<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version  -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc rfcedstyle="yes"?>
<?rfc toc="yes"?>
<?rfc tocindent="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="-o*+"?>

<rfc ipr="trust200902" docName="draft-irtf-hrpc-association-07" category="info">

  <front>
    <title abbrev="FoA">Freedom of Association on the Internet</title>

    <author initials="N." surname="ten Oever" fullname="Niels ten Oever">
      <organization>Univeristy of Amsterdam</organization>
      <address>
        <email>mail@nielstenoever.net</email>
      </address>
    </author>
    <author initials="G." surname="Perez de Acha" fullname="Gisela Perez de Acha">
      <organization>Derechos Digitales</organization>
      <address>
        <email>gisela@derechosdigitales.org</email>
      </address>
    </author>
    <author initials="S." surname="Couture" fullname="Stéphane Couture">
      <organization>University de Montreal</organization>
      <address>
        <email>stephane.couture@umontreal.ca</email>
      </address>
    </author>
    <author initials="M." surname="Knodel" fullname="Mallory Knodel">
      <organization>Center for Democracy &amp; Technology</organization>
      <address>
        <email>mknodel@cdt.org</email>
      </address>
    </author>

    <date year="2021" month="February" day="22"/>

    <area>IRTF</area>
    <workgroup>Human Rights Protocol Considerations Research Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document discusses the relationships between the Internet architecture and the ability of people to exercise their right to freedom of assembly and the right to association online. The Internet increasingly mediates our lives, our relationships, and our ability to exercise our human rights. As a global forum, the Internet provides a public space, yet it is predominantly built on private infrastructure. Since Internet protocols play a central role in the management, development, and use of the Internet, we analyze the relation between protocols and the rights to assemble and associate to mitigate infringements on those rights.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<figure><artwork><![CDATA[
We shape our tools and, thereafter, our tools shape us. 
     - John Culkin (1967)

Article 21 of the Covenant protects peaceful assemblies wherever they 
take place: outdoors, indoors and online; in public and private spaces; 
or a combination thereof.
     - General Comment 37 of the Human Rights Committee (2020)

In the digital age, the exercise of the rights of peaceful assembly and 
association has become largely dependent on business enterprises, 
whose legal obligations, policies, technical standards, financial models 
and algorithms can affect these freedoms.

     - Annual Report to the UN Human Rights Council by the Special 
     Rapporteur on the rights to freedom of peaceful assembly and 
     of association (2019).
]]></artwork></figure>

<t>The current draft continues the work started in “Research into Human Rights Protocol Considerations” <xref target="RFC8280"/> by investigating the impact of Internet protocols on a specific set of human rights, namely the right to freedom of assembly and association. Taking into consideration the international human rights framework regarding the human right to freedom of assembly and association, the present document seeks to deepen the relationship between this human right and Internet architecture, protocols, and standards. In that way, we continue the work of the Human Rights Protocol Consideration Research Group, as laid out in its charter, where one of the research aims is “to expose the relation between protocols and human rights, with a focus on the rights to freedom of expression and freedom of assembly” <xref target="HRPC-charter"/>. The conclusions may inform the development of new guidelines for protocol developers in draft-irtf-hrpc-guidelines.</t>

<t>The research question of this document is: what are the protocol development considerations for freedom of assembly and association?</t>

</section>
<section anchor="vocabulary-used" title="Vocabulary used">

<t><list style="hanging">
  <t hangText='Architecture'>
  The design of a structure</t>
  <t hangText='Autonomous System (AS)'>
  Autonomous Systems are the unit of routing policy in the modern world of exterior routing <xref target="RFC1930"/>.</t>
  <t>Within the Internet, an autonomous system (AS) is a collection of connected Internet Protocol (IP) routing prefixes under the control of one or more network operators on behalf of a single administrative entity or domain that presents a common, clearly defined routing policy to the Internet <xref target="RFC1930"/>.</t>
  <t>The classic definition of an Autonomous System is a set of routers under a single technical administration, using an interior gateway protocol and common metrics to route packets within the AS, and using an exterior gateway protocol to route packets to other ASs
<xref target="RFC1771"/>.</t>
  <t hangText='Border Gateway Protocol (BGP)'>
  An inter-Autonomous System routing protocol <xref target="RFC4271"/>.</t>
  <t hangText='Connectivity'>
  The extent to which a device or network is able to reach other devices or networks to exchange data. The Internet is the tool for providing global connectivity <xref target="RFC1958"/>. Different types of connectivity are further specified in <xref target="RFC4084"/>. The combination of the end-to-end principle, interoperability, distributed architecture, resilience, reliability and robustness are the enabling factors that result in connectivity to and on the Internet.</t>
  <t hangText='Decentralization'>
  Implementation or deployment of standards, protocols or systems without one single point of control.</t>
  <t hangText='Distributed system'>
  A system with multiple components that have their behavior co-ordinated via message passing. These components are usually
spatially separated and communicate using a network, and may be managed by a single root of trust or authority. <xref target="Troncosoetal"/></t>
  <t hangText='Infrastructure'>
  Underlying basis or structure for a functioning society, organization or community. Because infrastructure is a precondition
for other activities it has a procedural, rather than static, nature due to its social and cultural embeddedness <xref target="PipekWulf"/>
<xref target="Bloketal"/>. This means that infrastructure is always relational: infrastructure always develops in relation to something or someone <xref target="Bowker"/>.</t>
  <t hangText='Internet'>
  The Network of networks, that consists of Autonomous Systems that are connected through the Internet Protocol (IP).</t>
  <t>A persistent socio-technical system over which services are delivered <xref target="Mainwaringetal"/>,</t>
  <t>A techno-social assemblage of devices, users, sensors, networks, routers, governance, administrators, operators and protocols</t>
  <t>An emergent-process-driven thing that is born from the collections of the ASes that happen to be gathered together at any given time. The fact that they tend to interact at any given time means it is an emergent property that happens because they use the protocols defined at IETF.</t>
</list></t>

</section>
<section anchor="research-question" title="Research question">

<t>The research question of this document is: what are the protocol development considerations for freedom of assembly and association?</t>

</section>
<section anchor="methodology" title="Methodology">

<t>The point of departure of the present work <xref target="RFC8280"/> is an initial effort to expose the relationship between human rights and the Internet architecture, specifically protocols and standards. As such, <xref target="RFC8280"/> was inductive and explorative in nature. The methodology in this previous work was based on the discourse analysis of RFCs, interviews with members of the IETF community, and participant observation in IETF working groups, with the goal to identify technical concepts that relate to human rights. This work resulted in the proposal of guidelines to describe a relationship between the right to freedom of assembly and association and connectivity, security, censorship resistance, anonymity, pseudonymity, accessibility, decentralization, adaptability, and outcome transparency.</t>

<t>In this document, we deepen our exploration of human rights and protocols by assessing one specific set of human rights: freedom of association and assembly, abbreviated here as FAA. Our methodology for doing so is the following: first, we provide a brief twofold literature review addressing the philosophical and legal definitions of FAA and how this right has already been interpreted or analyzed concerning the digital. This literature review is not exhaustive nor systematic but aims at providing some lines of questioning that could later be used for protocol development. The second part of our methodology looks at some cases of Internet protocols that are relevant to the sub-questions highlighted in the literature review, and analyze how these protocols facilitate and inhibit the right to assembly and association.</t>

</section>
<section anchor="literature-review" title="Literature Review">

<section anchor="faa-definition-and-core-treaties" title="FAA definition and core treaties">

<t>The rights to freedom of association and assembly are defined and guaranteed in national law and international treaties. Article 20 of the Universal Declaration of Human Rights <xref target="UDHR"/> states for instance that “Everyone has the right to freedom of peaceful assembly and association” and that “No one may be compelled to belong to an association”. Article 23 further guarantees that “Everyone has the right to form and to join trade unions for the protection of his interests”. In the International Covenant on Civil and Political Rights <xref target="ICCPR"/>, article 21 stipulates that “The right of peaceful assembly shall be recognized” and that “No restrictions may be placed on the exercise of this right other than those imposed in conformity with the law and which are necessary in a democratic society in the interests of national security or public safety, public order (ordre public), the protection of public health or morals or the protection of the rights and freedoms of others” while article 22 states that “Everyone shall have the right to freedom of association with others, including the right to form and join trade unions”.</t>

<t>General Comment No. 37 on the right of peaceful assembly by the United Nations Human Rights Committee affirms that the right of  peaceful assembly protects non-violent online gatherings: “associated activities that happen online or otherwise rely upon digital services […] are also protected” <xref target="UNGC37"/>. Interference with emerging communications technologies that offer the opportunity to assemble either wholly or partly online or play an integral role in organizing, participating in and monitoring physical gatherings are assumed to impede assemblies which are protected by this right. Moreover, any restriction on the ‘operation of information dissemination systems’ must conform with the tests for restrictions on freedom of expression (see below).</t>

<t>Other treaties are sometimes cited as the source and framework to the right to freedom of association and assembly. Such as Article 5 of the International Convention on the Elimination of All Forms of Racial Discrimination <xref target="CERD"/> which stipulates freedom of peaceful assembly and association should be guaranteed “without discrimination as to race, colour, national or ethnic origin”; Article 15 of the Convention on the Rights of the Child <xref target="CRC"/> which recognises to child pending the restrictions cited above; and Article 21 of the Convention on the Rights of Persons with Disabilities <xref target="CRPD"/> which insist on usable and accessible formats and technologies appropriate for persons with different kinds of disabilities. The freedoms of peaceful assembly and association are also protected under regional human rights treaties: article 11 of the European Convention on Human Rights, articles 15 and 16 of the American Convention on Human Rights, article 10 and 11 of the African Charter on Human and Peoples’ Rights.</t>

<t>From a more philosophical perspective, Brownlee and Jenkins <xref target="Stanford"/> make some interesting distinctions in particular regarding the concepts of association, assembly and interaction, deviating somewhat from what is established in interpretations of international human rights law. “Interaction” refers to any kind of interpersonal and often incidental engagements in daily life, like encountering strangers on a bus.  Interaction is seen as a “prerequisite” for association. Assembly, according to Brownlee and Jenkins has a more political connotation and is
often used to refer to activists, protesters, or members of a group in a deliberating event. The authors refer to association as more “persistent connections” and distinguish between intimate associations, like friendship, love, or family, and collective association like trade unions, commercial business, or “expressive associations” like civil rights organizations or LGBTQIA associations. For Brownlee and Jenkins <xref target="Stanford"/>, the right to association is linked to different relative freedoms: permission (to associate or dissociate), claim-right (to oppose others interfering with our conduct), power (to alter the status of our association), immunity (from other people interfering in our right). Freedom of association thus refers both to the individual right to join or leave a group and to the collective right to form or dissolve a group.</t>

<t>Freedoms of association and peaceful assembly, however, are relative and not absolute. Excluding someone from an association based on its sex, race or other individual characteristic is also often contentious if not illegal. As mentioned above, international human rights law provides the framework for legitimate restrictions on these rights, as well as the right to privacy and the right to freedom of expression and opinion. Restrictions can be imposed by states, but only if this is lawful and proportionate. States must document how these limitations are necessary in the interests of national security or public safety, public order, the protection of public health or morals, or the protection of the rights and freedoms of others. Finally, states must also protect participants against possible abuses by non-state actors.</t>

<t>The Human Rights Committee explores a few restrictions related to associated activities online or reliant upon digital services, that are also protected under article 21, and stipulates that “States parties must not, for example, block or hinder Internet connectivity in relation to peaceful assemblies.  The same applies to geotargeted or technology-specific interference with connectivity or access to content.”. Additionally, “States should ensure that the activities of Internet service providers and intermediaries do not unduly restrict assemblies or the privacy of assembly participants.” <xref target="UNGC37"/>.</t>

<t>Interpreting international law, the right to freedom of peaceful assembly and the right to freedom of association protects any collective, gathered either permanently or temporarily for “peaceful” purposes, online and offline. It is important to underline the property of “freedom” because the right to freedom of association and assembly is voluntary and uncoerced: anyone can join or leave a group of choice, which in turn means one should not be forced to either join, stay or leave. An assembly is an “intentional and temporary gathering of a collective in a private or public space for a specific purpose: demonstrations, indoor meetings, strikes, processions, rallies, or even sits-in” <xref target="UNGA"/>. Association has a more formal and established nature and refer to a group of individuals or legal entities brought together in order to collectively act, express, promote, pursue, or defend a field of common interests <xref target="UNSRFOAA2012"/>. Think about civil society organizations, clubs, cooperatives, NGOs, religious associations, political parties, trade unions, or foundations.</t>

<t>When talking about the human right of freedom of association and assembly, one should always take into account that ‘all human rights are indivisible, interrelated, unalienable, universal, and mutually reinforcing’ <xref target="ViennaDeclaration"/>. This means that in the analysis of the impact of a certain variable on freedom of association and assembly one should take other human rights into account too. When devising an approach to mitigate a possible negative influence on this right, one should also always take into account the possible impact this might have on other rights. For example, the following rights are often impacted in conjunction with freedom of association and assembly: the right to political participation, the right to (group) privacy, the right to freedom of expression, and access to information. For instance, when the right to political participation is hampered, this often happens in conjunction with a limitation of the freedom of association and assembly because political participation is often done collectively. When the right to privacy is hampered, this privacy of particular groups is also impacted (so-called ‘group privacy’ <xref target="Loi"/>, which potentially has consequences for the right to association and assembly. Where the freedom of expression of a group is hampered, such as in protests or through Internet shutdowns, this both hampers other people’s ability to receive the information of the group, and impact the right to assembly of the people who seek to express themselves as a group <xref target="Nyokabi"/>.</t>

<t>Finally, if the right to association and assembly is limited by national law, this does not mean it is consistent with international human rights law. In such a case, the national law would therefore not be legitimate <xref target="Glasius"/>.</t>

</section>
<section anchor="faa-in-the-digital-era" title="FAA in the digital era">

<t>Before discussing freedom of association and assembly as it pertains to digital environments, we must first recognize that the United Nations Human Rights Council adopted resolutions on the promotion, protection and enjoyment of human rights on the Internet in 2012, 2014, 2016 and 2018, affirming and reaffirming  “… that the same rights that people have offline must also be protected online …” <xref target="UNHRC2018"/>. Therefore the digital environment is no exception to application of this right by any means. Various other resolutions and report have established the online applicability of the freedoms of association and assembly, most recently and authoritatively by the Human Rights Committee in General Comment 37 (2020)<xref target="UNGC37"/>. The questions that remain, however, are how these rights should be conceptualized and implemented in different parts and levels of digital environments.</t>

<t>The right to freedom of assembly and association online is the subject of increasing discussions and analysis. Especially since social media played an important role in several revolutions in 2011, which has led to increasing and ever more sophisticated attacks by autocratic governments on online communities and other associational activities occurring on the Internet <xref target="RutzenZenn"/>. In 2016, the Council of Europe published a report, “Report by the Committee of experts on cross-border flow of Internet traffic and Internet freedom on Freedom of assembly and association on the Internet” <xref target="CoE"/> which noted that while the Internet and technologies are not explicitly mentioned in international treaties, these treaties nevertheless apply to “the online environment”. The report argue the “Internet is the public sphere of the 21st century”, something demonstrated by the fact that informal associations can be gathered at scale in a matter of hours on the Internet, and that digital communication tools often serve to facilitate, publicize or otherwise enable presential associations or assemblies, like a protest or demonstration. They note, on the other hand, the negative ways in which the Internet can also be used to promote or facilitate terrorism, urban violence and hate speech, thus insisting on the “extremely important and urgent” need to fight online terrorist activities such as recruitment or mobilization, while at the same time respecting the right to peaceful assembly and association of other users. The report mentions the following use cases that could be help further our reflection:</t>

<t><list style="symbols">
  <t>Instances of network shutdowns in the Arab Spring, to prevent people from organising themselves or assembling</t>
  <t>California’s Bay Area Rapid Transit (BART) shutdown of mobile phone service, to avoid protester violence and disruption of service</t>
  <t>The wholesale blocking of Google as a violation of freedom of expression</t>
  <t>Telus, a telecom company which blocked customers’ access to websites critical of Telus during a Telecommunications Workers Union strike against it</t>
  <t>The targeting of social media users who call for or organise protests though the Internet in Turkey’s Gezi Park protests</t>
  <t>Mass surveillance or other interferences with privacy in the context of law enforcement and national security</t>
  <t>Use of VPNs (Virtual Private Networks) to the TOR network to ensure anonymity</t>
  <t>Distributed Denial of Service attacks (DDoS) as civil disobedience.</t>
</list></t>

<t>In 2019 the UN Special Rapporteur on the rights to freedom of peaceful assembly and of association, notes the opportunities and challenges posed by digital networks to the rights to freedom of peaceful assembly and of association <xref target="UNSRFAA2019"/>.  The report recommends that international human rights norms and principles should also be used as a framework “that guides digital technology companies’ design, control and governance of digital technologies”. The report states that “technical standards” in particular can affect the freedom of association and assembly, and makes some recommendations on which the following could be relevant to our discussion here:</t>

<t><list style="symbols">
  <t>“[Undertake] human rights impact assessments which incorporate the rights to freedom of peaceful assembly and of association when developing or modifying their products and services,”</t>
  <t>“increase the quality of participation in and implementation of existing multi-stakeholder initiatives,”</t>
  <t>“collaborate with governments and civil society to develop technology that promotes and strengthens human rights,”</t>
  <t>“support the research and development of appropriate technological solutions to online harassment, disinformation and propaganda, including tools to detect and identify State-linked accounts and bots,” and</t>
  <t>“adopt monitoring indicators that include specific concerns related to freedom of peaceful assembly and association.”</t>
</list></t>

<t>In one of their “training kits” <xref target="APCtraining"/>, the Association of Progressive Communications addressed different impacts of the internet on association and assembly and raised three particular issues worthy to note here:</t>

<t><list style="numbers">
  <t>Organization of protests. Internet and social media are enablers of protests, such as it was seen in the “Arab Spring”. Some of these protests - like online petitions or campaigns - are similar to offline association and assembly, but other protest forms are inherent to the Internet capacity like hacking, DDOS and are subject to controversy within the Internet community, some people finding it legitimate, and others not.</t>
  <t>Surveillance. While the Internet facilitates association, the association in turn leaves a lot of traces that can be used in turn for law enforcement but also for repressing political dissents. As they note, even the threat of surveillance can have deter facilitation.</t>
  <t>Anonymity and pseudonymity can be useful protection mechanism for those who’d like to attend legitimate association without facing retribution. On the other hand, anonymity can be used to harm society, such as in online fraud or sexual predation.</t>
</list></t>

<t>Online association and assembly are the starting point of group to mobilization in modern democracies, and even more so where physical gatherings have been impossible or dangerous <xref target="APC"/>. Throughout the world -from the Arab Spring to Latin American student movements and the #WomensMarch- the Internet has played a crucial role by providing means for the fast dissemination of information otherwise mediated by the press, or even forbidden by the government <xref target="Pensado"/>. According to Hussain and Howard the Internet helped to “build solidarity networks and identification of collective identities and goals, extend the range of local coverage to international broadcast networks” and as platform for contestation for “the future of civil society and information infrastructure” <xref target="HussainHoward"/>. The IETF itself, defined as an ‘open global community’ of network designers, operators, vendors, and researchers <xref target="RFC3233"/> is also protected by freedom of assembly and association . Discussions, comments and consensus around RFCs are possible because of the collective expression that freedom of association and assembly allow. The very word “protocol” found its way into the language of computer networking based on the need for collective agreement among a group of assembled network users <xref target="HafnerandLyon"/>.</t>

<t><xref target="RFC8280"/> is a paper by the Human Rights Protocol Consideration Resarch Group in the Internet Research Taskforce on internet protocols and human rights that discusses issues of FAA, specifically:</t>

<t><list style="symbols">
  <t>The expansion of DNS for generic namespace as an enabler of association for minorities. The paper argues that specifically the expansion of the DNS to allow for new generic Top Level Domains (gTLDs) can have negative impacts on freedom of association because of restrictive policies by some registries and registrars, on the other hand could gTLDs also enable communities to build clearly identifiable spaces for association (such as .gay).</t>
  <t>The impact of Distributed Denial of Service attacks on freedom of association. Whereas DDoS has been used as a tool for protest, in many cases this is infringing on other parties freedom of expression. Furthermore,  often devices (such as IoT devices and routers) are inscribed in such DDoS attacks whereas the owner or user did not consent to this. Thus they do not have the possibility to exit this assembly. Therefore the draft concluded that that IETF ”should try to ensure that their protocols cannot be used for DDoS attacks”</t>
  <t>The impact of middleboxes on the ability of users to connect to the Internet and therefore their ability to exercise their right to freedom of association and assembly. The lack of connectivity can significantly impact freedom of assembly and association of a user. Especially if this is done in a way that is not knowable for the user and if there is no possibility to for the user to have access to due process to dispute the lack of (secure or private) connectivity in general or to a specific service.</t>
</list></t>

<t>In June 2020, the United Nations High Commissioner for Human Rights concluded that technologies can be enablers of the excercise of FAA, but technology is also significantly used to interfere with the ability of people to exercise their right to freedom of association and assembly. Specifically, the report mentions network shutdowns, the usage of technology to surveil or crack down on protesters, leading to human rights violations. This includes facial recognition technology, and the uses of other ways to violate the (group) privacy of people engaged in an assembly or association. The report makes it explicit that companies play a significant role enabling, for instance by developing, providing or selling the technology, but also by directly exercising these violations <xref target="UNHRC2020"/>.</t>

</section>
<section anchor="specific-questions-raised-from-the-literature-review" title="Specific questions raised from the literature review">

<t>Here are some questions raised from the literature review that can have implications for protocol design:</t>

<t><list style="numbers">
  <t>Should protocols be designed to enable legitimate limitations on association in the interests of “national security or public safety, public order (ordre public), the protection of public health or morals or the protection of the rights and freedoms of others”, as stated in the ICCPR article 21 <xref target="ICCPR"/>? Where in the stack do we care for FAA?</t>
  <t>Can protocols facilitate agency of membership in associations, assemblies and interactions?</t>
  <t>What are the features of protocols that enable freedom of association and assembly?</t>
  <t>Does protocol development sufficiently consider usable and accessible formats and technologies appropriate for all persons, including those with different kinds of disabilities?</t>
  <t>Can a protocol be designed to legitimately exclude someone from an association?</t>
</list></t>

<t>In the following sections we attempt to answer these questions with specific examples of standardized protocols in the IETF.</t>

</section>
</section>
<section anchor="cases-and-examples" title="Cases and examples">

<t>As the Internet mediates collective action and collaboration, it impacts on freedom of association and assembly. To answer our research question regarding how internet architecture enable and/or inhibits such human right, we researched several independent and typical cases related to protocols that have been either adopted by the IETF, or are widely used on the Internet.  Our goal is to figure out whether they facilitate freedom of assembly and association, or whether they inhibit it through their design or implementation.</t>

<t>We are aware that some of the following examples go beyond the use of Internet protocols and flow over into the application layer or examples in the offline world whereas the purpose of the current document is to break down the relationship between Internet protocols and the right to freedom of assembly and association. Nonetheless, we do recognize that in some cases the line between them and applications, implementations, policies and offline realities are often blurred and hard -if not impossible- to differentiate.</t>

<t>We use the literature review to guide our process of inquiry for each case, and to dive deeper in what can be found interesting about each case as it relates to freedom of association.</t>

<section anchor="got-no-peace-spam-and-ddos" title="Got No Peace: Spam and DDoS">
<figure><artwork><![CDATA[
Should protocols be designed to enable legitimate limitations on 
association in the interests of “national security or public safety, 
public order (ordre public), the protection of public health or morals 
or the protection of the rights and freedoms of others”, as stated in 
the ICCPR article 21 {{ICCPR}}? Where in the stack do we care for FAA?
]]></artwork></figure>

<t>The 2020 report by the United Nations Special Rapporteur on Human Rights <xref target="UNHRC2020"/> described how technology is often used to limit freedom of assembly and association, such as for instance through network shutdowns and the surveillance of groups. Because access to the Internet is crucial not only for freedom of association and assembly, but also for the right to development, and the right to freedom of expression and information <xref target="Nyokabi"/>, the United Nation Special Rapporteur argues that:</t>

<figure><artwork><![CDATA[
(b) Avoid resorting to disruptions and shutdowns of Internet or 
telecommunications networks at all times and particularly during 
assemblies, including those taking place in electoral contexts 
and during times of unrest;
]]></artwork></figure>

<t>Whereas the states have the obligation to protect human rights, there has been an increasing call for non-state actors, such as companies, to respect human rights <xref target="UNGPBHR"/>. The UN adopted guiding principles on business and human rights <xref target="UNGPBHR"/> and talks within the HRC are ongoing about an international legally binding instrument to regulate the activities of transnational corporations and other business enterprises. This includes a chain-responsibility of actors, which means that not just the company’s own processes should not negatively impact human rights, but they should also engage in due diligence processes, such as human rights impact assessments. This includes an assessment of whether the products that are sold, or the services that are provided, can be used to engage in human rights violations, or whether human rights violations occur in any stage of the supply chain  of the company. If this is the case, measures should be taken to mitigate this.</t>

<t>In the case of dual-use technologies, this means that technology could be used for legitimate purposes, but could also be used to limit freedom of association or assembly,  it might mean that producers or sellers should limit the parties they sell to, or even better, ensure that the illegitimate use of the technology is not technically possible anymore, or made more difficult.</t>

<section anchor="spam" title="Spam">

<t>In the 1990s as the internet became more and more commercial, spam came to be defined as irrelevant or unsolicited messages that were posted many times to multiple news groups or mailing lists <xref target="Marcus"/>. Here the question of consent, but also harm, are crucial. In the 2000s a large part of the discussion revolved around the fact that certain corporations. protected by the right to freedom of association, considered spam to be a form of “commercial speech”, thus encompassed by free expression rights <xref target="Marcus"/>. Yet spam can be not only a nuisance, but a threat to systems and users.</t>

<t>This leaves us with an interesting case around spam mitigation: spam is currently handled mostly by mail providers on behalf of the user, next to that countries are increasingly adopting opt-in regimes for mailing lists and commercial e-mail, with a possibility of serious fines in case of violation. Yet many ask is spam not the equivalent of the fliers and handbills ever present in our offline world? The big difference between the proliferation of such messages offline and online is the scale.  It is not hard for a single person to message a lot of people online, whereas if that person needed to go house by house the scale and impact of their actions would be much smaller.  Inversely if it were a common practice to expose people to unlimited unwanted messages online, users would be drowned in such messages. This puts a large burden on filtering, and in both filtering and sifting through many message, other expressions would be drowned out and would be severely hampered.  Allowing illimited sending of unsolicited messages would be a blow against freedom of speech: when everyone talks, nobody listens.</t>

<t>Here the argument is very similar to DDoS attacks, considered next: Legitimate uses of online campaigning, or online protesting, are drowned out by a malicious use which constitutes an attack on the internet infrastructure and thus the assembly or association itself.</t>

</section>
<section anchor="ddos" title="DDoS">

<t>Distributed Denial of Service attacks are leveled against a server or service by a controller of a host or multiple hosts by overloading the server or service’s bandwidth or resources (volume-based floods) or exploit protocol behaviours (protocol attacks). DDoS attacks can thus stifle and complicate the rights to assemble online for media and human rights organisations whose websites are the target of DDoS. At the same time there are comparisons made between DDoS attacks and sit-in protests <xref target="Sauter"/>. However the main distinction is significant: only a small fragment of “participants” (from controllers to compromised device owners) in DDoS attacks are aware or willing <xref target="RFC8280"/>. Notably DDoS attacks are increasingly used to commit crimes such as extortion, which infringe on others’ human rights.</t>

<t>Because of the interrelation of technologies, it cannot be said that there is one point in the technical stack that there are characteristics of “peaceful” or “non-peaceful” association visible to protocol developers. As we can see from the cases of spam blocking and DDoS mitigation that “peaceful or non-peaceful” is not a meaningful heuristic, or even characteristic, of problematic content. If anything, their commonality is scale and volume.</t>

</section>
</section>
<section anchor="holistic-agency-mailing-lists-and-spam" title="Holistic Agency: Mailing Lists and Spam">

<figure><artwork><![CDATA[
Can protocols facilitate agency of membership in associations, 
assemblies and interactions?
]]></artwork></figure>

<section anchor="mailing-lists" title="Mailing lists">

<t>Since the beginning of the Internet mailing lists have been a key site of assembly and association <xref target="RFC0155"/> <xref target="RFC1211"/>. In fact, mailing lists were one of the Internet’s first functionalities <xref target="HafnerandLyon"/>.</t>

<t>In 1971 four years after the invention of email, the first mailing list was created to talk about the idea of using Arpanet for discussion. What had initially propelled the Arpanet project forward as a resource sharing platform was gradually replaced by the idea of a network as a means of bringing people together <xref target="Abbate"/>. More than 45 years after, mailing lists are pervasive and help communities to engage, have discussions, share information, ask questions, and build ties. Even as social media and discussion forums grow, mailing lists continue to be widely used <xref target="AckermannKargerZhang"/> and are still a crucial tool to organise groups and individuals around themes and causes <xref target="APC3"/>.</t>

<t>Mailing lists’ pervasive use are partly explained because they allow for “free” association: people subscribe (join) and unsubscribe (leave) as they please. Mailing lists also allow for association of specific groups on closed lists. This free association online enables agency of membership, a key component of freedom of association and assembly.</t>

</section>
<section anchor="spam-1" title="Spam">

<t>As we mentioned before, there are interesting implications for freedom of association and assembly when looking at spam mitigation. Here we want to specifically note that if we consider that the rights to assembly and association also mean that “no one may be compelled to belong to an association” <xref target="UDHR"/>, spam infringes both rights if an op-out mechanism is not provided and people are obliged to receive unwanted information, or be reached by people they do not know.</t>

</section>
</section>
<section anchor="civics-in-cyberspace-messaging-conferencing-and-networking" title="Civics in Cyberspace: Messaging, Conferencing, and Networking">

<figure><artwork><![CDATA[
What are the features of protocols that enable freedom of 
association and assembly?
]]></artwork></figure>

<t>Civic participation is often expressed as the freedom to associate and assemble, along with a whole other set of enabling rights such as freedom of expression and the right to privacy. Former UN Special Rapporteur David Kaye established a strong relationship between technology that allows anonymity and uses encryption have positive effects on freedom of expression <xref target="Kaye"/>. Here we look at messaging, such as email, mailing lists and internet relay chat; video conferencing and peer-to-peer networking protocols to investigate the common features that enable freedom of association and assembly online.</t>

<section anchor="email" title="Email">

<t>Similarly to freedom of expression’s enabling and universal right to impart one’s ideas openly, “the right to whisper”, or confidentiality, is the ability to limit to whom one imparts one’s ideas. An encrypted email project, the LEAP Encryption Access Project, says, “like free speech, the right to whisper is a necessary precondition for a free society. Without it, civil society languishes and political freedoms are curtailed. As the importance of digital communication for civic participation increases, so too does the importance of the ability to digitally whisper.” <xref target="LEAP"/></t>

</section>
<section anchor="mailing-lists-1" title="Mailing lists">

<t>Not only are mailing lists a good example of how protocols can facilitate the necessary ingredient of agency in freedom of association, mailing lists are an example of messaging technology that has other features that enable freedom of association and assembly.</t>

<t>The archival function of mailing lists allows for posterior accountability and analysis. The ubiquity and interoperability of email, and by extension email lists, provides a low barrier to entry to an inclusive medium.</t>

<t>Association and assembly online can be undermined when right to privacy is at risk. And one of the downsides of mailing lists are similar to the privacy and security concerns generally associated with email. At least with email, end-to-end encryption such as OpenPGP <xref target="RFC4880"/> and S​/​MIME <xref target="RFC5751"/> can keep user communications authenticated and confidential. With mailing lists, this protection is not as possible because with many lists the final recipients are typically too many for . There have been experimental solutions to address this issue such as Schleuder <xref target="Schleuder"/>, but this has not been standardized or widely deployed.</t>

</section>
<section anchor="irc" title="IRC">

<t>Internet Relay Chat (IRC) is an application layer protocol that enables communication in the form of text through a client/server networking model <xref target="RFC2810"/>. In other words, a chat service. IRC clients are computer programs that a user can install on their system. These clients communicate with chat servers to transfer messages to other clients. Features of IRC include: federated design, transport encryption, one-to-many routing, creation of topic-based “channels”, and spam or abuse moderation.</t>

<t>For the purposes of civic participation and freedom of association and assembly in particular it is critical that IRC’s federated design allows many interoperable, yet customisable, instances and basic assurance of confidentiality through transport encryption. We investigate the particular aspect of agency in membership through moderation in the section ‘Block Together Now: IRC and Refusals’ below.</t>

</section>
<section anchor="webrtc" title="WebRTC">
<t>Multi-party video conferencing protocols like WebRTC <xref target="RFC6176"/> <xref target="RFC7118"/> allow for robust, bandwidth-adaptive, wideband and super-wideband video and audio discussions in groups. ‘The WebRTC protocol was designed to enable responsive real-time communications over the Internet, and is instrumental in allowing streaming video and conferencing applications to run in the browser. In order to easily facilitate direct connections between computers (bypassing the need for a central server to act as a gatekeeper), WebRTC provides functionality to automatically collect the local and public IP addresses of Internet users (ICE or STUN). These functions do not require consent from the user, and can be instantiated by sites that a user visits without their awareness. The potential privacy implications of this aspect of WebRTC are well documented, and certain browsers have provided options to limit its behavior.’ <xref target="AndersonGuarnieri"/>.</t>

<t>Even though some multi-party video conferencing tools facilitate freedom of assembly and association, their own configuration might might pose concrete risks for those who use them. One the one hand WebRTC is providing resilient channels of communications, but on the other hand it also exposes information about those who are using the tool which might lead to increased surveillance, identification and the consequences that might be derived from that. This is especially concerning because the usage of a VPN does not protect against the exposure of IP addresses <xref target="Crawford"/>.</t>

<t>The risk of surveillance is also true in an offline space, but this is generally easy to analyze for the end-user. Security and privacy expectations of the end-user could be either improved or made explicit. This in turn would result in a more secure and/or private exercise of the right to freedom of assembly or association.</t>

</section>
<section anchor="peer-to-peer-networking" title="Peer-to-peer networking">
<t>At the organizational level, peer production is one of the most relevant innovations from Internet mediated social practices. According to <xref target="Benkler"/> these networks imply ‘open collaborative innovation and creation, performed by diverse, decentralized groups organized principally by neither price signals nor organizational hierarchy, harnessing heterogeneous motivations, and governed and managed based on principles other than the residual authority of ownership implemented through contract.’ <xref target="Benkler"/>.</t>

<t>In his book The Wealth of Networks, <xref target="Benkler2"/> significantly expands on his definition of commons-based peer production. In his view, what distinguishes commons-based production is that it doesn’t rely upon or propagate proprietary knowledge: “The inputs and outputs of the process are shared, freely or conditionally, in an institutional form that leaves them equally available for all to use as they choose at their individual discretion.” <xref target="Benkler2"/>. To ensure that the knowledge generated is available for free use, commons-based projects are often shared under an open license</t>

<t>Peer-to-peer (P2P) is essentially a model of how people interact in real life because “we deal directly with one another whenever we wish to” <xref target="Vu"/>. Usually if we need something we ask our peers, who in turn refer us to other peers. In this sense, the ideal definition of P2P is that “nodes are able to directly exchange resources and services between themselves without the need for centralized servers” where each participating node typically acts both as a server and as a client <xref target="Vu"/>. <xref target="RFC5694"/> has defined it as peers or nodes that should be able to communicate directly between themselves without passing intermediaries, and that the system should be self-organizing and have decentralized control <xref target="RFC5694"/>. With this in mind, the ultimate model of P2P is a completely decentralized system, which is more resistant to speech regulation, immune to single points of failure and has a higher performance and scalability. Nonetheless, in practice some P2P systems are supported by centralized servers and some others have hybrid models where nodes are organized into two layers: the upper tier servers and the lower tier common nodes <xref target="Vu"/>.</t>

<t>Since the ARPANET project, the original idea behind the Internet was conceived as what we would now call a peer-to-peer system <xref target="RFC0001"/>. Over time it has increasingly shifted towards a client/server model with “millions of consumer clients communicating with a relatively privileged set of servers” <xref target="NelsonHedlun"/>.</t>

<t>Whether for resource sharing or data sharing, P2P systems are enabling freedom of assembly and association. Not only do they allow for effective dissemination of information, but they leverage computing resources by diminishing costs allowing for the formation of open collectives at the network level. At the same time, in completely decentralized systems the nodes are autonomous and can join or leave the network as they want -a characteristic that makes the system unpredictable: a resource might be only sometimes available, and some other resources might be missing or incomplete <xref target="Vu"/>. Lack of information might in turn makes association or assembly more difficult.</t>

<t>Additionally, when architecturally assessing the role of P2P systems we could say that: “the main advantage of centralized P2P systems is that they are able to provide a quick and reliable resource locating. Their limitation, however, is that the scalability of the systems is affected by the use of servers. While decentralized P2P systems are better than centralized P2P systems in this aspect, they require a longer time in resource locating. As a result, hybrid P2P systems have been introduced to take advantage of both centralized and decentralized architectures. Basically, to maintain the scalability, similar to decentralized P2P systems, there are no servers in hybrid P2P systems. However, peer nodes that are more powerful than others can be selected to act as servers to serve others. These nodes are often called super peers. In this way, resource locating can be done by both decentralized search techniques and centralized search techniques (asking super peers), and hence the systems benefit from the search techniques of centralized P2P systems.” <xref target="Vu"/>.</t>

</section>
</section>
<section anchor="universal-access-the-web" title="Universal Access: The Web">

<figure><artwork><![CDATA[
Does protocol development sufficiently consider usable and accessible 
formats and technologies appropriate for persons with different kinds 
of disabilities?
]]></artwork></figure>

<t>The W3C has done significant work to ensure that the Web is accessible to people with diverse physical abilities <xref target="W3C"/>. The implementation of these accessibility standards for instance help
people who have issues with seeing or rendering images to understand what the image actually contains. Making the web more accessible for people with diverse physical abilities enables them to excercise their right to online assembly and association.</t>

<t>The IETF uses English as its primary working language, both in its documentation and in its communication. This is also the case for reference implementations. Whereas it is estimated that roughly 20% of the Earth’s population speaks English, whereas only 360 million speak English as their first language. <xref target="RFC2277"/> describes that ‘”Internationalization is for humans. This means that protocols are not subject to internationalization; text strings are.”, this implies that protocol developers, as well as people that work with protocols, are not people, or that protocol developers are all in command of the English language. This means that it is significantly easier for people who have a command of the English language to become a protocol developer - and it might lead to the development of separate protocols that are developed within large language communities that are not using the English language or the Latin script. This makes it harder for people who seek to shape their own space of association and assembly on the Internet to do so. And is thus driving these communities into, often proprietary and non-interoperable services such as Facebook.</t>

<t>When Ramsey Nasser developed the Arabic programming language قلب (transliterated Qalb, Qlb and Alb) <xref target="Nasser"/> he called it ‘engineering performance art’ instead of engineering, because he knew that his language would not work. In part this is because all modern programming tools are based on the ASCII character set, which encodes Latin Characters and was originally based on the English Language. This highlights cultural biases of computer science and engineering. Despite long significant efforts, it is still largely impossible to register an email address in a language such as Devanagari, Arabic, or Chinese. Even if it is possible - it is to be expected that there will be a significant failure rate in sending and receiving emails with other services. This makes it harder for people who do not speak English and/or don’t use the written Latin script to exercise their freedom of association and assembly.</t>

</section>
<section anchor="block-together-now-irc-and-refusals" title="Block Together Now: IRC and Refusals">

<figure><artwork><![CDATA[
Can a protocol be designed to legitimately exclude someone 
from an association?
]]></artwork></figure>

<t>Previously we spoke about the privacy protecting features of IRC that enable freedom of association and assembly, including transport security. But now we turn to the ability to block users and effectively moderate discussions on IRC as a key feature of the technology that enables agency in membership, a key aspect of freedom of association and assembly.</t>

<t>For order to be kept within the IRC network, special classes of users become “operators” and are allowed to perform general maintenance functions on the network: basic network tasks such as disconnecting (temporary or permanently) and reconnecting servers as needed <xref target="RFC2812"/>. One of the most controversial power of operators is the ability to remove a user from the connected network by ‘force’, i.e., operators are able to close the connection between any client and server <xref target="RFC2812"/>.</t>

<t>IRC servers may deploy different policies for the ability of users to create their own channels or ‘rooms’, and for the delegation of ‘operator’-rights in such spaces. Some IRC servers support SSL/TLS connections for security purposes <xref target="RFC7194"/> which helps stop the use of packet sniffer programs to obtain the passwords of IRC users, but has little use beyond this scope due to the public nature of IRC channels. TLS connections require both client and server support (that may require the user to install TLS binaries and IRC client specific patches or modules on their computers). Some networks also use TLS for server to server connections, and provide a special channel flag (such as +S) to only allow TLS-connected users on the channel, while disallowing operator identification in clear text, to better utilize the advantages that TLS provides.</t>

</section>
</section>
<section anchor="conclusions-can-we-learn-anything-from-the-previous-case-studies" title="Conclusions: Can we learn anything from the previous case studies?">

<t>Communities, collaboration and joint action lie at the heart of the Internet. Even at a linguistic level, the words “networks” and “associations” are closely related.  Both are groups and assemblies of people who depend on “links” and “relationships” <xref target="Swire"/>.  Taking legal definitions given in international human rights law and related normative documents, we could assert that the rights to freedom of assembly and association protect collective activity online.  These rights protect gatherings by persons for a specific purpose and groups with a defined aim over time for a variety of peaceful, expressive and non-expressive, purposes,.  It is voluntary and uncoerced.</t>

<t>Given that the Internet itself was originally designed as a medium of communication for machines that share resources with each other as equals <xref target="RFC0903"/>, the Internet is now one of the most basic infrastructures for the right to freedom of assembly and association. Since Internet protocols and the Internet architecture play a central role in the management, development and use of the Internet, we established the relation between some protocols and the right to freedom of assembly and association.</t>

<t>After reviewing several cases representative of FAA considerations inherent in protocols standardized at the IETF, we can conclude that the way in which infrastructure is designed and implemented impacts people’s ability to exercise their freedom of assembly and association. This is because different technical designs come with different properties and characteristics. These properties and characteristics on the one hand enable people to assemble and associate, but on the other hand also add limiting, or even potentially endangering, characteristics. More often than not, this depends on the context. A clearly identified group for open communications, where messages are sent in cleartext and where peoples persistent identities are visible, can help to facilitate an assembly and build trust, but in other contexts the same configuration could pose a significant danger. Endangering characteristics should be mitigated, or at least clearly communicated to the users of these technologies. It is therefore recommended that the the potential impacts of Internet technologies should be assessed, reflecting recommendations of various UN bodies and norms.</t>

<t>Lastly, the increasing shift towards closed and non-interoperable platforms in chat and social media networks have a significant impact on the distributed and open nature of the Internet. Often these non-interoperable platforms are built on open-protocols but do not allow for interoperability or data-portability. The use of social-media platforms has enabled groups to associate, but it has also rendered users unable to change platforms, therefore leading to a sort of “forced association” that inhibits people to fully exercise their freedom of assembly and association.</t>

</section>
<section anchor="acknowledgements" title="Acknowledgements">

<t><list style="symbols">
  <t>Fred Baker, Jefsey, and Andrew Sullivan for work on Internet definitions.</t>
  <t>Stephane Bortzmeyer, ICNL, and Lisa Vermeer for several concrete text suggestions that found their way in this document.</t>
  <t>Mark Perkins and Gurshabad for finding a lot of typos.</t>
  <t>Gurshabad Grover, an anonymous reviewer, ICNL, Lisa Vermeer, and Sandra Braman for full review.</t>
  <t>The hrpc mailinglist at large for a very constructive discussion on a hard topic.</t>
</list></t>

</section>
<section anchor="security-considerations" title="Security Considerations">

<t>As this draft concerns a research document, there are no security considerations.</t>

</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>This document has no actions for IANA.</t>

</section>
<section anchor="research-group-information" title="Research Group Information">

<t>The discussion list for the IRTF Human Rights Protocol Considerations
Research Group is located at the e-mail address
<eref target="mailto:hrpc@ietf.org">hrpc@ietf.org</eref>. Information on the group and information on how to
subscribe to the list is at
<eref target="https://www.irtf.org/mailman/listinfo/hrpc">https://www.irtf.org/mailman/listinfo/hrpc</eref></t>

<t>Archives of the list can be found at:
<eref target="https://www.irtf.org/mail-archive/web/hrpc/current/index.html">https://www.irtf.org/mail-archive/web/hrpc/current/index.html</eref></t>

</section>


  </middle>

  <back>


    <references title='Informative References'>





<reference  anchor="RFC0001" target='https://www.rfc-editor.org/info/rfc1'>
<front>
<title>Host Software</title>
<author initials='S.' surname='Crocker' fullname='S. Crocker'><organization /></author>
<date year='1969' month='April' />
</front>
<seriesInfo name='RFC' value='1'/>
<seriesInfo name='DOI' value='10.17487/RFC0001'/>
</reference>



<reference  anchor="RFC0155" target='https://www.rfc-editor.org/info/rfc155'>
<front>
<title>ARPA Network mailing lists</title>
<author initials='J.B.' surname='North' fullname='J.B. North'><organization /></author>
<date year='1971' month='May' />
</front>
<seriesInfo name='RFC' value='155'/>
<seriesInfo name='DOI' value='10.17487/RFC0155'/>
</reference>



<reference  anchor="RFC0903" target='https://www.rfc-editor.org/info/rfc903'>
<front>
<title>A Reverse Address Resolution Protocol</title>
<author initials='R.' surname='Finlayson' fullname='R. Finlayson'><organization /></author>
<author initials='T.' surname='Mann' fullname='T. Mann'><organization /></author>
<author initials='J.C.' surname='Mogul' fullname='J.C. Mogul'><organization /></author>
<author initials='M.' surname='Theimer' fullname='M. Theimer'><organization /></author>
<date year='1984' month='June' />
<abstract><t>This RFC suggests a method for workstations to dynamically find their    protocol address (e.g., their Internet Address), when they know only    their hardware address (e.g., their attached physical network address).    This RFC specifies a proposed protocol for the ARPA Internet community,    and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='STD' value='38'/>
<seriesInfo name='RFC' value='903'/>
<seriesInfo name='DOI' value='10.17487/RFC0903'/>
</reference>



<reference  anchor="RFC1211" target='https://www.rfc-editor.org/info/rfc1211'>
<front>
<title>Problems with the maintenance of large mailing lists</title>
<author initials='A.' surname='Westine' fullname='A. Westine'><organization /></author>
<author initials='J.' surname='Postel' fullname='J. Postel'><organization /></author>
<date year='1991' month='March' />
<abstract><t>This RFC discusses problems with maintaining large mailing lists, especially the processing of error reports.  This memo provides information for the Internet community.  It does not specify an Internet standard.</t></abstract>
</front>
<seriesInfo name='RFC' value='1211'/>
<seriesInfo name='DOI' value='10.17487/RFC1211'/>
</reference>



<reference  anchor="RFC1771" target='https://www.rfc-editor.org/info/rfc1771'>
<front>
<title>A Border Gateway Protocol 4 (BGP-4)</title>
<author initials='Y.' surname='Rekhter' fullname='Y. Rekhter'><organization /></author>
<author initials='T.' surname='Li' fullname='T. Li'><organization /></author>
<date year='1995' month='March' />
<abstract><t>This document, together with its companion document, &quot;Application of the Border Gateway Protocol in the Internet&quot;, define an inter-autonomous system routing protocol for the Internet. [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='1771'/>
<seriesInfo name='DOI' value='10.17487/RFC1771'/>
</reference>



<reference  anchor="RFC1930" target='https://www.rfc-editor.org/info/rfc1930'>
<front>
<title>Guidelines for creation, selection, and registration of an Autonomous System (AS)</title>
<author initials='J.' surname='Hawkinson' fullname='J. Hawkinson'><organization /></author>
<author initials='T.' surname='Bates' fullname='T. Bates'><organization /></author>
<date year='1996' month='March' />
<abstract><t>This memo discusses when it is appropriate to register and utilize an Autonomous System (AS), and lists criteria for such.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='6'/>
<seriesInfo name='RFC' value='1930'/>
<seriesInfo name='DOI' value='10.17487/RFC1930'/>
</reference>



<reference  anchor="RFC2277" target='https://www.rfc-editor.org/info/rfc2277'>
<front>
<title>IETF Policy on Character Sets and Languages</title>
<author initials='H.' surname='Alvestrand' fullname='H. Alvestrand'><organization /></author>
<date year='1998' month='January' />
<abstract><t>This document is the current policies being applied by the Internet Engineering Steering Group (IESG) towards the standardization efforts in the Internet Engineering Task Force (IETF) in order to help Internet protocols fulfill these requirements.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='18'/>
<seriesInfo name='RFC' value='2277'/>
<seriesInfo name='DOI' value='10.17487/RFC2277'/>
</reference>



<reference  anchor="RFC2810" target='https://www.rfc-editor.org/info/rfc2810'>
<front>
<title>Internet Relay Chat: Architecture</title>
<author initials='C.' surname='Kalt' fullname='C. Kalt'><organization /></author>
<date year='2000' month='April' />
<abstract><t>This document is an update describing the architecture of the current IRC protocol and the role of its different components.  Other documents describe in detail the protocol used between the various components defined here.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='2810'/>
<seriesInfo name='DOI' value='10.17487/RFC2810'/>
</reference>



<reference  anchor="RFC2812" target='https://www.rfc-editor.org/info/rfc2812'>
<front>
<title>Internet Relay Chat: Client Protocol</title>
<author initials='C.' surname='Kalt' fullname='C. Kalt'><organization /></author>
<date year='2000' month='April' />
<abstract><t>This document defines the Client Protocol, and assumes that the reader is familiar with the IRC Architecture.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='2812'/>
<seriesInfo name='DOI' value='10.17487/RFC2812'/>
</reference>



<reference  anchor="RFC3233" target='https://www.rfc-editor.org/info/rfc3233'>
<front>
<title>Defining the IETF</title>
<author initials='P.' surname='Hoffman' fullname='P. Hoffman'><organization /></author>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='2002' month='February' />
<abstract><t>This document gives a more concrete definition of &quot;the IETF&quot; as it understood today.  Many RFCs refer to &quot;the IETF&quot;.  Many important IETF documents speak of the IETF as if it were an already-defined entity. However, no IETF document correctly defines what the IETF is.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='58'/>
<seriesInfo name='RFC' value='3233'/>
<seriesInfo name='DOI' value='10.17487/RFC3233'/>
</reference>



<reference  anchor="RFC1958" target='https://www.rfc-editor.org/info/rfc1958'>
<front>
<title>Architectural Principles of the Internet</title>
<author initials='B.' surname='Carpenter' fullname='B. Carpenter' role='editor'><organization /></author>
<date year='1996' month='June' />
<abstract><t>The Internet and its architecture have grown in evolutionary fashion from modest beginnings, rather than from a Grand Plan. While this process of evolution is one of the main reasons for the technology's success, it nevertheless seems useful to record a snapshot of the current principles of the Internet architecture. This is intended for general guidance and general interest, and is in no way intended to be a formal or invariant reference model.  This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind.</t></abstract>
</front>
<seriesInfo name='RFC' value='1958'/>
<seriesInfo name='DOI' value='10.17487/RFC1958'/>
</reference>



<reference  anchor="RFC4084" target='https://www.rfc-editor.org/info/rfc4084'>
<front>
<title>Terminology for Describing Internet Connectivity</title>
<author initials='J.' surname='Klensin' fullname='J. Klensin'><organization /></author>
<date year='2005' month='May' />
<abstract><t>As the Internet has evolved, many types of arrangements have been advertised and sold as &quot;Internet connectivity&quot;.  Because these may differ significantly in the capabilities they offer, the range of options, and the lack of any standard terminology, the effort to distinguish between these services has caused considerable consumer confusion.  This document provides a list of terms and definitions that may be helpful to providers, consumers, and, potentially, regulators in clarifying the type and character of services being offered.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='104'/>
<seriesInfo name='RFC' value='4084'/>
<seriesInfo name='DOI' value='10.17487/RFC4084'/>
</reference>



<reference  anchor="RFC4271" target='https://www.rfc-editor.org/info/rfc4271'>
<front>
<title>A Border Gateway Protocol 4 (BGP-4)</title>
<author initials='Y.' surname='Rekhter' fullname='Y. Rekhter' role='editor'><organization /></author>
<author initials='T.' surname='Li' fullname='T. Li' role='editor'><organization /></author>
<author initials='S.' surname='Hares' fullname='S. Hares' role='editor'><organization /></author>
<date year='2006' month='January' />
<abstract><t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t><t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems.  This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t><t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR).  These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network &quot;class&quot; within BGP.  BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t><t>This document obsoletes RFC 1771.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4271'/>
<seriesInfo name='DOI' value='10.17487/RFC4271'/>
</reference>



<reference  anchor="RFC4880" target='https://www.rfc-editor.org/info/rfc4880'>
<front>
<title>OpenPGP Message Format</title>
<author initials='J.' surname='Callas' fullname='J. Callas'><organization /></author>
<author initials='L.' surname='Donnerhacke' fullname='L. Donnerhacke'><organization /></author>
<author initials='H.' surname='Finney' fullname='H. Finney'><organization /></author>
<author initials='D.' surname='Shaw' fullname='D. Shaw'><organization /></author>
<author initials='R.' surname='Thayer' fullname='R. Thayer'><organization /></author>
<date year='2007' month='November' />
<abstract><t>This document is maintained in order to publish all necessary information needed to develop interoperable applications based on the OpenPGP format.  It is not a step-by-step cookbook for writing an application.  It describes only the format and methods needed to read, check, generate, and write conforming packets crossing any network.  It does not deal with storage and implementation questions. It does, however, discuss implementation issues necessary to avoid security flaws.</t><t>OpenPGP software uses a combination of strong public-key and symmetric cryptography to provide security services for electronic communications and data storage.  These services include confidentiality, key management, authentication, and digital signatures.  This document specifies the message formats used in OpenPGP.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4880'/>
<seriesInfo name='DOI' value='10.17487/RFC4880'/>
</reference>



<reference  anchor="RFC5694" target='https://www.rfc-editor.org/info/rfc5694'>
<front>
<title>Peer-to-Peer (P2P) Architecture: Definition, Taxonomies, Examples, and Applicability</title>
<author initials='G.' surname='Camarillo' fullname='G. Camarillo' role='editor'><organization /></author>
<author><organization>IAB</organization></author>
<date year='2009' month='November' />
<abstract><t>In this document, we provide a survey of P2P (Peer-to-Peer) systems. The survey includes a definition and several taxonomies of P2P systems.  This survey also includes a description of which types of applications can be built with P2P technologies and examples of P2P applications that are currently in use on the Internet.  Finally, we discuss architectural trade-offs and provide guidelines for deciding whether or not a P2P architecture would be suitable to meet the requirements of a given application.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='5694'/>
<seriesInfo name='DOI' value='10.17487/RFC5694'/>
</reference>



<reference  anchor="RFC5751" target='https://www.rfc-editor.org/info/rfc5751'>
<front>
<title>Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.2 Message Specification</title>
<author initials='B.' surname='Ramsdell' fullname='B. Ramsdell'><organization /></author>
<author initials='S.' surname='Turner' fullname='S. Turner'><organization /></author>
<date year='2010' month='January' />
<abstract><t>This document defines Secure/Multipurpose Internet Mail Extensions (S/MIME) version 3.2.  S/MIME provides a consistent way to send and receive secure MIME data.  Digital signatures provide authentication, message integrity, and non-repudiation with proof of origin. Encryption provides data confidentiality.  Compression can be used to reduce data size.  This document obsoletes RFC 3851.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5751'/>
<seriesInfo name='DOI' value='10.17487/RFC5751'/>
</reference>



<reference  anchor="RFC6176" target='https://www.rfc-editor.org/info/rfc6176'>
<front>
<title>Prohibiting Secure Sockets Layer (SSL) Version 2.0</title>
<author initials='S.' surname='Turner' fullname='S. Turner'><organization /></author>
<author initials='T.' surname='Polk' fullname='T. Polk'><organization /></author>
<date year='2011' month='March' />
<abstract><t>This document requires that when Transport Layer Security (TLS) clients and servers establish connections, they never negotiate the use of  Secure Sockets Layer (SSL) version 2.0.  This document updates the  backward compatibility sections found in the Transport Layer Security (TLS). [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6176'/>
<seriesInfo name='DOI' value='10.17487/RFC6176'/>
</reference>



<reference  anchor="RFC7118" target='https://www.rfc-editor.org/info/rfc7118'>
<front>
<title>The WebSocket Protocol as a Transport for the Session Initiation Protocol (SIP)</title>
<author initials='I.' surname='Baz Castillo' fullname='I. Baz Castillo'><organization /></author>
<author initials='J.' surname='Millan Villegas' fullname='J. Millan Villegas'><organization /></author>
<author initials='V.' surname='Pascual' fullname='V. Pascual'><organization /></author>
<date year='2014' month='January' />
<abstract><t>The WebSocket protocol enables two-way real-time communication between clients and servers in web-based applications.  This document specifies a WebSocket subprotocol as a reliable transport mechanism between Session Initiation Protocol (SIP) entities to enable use of SIP in web-oriented deployments.</t></abstract>
</front>
<seriesInfo name='RFC' value='7118'/>
<seriesInfo name='DOI' value='10.17487/RFC7118'/>
</reference>



<reference  anchor="RFC7194" target='https://www.rfc-editor.org/info/rfc7194'>
<front>
<title>Default Port for Internet Relay Chat (IRC) via TLS/SSL</title>
<author initials='R.' surname='Hartmann' fullname='R. Hartmann'><organization /></author>
<date year='2014' month='August' />
<abstract><t>This document describes the commonly accepted practice of listening on TCP port 6697 for incoming Internet Relay Chat (IRC) connections encrypted via TLS/SSL.</t></abstract>
</front>
<seriesInfo name='RFC' value='7194'/>
<seriesInfo name='DOI' value='10.17487/RFC7194'/>
</reference>



<reference  anchor="RFC8280" target='https://www.rfc-editor.org/info/rfc8280'>
<front>
<title>Research into Human Rights Protocol Considerations</title>
<author initials='N.' surname='ten Oever' fullname='N. ten Oever'><organization /></author>
<author initials='C.' surname='Cath' fullname='C. Cath'><organization /></author>
<date year='2017' month='October' />
<abstract><t>This document aims to propose guidelines for human rights considerations, similar to the work done on the guidelines for privacy considerations (RFC 6973).  The other parts of this document explain the background of the guidelines and how they were developed.</t><t>This document is the first milestone in a longer-term research effort.  It has been reviewed by the Human Rights Protocol Considerations (HRPC) Research Group and also by individuals from outside the research group.</t></abstract>
</front>
<seriesInfo name='RFC' value='8280'/>
<seriesInfo name='DOI' value='10.17487/RFC8280'/>
</reference>


<reference anchor="UDHR" target="http://www.un.org/en/documents/udhr/">
  <front>
    <title>The Universal Declaration of Human Rights</title>
    <author >
      <organization>United Nations General Assembly</organization>
    </author>
    <date year="1948"/>
  </front>
</reference>
<reference anchor="ICCPR" target="http://www.ohchr.org/EN/ProfessionalInterest/Pages/CCPR.aspx">
  <front>
    <title>International Covenant on Civil and Political Rights</title>
    <author >
      <organization>United Nations General Assembly</organization>
    </author>
    <date year="1966"/>
  </front>
</reference>
<reference anchor="HussainHoward" target="https://doi.org/10.1111/misr.12020">
  <front>
    <title>What Best Explains Successful Protest Cascades? ICTs and the Fuzzy Causes of the Arab Spring</title>
    <author initials="M.M." surname="Hussain">
      <organization></organization>
    </author>
    <author initials="P.N." surname="Howard">
      <organization></organization>
    </author>
    <date year="2013"/>
  </front>
  <seriesInfo name="Int Stud Rev (2013) 15 (1): 48-66." value=""/>
</reference>
<reference anchor="UNRSFAA2012" target="http://freeassembly.net/wp-content/uploads/2013/10/A-HRC-20-27_en-annual-report-May-2012.pdf">
  <front>
    <title>Report of the Special Rapporteur on the rights to freedom of peaceful assembly and of association</title>
    <author initials="." surname="Maina Kiai">
      <organization></organization>
    </author>
    <date year="2012"/>
  </front>
  <seriesInfo name="A/HRC/20/27" value=""/>
</reference>
<reference anchor="APC" target="https://www.apc.org/es/system/files/FOAA_online_IndiaMalaysiaPakistan.pdf">
  <front>
    <title>Freedom of assembly and association online in India, Malaysia and Pakistan. Trends, challenges and recommendations.</title>
    <author >
      <organization>Association for Progressive Communications</organization>
    </author>
    <author initials="." surname="Gayathry Venkiteswaran">
      <organization></organization>
    </author>
    <date year="2016"/>
  </front>
</reference>
<reference anchor="Swire" target="https://ssrn.com/abstract=1989516 or http://dx.doi.org/10.2139/ssrn.1989516">
  <front>
    <title>Social Networks, Privacy, and Freedom of Association: Data Empowerment vs. Data Protection</title>
    <author initials="." surname="Peter Swire">
      <organization></organization>
    </author>
    <date year="2012"/>
  </front>
  <seriesInfo name="North Carolina Law Review (2012) 90 (1): 104." value=""/>
</reference>
<reference anchor="UNGA" target="http://www.un.org/en/ga/search/view_doc.asp?symbol=A/59/401 para. 46">
  <front>
    <title>Human rights defenders</title>
    <author initials="." surname="Hina Jilani">
      <organization></organization>
    </author>
    <date year="2004"/>
  </front>
  <seriesInfo name="A/59/401" value=""/>
</reference>
<reference anchor="HafnerandLyon" target="https://doi.org/10.1111/misr.12020">
  <front>
    <title>Where Wizards Stay Up Late. The Origins of the Internet</title>
    <author initials="K." surname="Hafnerand">
      <organization></organization>
    </author>
    <author initials="M." surname="Lyon">
      <organization></organization>
    </author>
    <date year="1998"/>
  </front>
  <seriesInfo name="First Touchstone Edition (1998): 93." value=""/>
</reference>
<reference anchor="Pensado" target="http://revista.drclas.harvard.edu/book/student-activism">
  <front>
    <title>Student Activism. Utopian Dreams.</title>
    <author initials="." surname="Jaime Pensado">
      <organization></organization>
    </author>
    <date year="2012"/>
  </front>
  <seriesInfo name="ReVista. Harvard Review of Latin America (2012)." value=""/>
</reference>
<reference anchor="Abbate" target="https://mitpress.mit.edu/books/inventing-internet">
  <front>
    <title>Inventing the Internet</title>
    <author initials="." surname="Janet Abbate">
      <organization></organization>
    </author>
    <date year="2013"/>
  </front>
  <seriesInfo name="Cambridge: MIT Press (2013): 11." value=""/>
</reference>
<reference anchor="AckermannKargerZhang" target="https://people.csail.mit.edu/axz/papers/mailinglists.pdf">
  <front>
    <title>Mailing Lists: Why Are They Still Here, What’s Wrong With Them, and How Can We Fix Them?</title>
    <author initials="M.S." surname="Ackerman">
      <organization></organization>
    </author>
    <author initials="D.R." surname="Karger">
      <organization></organization>
    </author>
    <author initials="A.X." surname="Zhang">
      <organization></organization>
    </author>
    <date year="2017"/>
  </front>
  <seriesInfo name="Mit. edu (2017): 1." value=""/>
</reference>
<reference anchor="Benkler" target="http://www.benkler.org/Peer%20production%20and%20cooperation%2009.pdf">
  <front>
    <title>Peer Production and Cooperation</title>
    <author initials="Y." surname="Benkler">
      <organization></organization>
    </author>
    <date year="2009"/>
  </front>
</reference>
<reference anchor="AndersonGuarnieri" target="https://iranthreats.github.io/resources/webrtc-deanonymization/">
  <front>
    <title>Fictitious Profiles and WebRTC's Privacy Leaks Used to Identify Iranian Activists</title>
    <author initials="C." surname="Anderson">
      <organization></organization>
    </author>
    <author initials="C." surname="Guarnieri">
      <organization></organization>
    </author>
    <date year="2016"/>
  </front>
</reference>
<reference anchor="NelsonHedlun" target="http://library.uniteddiversity.coop/REconomy_Resource_Pack/More_Inspirational_Videos_and_Useful_Info/Peer_to_Peer-Harnessing_the_Power_of_Disruptive_Technologies.pdf">
  <front>
    <title>A Network of Peers: Models Through the History of the Internet</title>
    <author initials="N." surname="Minar">
      <organization></organization>
    </author>
    <author initials="M." surname="Hedlun">
      <organization></organization>
    </author>
    <date year="2001"/>
  </front>
  <seriesInfo name="Peer to Peer: Harnessing the Power of Disruptive Technologies, ed: Andy Oram" value=""/>
</reference>
<reference anchor="Vu" target="https://www.springer.com/cn/book/9783642035135">
  <front>
    <title>Peer-to-Peer Computing: Principles and Applications</title>
    <author initials="." surname="Vu, Quang Hieu">
      <organization></organization>
    </author>
    <author initials="." surname="Lupu, Mihai">
      <organization></organization>
    </author>
    <author initials="." surname="Ooi, Beng Chin">
      <organization></organization>
    </author>
    <date year="2010"/>
  </front>
</reference>
<reference anchor="Schleuder" target="https://schleuder.nadir.org/">
  <front>
    <title>Schleuder - A gpg-enabled mailinglist with remailing-capabilities.</title>
    <author >
      <organization>Nadir</organization>
    </author>
    <date year="2017"/>
  </front>
</reference>
<reference anchor="Crawford" target="https://www.bestvpn.com/the-webrtc-vpn-bug-and-how-to-fix-it/">
  <front>
    <title>The WebRTC VPN “Bug” and How to Fix</title>
    <author initials="D." surname="Crawford">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
</reference>
<reference anchor="Troncosoetal" target="https://www.petsymposium.org/2017/papers/issue4/paper87-2017-4-source.pdf">
  <front>
    <title>Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments</title>
    <author initials="C." surname="Troncoso">
      <organization></organization>
    </author>
    <author initials="M." surname="Isaakdis">
      <organization></organization>
    </author>
    <author initials="G." surname="Danezis">
      <organization></organization>
    </author>
    <author initials="H." surname="Halpin">
      <organization></organization>
    </author>
    <date year="2017"/>
  </front>
  <seriesInfo name="Proceedings on Privacy Enhancing Technologies ; 2017 (4):307–329" value=""/>
</reference>
<reference anchor="Mainwaringetal" target="http://www.dourish.com/classes/readings/Mainwaring-Infrastructure.pdf">
  <front>
    <title>Infrastructures and Their Discontents: Implications for Ubicomp</title>
    <author initials="S.D." surname="Mainwaring">
      <organization></organization>
    </author>
    <author initials="M.F." surname="Chang">
      <organization></organization>
    </author>
    <author initials="K." surname="Anderson">
      <organization></organization>
    </author>
    <date year="2004"/>
  </front>
  <seriesInfo name="DBLP Conference: Conference: UbiComp 2004: Ubiquitous Computing: 6th International Conference, Nottingham, UK, September 7-10, 2004. Proceedings" value=""/>
</reference>
<reference anchor="Bowker" >
  <front>
    <title>Information mythology and infrastructure</title>
    <author initials="G." surname="Bowker">
      <organization></organization>
    </author>
    <date year="1994"/>
  </front>
  <seriesInfo name="In: L. Bud (Ed.), Information Acumen: The Understanding and use of Knowledge in Modern Business,Routledge,London,1994,pp.231–247" value=""/>
</reference>
<reference anchor="Bloketal" >
  <front>
    <title>Infrastructuring Environments</title>
    <author initials="A." surname="Blok">
      <organization></organization>
    </author>
    <author initials="M." surname="Nakazora">
      <organization></organization>
    </author>
    <author initials="B.R." surname="Winthereik">
      <organization></organization>
    </author>
    <date year="2016"/>
  </front>
  <seriesInfo name="Science as Culture 25:1, 1-22." value=""/>
</reference>
<reference anchor="PipekWulf" >
  <front>
    <title>Infrastructuring: Towards an Integrated Perspective on the Design and Use of Information Technology</title>
    <author initials="V." surname="Pipek">
      <organization></organization>
    </author>
    <author initials="W." surname="Wolf">
      <organization></organization>
    </author>
    <date year="2009"/>
  </front>
  <seriesInfo name="Journal of the Association for Information Systems (10) 5, pp. 306-332" value=""/>
</reference>
<reference anchor="CRC" target="https://www.info.dfat.gov.au/Info/Treaties/treaties.nsf/AllDocIDs/E123F4F71DCAE3E7CA256B4F007F2905">
  <front>
    <title>Lorum</title>
    <author initials="." surname="Wikipedia">
      <organization></organization>
    </author>
    <date year="2000"/>
  </front>
</reference>
<reference anchor="CERD" target="https://www.info.dfat.gov.au/Info/Treaties/treaties.nsf/AllDocIDs/2F70352A0B65EB67CA256B6E0075FE13">
  <front>
    <title>Convention on the Elimination of all forms of Racial Discrimination</title>
    <author >
      <organization>United Nations</organization>
    </author>
    <date year="1966"/>
  </front>
</reference>
<reference anchor="Sauter" >
  <front>
    <title>The Coming Swarm</title>
    <author initials="M." surname="Sauter">
      <organization></organization>
    </author>
    <date year="2014"/>
  </front>
  <seriesInfo name="Bloomsbury" value=""/>
</reference>
<reference anchor="HRPC-charter" target="https://datatracker.ietf.org/doc/charter-irtf-hrpc/">
  <front>
    <title>Charter for Research Group</title>
    <author initials="." surname="Human Rights Protocol Consideration RG">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
</reference>
<reference anchor="CRPD" target="http://www.austlii.edu.au/au/other/dfat/treaties/2008/12.html">
  <front>
    <title>Convention on the Rights of Persons with Disabilities</title>
    <author >
      <organization>United Nations</organization>
    </author>
    <date year="2007"/>
  </front>
</reference>
<reference anchor="Nyokabi" target="https://repository.gchumanrights.org/bitstream/handle/20.500.11825/1582/3.Global%20article%20HRDA_2_2019.pdf?sequence=4&amp;isAllowed=y">
  <front>
    <title>The right to development and internet shutdowns: Assessing the role of information and communications technology in democratic development in Africa</title>
    <author initials="D.M." surname="Nyokabi">
      <organization></organization>
    </author>
    <author initials="N." surname="Diallo">
      <organization></organization>
    </author>
    <author initials="N.W." surname="Ntesang">
      <organization></organization>
    </author>
    <author initials="T.K." surname="White">
      <organization></organization>
    </author>
    <author initials="T." surname="Ilori">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="Stanford" target="https://plato.stanford.edu/entries/freedom-association/">
  <front>
    <title>Freedom of Association</title>
    <author initials="K." surname="Brownlee">
      <organization></organization>
    </author>
    <author initials="D." surname="Jenkins">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="ViennaDeclaration" target="https://www.ohchr.org/en/professionalinterest/pages/vienna.aspx">
  <front>
    <title>Vienna Declaration and Programme of Action</title>
    <author >
      <organization>United Nations</organization>
    </author>
    <date year="1993"/>
  </front>
</reference>
<reference anchor="Loi" target="https://link.springer.com/article/10.1007/s13347-019-00351-0">
  <front>
    <title>Two Concepts of Group Privacy</title>
    <author initials="M." surname="Loi">
      <organization></organization>
    </author>
    <author initials="M." surname="Christen">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
</reference>
<reference anchor="Glasius" target="https://academic.oup.com/isq/article/64/2/453/5823498">
  <front>
    <title>Illiberal Norm Diffusion: How Do Governments Learn to Restrict Nongovernmental Organizations?</title>
    <author initials="M." surname="Glasius">
      <organization></organization>
    </author>
    <author initials="J." surname="Schalk">
      <organization></organization>
    </author>
    <author initials="M." surname="De Lange">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
</reference>
<reference anchor="CoE" target="https://mk0rofifiqa2w3u89nud.kinstacdn.com/wp-content/uploads/COE-report-on-FOAA-rights-on-the-internet-.pdf">
  <front>
    <title>Freedom of assembly and association on the Internet</title>
    <author >
      <organization>Council of Europe</organization>
    </author>
    <date year="2015"/>
  </front>
</reference>
<reference anchor="APCtraining" target="http://itrainonline.org/itrainonline/mmtk/APC_IRHRCurriculum_FOA_Handout.pdf">
  <front>
    <title>Multimedia training kit</title>
    <author initials="D." surname="Sauter">
      <organization></organization>
    </author>
    <author >
      <organization>Association for Progressive Communications</organization>
    </author>
    <date year="2013"/>
  </front>
</reference>
<reference anchor="UNHRC2020" target="https://www.ohchr.org/EN/HRBodies/HRC/RegularSessions/Session44/Documents/A_HRC_44_24_AEV.docx">
  <front>
    <title>Impact of new technologies on the promotion and protection of human rights in the context of assemblies, including peaceful protests. Report of the United Nations High Commissioner for Human Rights A/HRC/44/24, 2020</title>
    <author initials="." surname="Michelle Bachelet">
      <organization></organization>
    </author>
    <author >
      <organization>United Nations</organization>
    </author>
    <date year="2000"/>
  </front>
</reference>
<reference anchor="Benkler2" target="http://is.gd/rxUpTQ">
  <front>
    <title>The wealth of Networks - How social production transforms markets and freedom</title>
    <author initials="Y." surname="Benkler">
      <organization></organization>
    </author>
    <date year="2006"/>
  </front>
  <seriesInfo name="New Haven and London - Yale University Press" value=""/>
</reference>
<reference anchor="W3C" target="https://www.w3.org/standards/webdesign/accessibility">
  <front>
    <title>Accessibility</title>
    <author >
      <organization>W3C</organization>
    </author>
    <date year="2015"/>
  </front>
</reference>
<reference anchor="Nasser" target="https://nas.sr/%D9%82%D9%84%D8%A8/">
  <front>
    <title>قلب</title>
    <author initials="R." surname="Nasser">
      <organization></organization>
    </author>
    <date year="2013"/>
  </front>
</reference>
<reference anchor="UNGPBHR" target="https://www.ohchr.org/documents/publications/guidingprinciplesbusinesshr_en.pdf">
  <front>
    <title>Guiding Principles on Business and Human Rights</title>
    <author >
      <organization>United Nations</organization>
    </author>
    <date year="2011"/>
  </front>
</reference>
<reference anchor="Kaye" target="https://www.ohchr.org/EN/HRbodies/HRC/RegularSessions/Session29/Documents/A.HRC.29.32_AEV.doc">
  <front>
    <title>The use of encryption and anonymity in digital communications</title>
    <author initials="D." surname="Kaye">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
</reference>
<reference anchor="LEAP" target="https://leap.se/en/about-us/vision">
  <front>
    <title>The Right to Whisper</title>
    <author >
      <organization>LEAP</organization>
    </author>
    <date year="2020"/>
  </front>
</reference>
<reference anchor="Marcus" target="http://www.cardozoaelj.com/wp-content/uploads/2013/02/Marcus.pdf">
  <front>
    <title>Commercial Speech on the Internet: Spam and the first amendment</title>
    <author initials="J." surname="Marcus">
      <organization></organization>
    </author>
    <date year="1998"/>
  </front>
</reference>
<reference anchor="APC3" target="https://www.apc.org/en/node/36145/#tools">
  <front>
    <title>Closer than ever</title>
    <author >
      <organization>Association for Progressive Communications</organization>
    </author>
    <date year="2020"/>
  </front>
</reference>
<reference anchor="UNHRC2018" target="https://digitallibrary.un.org/record/1639840?ln=en">
  <front>
    <title>UN Human Rights Council Resolution 'The promotion, protection and enjoyment of human rights on the Internet' (A/HRC/32/L.20)</title>
    <author >
      <organization>United Nations Human Rights Council</organization>
    </author>
    <date year="2016"/>
  </front>
</reference>
<reference anchor="UNGC37" target="https://tbinternet.ohchr.org/_layouts/15/treatybodyexternal/TBSearch.aspx?Lang=en&amp;TreatyID=8&amp;DocTypeID=11">
  <front>
    <title>Human Rights Committee “General comment No. 37 (2020) on the right of peaceful assembly (article 21)”, CCPR/C/GC/3</title>
    <author >
      <organization>United Nations Human Rights Committee</organization>
    </author>
    <date year="2020"/>
  </front>
</reference>
<reference anchor="UNSRFOAA2012" target="ttp://freeassembly.net/wp-content/uploads/2013/10/A-HRC-20-27_en-annual-report-May-2012.pdf">
  <front>
    <title>Report of the Special Rapporteur on the rights to freedom of peaceful assembly and of association", A/HRC/20/27</title>
    <author initials="." surname="Maina Kiai">
      <organization></organization>
    </author>
    <author >
      <organization>United Nations</organization>
    </author>
    <date year="2012"/>
  </front>
</reference>
<reference anchor="RutzenZenn" >
  <front>
    <title>Association and Assembly in the Digital Age</title>
    <author initials="D." surname="Rutzen">
      <organization></organization>
    </author>
    <author initials="J." surname="Zenn">
      <organization></organization>
    </author>
    <date year="2011" month="December"/>
  </front>
  <seriesInfo name="The International Journal of Not-for-Profit Law, Volume 13, Issue 4" value=""/>
</reference>
<reference anchor="UNSRFAA2019" target="https://undocs.org/A/HRC/41/41">
  <front>
    <title>Report of the Special Rapporteur on the rights to freedom of peaceful assembly and of association</title>
    <author initials="." surname="Clément Voule">
      <organization></organization>
    </author>
    <author >
      <organization>United Nations</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>


    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

