there has been an increasing call for non-state actors, such as companies, to respect human rights <xref target="UNGP"/>. This includes a chain-responsibility of actors, which means that not just the company’s own processes should not negatively impact human rights, but they should also engage in due diligence processes, such as human rights impact assessments. This includes an assessment of whether the products that are sold, or the services that are provided, can be used to engage in human rights violations, or whether human rights violations occur in any stage of the supply chain  of the company. If this is the case, measures should be taken to mitigate this.</t>

<t>In the case of dual-use technologies, this means that technology could be used for legitimate purposes, but could also be used to limit freedom of association or assembly,  it might mean that producers or sellers should limit the parties they sell to, or even better, ensure that the illegitimate use of the technology is not technically possible anymore, or made more difficult.</t>

<section anchor="spam" title="Spam">

<t>In the 1990s as the internet became more and more commercial, spam came to be defined as irrelevant or unsolicited messages that were posted many times to multiple news groups or mailing lists {Marcus}}. Here the question of consent, but also harm, are crucial. In the 2000s a large part of the discussion revolved around the fact that certain corporations. protected by the right to freedom of association, considered spam to be a form of “commercial speech”, thus encompassed by free expression rights <xref target="Marcus"/>. Yet spam can be not only a nuisance, but a threat to systems and users.</t>

<t>This leaves us with an interesting case: spam is currently handled mostly by mail providers on behalf of the user, next to that countries are increasingly adopting opt-in regimes for mailing lists and commercial e-mail, with a possibility of serious fines in case of violation. Yet many ask is spam not the equivalent of the fliers and handbills ever present in our offline world? The big difference between the proliferation of such messages offline and online is the scale.  It is not hard for a single person to message a lot of people, whereas if that person needed to go house by house the scale and impact of their actions would be much smaller.  Inversely if it were a common practice to expose people to unwanted messages online, users would be drowned in such messages, and no expression would be possible anymore.  Allowing illimited sending of unsolicited messages would be a blow against freedom of speech: when everyone talks, nobody listens.</t>

<t>Here the argument is very similar to DDoS attacks, considered next: Legitimate uses of online campaigning, or online protesting, are drowned out by a malicious use which constitutes an attack on the internet infrastructure and thus the assembly or association itself.</t>

</section>
<section anchor="ddos" title="DDoS">

<t>Distributed Denial of Service attacks are leveled against a server or service by a controller of a host or multiple hosts by overloading the server or service’s bandwidth or resources (volume-based floods) or exploit protocol behaviours (protocol attacks). DDoS attacks can thus stifle and complicate the rights to assemble online for media and human rights organisations whose websites are the target of DDoS. At the same time there are comparisons made between DDoS attacks and sit-in protests <xref target="Sauter"/>. However the main distinction is significant: only a small fragment of “participants” (from controllers to compromised device owners) in DDoS attacks are aware or willing <xref target="RFC8280"/>. Notably DDoS attacks are increasingly used to commit crimes such as extortion, which infringe on others’ human rights.</t>

<t>Because of the interrelation of technologies, it cannot be said that there is one point in the technical stack that there are characteristics of “peaceful” or “non-peaceful” association visible to protocol developers. As we can see from the cases of spam blocking and DDoS mitigation that “peaceful or non-peaceful” is not a meaningful heuristic, or even characteristic, of problematic content. If anything, their commonality is scale and volume.</t>

</section>
</section>
<section anchor="holistic-agency-mailing-lists-and-spam" title="Holistic Agency: Mailing Lists and Spam">

<figure><artwork><![CDATA[
Can protocols facilitate agency of membership in associations, 
assemblies and interactions?
]]></artwork></figure>

<section anchor="mailing-lists" title="Mailing lists">

<t>Since the beginning of the Internet mailing lists have been a key site of assembly and association <xref target="RFC0155"/> <xref target="RFC1211"/>. In fact, mailing lists were one of the Internet’s first functionalities <xref target="HafnerandLyon"/>.</t>

<t>In 1971 four years after the invention of email, the first mailing list was created to talk about the idea of using Arpanet for discussion. What had initially propelled the Arpanet project forward as a resource sharing platform was gradually replaced by the idea of a network as a means of bringing people together <xref target="Abbate"/>. More than 45 years after, mailing lists are pervasive and help communities to engage, have discussions, share information, ask questions, and build ties. Even as social media and discussion forums grow, mailing lists continue to be widely used <xref target="AckermannKargerZhang"/> and are still a crucial tool to organise groups and individuals around themes and causes <xref target="APC3"/>.</t>

<t>Mailing lists’ pervasive use are partly explained because they allow for “free” association: people subscribe (join) and unsubscribe (leave) as they please. Mailing lists also allow for association of specific groups on closed lists. This free association online enables agency of membership, a key component of freedom of association and assembly.</t>

</section>
<section anchor="spam-1" title="Spam">

<t>As we mentioned before, there are interesting implications for freedom of association and assembly when looking at spam mitigation. Here we want to specifically note that if we consider that the rights to assembly and association also mean that “no one may be compelled to belong to an association” <xref target="UDHR"/>, spam infringes both rights if an op-out mechanism is not provided and people are obliged to receive unwanted information, or be reached by people they do not know.</t>

</section>
</section>
<section anchor="civics-in-cyberspace-messaging-conferencing-and-networking" title="Civics in Cyberspace: Messaging, Conferencing, and Networking">

<figure><artwork><![CDATA[
What are the features of protocols that enable freedom of 
association and assembly?
]]></artwork></figure>

<t>Civic participation is often expressed as the freedom to associate and assemble, along with a whole other set of enabling rights such as freedom of expression and the right to privacy. UN Special Rapporteur David Kaye established a strong relationship between technology that allows anonymity and uses encryption have positive effects on freedom of expression <xref target="Kaye"/>. Here we look at messaging, such as email, mailing lists and internet relay chat; video conferencing and peer-to-peer networking protocols to investigate the common features that enable freedom of association and assembly online.</t>

<section anchor="email" title="Email">

<t>Similarly to freedom of expression’s enabling and universal right to impart one’s ideas openly, “the right to whisper”, or confidentiality, is the ability to limit to whom one imparts one’s ideas. An encrypted email project, the LEAP Encryption Access Project, says, “like free speech, the right to whisper is a necessary precondition for a free society. Without it, civil society languishes and political freedoms are curtailed. As the importance of digital communication for civic participation increases, so too does the importance of the ability to digitally whisper.” <xref target="LEAP"/></t>

</section>
<section anchor="mailing-lists-1" title="Mailing lists">

<t>Not only are mailing lists a good example of how protocols can facilitate the necessary ingredient of agency in freedom of association, mailing lists are an example of messaging technology that has other features that enable freedom of association and assembly.</t>

<t>The archival function of mailing lists allows for posterior accountability and analysis. The ubiquity and interoperability of email, and by extension email lists, provides a low barrier to entry to an inclusive medium.</t>

<t>Association and assembly online can be undermined when right to privacy is at risk. And one of the downsides of mailing lists are similar to the privacy and security concerns generally associated with email. At least with email, end-to-end encryption such as OpenPGP <xref target="RFC4880"/> and S​/​MIME <xref target="RFC5751"/> can keep user communications authenticated and confidential. With mailing lists, this protection is not as possible because with many lists the final recipients are typically too many for . There have been experimental solutions to address this issue such as Schleuder <xref target="Schleuder"/>, but this has not been standardized or widely deployed.</t>

</section>
<section anchor="irc" title="IRC">

<t>Internet Relay Chat (IRC) is an application layer protocol that enables communication in the form of text through a client/server networking model <xref target="RFC2810"/>. In other words, a chat service. IRC clients are computer programs that a user can install on their system. These clients communicate with chat servers to transfer messages to other clients. Features of IRC include: federated design, transport encryption, one-to-many routing, creation of topic-based “channels”, and spam or abuse moderation.</t>

<t>For the purposes of civic participation and freedom of association and assembly in particular it is critical that IRC’s federated design allows many interoperable, yet customisable, instances and basic assurance of confidentiality through transport encryption. We investigate the particular aspect of agency in membership through moderation in the section ‘Block Together Now: IRC and Refusals’ below.</t>

</section>
<section anchor="webrtc" title="WebRTC">
<t>Multi-party video conferencing protocols like WebRTC <xref target="RFC6176"/> <xref target="RFC7118"/> allow for robust, bandwidth-adaptive, wideband and super-wideband video and audio discussions in groups. ‘The WebRTC protocol was designed to enable responsive real-time communications over the Internet, and is instrumental in allowing streaming video and conferencing applications to run in the browser. In order to easily facilitate direct connections between computers (bypassing the need for a central server to act as a gatekeeper), WebRTC provides functionality to automatically collect the local and public IP addresses of Internet users (ICE or STUN). These functions do not require consent from the user, and can be instantiated by sites that a user visits without their awareness. The potential privacy implications of this aspect of WebRTC are well documented, and certain browsers have provided options to limit its behavior.’ <xref target="AndersonGuarnieri"/>.</t>

<t>Even though some multi-party video conferencing tools facilitate freedom of assembly and association, their own configuration might might pose concrete risks for those who use them. One the one hand WebRTC is providing resilient channels of communications, but on the other hand it also exposes information about those who are using the tool which might lead to increased surveillance, identification and the consequences that might be derived from that. This is especially concerning because the usage of a VPN does not protect against the exposure of IP addresses <xref target="Crawford"/>.</t>

<t>The risk of surveillance is also true in an offline space, but this is generally easy to analyze for the end-user. Security and privacy expectations of the end-user could be either improved or made explicit. This in turn would result in a more secure and/or private exercise of the right to freedom of assembly or association.</t>

</section>
<section anchor="peer-to-peer-networking" title="Peer-to-peer networking">
<t>At the organizational level, peer production is one of the most relevant innovations from Internet mediated social practices. According to <xref target="Benkler"/> these networks imply ‘open collaborative innovation and creation, performed by diverse, decentralized groups organized principally by neither price signals nor organizational hierarchy, harnessing heterogeneous motivations, and governed and managed based on principles other than the residual authority of ownership implemented through contract.’ <xref target="Benkler"/>.</t>

<t>In his book The Wealth of Networks, <xref target="Benkler2"/> significantly expands on his definition of commons-based peer production. In his view, what distinguishes commons-based production is that it doesn’t rely upon or propagate proprietary knowledge: “The inputs and outputs of the process are shared, freely or conditionally, in an institutional form that leaves them equally available for all to use as they choose at their individual discretion.” <xref target="Benkler2"/>. To ensure that the knowledge generated is available for free use, commons-based projects are often shared under an open license</t>

<t>Peer-to-peer (P2P) is essentially a model of how people interact in real life because “we deal directly with one another whenever we wish to” <xref target="Vu"/>. Usually if we need something we ask our peers, who in turn refer us to other peers. In this sense, the ideal definition of P2P is that “nodes are able to directly exchange resources and services between themselves without the need for centralized servers” where each participating node typically acts both as a server and as a client <xref target="Vu"/>. <xref target="RFC5694"/> has defined it as peers or nodes that should be able to communicate directly between themselves without passing intermediaries, and that the system should be self-organizing and have decentralized control <xref target="RFC5694"/>. With this in mind, the ultimate model of P2P is a completely decentralized system, which is more resistant to speech regulation, immune to single points of failure and has a higher performance and scalability. Nonetheless, in practice some P2P systems are supported by centralized servers and some others have hybrid models where nodes are organized into two layers: the upper tier servers and the lower tier common nodes <xref target="Vu"/>.</t>

<t>Since the ARPANET project, the original idea behind the Internet was conceived as what we would now call a peer-to-peer system <xref target="RFC0001"/>. Over time it has increasingly shifted towards a client/server model with “millions of consumer clients communicating with a relatively privileged set of servers” <xref target="NelsonHedlun"/>.</t>

<t>Whether for resource sharing or data sharing, P2P systems are enabling freedom of assembly and association. Not only do they allow for effective dissemination of information, but they leverage computing resources by diminishing costs allowing for the formation of open collectives at the network level. At the same time, in completely decentralized systems the nodes are autonomous and can join or leave the network as they want -a characteristic that makes the system unpredictable: a resource might be only sometimes available, and some other resources might be missing or incomplete <xref target="Vu"/>. Lack of information might in turn makes association or assembly more difficult.</t>

<t>Additionally, when architecturally assessing the role of P2P systems we could say that: “the main advantage of centralized P2P systems is that they are able to provide a quick and reliable resource locating. Their limitation, however, is that the scalability of the systems is affected by the use of servers. While decentralized P2P systems are better than centralized P2P systems in this aspect, they require a longer time in resource locating. As a result, hybrid P2P systems have been introduced to take advantage of both centralized and decentralized architectures. Basically, to maintain the scalability, similar to decentralized P2P systems, there are no servers in hybrid P2P systems. However, peer nodes that are more powerful than others can be selected to act as servers to serve others. These nodes are often called super peers. In this way, resource locating can be done by both decentralized search techniques and centralized search techniques (asking super peers), and hence the systems benefit from the search techniques of centralized P2P systems.” <xref target="Vu"/>.</t>

</section>
</section>
<section anchor="universal-access-the-web" title="Universal Access: The Web">

<figure><artwork><![CDATA[
Does protocol development sufficiently consider usable and accessible 
formats and technologies appropriate for persons with different kinds 
of disabilities?
]]></artwork></figure>

<t>The W3C has done significant work to ensure that the Web is accessible to people with diverse physical abilities <xref target="W3C"/>. The implementation of these accesibility standards for instance help people can’t have issues with seeing or rendering an images to understand what the image actually contains.</t>

<t>The IETF uses English as its primary working language, both in its documentation and in its communication. This is also the case for reference implementations. Whereas it is estimated that roughly 20% of the Earth’s population speaks English, whereas only 360 million speak English as their first language. <xref target="RFC2277"/> describes that ‘”Internationalization is for humans. This means that protocols are not subject to internationalization; text strings are.”, this implies that protocol developers, as well as people that work with protocols, are not people, or that protocol developers are all in command of the English language. This means that it is significantly easier for people who have a command of the English language to become a protocol developer - and it might lead to the development of separate protocols that are developed within large language communities that are not using the English language or the Latin script. This makes it harder for people who seek to shape their own space of association and assembly on the Internet to do so. And is thus driving these communities into, often proprietary and non-interoperable services such as Facebook.</t>

<t>When Ramsey Nasser developed the Arabic programming language قلب (transliterated Qalb, Qlb and Alb) <xref target="Nasser"/> he called it ‘engineering performance art’ instead of engineering, because he knew that his language would not work. In part this is because all modern programming tools are based on the ASCII character set, which encodes Latin Characters and was originally based on the English Language. This highlights cultural biases of computer science and engineering. Despite long significant efforts, it is still largely impossible to register an email address in a language such as Devanagari, Arabic, or Chinese. Even if it is possible - it is to be expected that there will be a significant failure rate in sending and receiving emails with other services. This makes it harder for people who do not speak English and/or don’t use the written Latin script to exercise their freedom of association and assembly.</t>

</section>
<section anchor="block-together-now-irc-and-refusals" title="Block Together Now: IRC and Refusals">

<figure><artwork><![CDATA[
Can a protocol be designed to legitimately exclude someone 
from an association?
]]></artwork></figure>

<t>Previously we spoke about the privacy protecting features of IRC that enable freedom of association and assembly, including transport security. But now we turn to the ability to block users and effectively moderate discussions on IRC as a key feature of the technology that enables agency in membership, a key aspect of freedom of association and assembly.</t>

<t>For order to be kept within the IRC network, special classes of users become “operators” and are allowed to perform general maintenance functions on the network: basic network tasks such as disconnecting (temporary or permanently) and reconnecting servers as needed <xref target="RFC2812"/>. One of the most controversial power of operators is the ability to remove a user from the connected network by ‘force’, i.e., operators are able to close the connection between any client and server <xref target="RFC2812"/>.</t>

<t>IRC servers may deploy different policies for the ability of users to create their own channels or ‘rooms’, and for the delegation of ‘operator’-rights in such spaces. Some IRC servers support SSL/TLS connections for security purposes <xref target="RFC7194"/> which helps stop the use of packet sniffer programs to obtain the passwords of IRC users, but has little use beyond this scope due to the public nature of IRC channels. TLS connections require both client and server support (that may require the user to install TLS binaries and IRC client specific patches or modules on their computers). Some networks also use TLS for server to server connections, and provide a special channel flag (such as +S) to only allow TLS-connected users on the channel, while disallowing operator identification in clear text, to better utilize the advantages that TLS provides.</t>

</section>
</section>
<section anchor="conclusions-can-we-learn-anything-from-the-previous-case-studies" title="Conclusions: Can we learn anything from the previous case studies?">

<t>Communities, collaboration and joint action lie at the heart of the Internet. Even at at a linguistic level, the words “networks” and “associations” are closely related. Both are groups and assemblies of people depend on “links” and “relationships” <xref target="Swire"/>. Taking legal definitions given in international human rights law jurisprudence, we could assert that the right to freedom of assembly and association protect collective expression. These rights protect any collective, gathered either permanently or temporarily for “peaceful” purposes. It is voluntary and uncoerced.</t>

<t>Given that the Internet itself was originally designed as a medium of communication for machines that share resources with each other as equals <xref target="RFC0903"/>, the Internet is now one of the most basic infrastructures for the right to freedom of assembly and association. Since Internet protocols and the Internet architecture play a central role in the management, development and use of the Internet, we established the relation between some protocols and the right to freedom of assembly and association.</t>

<t>After reviewing several cases representative of FAA considerations inherent in protocols standardized at the IETF, we can conclude that the way in which infrastructure is designed and implemented impacts people’s ability to exercise their freedom of assembly and association. This is because different technical designs come with different properties and characteristics. These properties and characteristics on the one hand enable people to assemble and associate, but on the other hand also adds limiting, or even potentially endangering, characteristics. More often than not, this depends on the context. A clearly identified group for open communications, where messages are sent in cleartext and where peoples persistent identities are visible, can help to facilitate an assembly and build trust, but in other contexts the same configuration could pose a significant danger. Endangering characteristics should be mitigated, or at least clearly communicated to the users of these technologies.</t>

<t>Lastly, the increasing shift towards closed and non-interoperable platforms in chat and social media networks have a significant impact on the distributed and open nature of the Internet. Often these non-interoperable platforms are built on open-protocols but do not allow for interoperability or data-portability. The use of social-media platforms has enabled groups to associate, but it has also rendered users unable to change platforms, therefore leading to a sort of “forced association” that inhibits people to fully exercise their freedom of assembly and association.</t>

</section>
<section anchor="acknowledgements" title="Acknowledgements">

<t><list style="symbols">
  <t>Fred Baker, Jefsey, and Andrew Sullivan for work on Internet definitions.</t>
  <t>Stephane Bortzmeyer for several concrete text suggestions that found their way in this document (such as the AS filtering example).</t>
  <t>Mark Perkins and Gurshabad for finding a lot of typos.</t>
  <t>Gurshabad Grover and an anonymous reviewer for a full review.</t>
  <t>The hrpc mailinglist at large for a very constructive discussion on a hard topic.</t>
</list></t>

</section>
<section anchor="security-considerations" title="Security Considerations">

<t>As this draft concerns a research document, there are no security considerations.</t>

</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>This document has no actions for IANA.</t>

</section>
<section anchor="research-group-information" title="Research Group Information">

<t>The discussion list for the IRTF Human Rights Protocol Considerations
Research Group is located at the e-mail address
<eref target="mailto:hrpc@ietf.org">hrpc@ietf.org</eref>. Information on the group and information on how to
subscribe to the list is at
<eref target="https://www.irtf.org/mailman/listinfo/hrpc">https://www.irtf.org/mailman/listinfo/hrpc</eref></t>

<t>Archives of the list can be found at:
<eref target="https://www.irtf.org/mail-archive/web/hrpc/current/index.html">https://www.irtf.org/mail-archive/web/hrpc/current/index.html</eref></t>

</section>


  </middle>

  <back>


    <references title='Informative References'>





<reference  anchor="RFC0001" target='https://www.rfc-editor.org/info/rfc1'>
<front>
<title>Host Software</title>
<author initials='S.' surname='Crocker' fullname='S. Crocker'><organization /></author>
<date year='1969' month='April' />
</front>
<seriesInfo name='RFC' value='1'/>
<seriesInfo name='DOI' value='10.17487/RFC0001'/>
</reference>



<reference  anchor="RFC0155" target='https://www.rfc-editor.org/info/rfc155'>
<front>
<title>ARPA Network mailing lists</title>
<author initials='J.B.' surname='North' fullname='J.B. North'><organization /></author>
<date year='1971' month='May' />
</front>
<seriesInfo name='RFC' value='155'/>
<seriesInfo name='DOI' value='10.17487/RFC0155'/>
</reference>



<reference  anchor="RFC0903" target='https://www.rfc-editor.org/info/rfc903'>
<front>
<title>A Reverse Address Resolution Protocol</title>
<author initials='R.' surname='Finlayson' fullname='R. Finlayson'><organization /></author>
<author initials='T.' surname='Mann' fullname='T. Mann'><organization /></author>
<author initials='J.C.' surname='Mogul' fullname='J.C. Mogul'><organization /></author>
<author initials='M.' surname='Theimer' fullname='M. Theimer'><organization /></author>
<date year='1984' month='June' />
<abstract><t>This RFC suggests a method for workstations to dynamically find their    protocol address (e.g., their Internet Address), when they know only    their hardware address (e.g., their attached physical network address).    This RFC specifies a proposed protocol for the ARPA Internet community,    and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='STD' value='38'/>
<seriesInfo name='RFC' value='903'/>
<seriesInfo name='DOI' value='10.17487/RFC0903'/>
</reference>



<reference  anchor="RFC1211" target='https://www.rfc-editor.org/info/rfc1211'>
<front>
<title>Problems with the maintenance of large mailing lists</title>
<author initials='A.' surname='Westine' fullname='A. Westine'><organization /></author>
<author initials='J.' surname='Postel' fullname='J. Postel'><organization /></author>
<date year='1991' month='March' />
<abstract><t>This RFC discusses problems with maintaining large mailing lists, especially the processing of error reports.  This memo provides information for the Internet community.  It does not specify an Internet standard.</t></abstract>
</front>
<seriesInfo name='RFC' value='1211'/>
<seriesInfo name='DOI' value='10.17487/RFC1211'/>
</reference>



<reference  anchor="RFC1771" target='https://www.rfc-editor.org/info/rfc1771'>
<front>
<title>A Border Gateway Protocol 4 (BGP-4)</title>
<author initials='Y.' surname='Rekhter' fullname='Y. Rekhter'><organization /></author>
<author initials='T.' surname='Li' fullname='T. Li'><organization /></author>
<date year='1995' month='March' />
<abstract><t>This document, together with its companion document, &quot;Application of the Border Gateway Protocol in the Internet&quot;, define an inter-autonomous system routing protocol for the Internet. [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='1771'/>
<seriesInfo name='DOI' value='10.17487/RFC1771'/>
</reference>



<reference  anchor="RFC1930" target='https://www.rfc-editor.org/info/rfc1930'>
<front>
<title>Guidelines for creation, selection, and registration of an Autonomous System (AS)</title>
<author initials='J.' surname='Hawkinson' fullname='J. Hawkinson'><organization /></author>
<author initials='T.' surname='Bates' fullname='T. Bates'><organization /></author>
<date year='1996' month='March' />
<abstract><t>This memo discusses when it is appropriate to register and utilize an Autonomous System (AS), and lists criteria for such.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='6'/>
<seriesInfo name='RFC' value='1930'/>
<seriesInfo name='DOI' value='10.17487/RFC1930'/>
</reference>



<reference  anchor="RFC2277" target='https://www.rfc-editor.org/info/rfc2277'>
<front>
<title>IETF Policy on Character Sets and Languages</title>
<author initials='H.' surname='Alvestrand' fullname='H. Alvestrand'><organization /></author>
<date year='1998' month='January' />
<abstract><t>This document is the current policies being applied by the Internet Engineering Steering Group (IESG) towards the standardization efforts in the Internet Engineering Task Force (IETF) in order to help Internet protocols fulfill these requirements.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='18'/>
<seriesInfo name='RFC' value='2277'/>
<seriesInfo name='DOI' value='10.17487/RFC2277'/>
</reference>



<reference  anchor="RFC2810" target='https://www.rfc-editor.org/info/rfc2810'>
<front>
<title>Internet Relay Chat: Architecture</title>
<author initials='C.' surname='Kalt' fullname='C. Kalt'><organization /></author>
<date year='2000' month='April' />
<abstract><t>This document is an update describing the architecture of the current IRC protocol and the role of its different components.  Other documents describe in detail the protocol used between the various components defined here.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='2810'/>
<seriesInfo name='DOI' value='10.17487/RFC2810'/>
</reference>



<reference  anchor="RFC2812" target='https://www.rfc-editor.org/info/rfc2812'>
<front>
<title>Internet Relay Chat: Client Protocol</title>
<author initials='C.' surname='Kalt' fullname='C. Kalt'><organization /></author>
<date year='2000' month='April' />
<abstract><t>This document defines the Client Protocol, and assumes that the reader is familiar with the IRC Architecture.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='2812'/>
<seriesInfo name='DOI' value='10.17487/RFC2812'/>
</reference>



<reference  anchor="RFC3233" target='https://www.rfc-editor.org/info/rfc3233'>
<front>
<title>Defining the IETF</title>
<author initials='P.' surname='Hoffman' fullname='P. Hoffman'><organization /></author>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='2002' month='February' />
<abstract><t>This document gives a more concrete definition of &quot;the IETF&quot; as it understood today.  Many RFCs refer to &quot;the IETF&quot;.  Many important IETF documents speak of the IETF as if it were an already-defined entity. However, no IETF document correctly defines what the IETF is.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='58'/>
<seriesInfo name='RFC' value='3233'/>
<seriesInfo name='DOI' value='10.17487/RFC3233'/>
</reference>



<reference  anchor="RFC1958" target='https://www.rfc-editor.org/info/rfc1958'>
<front>
<title>Architectural Principles of the Internet</title>
<author initials='B.' surname='Carpenter' fullname='B. Carpenter' role='editor'><organization /></author>
<date year='1996' month='June' />
<abstract><t>The Internet and its architecture have grown in evolutionary fashion from modest beginnings, rather than from a Grand Plan. While this process of evolution is one of the main reasons for the technology's success, it nevertheless seems useful to record a snapshot of the current principles of the Internet architecture. This is intended for general guidance and general interest, and is in no way intended to be a formal or invariant reference model.  This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind.</t></abstract>
</front>
<seriesInfo name='RFC' value='1958'/>
<seriesInfo name='DOI' value='10.17487/RFC1958'/>
</reference>



<reference  anchor="RFC4084" target='https://www.rfc-editor.org/info/rfc4084'>
<front>
<title>Terminology for Describing Internet Connectivity</title>
<author initials='J.' surname='Klensin' fullname='J. Klensin'><organization /></author>
<date year='2005' month='May' />
<abstract><t>As the Internet has evolved, many types of arrangements have been advertised and sold as &quot;Internet connectivity&quot;.  Because these may differ significantly in the capabilities they offer, the range of options, and the lack of any standard terminology, the effort to distinguish between these services has caused considerable consumer confusion.  This document provides a list of terms and definitions that may be helpful to providers, consumers, and, potentially, regulators in clarifying the type and character of services being offered.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='104'/>
<seriesInfo name='RFC' value='4084'/>
<seriesInfo name='DOI' value='10.17487/RFC4084'/>
</reference>



<reference  anchor="RFC4271" target='https://www.rfc-editor.org/info/rfc4271'>
<front>
<title>A Border Gateway Protocol 4 (BGP-4)</title>
<author initials='Y.' surname='Rekhter' fullname='Y. Rekhter' role='editor'><organization /></author>
<author initials='T.' surname='Li' fullname='T. Li' role='editor'><organization /></author>
<author initials='S.' surname='Hares' fullname='S. Hares' role='editor'><organization /></author>
<date year='2006' month='January' />
<abstract><t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t><t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems.  This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t><t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR).  These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network &quot;class&quot; within BGP.  BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t><t>This document obsoletes RFC 1771.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4271'/>
<seriesInfo name='DOI' value='10.17487/RFC4271'/>
</reference>



<reference  anchor="RFC4880" target='https://www.rfc-editor.org/info/rfc4880'>
<front>
<title>OpenPGP Message Format</title>
<author initials='J.' surname='Callas' fullname='J. Callas'><organization /></author>
<author initials='L.' surname='Donnerhacke' fullname='L. Donnerhacke'><organization /></author>
<author initials='H.' surname='Finney' fullname='H. Finney'><organization /></author>
<author initials='D.' surname='Shaw' fullname='D. Shaw'><organization /></author>
<author initials='R.' surname='Thayer' fullname='R. Thayer'><organization /></author>
<date year='2007' month='November' />
<abstract><t>This document is maintained in order to publish all necessary information needed to develop interoperable applications based on the OpenPGP format.  It is not a step-by-step cookbook for writing an application.  It describes only the format and methods needed to read, check, generate, and write conforming packets crossing any network.  It does not deal with storage and implementation questions. It does, however, discuss implementation issues necessary to avoid security flaws.</t><t>OpenPGP software uses a combination of strong public-key and symmetric cryptography to provide security services for electronic communications and data storage.  These services include confidentiality, key management, authentication, and digital signatures.  This document specifies the message formats used in OpenPGP.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4880'/>
<seriesInfo name='DOI' value='10.17487/RFC4880'/>
</reference>



<reference  anchor="RFC5694" target='https://www.rfc-editor.org/info/rfc5694'>
<front>
<title>Peer-to-Peer (P2P) Architecture: Definition, Taxonomies, Examples, and Applicability</title>
<author initials='G.' surname='Camarillo' fullname='G. Camarillo' role='editor'><organization /></author>
<author><organization>IAB</organization></author>
<date year='2009' month='November' />
<abstract><t>In this document, we provide a survey of P2P (Peer-to-Peer) systems. The survey includes a definition and several taxonomies of P2P systems.  This survey also includes a description of which types of applications can be built with P2P technologies and examples of P2P applications that are currently in use on the Internet.  Finally, we discuss architectural trade-offs and provide guidelines for deciding whether or not a P2P architecture would be suitable to meet the requirements of a given application.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='5694'/>
<seriesInfo name='DOI' value='10.17487/RFC5694'/>
</reference>



<reference  anchor="RFC5751" target='https://www.rfc-editor.org/info/rfc5751'>
<front>
<title>Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.2 Message Specification</title>
<author initials='B.' surname='Ramsdell' fullname='B. Ramsdell'><organization /></author>
<author initials='S.' surname='Turner' fullname='S. Turner'><organization /></author>
<date year='2010' month='January' />
<abstract><t>This document defines Secure/Multipurpose Internet Mail Extensions (S/MIME) version 3.2.  S/MIME provides a consistent way to send and receive secure MIME data.  Digital signatures provide authentication, message integrity, and non-repudiation with proof of origin. Encryption provides data confidentiality.  Compression can be used to reduce data size.  This document obsoletes RFC 3851.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5751'/>
<seriesInfo name='DOI' value='10.17487/RFC5751'/>
</reference>



<reference  anchor="RFC6176" target='https://www.rfc-editor.org/info/rfc6176'>
<front>
<title>Prohibiting Secure Sockets Layer (SSL) Version 2.0</title>
<author initials='S.' surname='Turner' fullname='S. Turner'><organization /></author>
<author initials='T.' surname='Polk' fullname='T. Polk'><organization /></author>
<date year='2011' month='March' />
<abstract><t>This document requires that when Transport Layer Security (TLS) clients and servers establish connections, they never negotiate the use of  Secure Sockets Layer (SSL) version 2.0.  This document updates the  backward compatibility sections found in the Transport Layer Security (TLS). [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6176'/>
<seriesInfo name='DOI' value='10.17487/RFC6176'/>
</reference>



<reference  anchor="RFC7118" target='https://www.rfc-editor.org/info/rfc7118'>
<front>
<title>The WebSocket Protocol as a Transport for the Session Initiation Protocol (SIP)</title>
<author initials='I.' surname='Baz Castillo' fullname='I. Baz Castillo'><organization /></author>
<author initials='J.' surname='Millan Villegas' fullname='J. Millan Villegas'><organization /></author>
<author initials='V.' surname='Pascual' fullname='V. Pascual'><organization /></author>
<date year='2014' month='January' />
<abstract><t>The WebSocket protocol enables two-way real-time communication between clients and servers in web-based applications.  This document specifies a WebSocket subprotocol as a reliable transport mechanism between Session Initiation Protocol (SIP) entities to enable use of SIP in web-oriented deployments.</t></abstract>
</front>
<seriesInfo name='RFC' value='7118'/>
<seriesInfo name='DOI' value='10.17487/RFC7118'/>
</reference>



<reference  anchor="RFC7194" target='https://www.rfc-editor.org/info/rfc7194'>
<front>
<title>Default Port for Internet Relay Chat (IRC) via TLS/SSL</title>
<author initials='R.' surname='Hartmann' fullname='R. Hartmann'><organization /></author>
<date year='2014' month='August' />
<abstract><t>This document describes the commonly accepted practice of listening on TCP port 6697 for incoming Internet Relay Chat (IRC) connections encrypted via TLS/SSL.</t></abstract>
</front>
<seriesInfo name='RFC' value='7194'/>
<seriesInfo name='DOI' value='10.17487/RFC7194'/>
</reference>



<reference  anchor="RFC8280" target='https://www.rfc-editor.org/info/rfc8280'>
<front>
<title>Research into Human Rights Protocol Considerations</title>
<author initials='N.' surname='ten Oever' fullname='N. ten Oever'><organization /></author>
<author initials='C.' surname='Cath' fullname='C. Cath'><organization /></author>
<date year='2017' month='October' />
<abstract><t>This document aims to propose guidelines for human rights considerations, similar to the work done on the guidelines for privacy considerations (RFC 6973).  The other parts of this document explain the background of the guidelines and how they were developed.</t><t>This document is the first milestone in a longer-term research effort.  It has been reviewed by the Human Rights Protocol Considerations (HRPC) Research Group and also by individuals from outside the research group.</t></abstract>
</front>
<seriesInfo name='RFC' value='8280'/>
<seriesInfo name='DOI' value='10.17487/RFC8280'/>
</reference>


<reference anchor="UDHR" target="http://www.un.org/en/documents/udhr/">
  <front>
    <title>The Universal Declaration of Human Rights</title>
    <author >
      <organization>United Nations General Assembly</organization>
    </author>
    <date year="1948"/>
  </front>
</reference>
<reference anchor="ICCPR" target="http://www.ohchr.org/EN/ProfessionalInterest/Pages/CCPR.aspx">
  <front>
    <title>International Covenant on Civil and Political Rights</title>
    <author >
      <organization>United Nations General Assembly</organization>
    </author>
    <date year="1966"/>
  </front>
</reference>
<reference anchor="HussainHoward" target="https://doi.org/10.1111/misr.12020">
  <front>
    <title>What Best Explains Successful Protest Cascades? ICTs and the Fuzzy Causes of the Arab Spring</title>
    <author initials="M.M." surname="Hussain">
      <organization></organization>
    </author>
    <author initials="P.N." surname="Howard">
      <organization></organization>
    </author>
    <date year="2013"/>
  </front>
  <seriesInfo name="Int Stud Rev (2013) 15 (1): 48-66." value=""/>
</reference>
<reference anchor="UNHRC" target="http://freeassembly.net/wp-content/uploads/2013/10/A-HRC-20-27_en-annual-report-May-2012.pdf">
  <front>
    <title>Report of the Special Rapporteur on the rights to freedom of peaceful assembly and of association</title>
    <author initials="." surname="Maina Kiai">
      <organization></organization>
    </author>
    <date year="2012"/>
  </front>
  <seriesInfo name="A/HRC/20/27" value=""/>
</reference>
<reference anchor="APC" target="https://www.apc.org/es/system/files/FOAA_online_IndiaMalaysiaPakistan.pdf">
  <front>
    <title>Freedom of assembly and association online in India, Malaysia and Pakistan. Trends, challenges and recommendations.</title>
    <author >
      <organization>Association for Progressive Communications</organization>
    </author>
    <author initials="." surname="Gayathry Venkiteswaran">
      <organization></organization>
    </author>
    <date year="2016"/>
  </front>
</reference>
<reference anchor="Swire" target="https://ssrn.com/abstract=1989516 or http://dx.doi.org/10.2139/ssrn.1989516">
  <front>
    <title>Social Networks, Privacy, and Freedom of Association: Data Empowerment vs. Data Protection</title>
    <author initials="." surname="Peter Swire">
      <organization></organization>
    </author>
    <date year="2012"/>
  </front>
  <seriesInfo name="North Carolina Law Review (2012) 90 (1): 104." value=""/>
</reference>
<reference anchor="UNGA" target="http://www.un.org/en/ga/search/view_doc.asp?symbol=A/59/401 para. 46">
  <front>
    <title>Human rights defenders</title>
    <author initials="." surname="Hina Jilani">
      <organization></organization>
    </author>
    <date year="2004"/>
  </front>
  <seriesInfo name="A/59/401" value=""/>
</reference>
<reference anchor="HafnerandLyon" target="https://doi.org/10.1111/misr.12020">
  <front>
    <title>Where Wizards Stay Up Late. The Origins of the Internet</title>
    <author initials="K." surname="Hafnerand">
      <organization></organization>
    </author>
    <author initials="M." surname="Lyon">
      <organization></organization>
    </author>
    <date year="1998"/>
  </front>
  <seriesInfo name="First Touchstone Edition (1998): 93." value=""/>
</reference>
<reference anchor="Pensado" target="http://revista.drclas.harvard.edu/book/student-activism">
  <front>
    <title>Student Activism. Utopian Dreams.</title>
    <author initials="." surname="Jaime Pensado">
      <organization></organization>
    </author>
    <date year="2012"/>
  </front>
  <seriesInfo name="ReVista. Harvard Review of Latin America (2012)." value=""/>
</reference>
<reference anchor="Abbate" target="https://mitpress.mit.edu/books/inventing-internet">
  <front>
    <title>Inventing the Internet</title>
    <author initials="." surname="Janet Abbate">
      <organization></organization>
    </author>
    <date year="2013"/>
  </front>
  <seriesInfo name="Cambridge: MIT Press (2013): 11." value=""/>
</reference>
<reference anchor="AckermannKargerZhang" target="https://people.csail.mit.edu/axz/papers/mailinglists.pdf">
  <front>
    <title>Mailing Lists: Why Are They Still Here, What’s Wrong With Them, and How Can We Fix Them?</title>
    <author initials="M.S." surname="Ackerman">
      <organization></organization>
    </author>
    <author initials="D.R." surname="Karger">
      <organization></organization>
    </author>
    <author initials="A.X." surname="Zhang">
      <organization></organization>
    </author>
    <date year="2017"/>
  </front>
  <seriesInfo name="Mit. edu (2017): 1." value=""/>
</reference>
<reference anchor="Benkler" target="http://www.benkler.org/Peer%20production%20and%20cooperation%2009.pdf">
  <front>
    <title>Peer Production and Cooperation</title>
    <author initials="Y." surname="Benkler">
      <organization></organization>
    </author>
    <date year="2009"/>
  </front>
</reference>
<reference anchor="AndersonGuarnieri" target="https://iranthreats.github.io/resources/webrtc-deanonymization/">
  <front>
    <title>Fictitious Profiles and WebRTC's Privacy Leaks Used to Identify Iranian Activists</title>
    <author initials="C." surname="Anderson">
      <organization></organization>
    </author>
    <author initials="C." surname="Guarnieri">
      <organization></organization>
    </author>
    <date year="2016"/>
  </front>
</reference>
<reference anchor="NelsonHedlun" target="http://library.uniteddiversity.coop/REconomy_Resource_Pack/More_Inspirational_Videos_and_Useful_Info/Peer_to_Peer-Harnessing_the_Power_of_Disruptive_Technologies.pdf">
  <front>
    <title>A Network of Peers: Models Through the History of the Internet</title>
    <author initials="N." surname="Minar">
      <organization></organization>
    </author>
    <author initials="M." surname="Hedlun">
      <organization></organization>
    </author>
    <date year="2001"/>
  </front>
  <seriesInfo name="Peer to Peer: Harnessing the Power of Disruptive Technologies, ed: Andy Oram" value=""/>
</reference>
<reference anchor="Vu" target="https://www.springer.com/cn/book/9783642035135">
  <front>
    <title>Peer-to-Peer Computing: Principles and Applications</title>
    <author initials="." surname="Vu, Quang Hieu">
      <organization></organization>
    </author>
    <author initials="." surname="Lupu, Mihai">
      <organization></organization>
    </author>
    <author initials="." surname="Ooi, Beng Chin">
      <organization></organization>
    </author>
    <date year="2010"/>
  </front>
</reference>
<reference anchor="Schleuder" target="https://schleuder.nadir.org/">
  <front>
    <title>Schleuder - A gpg-enabled mailinglist with remailing-capabilities.</title>
    <author >
      <organization>Nadir</organization>
    </author>
    <date year="2017"/>
  </front>
</reference>
<reference anchor="Crawford" target="https://www.bestvpn.com/the-webrtc-vpn-bug-and-how-to-fix-it/">
  <front>
    <title>The WebRTC VPN “Bug” and How to Fix</title>
    <author initials="D." surname="Crawford">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
</reference>
<reference anchor="Troncosoetal" target="https://www.petsymposium.org/2017/papers/issue4/paper87-2017-4-source.pdf">
  <front>
    <title>Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments</title>
    <author initials="C." surname="Troncoso">
      <organization></organization>
    </author>
    <author initials="M." surname="Isaakdis">
      <organization></organization>
    </author>
    <author initials="G." surname="Danezis">
      <organization></organization>
    </author>
    <author initials="H." surname="Halpin">
      <organization></organization>
    </author>
    <date year="2017"/>
  </front>
  <seriesInfo name="Proceedings on Privacy Enhancing Technologies ; 2017 (4):307–329" value=""/>
</reference>
<reference anchor="Mainwaringetal" target="http://www.dourish.com/classes/readings/Mainwaring-Infrastructure.pdf">
  <front>
    <title>Infrastructures and Their Discontents: Implications for Ubicomp</title>
    <author initials="S.D." surname="Mainwaring">
      <organization></organization>
    </author>
    <author initials="M.F." surname="Chang">
      <organization></organization>
    </author>
    <author initials="K." surname="Anderson">
      <organization></organization>
    </author>
    <date year="2004"/>
  </front>
  <seriesInfo name="DBLP Conference: Conference: UbiComp 2004: Ubiquitous Computing: 6th International Conference, Nottingham, UK, September 7-10, 2004. Proceedings" value=""/>
</reference>
<reference anchor="Bowker" >
  <front>
    <title>Information mythology and infrastructure</title>
    <author initials="G." surname="Bowker">
      <organization></organization>
    </author>
    <date year="1994"/>
  </front>
  <seriesInfo name="In: L. Bud (Ed.), Information Acumen: The Understanding and use of Knowledge in Modern Business,Routledge,London,1994,pp.231–247" value=""/>
</reference>
<reference anchor="Bloketal" >
  <front>
    <title>Infrastructuring Environments</title>
    <author initials="A." surname="Blok">
      <organization></organization>
    </author>
    <author initials="M." surname="Nakazora">
      <organization></organization>
    </author>
    <author initials="B.R." surname="Winthereik">
      <organization></organization>
    </author>
    <date year="2016"/>
  </front>
  <seriesInfo name="Science as Culture 25:1, 1-22." value=""/>
</reference>
<reference anchor="PipekWulf" >
  <front>
    <title>Infrastructuring: Towards an Integrated Perspective on the Design and Use of Information Technology</title>
    <author initials="V." surname="Pipek">
      <organization></organization>
    </author>
    <author initials="W." surname="Wolf">
      <organization></organization>
    </author>
    <date year="2009"/>
  </front>
  <seriesInfo name="Journal of the Association for Information Systems (10) 5, pp. 306-332" value=""/>
</reference>
<reference anchor="Australia" target="https://www.ag.gov.au/rights-and-protections/human-rights-and-anti-discrimination/human-rights-scrutiny/public-sector-guidance-sheets/right-freedom-assembly-and-association#topofpage">
  <front>
    <title>Right to freedom of assembly and association</title>
    <author >
      <organization>Australian Government, Attorney-General's Department</organization>
    </author>
    <date year="2020"/>
  </front>
</reference>
<reference anchor="CRC" target="https://www.info.dfat.gov.au/Info/Treaties/treaties.nsf/AllDocIDs/E123F4F71DCAE3E7CA256B4F007F2905">
  <front>
    <title>Lorum</title>
    <author initials="." surname="Wikipedia">
      <organization></organization>
    </author>
    <date year="2000"/>
  </front>
</reference>
<reference anchor="CERD" target="https://www.info.dfat.gov.au/Info/Treaties/treaties.nsf/AllDocIDs/2F70352A0B65EB67CA256B6E0075FE13">
  <front>
    <title>Convention on the Elimination of all forms of Racial Discrimination</title>
    <author >
      <organization>United Nations</organization>
    </author>
    <date year="1966"/>
  </front>
</reference>
<reference anchor="Sauter" >
  <front>
    <title>The Coming Swarm</title>
    <author initials="M." surname="Sauter">
      <organization></organization>
    </author>
    <date year="2014"/>
  </front>
  <seriesInfo name="Bloomsbury" value=""/>
</reference>
<reference anchor="HRPC-charter" target="https://datatracker.ietf.org/doc/charter-irtf-hrpc/">
  <front>
    <title>Charter for Research Group</title>
    <author initials="." surname="Human Rights Protocol Consideration RG">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
</reference>
<reference anchor="CRPD" target="http://www.austlii.edu.au/au/other/dfat/treaties/2008/12.html">
  <front>
    <title>Convention on the Rights of Persons with Disabilities</title>
    <author >
      <organization>United Nations</organization>
    </author>
    <date year="2007"/>
  </front>
</reference>
<reference anchor="Nyokabi" target="https://repository.gchumanrights.org/bitstream/handle/20.500.11825/1582/3.Global%20article%20HRDA_2_2019.pdf?sequence=4&amp;isAllowed=y">
  <front>
    <title>The right to development and internet shutdowns: Assessing the role of information and communications technology in democratic development in Africa</title>
    <author initials="D.M." surname="Nyokabi">
      <organization></organization>
    </author>
    <author initials="N." surname="Diallo">
      <organization></organization>
    </author>
    <author initials="N.W." surname="Ntesang">
      <organization></organization>
    </author>
    <author initials="T.K." surname="White">
      <organization></organization>
    </author>
    <author initials="T." surname="Ilori">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="Stanford" target="https://plato.stanford.edu/entries/freedom-association/">
  <front>
    <title>Freedom of Association</title>
    <author initials="K." surname="Brownlee">
      <organization></organization>
    </author>
    <author initials="D." surname="Jenkins">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="ViennaDeclaration" target="https://www.ohchr.org/en/professionalinterest/pages/vienna.aspx">
  <front>
    <title>Vienna Declaration and Programme of Action</title>
    <author >
      <organization>United Nations</organization>
    </author>
    <date year="1993"/>
  </front>
</reference>
<reference anchor="Loi" target="https://link.springer.com/article/10.1007/s13347-019-00351-0">
  <front>
    <title>Two Concepts of Group Privacy</title>
    <author initials="M." surname="Loi">
      <organization></organization>
    </author>
    <author initials="M." surname="Christen">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
</reference>
<reference anchor="Glasius" target="https://academic.oup.com/isq/article/64/2/453/5823498">
  <front>
    <title>Illiberal Norm Diffusion: How Do Governments Learn to Restrict Nongovernmental Organizations?</title>
    <author initials="M." surname="Glasius">
      <organization></organization>
    </author>
    <author initials="J." surname="Schalk">
      <organization></organization>
    </author>
    <author initials="M." surname="De Lange">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
</reference>
<reference anchor="CoE" target="https://mk0rofifiqa2w3u89nud.kinstacdn.com/wp-content/uploads/COE-report-on-FOAA-rights-on-the-internet-.pdf">
  <front>
    <title>Freedom of assembly and association on the Internet</title>
    <author >
      <organization>Council of Europe</organization>
    </author>
    <date year="2015"/>
  </front>
</reference>
<reference anchor="APCtraining" target="http://itrainonline.org/itrainonline/mmtk/APC_IRHRCurriculum_FOA_Handout.pdf">
  <front>
    <title>Multimedia training kit</title>
    <author initials="D." surname="Sauter">
      <organization></organization>
    </author>
    <author >
      <organization>Association for Progressive Communications</organization>
    </author>
    <date year="2013"/>
  </front>
</reference>
<reference anchor="UN44-24" target="https://www.ohchr.org/EN/HRBodies/HRC/RegularSessions/Session44/Documents/A_HRC_44_24_AEV.docx">
  <front>
    <title>Lorum</title>
    <author initials="." surname="Wikipedia">
      <organization></organization>
    </author>
    <date year="2000"/>
  </front>
</reference>
<reference anchor="Benkler2" target="http://is.gd/rxUpTQ">
  <front>
    <title>The wealth of Networks - How social production transforms markets and freedom</title>
    <author initials="Y." surname="Benkler">
      <organization></organization>
    </author>
    <date year="2006"/>
  </front>
  <seriesInfo name="New Haven and London - Yale University Press" value=""/>
</reference>
<reference anchor="W3C" target="https://www.w3.org/standards/webdesign/accessibility">
  <front>
    <title>Accessibility</title>
    <author >
      <organization>W3C</organization>
    </author>
    <date year="2015"/>
  </front>
</reference>
<reference anchor="Nasser" target="https://nas.sr/%D9%82%D9%84%D8%A8/">
  <front>
    <title>قلب</title>
    <author initials="R." surname="Nasser">
      <organization></organization>
    </author>
    <date year="2013"/>
  </front>
</reference>
<reference anchor="UNGP" target="https://www.ohchr.org/documents/publications/guidingprinciplesbusinesshr_en.pdf">
  <front>
    <title>Guiding Principles on Business and Human Rights</title>
    <author >
      <organization>United Nations</organization>
    </author>
    <date year="2011"/>
  </front>
</reference>
<reference anchor="Kaye" target="https://www.ohchr.org/EN/HRbodies/HRC/RegularSessions/Session29/Documents/A.HRC.29.32_AEV.doc">
  <front>
    <title>The use of encryption and anonymity in digital communications</title>
    <author initials="D." surname="Kaye">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
</reference>
<reference anchor="LEAP" target="https://leap.se/en/about-us/vision">
  <front>
    <title>The Right to Whisper</title>
    <author >
      <organization>LEAP</organization>
    </author>
    <date year="2020"/>
  </front>
</reference>
<reference anchor="Marcus" target="http://www.cardozoaelj.com/wp-content/uploads/2013/02/Marcus.pdf">
  <front>
    <title>Commercial Speech on the Internet: Spam and the first amendment</title>
    <author initials="J." surname="Marcus">
      <organization></organization>
    </author>
    <date year="1998"/>
  </front>
</reference>
<reference anchor="APC3" target="https://www.apc.org/en/node/36145/#tools">
  <front>
    <title>Closer than ever</title>
    <author >
      <organization>Association for Progressive Communications</organization>
    </author>
    <date year="2020"/>
  </front>
</reference>
<reference anchor="UNHRC2016" target="https://documents-dds-ny.un.org/doc/UNDOC/LTD/G16/131/89/PDF/G1613189.pdf?OpenElement">
  <front>
    <title>UN Human Rights Council Resolution 'The promotion, protection and enjoyment of human rights on the Internet' (A/HRC/32/L.20)</title>
    <author >
      <organization>United Nations Human Rights Council</organization>
    </author>
    <date year="2016"/>
  </front>
</reference>


    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

