<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version  -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc rfcedstyle="yes"?>
<?rfc toc="yes"?>
<?rfc tocindent="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="-o*+"?>

<rfc ipr="trust200902" docName="draft-irtf-hrpc-association-09" category="info">
  <front>
    <title abbrev="FoA">Freedom of Association on the Internet</title>

    <author initials="N." surname="ten Oever" fullname="Niels ten Oever">
      <organization>University of Amsterdam</organization>
      <address>
        <email>mail@nielstenoever.net</email>
      </address>
    </author>
    <author initials="G." surname="Perez de Acha" fullname="Gisela Perez de Acha">
      <organization>Derechos Digitales</organization>
      <address>
        <email>gisela@derechosdigitales.org</email>
      </address>
    </author>
    <author initials="S." surname="Couture" fullname="Stéphane Couture">
      <organization>Université de Montréal</organization>
      <address>
        <email>stephane.couture@umontreal.ca</email>
      </address>
    </author>
    <author initials="M." surname="Knodel" fullname="Mallory Knodel">
      <organization>Center for Democracy &amp; Technology</organization>
      <address>
        <email>mknodel@cdt.org</email>
      </address>
    </author>

    <date year="2022" month="March" day="07"/>

    <area>IRTF</area>
    <workgroup>Human Rights Protocol Considerations Research Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document explores whether is a relation between the Internet architecture and the ability of people to exercise their right to peaceful assembly and the right to association online. It does so by asking the question: what are the protocol development considerations for freedom of assembly and association? The Internet increasingly mediates our lives, our relationships, and our ability to exercise our human rights. As a global assemblage, the Internet provides a public space, yet it is predominantly built on private infrastructure. Since Internet protocols and architecture play a central role in the management, development, and use of the Internet, we analyze the relation between protocols, architecture, and the rights to assemble and associate to mitigate infringements on those rights. This document concludes that the way in which infrastructure is designed and implemented impacts people’s ability to exercise their freedom of assembly and association. It is therefore recommended that the the potential impacts of Internet technologies should be assessed, reflecting recommendations of various UN bodies and norms. Finally, the document remarks that non-interoperable platforms that do not allow for interoperability or data-portability, render users unable to change platforms, therefore leading to a sort of “forced association” that inhibits people to fully exercise their freedom of assembly and association.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<figure><artwork><![CDATA[
    We shape our tools and, thereafter, our tools shape us. 

         - John Culkin (1967)

    Article 21 of the Covenant protects peaceful assemblies wherever 
    they take place: outdoors, indoors and online; in public and 
    private spaces; or a combination thereof.

         - General Comment 37 of the Human Rights Committee (2020)

    In the digital age, the exercise of the rights of peaceful 
    assembly and association has become largely dependent on business 
    enterprises, whose legal obligations, policies, technical 
    standards, financial models and algorithms can affect these 
    freedoms.

         - Annual Report to the UN Human Rights Council by the Special
         Rapporteur on the rights to freedom of peaceful assembly and 
         of association (2019).

]]></artwork></figure>

<t>The current draft continues the work started in “Research into Human Rights Protocol Considerations” <xref target="RFC8280"/> by investigating the impact of Internet protocols on a specific set of human rights, namely the right to peaceful assembly and the right to association. Taking into consideration the international human rights framework regarding the human right to peaceful assembly and the right to association, the present document seeks to deepen the relationship between this human right and Internet architecture, protocols, and standards. In that way, we continue the work of the Human Rights Protocol Consideration Research Group, as laid out in its charter, where one of the research aims is “to expose the relation between protocols and human rights, with a focus on the rights to freedom of expression and freedom of assembly” <xref target="HRPC-charter"/>. The conclusions may inform the development of new guidelines for protocol developers in draft-irtf-hrpc-guidelines.</t>

<t>The research question of this document is: what are the protocol development considerations for the right to peaceful assembly and the right to association?</t>

</section>
<section anchor="vocabulary-used" title="Vocabulary used">

<t><list style="hanging">
  <t hangText="Architecture">
  The design of a structure</t>
  <t hangText="Autonomous System (AS)">
  Autonomous Systems are the unit of routing policy in the modern world of exterior routing <xref target="RFC1930"/>.</t>
  <t>Within the Internet, an autonomous system (AS) is a collection of connected Internet Protocol (IP) routing prefixes under the control of one or more network operators on behalf of a single administrative entity or domain that presents a common, clearly defined routing policy to the Internet <xref target="RFC1930"/>.</t>
  <t>The classic definition of an Autonomous System is a set of routers under a single technical administration, using an interior gateway protocol and common metrics to route packets within the AS, and using an exterior gateway protocol to route packets to other ASs
<xref target="RFC1771"/>.</t>
  <t hangText="Border Gateway Protocol (BGP)">
  An inter-Autonomous System routing protocol <xref target="RFC4271"/>.</t>
  <t hangText="Connectivity">
  The extent to which a device or network is able to reach other devices or networks to exchange data. The Internet is the tool for providing global connectivity <xref target="RFC1958"/>. Different types of connectivity are further specified in <xref target="RFC4084"/>. The combination of the end-to-end principle, interoperability, distributed architecture, resilience, reliability and robustness are the enabling factors that result in connectivity to and on the Internet.</t>
  <t hangText="Decentralization">
  Implementation or deployment of standards, protocols or systems without one single point of control.</t>
  <t hangText="Distributed system">
  A system with multiple components that have their behavior co-ordinated via message passing. These components are usually
spatially separated and communicate using a network, and may be managed by a single root of trust or authority. <xref target="Troncosoetal"/></t>
  <t hangText="Infrastructure">
  Underlying basis or structure for a functioning society, organization or community. Because infrastructure is a precondition
for other activities it has a procedural, rather than static, nature due to its social and cultural embeddedness <xref target="PipekWulf"/>
<xref target="Bloketal"/>. This means that infrastructure is always relational: infrastructure always develops in relation to something or someone <xref target="Bowker"/>.</t>
  <t hangText="Internet">
  The Network of networks, that consists of Autonomous Systems that are connected through the Internet Protocol (IP).</t>
  <t>A persistent socio-technical system over which services are delivered <xref target="Mainwaringetal"/>,</t>
  <t>A techno-social assemblage of devices, users, sensors, networks, routers, governance, administrators, operators and protocols</t>
  <t>An emergent-process-driven thing that is born from the collections of the ASes that happen to be gathered together at any given time. The fact that they tend to interact at any given time means it is an emergent property that happens because they use the protocols defined at IETF.</t>
  <t hangText="Right to peaceful assembly">
  ‘The right of peaceful assembly protects the non-violent gathering by persons for specific purposes, principally expressive ones.1 It constitutes an individual right that is exercised collectively.2 Inherent to the right is thus an associative element.’ <xref target="UNGC37"/></t>
  <t hangText="Right to association">
  ‘The right and freedom of association encompasses both an individual’s right to join or leave groups voluntarily, the right of the group to take collective action to pursue the interests of its members, and the right of an association to accept or decline membership based on certain criteria.’ <xref target="FoAdef"/></t>
</list></t>

</section>
<section anchor="research-question" title="Research question">

<t>The research question of this document is: what are the protocol development considerations for freedom of assembly and association?</t>

</section>
<section anchor="methodology" title="Methodology">

<t>In this document, we deepen our exploration of human rights and protocols by assessing one specific set of human rights: freedom of association and assembly, abbreviated here as FAA. Our methodology for doing so is the following: first, we provide a brief twofold literature review addressing the philosophical and legal definitions of FAA and how this right has already been interpreted or analyzed concerning the digital. This literature review is not exhaustive nor systematic but aims at providing some lines of questioning that could later be used for protocol development. The second part of our methodology looks at some cases of Internet protocols that are relevant to the sub-questions highlighted in the literature review, and analyze how these protocols facilitate and inhibit the right to peaceful assembly and association.</t>

</section>
<section anchor="literature-review" title="Literature Review">

<section anchor="faa-definition-and-core-treaties" title="FAA definition and core treaties">

<t>The rights to peaceful assembly and the freedom of association are defined and guaranteed in national law and international treaties, however, in this document we limit outselves to international treaties. Article 20 of the Universal Declaration of Human Rights <xref target="UDHR"/> states that “Everyone has the right to freedom of peaceful assembly and association” and that “No one may be compelled to belong to an association”. Article 23 further guarantees that “Everyone has the right to form and to join trade unions for the protection of his interests”. In the International Covenant on Civil and Political Rights <xref target="ICCPR"/>, article 21 stipulates that “The right of peaceful assembly shall be recognized” and that “No restrictions may be placed on the exercise of this right other than those imposed in conformity with the law and which are necessary in a democratic society in the interests of national security or public safety, public order (ordre public), the protection of public health or morals or the protection of the rights and freedoms of others” while article 22 states that “Everyone shall have the right to freedom of association with others, including the right to form and join trade unions”.</t>

<t>General Comment No. 37 on the right of peaceful assembly by the United Nations Human Rights Committee affirms that the right of  peaceful assembly protects non-violent online gatherings: “associated activities that happen online or otherwise rely upon digital services […] are also protected” <xref target="UNGC37"/>. Interference with emerging communications technologies that offer the opportunity to assemble either wholly or partly online or play an integral role in organizing, participating in and monitoring physical gatherings are assumed to impede assemblies which are protected by this right. Moreover, any restriction on the ‘operation of information dissemination systems’ must conform with the tests for restrictions on freedom of expression (see below).</t>

<t>Other treaties are sometimes cited as the source and framework to the right to freedom of association and assembly. An example of this is Article 5 of the International Convention on the Elimination of All Forms of Racial Discrimination <xref target="CERD"/> which stipulates freedom of peaceful assembly and association should be guaranteed “without discrimination as to race, colour, national or ethnic origin”; Article 15 of the Convention on the Rights of the Child <xref target="CRC"/> which recognises to child pending the restrictions cited above; and Article 21 of the Convention on the Rights of Persons with Disabilities <xref target="CRPD"/> which insist on usable and accessible formats and technologies appropriate for persons with different kinds of disabilities. The freedoms of peaceful assembly and association are also protected under regional human rights treaties: article 11 of the European Convention on Human Rights, articles 15 and 16 of the American Convention on Human Rights, article 10 and 11 of the African Charter on Human and Peoples’ Rights.</t>

<t>From a more philosophical perspective, Brownlee and Jenkins <xref target="Stanford"/> make some interesting distinctions in particular regarding the concepts of association, assembly and interaction, deviating somewhat from what is established in interpretations of international human rights law. “Interaction” refers to any kind of interpersonal and often incidental engagements in daily life, like encountering strangers on a bus.  Interaction is seen as a “prerequisite” for association. Assembly, according to Brownlee and Jenkins has a more political connotation and is often used to refer to activists, protesters, or members of a group in a deliberating event. The authors refer to association as more “persistent connections” and distinguish between intimate associations, like friendship, love, or family, and collective association like trade unions, commercial business, or “expressive associations” like civil rights organizations or LGBTQIA associations. For Brownlee and Jenkins <xref target="Stanford"/>, the right to association is linked to different relative freedoms: permission (to associate or dissociate), claim-right (to oppose others interfering with our conduct), power (to alter the status of our association), immunity (from other people interfering in our right). Freedom of association thus refers both to the individual right to join or leave a group and to the collective right to form or dissolve a group.</t>

<t>Freedoms of association and peaceful assembly, however, are relative and not absolute. Excluding someone from an association based on its sex, race or other individual characteristic is also often contentious if not illegal. As mentioned above, international human rights law provides the framework for legitimate restrictions on these rights, as well as the right to privacy and the right to freedom of expression and opinion. Restrictions can be imposed by states, but only if this is lawful and proportionate. States must document how these limitations are necessary in the interests of national security or public safety, public order, the protection of public health or morals, or the protection of the rights and freedoms of others. Finally, states must also protect participants against possible abuses by non-state actors.</t>

<t>The Human Rights Committee explores a few restrictions related to associated activities online or reliant upon digital services, that are also protected under article 21, and stipulates that “States parties must not, for example, block or hinder Internet connectivity in relation to peaceful assemblies.  The same applies to geotargeted or technology-specific interference with connectivity or access to content.”. Additionally, “States should ensure that the activities of Internet service providers and intermediaries do not unduly restrict assemblies or the privacy of assembly participants.” <xref target="UNGC37"/>.</t>

<t>Interpreting international law, the right to freedom of peaceful assembly and the right to freedom of association protects any collective, gathered either permanently or temporarily for “peaceful” purposes, online and offline. It is important to underline the property of “freedom” because the right to freedom of association and assembly is voluntary and uncoerced: anyone can join or leave a group of choice, which in turn means one should not be forced to either join, stay or leave. An assembly is an “intentional and temporary gathering of a collective in a private or public space for a specific purpose: demonstrations, indoor meetings, strikes, processions, rallies, or even sits-in” <xref target="UNGA"/>. Association has a more formal and established nature and refer to a group of individuals or legal entities brought together in order to collectively act, express, promote, pursue, or defend a field of common interests <xref target="UNSRFOAA2012"/>. Think about civil society organizations, clubs, cooperatives, NGOs, religious associations, political parties, trade unions, or foundations.</t>

<t>When talking about the human right of freedom of association and assembly, one should always take into account that ‘all human rights are indivisible, interrelated, unalienable, universal, and mutually reinforcing’ <xref target="ViennaDeclaration"/>. This means that in the analysis of the impact of a certain variable on freedom of association and assembly one should take other human rights into account too. When devising an approach to mitigate a possible negative influence on this right, one should also always take into account the possible impact this might have on other rights. For example, the following rights are often impacted in conjunction with freedom of association and assembly: the right to political participation, the right to (group) privacy, the right to freedom of expression, and access to information. For instance, when the right to political participation is hampered, this often happens in conjunction with a limitation of the freedom of association and assembly because political participation is often done collectively. When the right to privacy is hampered, this privacy of particular groups is also impacted (so-called ‘group privacy’ <xref target="Loi"/>, which potentially has consequences for the right to association and assembly. Where the freedom of expression of a group is hampered, such as in protests or through Internet shutdowns, this both hampers other people’s ability to receive the information of the group, and impact the right to assembly of the people who seek to express themselves as a group <xref target="Nyokabi"/>.</t>

<t>Finally, if the right to association and assembly is limited by national law, this does not mean it is consistent with international human rights law. In such a case, the national law would therefore not be legitimate <xref target="Glasius"/>.</t>

</section>
<section anchor="faa-in-the-digital-era" title="FAA in the digital era">

<t>Before discussing freedom of association and assembly as it pertains to digital environments, we must first recognize that the United Nations Human Rights Council adopted resolutions on the promotion, protection and enjoyment of human rights on the Internet in 2012, 2014, 2016 and 2018, affirming and reaffirming  “… that the same rights that people have offline must also be protected online …” <xref target="UNHRC2018"/>. Therefore the digital environment is no exception to application of this right by any means. Various other resolutions and report have established the online applicability of the freedoms of association and assembly, most recently and authoritatively by the Human Rights Committee in General Comment 37 (2020)<xref target="UNGC37"/>. The questions that remain, however, are how these rights should be conceptualized and implemented in different parts and levels of digital environments.</t>

<t>The right to freedom of assembly and association online is the subject of increasing discussions and analysis. Especially since social media played an important role in several revolutions in 2011, which has led to increasing and ever more sophisticated attacks by autocratic governments on online communities and other associational activities occurring on the Internet <xref target="RutzenZenn"/>. In 2016, the Council of Europe published a report, “Report by the Committee of experts on cross-border flow of Internet traffic and Internet freedom on Freedom of assembly and association on the Internet” <xref target="CoE"/> which noted that while the Internet and technologies are not explicitly mentioned in international treaties, these treaties nevertheless apply to “the online environment”. The report argue the “Internet is the public sphere of the 21st century”, something demonstrated by the fact that informal associations can be gathered at scale in a matter of hours on the Internet, and that digital communication tools often serve to facilitate, publicize or otherwise enable presential associations or assemblies, like a protest or demonstration. They note, on the other hand, the negative ways in which the Internet can also be used to promote or facilitate terrorism, urban violence and hate speech, thus insisting on the “extremely important and urgent” need to fight online terrorist activities such as recruitment or mobilization, while at the same time respecting the right to peaceful assembly and association of other users. The report mentions the following examples that could be help further our reflection:</t>

<t><list style="symbols">
  <t>Instances of network shutdowns in the Arab Spring, to prevent people from organising themselves or assembling</t>
  <t>California’s Bay Area Rapid Transit (BART) shutdown of mobile phone service, to prevent potential property destruction by protesters and disruption of service</t>
  <t>The wholesale blocking of Google as a violation of freedom of expression</t>
  <t>Telus, a telecom company which blocked customers’ access to websites critical of Telus during a Telecommunications Workers Union strike against it</t>
  <t>The targeting of social media users who call for or organise protests though the Internet in Turkey’s Gezi Park protests</t>
  <t>Mass surveillance or other interferences with privacy in the context of law enforcement and national security</t>
  <t>Use of VPNs (Virtual Private Networks) and the Tor network to ensure anonymity</t>
  <t>Distributed Denial of Service attacks (DDoS) as civil disobedience.</t>
</list></t>

<t>In 2019 the UN Special Rapporteur on the rights to freedom of peaceful assembly and of association, notes the opportunities and challenges posed by digital networks to the rights to freedom of peaceful assembly and of association <xref target="UNSRFAA2019"/>.  The report recommends that international human rights norms and principles should also be used as a framework “that guides digital technology companies’ design, control and governance of digital technologies”. The report states that “technical standards” in particular can affect the freedom of association and assembly, and makes some recommendations which could be relevant, including:</t>

<t><list style="symbols">
  <t>“[Undertake] human rights impact assessments which incorporate the rights to freedom of peaceful assembly and of association when developing or modifying their products and services,”</t>
  <t>“increase the quality of participation in and implementation of existing multi-stakeholder initiatives,”</t>
  <t>“collaborate with governments and civil society to develop technology that promotes and strengthens human rights,”</t>
  <t>“support the research and development of appropriate technological solutions to online harassment, disinformation and propaganda, including tools to detect and identify State-linked accounts and bots,” and</t>
  <t>“adopt monitoring indicators that include specific concerns related to freedom of peaceful assembly and association.”</t>
</list></t>

<t>In one of their “training kits” <xref target="APCtraining"/>, the Association of Progressive Communications addressed different impacts of the internet on association and assembly and raised three particular issues worthy to note here:</t>

<t><list style="numbers">
  <t>Organization of protests. Internet and social media are enablers of protests, such as it was seen in the “Arab Spring”. Some of these protests - like online petitions or campaigns - are similar to offline association and assembly, but other protest forms are inherent to the Internet capacity like hacking, DDOS and are subject to controversy within the Internet community, some people finding it legitimate, and others not.</t>
  <t>Surveillance. While the Internet facilitates association, the association in turn leaves a lot of traces that can be used in turn for law enforcement but also for repressing political dissents. As they note, even the threat of surveillance can have deter facilitation.</t>
  <t>Anonymity and pseudonymity can be useful protection mechanism for those who’d like to attend legitimate association without facing retribution. On the other hand, anonymity can be used to harm society, such as in online fraud or sexual predation.</t>
</list></t>

<t>Online association and assembly are the starting point of civic mass-mobilization in modern democracies, and even more so where physical gatherings have been impossible or dangerous <xref target="APC"/>. Throughout the world -from the Arab Spring to Latin American student movements and the #WomensMarch- the Internet has played a crucial role by providing means for the fast dissemination of information otherwise mediated by the press, or even forbidden by the government <xref target="Pensado"/>. According to Hussain and Howard the Internet helped to “build solidarity networks and identification of collective identities and goals, extend the range of local coverage to international broadcast networks” and as platform for contestation for “the future of civil society and information infrastructure” <xref target="HussainHoward"/>. The IETF itself, defined as an ‘open global community’ of network designers, operators, vendors, and researchers <xref target="RFC3233"/> is also protected by freedom of assembly and association . Discussions, comments and consensus around RFCs are possible because of the collective expression that freedom of association and assembly allow. The very word “protocol” found its way into the language of computer networking based on the need for collective agreement among a group of assembled network users <xref target="HafnerandLyon"/>.</t>

<t><xref target="RFC8280"/> is a paper by the Human Rights Protocol Consideration Resarch Group in the Internet Research Taskforce on internet protocols and human rights that discusses issues of FAA, specifically:</t>

<t><list style="symbols">
  <t>The expansion of DNS for generic namespace as an enabler of association for minorities. The paper argues that specifically the expansion of the DNS to allow for new generic Top Level Domains (gTLDs) can have negative impacts on freedom of association because of restrictive policies by some registries and registrars, on the other hand could gTLDs could also enable communities to build clearly identifiable spaces for association (such as .gay).</t>
  <t>The impact of Distributed Denial of Service attacks on freedom of association. Whereas DDoS has been used as a tool for protest, in many cases this is infringing on other parties freedom of expression. Furthermore,  often devices (such as IoT devices and routers) are inscribed in such DDoS attacks whereas the owner or user did not consent to this. Thus they do not have the possibility to exit this assembly. Therefore the draft concluded that that IETF ”should try to ensure that their protocols cannot be used for DDoS attacks”</t>
  <t>The impact of middleboxes on the ability of users to connect to the Internet and therefore their ability to exercise their right to freedom of association and assembly. Lack of connectivity can significantly impact freedom of assembly and association of a user. Especially if the user cannot retrieve the reason for their inability to connect, and if there thus is no possibility to for the user to have access to due process to dispute the lack of (secure or private) connectivity in general or to a specific service.</t>
</list></t>

<t>In June 2020, the United Nations High Commissioner for Human Rights concluded that technologies can be enablers of the excercise of FAA, but technology is also significantly used to interfere with the ability of people to exercise their right to freedom of association and assembly. Specifically, the report mentions network shutdowns, the usage of technology to surveil or crack down on protesters, leading to human rights violations. This includes facial recognition technology, and the uses of other ways to violate the (group) privacy of people engaged in an assembly or association. The report makes it explicit that companies play a significant role enabling, for instance by developing, providing or selling the technology, but also by directly exercising these violations <xref target="UNHRC2020"/>.</t>

</section>
<section anchor="specific-questions-raised-from-the-literature-review" title="Specific questions raised from the literature review">

<t>Here are some questions raised from the literature review that can have implications for protocol design:</t>

<t><list style="numbers">
  <t>Should protocols be designed to enable legitimate limitations on association in the interests of “national security or public safety, public order (ordre public), the protection of public health or morals or the protection of the rights and freedoms of others”, as stated in the ICCPR article 21 <xref target="ICCPR"/>? Where in the stack do we care for FAA?</t>
  <t>Can protocols facilitate agency of membership in associations, assemblies and interactions?</t>
  <t>What are the features of protocols that enable freedom of association and assembly?</t>
  <t>Does protocol development sufficiently consider usable and accessible formats and technologies appropriate for all persons, including those with different kinds of abilities?</t>
  <t>Can a protocol be designed to legitimately exclude someone from an association?</t>
</list></t>

<t>In the following sections we attempt to answer these questions with specific examples of standardized protocols in the IETF.</t>

</section>
</section>
<section anchor="analysis" title="Analysis">

<t>As the Internet mediates collective action and collaboration, it impacts on freedom of association and assembly. To answer our research question regarding how internet architecture enables and/or inhibits such human rights, we researched several independent and typical cases related to protocols that have been either adopted by the IETF, or are widely used on the Internet.  Our goal is to figure h they facilitate freedom of assembly and association, or how they inhibit it through their design or implementation.</t>

<t>We are aware that some of the following examples go beyond the use of Internet protocols and flow over into the application layer or examples in the offline world whereas the purpose of the current document is to break down the relationship between Internet protocols and the right to freedom of assembly and association. Nonetheless, we do recognize that in some cases the line between them and applications, implementations, policies and offline realities are often blurred and hard -if not impossible- to differentiate.</t>

<t>We use the literature review to guide our process of inquiry for each case, and to dive deeper in what can be found interesting about each case as it relates to freedom of association.</t>

<section anchor="got-no-peace-spam-and-ddos" title="Got No Peace: Spam and DDoS">
<figure><artwork><![CDATA[
Should protocols be designed to enable legitimate limitations on 
association in the interests of “national security or public safety, 
public order (ordre public), the protection of public health or morals 
or the protection of the rights and freedoms of others”, as stated in 
the ICCPR article 21 {{ICCPR}}? Where in the stack do we care for FAA?
]]></artwork></figure>

<t>The 2020 report by the United Nations Special Rapporteur on Human Rights <xref target="UNHRC2020"/> described how technology is often used to limit freedom of assembly and association, such as for instance through network shutdowns and the surveillance of groups. Because access to the Internet is crucial not only for freedom of association and assembly, but also for the right to development, and the right to freedom of expression and information <xref target="Nyokabi"/>, the United Nation Special Rapporteur argues that:</t>

<figure><artwork><![CDATA[
(b) Avoid resorting to disruptions and shutdowns of Internet or 
telecommunications networks at all times and particularly during 
assemblies, including those taking place in electoral contexts 
and during times of unrest;
]]></artwork></figure>

<t>Whereas the states have the obligation to protect human rights, there has been an increasing call for non-state actors, such as companies, to respect human rights <xref target="UNGPBHR"/>. The UN adopted guiding principles on business and human rights <xref target="UNGPBHR"/> and talks within the HRC are ongoing about an international legally binding instrument to regulate the activities of transnational corporations and other business enterprises. This includes a chain-responsibility of actors, which means that not just the company’s own processes should not negatively impact human rights, but they should also engage in due diligence processes, such as human rights impact assessments. This includes an assessment of whether the products that are sold, or the services that are provided, can be used to engage in human rights violations, or whether human rights violations occur in any stage of the supply chain  of the company. If this is the case, measures should be taken to mitigate this.</t>

<t>In the case of dual-use technologies, this means that technology could be used for legitimate purposes, but could also be used to limit freedom of association or assembly,  it might mean that producers or sellers should limit the parties they sell to, or even better, ensure that the illegitimate use of the technology is not technically possible anymore, or made more difficult.</t>

<section anchor="spam" title="Spam">

<t>In the 1990s as the internet became more widely adopted, spam came to be defined as irrelevant or unsolicited messages that were posted many times to multiple news groups or mailing lists <xref target="Marcus"/>. Here the question of consent, but also harm, are crucial. In the 2000s a large part of the discussion revolved around the fact that certain corporations. protected by the right to freedom of association, considered spam to be a form of “commercial speech”, thus encompassed by free expression rights <xref target="Marcus"/>. Yet spam can be not only a nuisance, but a threat to systems and users.</t>

<t>This leaves us with an interesting case around spam mitigation: spam is currently handled mostly by mail providers on behalf of the user. Next to that, countries are increasingly adopting regulatory opt-in regimes for mailing lists and commercial e-mail, with a possibility of serious fines in case of violation. Yet many ask is spam not the equivalent of the fliers and handbills ever present in our offline world? The big difference between the proliferation of such messages offline and online is the scale.  It is not hard for a single person to message a lot of people online, whereas if that person needed to go house by house the scale and impact of their actions would be much smaller.  Inversely if it were a common practice to expose people to unlimited unwanted messages online, users would be drowned in such messages. This puts a large burden on filtering, and in both filtering and sifting through many message, other expressions would be drowned out and would be severely hampered.  Allowing illimited sending of unsolicited messages would be a blow against freedom of speech: when everyone talks, nobody listens.</t>

<t>Here the argument is very similar to DDoS attacks, considered next: Legitimate uses of online campaigning, or online protesting, are drowned out by a malicious use which constitutes an attack on the internet infrastructure and thus the assembly or association itself.</t>

</section>
<section anchor="ddos" title="DDoS">

<t>Distributed Denial of Service attacks are leveled against a server or service by a controller of a host or multiple hosts by overloading the server or service’s bandwidth or resources (volume-based floods) or exploit protocol behaviours (protocol attacks). DDoS attacks can thus stifle and complicate the rights to assemble online for media and human rights organisations whose websites are the target of DDoS. At the same time there are comparisons made between DDoS attacks and sit-in protests <xref target="Sauter"/>. However the main distinction is significant: only a small fragment of “participants” (from controllers to compromised device owners) in DDoS attacks are aware or willing <xref target="RFC8280"/>. Notably DDoS attacks are increasingly used to commit crimes such as extortion, which infringe on others’ human rights.</t>

<t>Because of the interrelation of technologies, it cannot be said that there is one point in the technical stack where one can locate the characteristics of “peaceful” or “non-peaceful” association visible to protocol developers. In the cases of spam blocking and DDoS mitigation, “peaceful or non-peaceful” is not a meaningful heuristic, or even characteristic, of problematic content. If anything, their commonality is their unrequested and nature, next to scale and volume. This allows us to draw the conclusion that DDoS and spam are not examples of freedom of association or assembly.</t>

</section>
</section>
<section anchor="holistic-agency-mailing-lists-and-spam" title="Holistic Agency: Mailing Lists and Spam">

<figure><artwork><![CDATA[
Can protocols facilitate agency of membership in associations, 
assemblies and interactions?
]]></artwork></figure>

<section anchor="mailing-lists" title="Mailing lists">

<t>Since the beginning of the Internet mailing lists have been a key site of assembly and association <xref target="RFC0155"/> <xref target="RFC1211"/>. In fact, mailing lists were one of the Internet’s first functionalities <xref target="HafnerandLyon"/>.</t>

<t>In 1971 four years after the invention of email, the first mailing list was created to talk about the idea of using Arpanet for discussion. What had initially propelled the Arpanet project forward as a resource sharing platform was gradually replaced by the idea of a network as a means of bringing people together <xref target="Abbate"/>. More than 45 years after, mailing lists are pervasive and help communities to engage, have discussions, share information, ask questions, and build ties. Even as social media and discussion forums grow, mailing lists continue to be widely used <xref target="AckermannKargerZhang"/> and are still a crucial tool to organise groups and individuals around themes and causes <xref target="APC3"/>.</t>

<t>Mailing lists’ pervasive use are partly explained because they allow for “free” association: people subscribe (join) and unsubscribe (leave) as they please, and it functions on low bandwith connections. Mailing lists also allow for association of specific groups on closed lists. This free association online enables agency of membership, a key component of freedom of association and assembly.</t>

</section>
<section anchor="spam-1" title="Spam">

<t>As we mentioned before, there are interesting implications for freedom of association and assembly when looking at spam mitigation. Here we want to specifically note that if we consider that the rights to assembly and association also mean that “no one may be compelled to belong to an association” <xref target="UDHR"/>, spam infringes both rights if an op-out mechanism is not provided and people are obliged to receive unwanted information, or be reached by people they do not know.</t>

</section>
</section>
<section anchor="civics-in-cyberspace-messaging-conferencing-and-networking" title="Civics in Cyberspace: Messaging, Conferencing, and Networking">

<figure><artwork><![CDATA[
What are the features of protocols that enable freedom of 
association and assembly?
]]></artwork></figure>

<t>Civic participation is often expressed as the freedom to associate and assemble, along with a whole other set of enabling rights such as freedom of expression and the right to privacy. Former UN Special Rapporteur David Kaye established a strong relationship between technology that allows anonymity and uses encryption have positive effects on freedom of expression <xref target="Kaye"/>. Here we look at messaging, such as email, mailing lists and internet relay chat; video conferencing and peer-to-peer networking protocols to investigate the common features that enable freedom of association and assembly online.</t>

<section anchor="email" title="Email">

<t>Similarly to freedom of expression’s enabling and universal right to impart one’s ideas openly, “the right to whisper”, or confidentiality, is the ability to limit to whom one imparts one’s ideas. An encrypted email project, the LEAP Encryption Access Project, says, “like free speech, the right to whisper is a necessary precondition for a free society. Without it, civil society languishes and political freedoms are curtailed. As the importance of digital communication for civic participation increases, so too does the importance of the ability to digitally whisper.” <xref target="LEAP"/></t>

</section>
<section anchor="mailing-lists-1" title="Mailing lists">

<t>Not only are mailing lists a good example of how protocols can facilitate the necessary ingredient of agency in freedom of association, mailing lists are an example of messaging technology that has other features that enable freedom of association and assembly.</t>

<t>The archival function of mailing lists allows for posterior accountability and analysis. The ubiquity and interoperability of email, and by extension email lists, provides a low barrier to entry to an inclusive medium.</t>

<t>Association and assembly online can be undermined when right to privacy is at risk. And one of the downsides of mailing lists are similar to the privacy and security concerns generally associated with email. At least with email, end-to-end encryption such as OpenPGP <xref target="RFC4880"/> and S​/​MIME <xref target="RFC5751"/> can keep user communications authenticated and confidential. With mailing lists, this protection is not as possible because with many lists the final recipients are typically not known by the sender. There have been experimental solutions to address this issue such as Schleuder <xref target="Schleuder"/>, but this has not been standardized or widely deployed.</t>

</section>
<section anchor="irc" title="IRC">

<t>Internet Relay Chat (IRC) is an application layer protocol that enables communication in the form of text through a client/server networking model <xref target="RFC2810"/>. In other words, a chat service. IRC clients are computer programs that a user can install on their system. These clients communicate with chat servers to transfer messages to other clients. Features of IRC include: federated design, transport encryption, one-to-many routing, creation of topic-based “channels”, and spam or abuse moderation.</t>

<t>For the purposes of civic participation and freedom of association and assembly in particular it is critical that IRC’s federated design allows many interoperable, yet customisable, instances and basic assurance of confidentiality through transport encryption. We investigate the particular aspect of agency in membership through moderation in the section ‘Block Together Now: IRC and Refusals’ below.</t>

</section>
<section anchor="webrtc" title="WebRTC">
<t>Multi-party video conferencing protocols like WebRTC <xref target="RFC6176"/> <xref target="RFC7118"/> allow for robust, bandwidth-adaptive, wideband and super-wideband video and audio discussions in groups. However, it comes with many different configuration options, which can leave users open to unexpected privacy leakages:</t>

<figure><artwork><![CDATA[
‘The WebRTC protocol was designed to enable responsive real-time
communications over the Internet, and is instrumental in 
allowing streaming video and conferencing applications to run in 
the browser. In order to easily facilitate direct connections
between computers (bypassing the need for a central server to act 
as a gatekeeper), WebRTC provides functionality to automatically 
collect the local and public IP addresses of Internet users (ICE 
or STUN). These functions do not require consent from the user,
and can be instantiated by sites that a user visits without their 
awareness. The potential privacy implications of this aspect of 
WebRTC are well documented, and certain browsers have provided 
options to limit its behavior.’  {{AndersonGuarnieri}}
]]></artwork></figure>

<t>Even though some multi-party video conferencing tools facilitate freedom of assembly and association, their own configuration might might pose concrete risks for those who use them. On the one hand WebRTC is providing resilient channels of communications, but on the other hand it also exposes information about those who are using the tool which might lead to increased surveillance, identification and the consequences that might be derived from that. This is especially concerning because the usage of a VPN does not protect against the exposure of IP addresses <xref target="Crawford"/>.</t>

<t>The risk of surveillance is also exists in an offline space, but this is generally slight easier to analyze for the end-user. Security and privacy expectations of the end-user could be either improved or made explicit. This in turn would result in a more secure and/or private exercise of the right to freedom of assembly or association.</t>

</section>
<section anchor="peer-to-peer-networking" title="Peer-to-peer networking">
<t>At the organizational level, peer production is one of the most relevant innovations from Internet mediated social practices. According to <xref target="Benkler"/> these networks imply ‘open collaborative innovation and creation, performed by diverse, decentralized groups organized principally by neither price signals nor organizational hierarchy, harnessing heterogeneous motivations, and governed and managed based on principles other than the residual authority of ownership implemented through contract.’ <xref target="Benkler"/>.</t>

<t>In his book The Wealth of Networks, <xref target="Benkler2"/> significantly expands on his definition of commons-based peer production. In his view, what distinguishes commons-based production is that it doesn’t rely upon or propagate proprietary knowledge: “The inputs and outputs of the process are shared, freely or conditionally, in an institutional form that leaves them equally available for all to use as they choose at their individual discretion.” <xref target="Benkler2"/>. To ensure that the knowledge generated is available for free use, commons-based projects are often shared under an open license</t>

<t>Peer-to-peer (P2P) is essentially a model of how people interact in real life because “we deal directly with one another whenever we wish to” <xref target="Vu"/>. Usually if we need something we ask our peers, who in turn refer us to other peers. In this sense, the ideal definition of P2P is that “nodes are able to directly exchange resources and services between themselves without the need for centralized servers” where each participating node typically acts both as a server and as a client <xref target="Vu"/>. <xref target="RFC5694"/> has defined it as peers or nodes that should be able to communicate directly between themselves without passing intermediaries, and that the system should be self-organizing and have decentralized control <xref target="RFC5694"/>. With this in mind, the ultimate model of P2P is a completely decentralized system, which is more resistant to speech regulation, immune to single points of failure and has a higher performance and scalability. Nonetheless, in practice some P2P systems are supported by centralized servers and some others have hybrid models where nodes are organized into two layers: the upper tier servers and the lower tier common nodes <xref target="Vu"/>.</t>

<t>Since the ARPANET project, the original idea behind the Internet was conceived as what we would now call a peer-to-peer system <xref target="RFC0001"/>. Over time it has increasingly shifted towards a client/server model with “millions of consumer clients communicating with a relatively privileged set of servers” <xref target="NelsonHedlun"/>.</t>

<t>Whether for resource sharing or data sharing, P2P systems are enabling freedom of assembly and association. Not only do they allow for effective dissemination of information, but they leverage computing resources by diminishing costs allowing for the formation of open collectives at the network level. At the same time, in completely decentralized systems the nodes are autonomous and can join or leave the network as they want -a characteristic that makes the system unpredictable: a resource might be only sometimes available, and some other resources might be missing or incomplete <xref target="Vu"/>. Lack of information might in turn makes association or assembly more difficult.</t>

<t>Additionally, when architecturally assessing the role of P2P systems we could say that: “the main advantage of centralized P2P systems is that they are able to provide a quick and reliable resource locating. Their limitation, however, is that the scalability of the systems is affected by the use of servers. While decentralized P2P systems are better than centralized P2P systems in this aspect, they require a longer time in resource locating. As a result, hybrid P2P systems have been introduced to take advantage of both centralized and decentralized architectures. Basically, to maintain the scalability, similar to decentralized P2P systems, there are no servers in hybrid P2P systems. However, peer nodes that are more powerful than others can be selected to act as servers to serve others. These nodes are often called super peers. In this way, resource locating can be done by both decentralized search techniques and centralized search techniques (asking super peers), and hence the systems benefit from the search techniques of centralized P2P systems.” <xref target="Vu"/>.</t>

</section>
</section>
<section anchor="universal-access-the-web" title="Universal Access: The Web">

<figure><artwork><![CDATA[
Does protocol development sufficiently consider usable and accessible 
formats and technologies appropriate for persons with different kinds 
of abilities?
]]></artwork></figure>

<t>The W3C has done significant work to ensure that the Web is accessible to people with diverse physical abilities <xref target="W3C"/>. The implementation of these accessibility standards for instance help people who have issues with seeing or rendering images to understand what the image actually contains. Making the web more accessible for people with diverse physical abilities enables them to excercise their right to online assembly and association. While there are accessibility standards implemented for the web, this is less the case for the Internet.</t>

<t>The IETF uses English as its primary working language, both in its documentation and in its communication. This is also the case for reference implementations. It is estimated that roughly 20% of the Earth’s population speaks English, whereas only 360 million speak English as their first language. <xref target="RFC2277"/> describes that ‘”Internationalization is for humans. This means that protocols are not subject to internationalization; text strings are.”, this implies that protocol developers, as well as people that work with protocols, are not people, or that protocol developers are all in command of the English language. This means that it is significantly easier for people who have a command of the English language to become a protocol developer - and it might lead to the development of separate protocols that are developed within large language communities that are not using the English language or the Latin script. This makes it harder for people who seek to shape their own space of association and assembly on the Internet to do so. And is thus driving these communities into, often proprietary and non-interoperable services such as Facebook.</t>

<t>When Ramsey Nasser developed the Arabic programming language قلب (transliterated Qalb, Qlb and Alb) <xref target="Nasser"/> he called it ‘engineering performance art’ instead of engineering, because he knew that his language would not work. In part this is because all modern programming tools are based on the ASCII character set, which encodes Latin Characters and was originally based on the English Language. This highlights cultural biases of computer science and engineering. Despite long significant efforts, it is still largely impossible to register an email address in a language such as Devanagari, Arabic, or Chinese. Even if it is possible - it is to be expected that there will be a significant failure rate in sending and receiving emails with other services. This makes it harder for people who do not speak English and/or don’t use the written Latin script to exercise their freedom of association and assembly.</t>

</section>
<section anchor="block-together-now-irc-and-refusals" title="Block Together Now: IRC and Refusals">

<figure><artwork><![CDATA[
Can a protocol be designed to legitimately exclude someone 
from an association?
]]></artwork></figure>

<t>Previously we spoke about the privacy protecting features of IRC that enable freedom of association and assembly, including transport security. But now we turn to the ability to block users and effectively moderate discussions on IRC as a key feature of the technology that enables agency in membership, a key aspect of freedom of association and assembly.</t>

<t>For order to be kept within the IRC network, special classes of users become “operators” and are allowed to perform general maintenance functions on the network: basic network tasks such as disconnecting (temporary or permanently) and reconnecting servers as needed <xref target="RFC2812"/>. One of the most controversial power of operators is the ability to remove a user from the connected network by ‘force’, i.e., operators are able to close the connection between any client and server <xref target="RFC2812"/>.</t>

<t>IRC servers may deploy different policies for the ability of users to create their own channels or ‘rooms’, and for the delegation of ‘operator’-rights in such spaces. Some IRC servers support SSL/TLS connections for security purposes <xref target="RFC7194"/> which helps stop the use of packet sniffer programs to obtain the passwords of IRC users, but has little use beyond this scope due to the public nature of IRC channels. TLS connections require both client and server support (that may require the user to install TLS binaries and IRC client specific patches or modules on their computers). Some networks also use TLS for server to server connections, and provide a special channel flag (such as +S) to only allow TLS-connected users on the channel, while disallowing operator identification in clear text, to better utilize the advantages that TLS provides.</t>

</section>
</section>
<section anchor="conclusions-can-we-learn-anything-from-the-previous-case-studies" title="Conclusions: Can we learn anything from the previous case studies?">

<t>Communities, collaboration and joint action lie at the heart of the Internet. Even at a linguistic level, the words “networks” and “associations” are closely related.  Both are groups and assemblies of people who depend on “links” and “relationships” <xref target="Swire"/>.  Taking legal definitions given in international human rights law and related normative documents, we could assert that the rights to freedom of assembly and association protect collective activity online.  These rights protect gatherings by persons for a specific purpose and groups with a defined aim over time for a variety of peaceful, expressive and non-expressive, purposes,.  It is voluntary and uncoerced.</t>

<t>Given that the Internet itself was originally designed as a medium of communication for machines that share resources with each other as equals <xref target="RFC0903"/>, the Internet is now one of the most basic infrastructures for the right to freedom of assembly and association. Since Internet protocols and the Internet architecture play a central role in the management, development and use of the Internet, we established the relation between some protocols and the right to freedom of assembly and association.</t>

<t>After reviewing several cases representative of FAA considerations inherent in protocols standardized at the IETF, we can conclude that the way in which infrastructure is designed and implemented impacts people’s ability to exercise their freedom of assembly and association. This is because different technical designs come with different properties and characteristics. These properties and characteristics on the one hand enable people to assemble and associate, but on the other hand also add limiting, or even potentially endangering, characteristics. More often than not, this depends on the context. A clearly identified group for open communications, where messages are sent in cleartext and where peoples persistent identities are visible, can help to facilitate an assembly and build trust, but in other contexts the same configuration could pose a significant danger. Endangering characteristics should be mitigated, or at least clearly communicated to the users of these technologies. It is therefore recommended that the the potential impacts of Internet technologies should be assessed, reflecting recommendations of various UN bodies and norms.</t>

<t>Lastly, the increasing shift towards closed and non-interoperable platforms in chat and social media networks have a significant impact on the distributed and open nature of the Internet. Often these non-interoperable platforms are built on open-protocols but do not allow for interoperability or data-portability. The use of social-media platforms has enabled groups to associate, but it has also rendered users unable to change platforms, therefore leading to a sort of “forced association” that inhibits people to fully exercise their freedom of assembly and association.</t>

</section>
<section anchor="acknowledgements" title="Acknowledgements">

<t><list style="symbols">
  <t>Fred Baker, Jefsey, and Andrew Sullivan for work on Internet definitions.</t>
  <t>Stephane Bortzmeyer, ICNL, and Lisa Vermeer for several concrete text suggestions that found their way in this document.</t>
  <t>Mark Perkins and Gurshabad for finding a lot of typos.</t>
  <t>Gurshabad Grover, an anonymous reviewer, ICNL, Lisa Vermeer, and Sandra Braman for full reviews.</t>
  <t>The hrpc mailinglist at large for a very constructive discussion on a hard topic.</t>
</list></t>

</section>
<section anchor="work-space" title="Work Space">

<t>Current work on this draft is happening at: https://github.com/IRTF-HRPC/draft-association
Pull requests and issues are welcome.</t>

</section>
<section anchor="security-considerations" title="Security Considerations">

<t>As this draft concerns a research document, there are no security considerations.</t>

</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>This document has no actions for IANA.</t>

</section>
<section anchor="research-group-information" title="Research Group Information">

<t>The discussion list for the IRTF Human Rights Protocol Considerations Research Group is located at the e-mail address <eref target="mailto:hrpc@ietf.org">hrpc@ietf.org</eref>. Information on the group and information on how to
subscribe to the list is at <eref target="https://www.irtf.org/mailman/listinfo/hrpc">https://www.irtf.org/mailman/listinfo/hrpc</eref></t>

<t>Archives of the list can be found at:
<eref target="https://www.irtf.org/mail-archive/web/hrpc/current/index.html">https://www.irtf.org/mail-archive/web/hrpc/current/index.html</eref></t>

</section>


  </middle>

  <back>


    <references title='Informative References'>





<reference anchor='RFC0001' target='https://www.rfc-editor.org/info/rfc1'>
<front>
<title>Host Software</title>
<author fullname='S. Crocker' initials='S.' surname='Crocker'><organization/></author>
<date month='April' year='1969'/>
</front>
<seriesInfo name='RFC' value='1'/>
<seriesInfo name='DOI' value='10.17487/RFC0001'/>
</reference>



<reference anchor='RFC0155' target='https://www.rfc-editor.org/info/rfc155'>
<front>
<title>ARPA Network mailing lists</title>
<author fullname='J.B. North' initials='J.B.' surname='North'><organization/></author>
<date month='May' year='1971'/>
</front>
<seriesInfo name='RFC' value='155'/>
<seriesInfo name='DOI' value='10.17487/RFC0155'/>
</reference>



<reference anchor='RFC0903' target='https://www.rfc-editor.org/info/rfc903'>
<front>
<title>A Reverse Address Resolution Protocol</title>
<author fullname='R. Finlayson' initials='R.' surname='Finlayson'><organization/></author>
<author fullname='T. Mann' initials='T.' surname='Mann'><organization/></author>
<author fullname='J.C. Mogul' initials='J.C.' surname='Mogul'><organization/></author>
<author fullname='M. Theimer' initials='M.' surname='Theimer'><organization/></author>
<date month='June' year='1984'/>
<abstract><t>This RFC suggests a method for workstations to dynamically find their    protocol address (e.g., their Internet Address), when they know only    their hardware address (e.g., their attached physical network address).    This RFC specifies a proposed protocol for the ARPA Internet community,    and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='STD' value='38'/>
<seriesInfo name='RFC' value='903'/>
<seriesInfo name='DOI' value='10.17487/RFC0903'/>
</reference>



<reference anchor='RFC1211' target='https://www.rfc-editor.org/info/rfc1211'>
<front>
<title>Problems with the maintenance of large mailing lists</title>
<author fullname='A. Westine' initials='A.' surname='Westine'><organization/></author>
<author fullname='J. Postel' initials='J.' surname='Postel'><organization/></author>
<date month='March' year='1991'/>
<abstract><t>This RFC discusses problems with maintaining large mailing lists, especially the processing of error reports.  This memo provides information for the Internet community.  It does not specify an Internet standard.</t></abstract>
</front>
<seriesInfo name='RFC' value='1211'/>
<seriesInfo name='DOI' value='10.17487/RFC1211'/>
</reference>



<reference anchor='RFC1771' target='https://www.rfc-editor.org/info/rfc1771'>
<front>
<title>A Border Gateway Protocol 4 (BGP-4)</title>
<author fullname='Y. Rekhter' initials='Y.' surname='Rekhter'><organization/></author>
<author fullname='T. Li' initials='T.' surname='Li'><organization/></author>
<date month='March' year='1995'/>
<abstract><t>This document, together with its companion document, &quot;Application of the Border Gateway Protocol in the Internet&quot;, define an inter-autonomous system routing protocol for the Internet. [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='1771'/>
<seriesInfo name='DOI' value='10.17487/RFC1771'/>
</reference>



<reference anchor='RFC1930' target='https://www.rfc-editor.org/info/rfc1930'>
<front>
<title>Guidelines for creation, selection, and registration of an Autonomous System (AS)</title>
<author fullname='J. Hawkinson' initials='J.' surname='Hawkinson'><organization/></author>
<author fullname='T. Bates' initials='T.' surname='Bates'><organization/></author>
<date month='March' year='1996'/>
<abstract><t>This memo discusses when it is appropriate to register and utilize an Autonomous System (AS), and lists criteria for such.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='6'/>
<seriesInfo name='RFC' value='1930'/>
<seriesInfo name='DOI' value='10.17487/RFC1930'/>
</reference>



<reference anchor='RFC2277' target='https://www.rfc-editor.org/info/rfc2277'>
<front>
<title>IETF Policy on Character Sets and Languages</title>
<author fullname='H. Alvestrand' initials='H.' surname='Alvestrand'><organization/></author>
<date month='January' year='1998'/>
<abstract><t>This document is the current policies being applied by the Internet Engineering Steering Group (IESG) towards the standardization efforts in the Internet Engineering Task Force (IETF) in order to help Internet protocols fulfill these requirements.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='18'/>
<seriesInfo name='RFC' value='2277'/>
<seriesInfo name='DOI' value='10.17487/RFC2277'/>
</reference>



<reference anchor='RFC2810' target='https://www.rfc-editor.org/info/rfc2810'>
<front>
<title>Internet Relay Chat: Architecture</title>
<author fullname='C. Kalt' initials='C.' surname='Kalt'><organization/></author>
<date month='April' year='2000'/>
<abstract><t>This document is an update describing the architecture of the current IRC protocol and the role of its different components.  Other documents describe in detail the protocol used between the various components defined here.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='2810'/>
<seriesInfo name='DOI' value='10.17487/RFC2810'/>
</reference>



<reference anchor='RFC2812' target='https://www.rfc-editor.org/info/rfc2812'>
<front>
<title>Internet Relay Chat: Client Protocol</title>
<author fullname='C. Kalt' initials='C.' surname='Kalt'><organization/></author>
<date month='April' year='2000'/>
<abstract><t>This document defines the Client Protocol, and assumes that the reader is familiar with the IRC Architecture.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='2812'/>
<seriesInfo name='DOI' value='10.17487/RFC2812'/>
</reference>



<reference anchor='RFC3233' target='https://www.rfc-editor.org/info/rfc3233'>
<front>
<title>Defining the IETF</title>
<author fullname='P. Hoffman' initials='P.' surname='Hoffman'><organization/></author>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='February' year='2002'/>
<abstract><t>This document gives a more concrete definition of &quot;the IETF&quot; as it understood today.  Many RFCs refer to &quot;the IETF&quot;.  Many important IETF documents speak of the IETF as if it were an already-defined entity. However, no IETF document correctly defines what the IETF is.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='58'/>
<seriesInfo name='RFC' value='3233'/>
<seriesInfo name='DOI' value='10.17487/RFC3233'/>
</reference>



<reference anchor='RFC1958' target='https://www.rfc-editor.org/info/rfc1958'>
<front>
<title>Architectural Principles of the Internet</title>
<author fullname='B. Carpenter' initials='B.' role='editor' surname='Carpenter'><organization/></author>
<date month='June' year='1996'/>
<abstract><t>The Internet and its architecture have grown in evolutionary fashion from modest beginnings, rather than from a Grand Plan. While this process of evolution is one of the main reasons for the technology's success, it nevertheless seems useful to record a snapshot of the current principles of the Internet architecture. This is intended for general guidance and general interest, and is in no way intended to be a formal or invariant reference model.  This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind.</t></abstract>
</front>
<seriesInfo name='RFC' value='1958'/>
<seriesInfo name='DOI' value='10.17487/RFC1958'/>
</reference>



<reference anchor='RFC4084' target='https://www.rfc-editor.org/info/rfc4084'>
<front>
<title>Terminology for Describing Internet Connectivity</title>
<author fullname='J. Klensin' initials='J.' surname='Klensin'><organization/></author>
<date month='May' year='2005'/>
<abstract><t>As the Internet has evolved, many types of arrangements have been advertised and sold as &quot;Internet connectivity&quot;.  Because these may differ significantly in the capabilities they offer, the range of options, and the lack of any standard terminology, the effort to distinguish between these services has caused considerable consumer confusion.  This document provides a list of terms and definitions that may be helpful to providers, consumers, and, potentially, regulators in clarifying the type and character of services being offered.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='104'/>
<seriesInfo name='RFC' value='4084'/>
<seriesInfo name='DOI' value='10.17487/RFC4084'/>
</reference>



<reference anchor='RFC4271' target='https://www.rfc-editor.org/info/rfc4271'>
<front>
<title>A Border Gateway Protocol 4 (BGP-4)</title>
<author fullname='Y. Rekhter' initials='Y.' role='editor' surname='Rekhter'><organization/></author>
<author fullname='T. Li' initials='T.' role='editor' surname='Li'><organization/></author>
<author fullname='S. Hares' initials='S.' role='editor' surname='Hares'><organization/></author>
<date month='January' year='2006'/>
<abstract><t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t><t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems.  This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t><t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR).  These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network &quot;class&quot; within BGP.  BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t><t>This document obsoletes RFC 1771.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4271'/>
<seriesInfo name='DOI' value='10.17487/RFC4271'/>
</reference>



<reference anchor='RFC4880' target='https://www.rfc-editor.org/info/rfc4880'>
<front>
<title>OpenPGP Message Format</title>
<author fullname='J. Callas' initials='J.' surname='Callas'><organization/></author>
<author fullname='L. Donnerhacke' initials='L.' surname='Donnerhacke'><organization/></author>
<author fullname='H. Finney' initials='H.' surname='Finney'><organization/></author>
<author fullname='D. Shaw' initials='D.' surname='Shaw'><organization/></author>
<author fullname='R. Thayer' initials='R.' surname='Thayer'><organization/></author>
<date month='November' year='2007'/>
<abstract><t>This document is maintained in order to publish all necessary information needed to develop interoperable applications based on the OpenPGP format.  It is not a step-by-step cookbook for writing an application.  It describes only the format and methods needed to read, check, generate, and write conforming packets crossing any network.  It does not deal with storage and implementation questions. It does, however, discuss implementation issues necessary to avoid security flaws.</t><t>OpenPGP software uses a combination of strong public-key and symmetric cryptography to provide security services for electronic communications and data storage.  These services include confidentiality, key management, authentication, and digital signatures.  This document specifies the message formats used in OpenPGP.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4880'/>
<seriesInfo name='DOI' value='10.17487/RFC4880'/>
</reference>



<reference anchor='RFC5694' target='https://www.rfc-editor.org/info/rfc5694'>
<front>
<title>Peer-to-Peer (P2P) Architecture: Definition, Taxonomies, Examples, and Applicability</title>
<author fullname='G. Camarillo' initials='G.' role='editor' surname='Camarillo'><organization/></author>
<author><organization>IAB</organization></author>
<date month='November' year='2009'/>
<abstract><t>In this document, we provide a survey of P2P (Peer-to-Peer) systems. The survey includes a definition and several taxonomies of P2P systems.  This survey also includes a description of which types of applications can be built with P2P technologies and examples of P2P applications that are currently in use on the Internet.  Finally, we discuss architectural trade-offs and provide guidelines for deciding whether or not a P2P architecture would be suitable to meet the requirements of a given application.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='5694'/>
<seriesInfo name='DOI' value='10.17487/RFC5694'/>
</reference>



<reference anchor='RFC5751' target='https://www.rfc-editor.org/info/rfc5751'>
<front>
<title>Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.2 Message Specification</title>
<author fullname='B. Ramsdell' initials='B.' surname='Ramsdell'><organization/></author>
<author fullname='S. Turner' initials='S.' surname='Turner'><organization/></author>
<date month='January' year='2010'/>
<abstract><t>This document defines Secure/Multipurpose Internet Mail Extensions (S/MIME) version 3.2.  S/MIME provides a consistent way to send and receive secure MIME data.  Digital signatures provide authentication, message integrity, and non-repudiation with proof of origin. Encryption provides data confidentiality.  Compression can be used to reduce data size.  This document obsoletes RFC 3851.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5751'/>
<seriesInfo name='DOI' value='10.17487/RFC5751'/>
</reference>



<reference anchor='RFC6176' target='https://www.rfc-editor.org/info/rfc6176'>
<front>
<title>Prohibiting Secure Sockets Layer (SSL) Version 2.0</title>
<author fullname='S. Turner' initials='S.' surname='Turner'><organization/></author>
<author fullname='T. Polk' initials='T.' surname='Polk'><organization/></author>
<date month='March' year='2011'/>
<abstract><t>This document requires that when Transport Layer Security (TLS) clients and servers establish connections, they never negotiate the use of  Secure Sockets Layer (SSL) version 2.0.  This document updates the  backward compatibility sections found in the Transport Layer Security (TLS). [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6176'/>
<seriesInfo name='DOI' value='10.17487/RFC6176'/>
</reference>



<reference anchor='RFC7118' target='https://www.rfc-editor.org/info/rfc7118'>
<front>
<title>The WebSocket Protocol as a Transport for the Session Initiation Protocol (SIP)</title>
<author fullname='I. Baz Castillo' initials='I.' surname='Baz Castillo'><organization/></author>
<author fullname='J. Millan Villegas' initials='J.' surname='Millan Villegas'><organization/></author>
<author fullname='V. Pascual' initials='V.' surname='Pascual'><organization/></author>
<date month='January' year='2014'/>
<abstract><t>The WebSocket protocol enables two-way real-time communication between clients and servers in web-based applications.  This document specifies a WebSocket subprotocol as a reliable transport mechanism between Session Initiation Protocol (SIP) entities to enable use of SIP in web-oriented deployments.</t></abstract>
</front>
<seriesInfo name='RFC' value='7118'/>
<seriesInfo name='DOI' value='10.17487/RFC7118'/>
</reference>



<reference anchor='RFC7194' target='https://www.rfc-editor.org/info/rfc7194'>
<front>
<title>Default Port for Internet Relay Chat (IRC) via TLS/SSL</title>
<author fullname='R. Hartmann' initials='R.' surname='Hartmann'><organization/></author>
<date month='August' year='2014'/>
<abstract><t>This document describes the commonly accepted practice of listening on TCP port 6697 for incoming Internet Relay Chat (IRC) connections encrypted via TLS/SSL.</t></abstract>
</front>
<seriesInfo name='RFC' value='7194'/>
<seriesInfo name='DOI' value='10.17487/RFC7194'/>
</reference>



<reference anchor='RFC8280' target='https://www.rfc-editor.org/info/rfc8280'>
<front>
<title>Research into Human Rights Protocol Considerations</title>
<author fullname='N. ten Oever' initials='N.' surname='ten Oever'><organization/></author>
<author fullname='C. Cath' initials='C.' surname='Cath'><organization/></author>
<date month='October' year='2017'/>
<abstract><t>This document aims to propose guidelines for human rights considerations, similar to the work done on the guidelines for privacy considerations (RFC 6973).  The other parts of this document explain the background of the guidelines and how they were developed.</t><t>This document is the first milestone in a longer-term research effort.  It has been reviewed by the Human Rights Protocol Considerations (HRPC) Research Group and also by individuals from outside the research group.</t></abstract>
</front>
<seriesInfo name='RFC' value='8280'/>
<seriesInfo name='DOI' value='10.17487/RFC8280'/>
</reference>


<reference anchor="UDHR" target="http://www.un.org/en/documents/udhr/">
  <front>
    <title>The Universal Declaration of Human Rights</title>
    <author >
      <organization>United Nations General Assembly</organization>
    </author>
    <date year="1948"/>
  </front>
</reference>
<reference anchor="ICCPR" target="http://www.ohchr.org/EN/ProfessionalInterest/Pages/CCPR.aspx">
  <front>
    <title>International Covenant on Civil and Political Rights</title>
    <author >
      <organization>United Nations General Assembly</organization>
    </author>
    <date year="1966"/>
  </front>
</reference>
<reference anchor="HussainHoward" target="https://doi.org/10.1111/misr.12020">
  <front>
    <title>What Best Explains Successful Protest Cascades? ICTs and the Fuzzy Causes of the Arab Spring</title>
    <author initials="M.M." surname="Hussain">
      <organization></organization>
    </author>
    <author initials="P.N." surname="Howard">
      <organization></organization>
    </author>
    <date year="2013"/>
  </front>
  <seriesInfo name="Int Stud Rev (2013) 15 (1): 48-66." value=""/>
</reference>
<reference anchor="UNSRFAA2012" target="http://freeassembly.net/wp-content/uploads/2013/10/A-HRC-20-27_en-annual-report-May-2012.pdf">
  <front>
    <title>Report of the Special Rapporteur on the rights to freedom of peaceful assembly and of association</title>
    <author initials="." surname="Maina Kiai">
      <organization></organization>
    </author>
    <date year="2012"/>
  </front>
  <seriesInfo name="A/HRC/20/27" value=""/>
</reference>
<reference anchor="APC" target="https://www.apc.org/es/system/files/FOAA_online_IndiaMalaysiaPakistan.pdf">
  <front>
    <title>Freedom of assembly and association online in India, Malaysia and Pakistan. Trends, challenges and recommendations.</title>
    <author >
      <organization>Association for Progressive Communications</organization>
    </author>
    <author initials="." surname="Gayathry Venkiteswaran">
      <organization></organization>
    </author>
    <date year="2016"/>
  </front>
</reference>
<reference anchor="Swire" target="https://ssrn.com/abstract=1989516 or http://dx.doi.org/10.2139/ssrn.1989516">
  <front>
    <title>Social Networks, Privacy, and Freedom of Association: Data Empowerment vs. Data Protection</title>
    <author initials="." surname="Peter Swire">
      <organization></organization>
    </author>
    <date year="2012"/>
  </front>
  <seriesInfo name="North Carolina Law Review (2012) 90 (1): 104." value=""/>
</reference>
<reference anchor="UNGA" target="http://www.un.org/en/ga/search/view_doc.asp?symbol=A/59/401 para. 46">
  <front>
    <title>Human rights defenders</title>
    <author initials="." surname="Hina Jilani">
      <organization></organization>
    </author>
    <date year="2004"/>
  </front>
  <seriesInfo name="A/59/401" value=""/>
</reference>
<reference anchor="HafnerandLyon" target="https://doi.org/10.1111/misr.12020">
  <front>
    <title>Where Wizards Stay Up Late. The Origins of the Internet</title>
    <author initials="K." surname="Hafnerand">
      <organization></organization>
    </author>
    <author initials="M." surname="Lyon">
      <organization></organization>
    </author>
    <date year="1998"/>
  </front>
  <seriesInfo name="First Touchstone Edition (1998): 93." value=""/>
</reference>
<reference anchor="Pensado" target="http://revista.drclas.harvard.edu/book/student-activism">
  <front>
    <title>Student Activism. Utopian Dreams.</title>
    <author initials="." surname="Jaime Pensado">
      <organization></organization>
    </author>
    <date year="2012"/>
  </front>
  <seriesInfo name="ReVista. Harvard Review of Latin America (2012)." value=""/>
</reference>
<reference anchor="Abbate" target="https://mitpress.mit.edu/books/inventing-internet">
  <front>
    <title>Inventing the Internet</title>
    <author initials="." surname="Janet Abbate">
      <organization></organization>
    </author>
    <date year="2013"/>
  </front>
  <seriesInfo name="Cambridge: MIT Press (2013): 11." value=""/>
</reference>
<reference anchor="AckermannKargerZhang" target="https://people.csail.mit.edu/axz/papers/mailinglists.pdf">
  <front>
    <title>Mailing Lists: Why Are They Still Here, What’s Wrong With Them, and How Can We Fix Them?</title>
    <author initials="M.S." surname="Ackerman">
      <organization></organization>
    </author>
    <author initials="D.R." surname="Karger">
      <organization></organization>
    </author>
    <author initials="A.X." surname="Zhang">
      <organization></organization>
    </author>
    <date year="2017"/>
  </front>
  <seriesInfo name="Mit. edu (2017): 1." value=""/>
</reference>
<reference anchor="Benkler" target="http://www.benkler.org/Peer%20production%20and%20cooperation%2009.pdf">
  <front>
    <title>Peer Production and Cooperation</title>
    <author initials="Y." surname="Benkler">
      <organization></organization>
    </author>
    <date year="2009"/>
  </front>
</reference>
<reference anchor="AndersonGuarnieri" target="https://iranthreats.github.io/resources/webrtc-deanonymization/">
  <front>
    <title>Fictitious Profiles and WebRTC's Privacy Leaks Used to Identify Iranian Activists</title>
    <author initials="C." surname="Anderson">
      <organization></organization>
    </author>
    <author initials="C." surname="Guarnieri">
      <organization></organization>
    </author>
    <date year="2016"/>
  </front>
</reference>
<reference anchor="NelsonHedlun" target="http://library.uniteddiversity.coop/REconomy_Resource_Pack/More_Inspirational_Videos_and_Useful_Info/Peer_to_Peer-Harnessing_the_Power_of_Disruptive_Technologies.pdf">
  <front>
    <title>A Network of Peers: Models Through the History of the Internet</title>
    <author initials="N." surname="Minar">
      <organization></organization>
    </author>
    <author initials="M." surname="Hedlun">
      <organization></organization>
    </author>
    <date year="2001"/>
  </front>
  <seriesInfo name="Peer to Peer: Harnessing the Power of Disruptive Technologies, ed: Andy Oram" value=""/>
</reference>
<reference anchor="Vu" target="https://www.springer.com/cn/book/9783642035135">
  <front>
    <title>Peer-to-Peer Computing: Principles and Applications</title>
    <author initials="." surname="Vu, Quang Hieu">
      <organization></organization>
    </author>
    <author initials="." surname="Lupu, Mihai">
      <organization></organization>
    </author>
    <author initials="." surname="Ooi, Beng Chin">
      <organization></organization>
    </author>
    <date year="2010"/>
  </front>
</reference>
<reference anchor="Schleuder" target="https://schleuder.nadir.org/">
  <front>
    <title>Schleuder - A gpg-enabled mailinglist with remailing-capabilities.</title>
    <author >
      <organization>Nadir</organization>
    </author>
    <date year="2017"/>
  </front>
</reference>
<reference anchor="Crawford" target="https://www.bestvpn.com/the-webrtc-vpn-bug-and-how-to-fix-it/">
  <front>
    <title>The WebRTC VPN “Bug” and How to Fix</title>
    <author initials="D." surname="Crawford">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
</reference>
<reference anchor="Troncosoetal" target="https://www.petsymposium.org/2017/papers/issue4/paper87-2017-4-source.pdf">
  <front>
    <title>Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments</title>
    <author initials="C." surname="Troncoso">
      <organization></organization>
    </author>
    <author initials="M." surname="Isaakdis">
      <organization></organization>
    </author>
    <author initials="G." surname="Danezis">
      <organization></organization>
    </author>
    <author initials="H." surname="Halpin">
      <organization></organization>
    </author>
    <date year="2017"/>
  </front>
  <seriesInfo name="Proceedings on Privacy Enhancing Technologies ; 2017 (4):307–329" value=""/>
</reference>
<reference anchor="Mainwaringetal" target="http://www.dourish.com/classes/readings/Mainwaring-Infrastructure.pdf">
  <front>
    <title>Infrastructures and Their Discontents: Implications for Ubicomp</title>
    <author initials="S.D." surname="Mainwaring">
      <organization></organization>
    </author>
    <author initials="M.F." surname="Chang">
      <organization></organization>
    </author>
    <author initials="K." surname="Anderson">
      <organization></organization>
    </author>
    <date year="2004"/>
  </front>
  <seriesInfo name="DBLP Conference: Conference: UbiComp 2004: Ubiquitous Computing: 6th International Conference, Nottingham, UK, September 7-10, 2004. Proceedings" value=""/>
</reference>
<reference anchor="Bowker" >
  <front>
    <title>Information mythology and infrastructure</title>
    <author initials="G." surname="Bowker">
      <organization></organization>
    </author>
    <date year="1994"/>
  </front>
  <seriesInfo name="In: L. Bud (Ed.), Information Acumen: The Understanding and use of Knowledge in Modern Business,Routledge,London,1994,pp.231–247" value=""/>
</reference>
<reference anchor="Bloketal" >
  <front>
    <title>Infrastructuring Environments</title>
    <author initials="A." surname="Blok">
      <organization></organization>
    </author>
    <author initials="M." surname="Nakazora">
      <organization></organization>
    </author>
    <author initials="B.R." surname="Winthereik">
      <organization></organization>
    </author>
    <date year="2016"/>
  </front>
  <seriesInfo name="Science as Culture 25:1, 1-22." value=""/>
</reference>
<reference anchor="PipekWulf" >
  <front>
    <title>Infrastructuring: Towards an Integrated Perspective on the Design and Use of Information Technology</title>
    <author initials="V." surname="Pipek">
      <organization></organization>
    </author>
    <author initials="W." surname="Wolf">
      <organization></organization>
    </author>
    <date year="2009"/>
  </front>
  <seriesInfo name="Journal of the Association for Information Systems (10) 5, pp. 306-332" value=""/>
</reference>
<reference anchor="CRC" target="https://www.info.dfat.gov.au/Info/Treaties/treaties.nsf/AllDocIDs/E123F4F71DCAE3E7CA256B4F007F2905">
  <front>
    <title>Lorum</title>
    <author initials="." surname="Wikipedia">
      <organization></organization>
    </author>
    <date year="2000"/>
  </front>
</reference>
<reference anchor="CERD" target="https://www.info.dfat.gov.au/Info/Treaties/treaties.nsf/AllDocIDs/2F70352A0B65EB67CA256B6E0075FE13">
  <front>
    <title>Convention on the Elimination of all forms of Racial Discrimination</title>
    <author >
      <organization>United Nations</organization>
    </author>
    <date year="1966"/>
  </front>
</reference>
<reference anchor="Sauter" >
  <front>
    <title>The Coming Swarm</title>
    <author initials="M." surname="Sauter">
      <organization></organization>
    </author>
    <date year="2014"/>
  </front>
  <seriesInfo name="Bloomsbury" value=""/>
</reference>
<reference anchor="HRPC-charter" target="https://datatracker.ietf.org/doc/charter-irtf-hrpc/">
  <front>
    <title>Charter for Research Group</title>
    <author initials="." surname="Human Rights Protocol Consideration RG">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
</reference>
<reference anchor="CRPD" target="http://www.austlii.edu.au/au/other/dfat/treaties/2008/12.html">
  <front>
    <title>Convention on the Rights of Persons with Disabilities</title>
    <author >
      <organization>United Nations</organization>
    </author>
    <date year="2007"/>
  </front>
</reference>
<reference anchor="Nyokabi" target="https://repository.gchumanrights.org/bitstream/handle/20.500.11825/1582/3.Global%20article%20HRDA_2_2019.pdf?sequence=4&amp;isAllowed=y">
  <front>
    <title>The right to development and internet shutdowns: Assessing the role of information and communications technology in democratic development in Africa</title>
    <author initials="D.M." surname="Nyokabi">
      <organization></organization>
    </author>
    <author initials="N." surname="Diallo">
      <organization></organization>
    </author>
    <author initials="N.W." surname="Ntesang">
      <organization></organization>
    </author>
    <author initials="T.K." surname="White">
      <organization></organization>
    </author>
    <author initials="T." surname="Ilori">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="Stanford" target="https://plato.stanford.edu/entries/freedom-association/">
  <front>
    <title>Freedom of Association</title>
    <author initials="K." surname="Brownlee">
      <organization></organization>
    </author>
    <author initials="D." surname="Jenkins">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="ViennaDeclaration" target="https://www.ohchr.org/en/professionalinterest/pages/vienna.aspx">
  <front>
    <title>Vienna Declaration and Programme of Action</title>
    <author >
      <organization>United Nations</organization>
    </author>
    <date year="1993"/>
  </front>
</reference>
<reference anchor="Loi" target="https://link.springer.com/article/10.1007/s13347-019-00351-0">
  <front>
    <title>Two Concepts of Group Privacy</title>
    <author initials="M." surname="Loi">
      <organization></organization>
    </author>
    <author initials="M." surname="Christen">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
</reference>
<reference anchor="Glasius" target="https://academic.oup.com/isq/article/64/2/453/5823498">
  <front>
    <title>Illiberal Norm Diffusion: How Do Governments Learn to Restrict Nongovernmental Organizations?</title>
    <author initials="M." surname="Glasius">
      <organization></organization>
    </author>
    <author initials="J." surname="Schalk">
      <organization></organization>
    </author>
    <author initials="M." surname="De Lange">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
</reference>
<reference anchor="CoE" target="https://mk0rofifiqa2w3u89nud.kinstacdn.com/wp-content/uploads/COE-report-on-FOAA-rights-on-the-internet-.pdf">
  <front>
    <title>Freedom of assembly and association on the Internet</title>
    <author >
      <organization>Council of Europe</organization>
    </author>
    <date year="2015"/>
  </front>
</reference>
<reference anchor="APCtraining" target="http://itrainonline.org/itrainonline/mmtk/APC_IRHRCurriculum_FOA_Handout.pdf">
  <front>
    <title>Multimedia training kit</title>
    <author initials="D." surname="Sauter">
      <organization></organization>
    </author>
    <author >
      <organization>Association for Progressive Communications</organization>
    </author>
    <date year="2013"/>
  </front>
</reference>
<reference anchor="UNHRC2020" target="https://www.ohchr.org/EN/HRBodies/HRC/RegularSessions/Session44/Documents/A_HRC_44_24_AEV.docx">
  <front>
    <title>Impact of new technologies on the promotion and protection of human rights in the context of assemblies, including peaceful protests. Report of the United Nations High Commissioner for Human Rights A/HRC/44/24, 2020</title>
    <author initials="." surname="Michelle Bachelet">
      <organization></organization>
    </author>
    <author >
      <organization>United Nations</organization>
    </author>
    <date year="2000"/>
  </front>
</reference>
<reference anchor="Benkler2" target="http://is.gd/rxUpTQ">
  <front>
    <title>The wealth of Networks - How social production transforms markets and freedom</title>
    <author initials="Y." surname="Benkler">
      <organization></organization>
    </author>
    <date year="2006"/>
  </front>
  <seriesInfo name="New Haven and London - Yale University Press" value=""/>
</reference>
<reference anchor="W3C" target="https://www.w3.org/standards/webdesign/accessibility">
  <front>
    <title>Accessibility</title>
    <author >
      <organization>W3C</organization>
    </author>
    <date year="2015"/>
  </front>
</reference>
<reference anchor="Nasser" target="https://nas.sr/%D9%82%D9%84%D8%A8/">
  <front>
    <title>قلب</title>
    <author initials="R." surname="Nasser">
      <organization></organization>
    </author>
    <date year="2013"/>
  </front>
</reference>
<reference anchor="UNGPBHR" target="https://www.ohchr.org/documents/publications/guidingprinciplesbusinesshr_en.pdf">
  <front>
    <title>Guiding Principles on Business and Human Rights</title>
    <author >
      <organization>United Nations</organization>
    </author>
    <date year="2011"/>
  </front>
</reference>
<reference anchor="Kaye" target="https://www.ohchr.org/EN/HRbodies/HRC/RegularSessions/Session29/Documents/A.HRC.29.32_AEV.doc">
  <front>
    <title>The use of encryption and anonymity in digital communications</title>
    <author initials="D." surname="Kaye">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
</reference>
<reference anchor="LEAP" target="https://leap.se/en/about-us/vision">
  <front>
    <title>The Right to Whisper</title>
    <author >
      <organization>LEAP</organization>
    </author>
    <date year="2020"/>
  </front>
</reference>
<reference anchor="Marcus" target="http://www.cardozoaelj.com/wp-content/uploads/2013/02/Marcus.pdf">
  <front>
    <title>Commercial Speech on the Internet: Spam and the first amendment</title>
    <author initials="J." surname="Marcus">
      <organization></organization>
    </author>
    <date year="1998"/>
  </front>
</reference>
<reference anchor="APC3" target="https://www.apc.org/en/node/36145/#tools">
  <front>
    <title>Closer than ever</title>
    <author >
      <organization>Association for Progressive Communications</organization>
    </author>
    <date year="2020"/>
  </front>
</reference>
<reference anchor="UNHRC2018" target="https://digitallibrary.un.org/record/1639840?ln=en">
  <front>
    <title>UN Human Rights Council Resolution 'The promotion, protection and enjoyment of human rights on the Internet' (A/HRC/32/L.20)</title>
    <author >
      <organization>United Nations Human Rights Council</organization>
    </author>
    <date year="2016"/>
  </front>
</reference>
<reference anchor="UNGC37" target="https://tbinternet.ohchr.org/_layouts/15/treatybodyexternal/TBSearch.aspx?Lang=en&amp;TreatyID=8&amp;DocTypeID=11">
  <front>
    <title>Human Rights Committee “General comment No. 37 (2020) on the right of peaceful assembly (article 21)”, CCPR/C/GC/3</title>
    <author >
      <organization>United Nations Human Rights Committee</organization>
    </author>
    <date year="2020"/>
  </front>
</reference>
<reference anchor="UNSRFOAA2012" target="http://freeassembly.net/wp-content/uploads/2013/10/A-HRC-20-27_en-annual-report-May-2012.pdf">
  <front>
    <title>Report of the Special Rapporteur on the rights to freedom of peaceful assembly and of association", A/HRC/20/27</title>
    <author initials="." surname="Maina Kiai">
      <organization></organization>
    </author>
    <author >
      <organization>United Nations</organization>
    </author>
    <date year="2012"/>
  </front>
</reference>
<reference anchor="FoAdef" target="https://en.wikipedia.org/wiki/Freedom_of_association">
  <front>
    <title>Freedom of association</title>
    <author >
      <organization>Wikipedia</organization>
    </author>
    <date year="2021"/>
  </front>
</reference>
<reference anchor="RutzenZenn" >
  <front>
    <title>Association and Assembly in the Digital Age</title>
    <author initials="D." surname="Rutzen">
      <organization></organization>
    </author>
    <author initials="J." surname="Zenn">
      <organization></organization>
    </author>
    <date year="2011" month="December"/>
  </front>
  <seriesInfo name="The International Journal of Not-for-Profit Law, Volume 13, Issue 4" value=""/>
</reference>
<reference anchor="UNSRFAA2019" target="https://undocs.org/A/HRC/41/41">
  <front>
    <title>Report of the Special Rapporteur on the rights to freedom of peaceful assembly and of association</title>
    <author initials="." surname="Clément Voule">
      <organization></organization>
    </author>
    <author >
      <organization>United Nations</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>


    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

