<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version  (Ruby 3.0.4) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="-o*+"?>

<rfc ipr="trust200902" docName="draft-irtf-hrpc-association-10" category="info" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="FoA">Freedom of Association on the Internet</title>

    <author initials="N." surname="ten Oever" fullname="Niels ten Oever">
      <organization>University of Amsterdam</organization>
      <address>
        <email>mail@nielstenoever.net</email>
      </address>
    </author>
    <author initials="G." surname="Perez de Acha" fullname="Gisela Perez de Acha">
      <organization>Derechos Digitales</organization>
      <address>
        <email>gisela@derechosdigitales.org</email>
      </address>
    </author>
    <author initials="S." surname="Couture" fullname="Stéphane Couture">
      <organization>Université de Montréal</organization>
      <address>
        <email>stephane.couture@umontreal.ca</email>
      </address>
    </author>
    <author initials="M." surname="Knodel" fullname="Mallory Knodel">
      <organization>Center for Democracy &amp; Technology</organization>
      <address>
        <email>mknodel@cdt.org</email>
      </address>
    </author>

    <date year="2022" month="July" day="26"/>

    <area>IRTF</area>
    <workgroup>Human Rights Protocol Considerations Research Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document explores whether there is a relation between the Internet architecture and the ability of people to exercise their rights to peaceful assembly and  association online. It does so by asking the question: what are the protocol development considerations for freedom of assembly and association? The Internet increasingly mediates our lives, our relationships, and our ability to exercise our human rights. As a global assemblage, the Internet provides a public space, yet it is predominantly built on private infrastructure. Since Internet protocols and architecture play a central role in the management, development, and use of the Internet, we analyze the relation between protocols, architecture, and the rights to assemble and associate to mitigate infringements on those rights. This document concludes that the way in which infrastructure is designed and implemented impacts people’s ability to exercise their freedom of assembly and association. It is therefore recommended that the the potential impacts of Internet technologies should be assessed, reflecting recommendations of various UN bodies and norms. Finally, the document considers both the limitations on changing association and impact of "forced association" in the context of online platforms.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<figure><artwork><![CDATA[
    We shape our tools and, thereafter, our tools shape us. 

         - John Culkin (1967)

    Article 21 of the Covenant protects peaceful assemblies wherever 
    they take place: outdoors, indoors and online; in public and 
    private spaces; or a combination thereof.

         - General Comment 37 of the Human Rights Committee (2020)

    In the digital age, the exercise of the rights of peaceful 
    assembly and association has become largely dependent on business 
    enterprises, whose legal obligations, policies, technical 
    standards, financial models and algorithms can affect these 
    freedoms.

         - Annual Report to the UN Human Rights Council by the Special
         Rapporteur on the rights to freedom of peaceful assembly and 
         of association (2019).

]]></artwork></figure>

<t>The current draft continues the work started in “Research into Human Rights Protocol Considerations” <xref target="RFC8280"/> by investigating the impact of Internet protocols on a specific set of human rights, namely the right to peaceful assembly and the right to association. Taking into consideration the international human rights framework, the present document seeks to deepen the relationship between these human rights and Internet architecture, protocols, and standards. In that way, we continue the work of the Human Rights Protocol Consideration Research Group, as laid out in its charter,  “to expose the relation between protocols and human rights, with a focus on the rights to freedom of expression and freedom of assembly” <xref target="HRPC-charter"/>.</t>

</section>
<section anchor="vocabulary-used"><name>Vocabulary used</name>

<dl>
  <dt>Architecture</dt>
  <dd>
    <t>The design of a structure</t>
  </dd>
  <dt>Autonomous System (AS)</dt>
  <dd>
    <t>Autonomous Systems are the unit of routing policy in the modern world of exterior routing <xref target="RFC1930"/>.</t>
  </dd>
  <dt/>
  <dd>
    <t>Within the Internet, an autonomous system (AS) is a collection of connected Internet Protocol (IP) routing prefixes under the control of one or more network operators on behalf of a single administrative entity or domain that presents a common, clearly defined routing policy to the Internet <xref target="RFC1930"/>.</t>
  </dd>
  <dt/>
  <dd>
    <t>The classic definition of an Autonomous System is a set of routers under a single technical administration, using an interior gateway protocol and common metrics to route packets within the AS and using an exterior gateway protocol to route packets to other ASs
<xref target="RFC1771"/>.</t>
  </dd>
  <dt>Border Gateway Protocol (BGP)</dt>
  <dd>
    <t>An inter-Autonomous System routing protocol <xref target="RFC4271"/>.</t>
  </dd>
  <dt>Connectivity</dt>
  <dd>
    <t>The extent to which a device or network is able to reach other devices or networks to exchange data. The Internet is the tool for providing global connectivity <xref target="RFC1958"/>. Different types of connectivity are further specified in <xref target="RFC4084"/>. The combination of the end-to-end principle, interoperability, distributed architecture, resilience, reliability and robustness are the enabling factors that result in connectivity to and on the Internet.</t>
  </dd>
  <dt>Decentralization</dt>
  <dd>
    <t>Implementation or deployment of standards, protocols or systems without one single point of control.</t>
  </dd>
  <dt>Distributed system</dt>
  <dd>
    <t>A system with multiple components that have their behavior co-ordinated via message passing. These components are usually
spatially separated and communicate using a network, and may be managed by a single root of trust or authority <xref target="Troncosoetal"/>.</t>
  </dd>
  <dt>Infrastructure</dt>
  <dd>
    <t>Underlying basis or structure for a functioning society, organization or community. Because infrastructure is a precondition
for other activities it has a procedural, rather than static, nature due to its social and cultural embeddedness <xref target="PipekWulf"/>
<xref target="Bloketal"/>. This means that infrastructure is always relational: infrastructure always develops in relation to something or someone <xref target="Bowker"/>.</t>
  </dd>
  <dt>Internet</dt>
  <dd>
    <t>The Network of networks, that consists of Autonomous Systems that are connected through the Internet Protocol (IP).</t>
  </dd>
  <dt/>
  <dd>
    <t>A persistent socio-technical system over which services are delivered <xref target="Mainwaringetal"/>,</t>
  </dd>
  <dt/>
  <dd>
    <t>A techno-social assemblage of devices, users, sensors, networks, routers, governance, administrators, operators and protocols</t>
  </dd>
  <dt/>
  <dd>
    <t>An emergent-process-driven thing that is born from the collections of the ASes that happen to be gathered together at any given time. The fact that they tend to interact at any given time means it is an emergent property that happens because they use the protocols defined at IETF.</t>
  </dd>
  <dt>Right to peaceful assembly</dt>
  <dd>
    <t>"The right of peaceful assembly protects the non-violent gathering by persons for specific purposes, principally expressive ones. It constitutes an individual right that is exercised collectively. Inherent to the right is thus an associative element." <xref target="UNGC37"/></t>
  </dd>
  <dt>Right to association</dt>
  <dd>
    <t>'The right and freedom of association encompasses both an individual's right to join or leave groups voluntarily, the right of the group to take collective action to pursue the interests of its members, and the right of an association to accept or decline membership based on certain criteria.' <xref target="FoAdef"/></t>
  </dd>
</dl>

</section>
<section anchor="research-question"><name>Research question</name>

<t>The research question of this document is: what are the protocol development considerations for freedom of assembly and association?</t>

</section>
<section anchor="methodology"><name>Methodology</name>

<t>In this document, we deepen our exploration of human rights and protocols by assessing one specific set of human rights: freedom of association and assembly, abbreviated here as FAA. Our methodology for doing so is the following: first, we provide a brief twofold literature review addressing the philosophical and legal definitions of FAA and how this right has already been interpreted or analyzed in the digital context. This literature review is not exhaustive but aims at providing some lines of questioning that could later be used for protocol development. Second, we look at some cases of Internet protocols that are relevant to the sub-questions highlighted in the literature review and analyze how these protocols facilitate or inhibit the right to peaceful assembly and association.</t>

</section>
<section anchor="literature-review"><name>Literature Review</name>

<section anchor="faa-definition-and-core-treaties"><name>FAA definition and core treaties</name>

<t>The rights to peaceful assembly and the freedom of association are defined and guaranteed in national law and international treaties; however, in this document we limit outselves to international treaties. Article 20 of the Universal Declaration of Human Rights <xref target="UDHR"/> states that “Everyone has the right to freedom of peaceful assembly and association” and that “No one may be compelled to belong to an association”. Article 23 further guarantees that “Everyone has the right to form and to join trade unions for the protection of his interests”. In the International Covenant on Civil and Political Rights <xref target="ICCPR"/>, article 21 stipulates that “The right of peaceful assembly shall be recognized” and that “No restrictions may be placed on the exercise of this right other than those imposed in conformity with the law and which are necessary in a democratic society in the interests of national security or public safety, public order (ordre public), the protection of public health or morals or the protection of the rights and freedoms of others” while article 22 states that “Everyone shall have the right to freedom of association with others, including the right to form and join trade unions”.</t>

<t>General Comment No. 37 on the right of peaceful assembly by the United Nations Human Rights Committee affirms that the right of peaceful assembly protects non-violent online gatherings: “associated activities that happen online or otherwise rely upon digital services [...] are also protected” <xref target="UNGC37"/>. Interference with emerging communications technologies that offer the opportunity to assemble either wholly or partly online or play an integral role in organizing, participating in and monitoring physical gatherings are assumed to impede assemblies which are protected by this right. Moreover, any restriction on the ‘operation of information dissemination systems’ must conform with the tests for restrictions on freedom of expression (see below).</t>

<t>Other treaties are sometimes cited as the source and framework to the right to freedom of association and assembly. An example of this is Article 5 of the International Convention on the Elimination of All Forms of Racial Discrimination <xref target="CERD"/> which stipulates freedom of peaceful assembly and association should be guaranteed “without discrimination as to race, colour, national or ethnic origin”; Article 15 of the Convention on the Rights of the Child <xref target="CRC"/> which recognises these rights for children with the restrictions cited above; and Article 21 of the Convention on the Rights of Persons with Disabilities <xref target="CRPD"/> which insists on usable and accessible formats and technologies appropriate for persons with different kinds of disabilities. The freedoms of peaceful assembly and association are also protected under regional human rights treaties: article 11 of the European Convention on Human Rights, articles 15 and 16 of the American Convention on Human Rights, and articles 10 and 11 of the African Charter on Human and Peoples’ Rights.</t>

<t>From a more philosophical perspective, Brownlee and Jenkins <xref target="Stanford"/> make some interesting distinctions in particular regarding the concepts of association, assembly and interaction, deviating somewhat from what is established in interpretations of international human rights law. "Interaction" refers to any kind of interpersonal and often incidental engagements in daily life, like encountering strangers on a bus. Interaction is seen as a prerequisite for association. According to Brownlee and Jenkins, "assembly" has a more political connotation and is often used to refer to activists, protesters, or members of a group in a deliberating event. The authors refer to association as more "persistent connections" and distinguish between intimate associations, like friendship, love, or family, and collective association like trade unions or commercial businesses, or “expressive associations” like civil rights organizations or LGBTQIA associations. For Brownlee and Jenkins <xref target="Stanford"/>, the right to association is linked to different relative freedoms: permission (to associate or dissociate), claim-right (to oppose others interfering with our conduct), power (to alter the status of our association), and immunity (from other people interfering in our right). Freedom of association thus refers both to the individual right to join or leave a group and to the collective right to form or dissolve a group.</t>

<t>Freedoms of association and peaceful assembly, however, are relative and not absolute. Excluding someone from an association based on their sex, race or other individual characteristic is also often contentious if not illegal. As mentioned above, international human rights law provides the framework for legitimate restrictions on these rights, as well as the right to privacy and the right to freedom of expression and opinion. Restrictions can be imposed by states, but only if this is lawful and proportionate. States must document how these limitations are necessary in the interests of national security or public safety, public order, the protection of public health or morals, or the protection of the rights and freedoms of others. Finally, states must also protect participants against possible abuses by non-state actors.</t>

<t>The Human Rights Committee explores a few restrictions of activities of free association online or activities of free association reliant upon digital services, that are also protected under article 21, and stipulates that “States parties must not, for example, block or hinder Internet connectivity in relation to peaceful assemblies.  The same applies to geotargeted or technology-specific interference with connectivity or access to content.” Additionally, “States should ensure that the activities of Internet service providers and intermediaries do not unduly restrict assemblies or the privacy of assembly participants.” <xref target="UNGC37"/>.</t>

<t>Interpreting international law, the right to freedom of peaceful assembly and the right to freedom of association protects any collective, gathered either permanently or temporarily for peaceful purposes, online and offline. It is important to underline the property of “freedom” because the right to freedom of association and assembly is voluntary and uncoerced: anyone can join or leave a group of choice, which in turn means one should not be forced to either join, stay or leave. In other words, free association means that only the association of people itself determines who can be a member. An assembly is an "intentional and temporary gathering of a collective in a private or public space for a specific purpose: demonstrations, indoor meetings, strikes, processions, rallies, or even sits-in" <xref target="UNGA"/>. Association has a more formal and established nature and refer to a group of individuals or legal entities brought together in order to collectively act, express, promote, pursue, or defend a field of common interests <xref target="UNSRFOAA2012"/>. Think about civil society organizations, clubs, cooperatives, NGOs, religious associations, political parties, trade unions, or foundations.</t>

<t>When talking about the human right of freedom of association and assembly, one should always take into account that "all human rights are indivisible, interrelated, unalienable, universal, and mutually reinforcing" <xref target="ViennaDeclaration"/>. This means that in the analysis of the impact of a certain variable on freedom of association and assembly one should take other human rights into account too. When devising an approach to mitigate a possible negative influence on this right, one should also always take into account the possible impact this might have on other rights. For example, the following rights are often impacted in conjunction with freedom of association and assembly: the right to political participation, the right to privacy, the right to freedom of expression, and the right to access to information. For instance, when the right to political participation is hampered, this often happens in conjunction with a limitation of the freedom of association and assembly because political participation is often done collectively. When the right to privacy is hampered, this privacy of particular groups is also impacted (so-called ‘group privacy’ <xref target="Loi"/>), which potentially has consequences for the right to association and assembly. Where the freedom of expression of a group is hampered, such as in protests or through Internet shutdowns, this both hampers other people’s ability to receive the information of the group and impacts the right to assembly of the people who seek to express themselves as a group <xref target="Nyokabi"/>.</t>

<t>Finally, if the right to association and assembly is limited by national law, this does not mean it is consistent with international human rights law. In such a case, the national law would therefore not be legitimate <xref target="Glasius"/>.</t>

</section>
<section anchor="faa-in-the-digital-era"><name>FAA in the digital era</name>

<t>The United Nations Human Rights Council adopted resolutions on the promotion, protection and enjoyment of human rights on the Internet in 2012, 2014, 2016 and 2018, affirming and reaffirming  "that the same rights that people have offline must also be protected online" <xref target="UNHRC2018"/>. Therefore the digital environment is no exception to application of the right of freedom of association. Various other resolutions and reports have established the online applicability of the freedoms of association and assembly, most recently and authoritatively the Human Rights Committee in General Comment 37 (2020)<xref target="UNGC37"/>. The questions that remain are how these rights should be conceptualized and implemented in different parts and levels of digital environments.</t>

<t>The right to freedom of assembly and association online is the subject of increasing discussions and analysis. Especially since social media played an important role in several revolutions in 2011, there have been increasing and ever more sophisticated attacks by autocratic governments on online communities and other associational activities occurring on the Internet <xref target="RutzenZenn"/>. In 2016, the Council of Europe published the “Report by the Committee of experts on cross-border flow of Internet traffic and Internet freedom on Freedom of assembly and association on the Internet” <xref target="CoE"/> which noted that while the Internet and communication technologies are not explicitly mentioned in international treaties, these treaties nevertheless apply to “the online environment”. The report argues that the “Internet is the public sphere of the 21st century”, demonstrated by the fact that informal associations can be gathered at scale in a matter of hours on the Internet, and that digital communication tools often serve to facilitate, publicize or otherwise enable associations or assemblies in person, like a protest or demonstration. The report notes, on the other hand, the negative ways in which the Internet can also be used to promote or facilitate terrorism, violence and hate speech, thus insisting on the “extremely important and urgent” need to fight online terrorist activities such as recruitment or mobilization, while at the same time respecting the right to peaceful assembly and association of other users. The report mentions the following examples that could further our reflection:</t>

<t><list style="symbols">
  <t>network shutdowns during the Arab Spring, to prevent people from organising themselves or assembling</t>
  <t>California’s Bay Area Rapid Transit (BART) shutdown of mobile phone service, to prevent potential property destruction by protesters and disruption of service</t>
  <t>the wholesale blocking of Google as a violation of freedom of expression</t>
  <t>the telecom company Telus's blocking of customers’ access to websites critical of Telus during a Telecommunications Workers Union strike against it</t>
  <t>the targeting of social media users who call for or organise protests though the Internet in Turkey’s Gezi Park protests</t>
  <t>mass surveillance or other interferences with privacy in the context of law enforcement and national security</t>
  <t>use of VPNs (Virtual Private Networks) and the Tor network to ensure anonymity</t>
  <t>Distributed Denial of Service attacks (DDoS) as civil disobedience.</t>
</list></t>

<t>In 2019 a UN Special Rapporteur noted the opportunities and challenges posed by digital networks to the rights to freedom of peaceful assembly and of association <xref target="UNSRFAA2019"/>. The report recommends that international human rights norms and principles should be used as a framework “that guides digital technology companies’ design, control and governance of digital technologies”. The report states that “technical standards” in particular can affect the freedom of association and assembly, and makes some relevant recommendations, including:</t>

<t><list style="symbols">
  <t>"[Undertake] human rights impact assessments which incorporate the rights to freedom of peaceful assembly and of association when developing or modifying their products and services,”</t>
  <t>“increase the quality of participation in and implementation of existing multi-stakeholder initiatives,”</t>
  <t>“collaborate with governments and civil society to develop technology that promotes and strengthens human rights,”</t>
  <t>“support the research and development of appropriate technological solutions to online harassment, disinformation and propaganda, including tools to detect and identify State-linked accounts and bots,” and</t>
  <t>“adopt monitoring indicators that include specific concerns related to freedom of peaceful assembly and association.”</t>
</list></t>

<t>In one of their “training kits” <xref target="APCtraining"/>, the Association of Progressive Communications addressed different impacts of the internet on association and assembly and raised three particular issues worthy to note here:</t>

<t><list style="numbers">
  <t>Organization of protests. Internet and social media are enablers of protests, such as it was seen in the “Arab Spring”. Some of these protests - like online petitions or campaigns - are similar to offline association and assembly, but other protest forms are inherent to the Internet. Hacking and DDoS are subject to controversy within the Internet community: some finding them legitimate acts of protest, and others not.</t>
  <t>Surveillance. While the Internet facilitates association, that association in turn leaves many traces that can be used for law enforcement or for repression of political dissent. Even the threat of surveillance can deter association.</t>
  <t>Anonymity and pseudonymity. Anonymity and pseudonymity can be useful protection mechanisms for those who’d like to attend online assemblies without facing retribution. On the other hand, anonymity can be used to harm society, such as in online fraud or sexual predation.</t>
</list></t>

<t>Online association and assembly are the starting point of civic mass mobilization in modern democracies, and even more so where physical gatherings have been impossible or dangerous <xref target="APC"/>. Throughout the world - from the Arab Spring to Latin American student movements and the #WomensMarch - the Internet has played a crucial role by providing means for the fast dissemination of information otherwise mediated by the press, or even forbidden by the government <xref target="Pensado"/>. According to Hussain and Howard the Internet helped “build solidarity networks and identification of collective identities and goals, extend the range of local coverage to international broadcast networks” and served as a platform for contestation of “the future of civil society and information infrastructure” <xref target="HussainHoward"/>. The IETF itself, defined as an "open global community" of network designers, operators, vendors, and researchers <xref target="RFC3233"/> is also protected by freedom of assembly and association. Discussions, comments and consensus around RFCs are possible because of the collective expression that freedom of association and assembly allow. The very word “protocol” found its way into the language of computer networking based on the need for collective agreement among a group of assembled network users <xref target="HafnerandLyon"/>.</t>

<t><xref target="RFC8280"/> discusses issues of FAA, specifically:</t>

<t><list style="symbols">
  <t>The expansion of DNS as an enabler of association for minorities. The document argues that the expansion of the DNS to allow for new generic Top Level Domains (gTLDs) can have negative impacts on freedom of association because of restrictive policies by some registries and registrars. On the other hand, gTLDs could also enable communities to build clearly identifiable spaces for association (such as .gay).</t>
  <t>The impact of Distributed Denial of Service attacks on freedom of association. Whereas DDoS has been used as a tool for protest, in many cases this is infringing on other parties freedom of expression. Furthermore,  often devices (such as IoT devices and routers) are inscribed in such DDoS attacks without the owner's or user's consent. Thus they do not have the possibility to exit this assembly. Therefore the document concluded that the IETF ”should try to ensure that their protocols cannot be used for DDoS attacks”.</t>
  <t>The impact of middleboxes on the ability of users to connect to the Internet. Lack of connectivity can significantly impact freedom of assembly and association. In particular, if the user cannot retrieve the reason for their inability to connect, there may not be access to due process to dispute the lack of (secure or private) connectivity, either in general or to a specific service.</t>
</list></t>

<t>In June 2020, the United Nations High Commissioner for Human Rights concluded that technologies can be enablers of the excercise of FAA, but technology is also significantly used to interfere with those rights. Specifically, the report mentions network shutdowns and the use of technology to surveil or crack down on protesters, leading to human rights violations. This includes facial recognition technology, among other ways to violate the (group) privacy of people engaged in an assembly or association. The report makes it explicit that companies play a significant role, by developing, providing or selling the technology, but also by directly causing these violations <xref target="UNHRC2020"/>.</t>

</section>
<section anchor="specific-questions-raised-from-the-literature-review"><name>Specific questions raised from the literature review</name>

<t>Here are some questions raised from the literature review that can have implications for protocol design:</t>

<t><list style="numbers">
  <t>Should protocols be designed to enable legitimate limitations on association in the interests of “national security or public safety, public order (ordre public), the protection of public health or morals or the protection of the rights and freedoms of others”, as stated in the ICCPR article 21 <xref target="ICCPR"/>? Where in the stack do we care for FAA?</t>
  <t>Can protocols facilitate agency of membership in associations, assemblies and interactions?</t>
  <t>What are the features of protocols that enable freedom of association and assembly?</t>
  <t>Does protocol development sufficiently consider usable and accessible formats and technologies appropriate for all persons, including those with different kinds of abilities?</t>
  <t>Can a protocol be designed to legitimately exclude someone from an association?</t>
</list></t>

<t>In the following sections we attempt to answer these questions with specific examples of standardized protocols in the IETF.</t>

</section>
</section>
<section anchor="analysis"><name>Analysis</name>

<t>As the Internet mediates collective action and collaboration, it impacts on freedom of association and assembly. To answer our research question regarding how internet architecture enables and/or inhibits such human rights, we researched several independent and typical cases related to protocols that have been either adopted by the IETF, or are widely used on the Internet.  Our goal is to determine how they facilitate freedom of assembly and association, or how they inhibit it through their design or implementation.</t>

<t>We are aware that some of the following examples go beyond the use of Internet protocols and flow over into the application layer or examples in the offline world whereas the purpose of the current document is to break down the relationship between Internet protocols and the right to freedom of assembly and association. Nonetheless, we do recognize that in some cases the line between them and applications, implementations, policies and offline realities are often blurred and hard -if not impossible- to differentiate.</t>

<t>We use the literature review to guide our process of inquiry for each case, and to dive deeper in what can be found interesting about each case as it relates to freedom of association.</t>

<section anchor="got-no-peace-spam-and-ddos"><name>Got No Peace: Spam and DDoS</name>
<figure><artwork><![CDATA[
Should protocols be designed to enable legitimate limitations on 
association in the interests of “national security or public safety, 
public order (ordre public), the protection of public health or morals 
or the protection of the rights and freedoms of others”, as stated in 
the ICCPR article 21 {{ICCPR}}? Where in the stack do we care for FAA?
]]></artwork></figure>

<t>The 2020 report by the United Nations Special Rapporteur on Human Rights <xref target="UNHRC2020"/> described how technology is often used to limit freedom of assembly and association, such as through network shutdowns and the surveillance of groups. Because access to the Internet is crucial not only for freedom of association and assembly, but also for the right to development, and the right to freedom of expression and information <xref target="Nyokabi"/>, the United Nation Special Rapporteur advises to:</t>

<figure><artwork><![CDATA[
(b) Avoid resorting to disruptions and shutdowns of Internet or 
telecommunications networks at all times and particularly during 
assemblies, including those taking place in electoral contexts 
and during times of unrest;
]]></artwork></figure>

<t>Whereas states have an obligation to protect human rights, there has been an increasing call for non-state actors, such as companies, also to respect human rights <xref target="UNGPBHR"/>. The UN adopted guiding principles on business and human rights <xref target="UNGPBHR"/> and talks within the HRC are ongoing about an international legally binding instrument to regulate the activities of transnational corporations and other business enterprises. This includes a chain-responsibility of actors: not only that the company’s own processes should not negatively impact human rights, but also that the company should also engage in due diligence processes, such as human rights impact assessments. This includes an assessment of whether the products that are sold, or the services that are provided, can be used to engage in human rights violations, or whether human rights violations occur in any stage of the supply chain of the company. If this is the case, measures should be taken to mitigate this.</t>

<t>In the case of dual-use technologies, where technology could be used for legitimate purposes, but could also be used to limit freedom of association or assembly, this obligation might mean that producers or sellers should limit the parties they sell to, or even better, ensure that the illegitimate use of the technology is not technically possible anymore, or made more difficult.</t>

<section anchor="spam"><name>Spam</name>

<t>In the 1990s as the Internet became more widely adopted, spam came to be defined as irrelevant or unsolicited messages that were posted many times to multiple news groups or mailing lists <xref target="Marcus"/>. Here the question of consent, but also harm, are crucial. In the 2000s a significant part of the technical and policy debate on spam revolved around the fact that certain corporations, protected by the right to freedom of expression, considered spam to be a form of "commercial speech", thus encompassed by free expression rights <xref target="Marcus"/>. Yet spam can be not only a nuisance, but a threat to systems and users.</t>

<t>This leaves us with an interesting case around spam mitigation: spam is currently handled mostly by mail providers on behalf of the user. Next to that, countries are increasingly adopting regulatory opt-in regimes for mailing lists and commercial e-mail, with a possibility of serious fines in case of violation. Yet many ask: is spam not the equivalent of the fliers and handbills ever present in our offline world? The big difference between the proliferation of such messages offline and online is the scale. It is not hard for a single person to message a lot of people online, whereas if that person needed to go house by house the impact of their efforts would be much smaller. Conversely, if it were a common practice to expose people to unlimited unwanted messages online, users would be drowned in such messages. This puts a large burden on filtering, and in sifting through many messages, other expressions would be drowned out and would be severely hampered.  Allowing unlimited sending of unsolicited messages would be a blow against freedom of speech: when everyone talks, nobody can hear.</t>

<t>Whereas one could perhaps consider singular instances in which spam could be proportional, legitimate uses of online campaigning, or online protesting, would be drowned out by other spam. Furthermore, the individual receiving the spam never consented to receiving it. Finally, the widespread usage of spam constitutes an attack on the internet infrastructure in terms of mailservers, bandwidth, and inboxes. This in turn thus hamper the freedom of association and assembly that is happening in and is facilitated through the internet infrastructure. Finally, spam leads to spam filtering by users and mail providers on behalf of the user, this in turn might lead to the blocking of messages that a user would consent to, but that get caught in the filter.</t>

</section>
<section anchor="ddos"><name>DDoS</name>

<t>Distributed Denial of Service attacks are leveled against a server or service by a controller of multiple hosts by overloading the server or service’s bandwidth or resources (volume-based floods) or exploiting protocol behaviours (protocol attacks). DDoS attacks can thus stifle the right to assemble online for organisations whose websites are targeted. At the same time there are comparisons made between DDoS attacks and sit-in protests <xref target="Sauter"/>. However the main distinction is significant: only a small fragment of “participants” (from controllers to compromised device owners) in DDoS attacks are aware or willing <xref target="RFC8280"/>. Notably, DDoS attacks are increasingly used to commit crimes such as extortion, which infringe on others’ human rights.</t>

<t>Because of the interrelation of technologies, it cannot be said that there is one point in the technical stack where one can locate the characteristics of “peaceful” or “non-peaceful” association visible to protocol developers. In the cases of spam blocking and DDoS mitigation, “peaceful or non-peaceful” is not a meaningful heuristic, or even characteristic, of problematic content. Their commonalities are their volume, and the unrequested nature of particpation in DDoS and the receiving of spam. One could say that the 'receivers' of demonstrations did not ask for it either, but in the case of spam the receivers are generally a larger group than one particular target, else the spam could be described as a DDoS attack against one target. This allows us to draw the conclusion that DDoS and spam are not examples of freedom of association or assembly.</t>

</section>
</section>
<section anchor="holistic-agency-mailing-lists-and-spam"><name>Holistic Agency: Mailing Lists and Spam</name>

<figure><artwork><![CDATA[
Can protocols facilitate agency of membership in associations, 
assemblies and interactions?
]]></artwork></figure>

<section anchor="mailing-lists"><name>Mailing lists</name>

<t>Since the beginning of the Internet mailing lists have been a key site of assembly and association <xref target="RFC0155"/> <xref target="RFC1211"/>. In fact, mailing lists were one of the Internet’s first functionalities <xref target="HafnerandLyon"/>.</t>

<t>In 1971 four years after the invention of email, the first mailing list was created to talk about the idea of using Arpanet for discussion. What had initially propelled the Arpanet project forward as a resource sharing platform was gradually replaced by the idea of a network as a means of bringing people together <xref target="Abbate"/>. More than 45 years later, mailing lists are pervasive and help communities to engage, have discussions, share information, ask questions, and build ties. Even as social media and discussion forums grow, mailing lists continue to be widely used <xref target="AckermannKargerZhang"/> and are still a crucial tool to organise groups and individuals around themes and causes <xref target="APC3"/>.</t>

<t>Mailing lists’ pervasive use are partly explained because they allow for free and low-cost association: people subscribe (join) and unsubscribe (leave) as they please, another example that explains their wide use is that email functions on low bandwith connections and across platforms. Mailing lists also allow for association of specific groups on closed lists. This enables agency of membership, a key component of freedom of association and assembly.</t>

<t>As we mentioned before, there are interesting implications for freedom of association and assembly when looking at spam mitigation. Here we want to specifically note that if we consider that the rights to assembly and association also mean that "no one may be compelled to belong to an association" <xref target="UDHR"/>, spam infringes both rights if an opt-out mechanism is not provided and people are obliged to receive unwanted information, or be reached by people they do not wish to be in contact with.</t>

</section>
</section>
<section anchor="civics-in-cyberspace-messaging-conferencing-and-networking"><name>Civics in Cyberspace: Messaging, Conferencing, and Networking</name>

<figure><artwork><![CDATA[
What are the features of protocols that enable freedom of 
association and assembly?
]]></artwork></figure>

<t>Civic participation is often expressed as the freedom to associate and assemble, along with other enabling rights such as freedom of expression and the right to privacy. Former UN Special Rapporteur David Kaye established a strong relationship between technology that allows anonymity and uses encryption with positive effects on freedom of expression <xref target="Kaye"/>. Here we look at messaging, including email, mailing lists and internet relay chat; video conferencing; and peer-to-peer networking protocols to investigate the common features that enable freedom of association and assembly online.</t>

<section anchor="email"><name>Email</name>

<t>Email was one of the first applications of the early Internet that showed what the architecture was really capable of, namely allowing people to exchange messages much faster and much cheaper than communication networks could do before. This enabled many collaborations among academics and other users of the early network, showcasing the importance of email in the forming of assemblies and associations. Whereas many messaging solutions have been invented since email, it is still widely used because of its distributed architecture, reliability, and ability to function on a wide range of devices and platforms.</t>

</section>
<section anchor="mailing-lists-1"><name>Mailing lists</name>

<t>Not only are mailing lists a good example of how protocols can facilitate the necessary ingredient of agency in freedom of association, we can see how particular features of mailing lists that enable freedom of association and assembly.</t>

<t>The archival function of mailing lists allows for posterior accountability and analysis.</t>

<t>The ubiquity and interoperability of email, and by extension mailing lists, provides a low barrier to entry to an inclusive medium.</t>

<t>Association and assembly online can be undermined when right to privacy is at risk. One downside of mailing lists are the privacy and security concerns generally associated with email. End-to-end encryption with OpenPGP <xref target="RFC4880"/> and S​/​MIME <xref target="RFC5751"/> can keep email communications authenticated and confidential if properly configured, deployed and used, but users often do not have those protections. And with mailing lists, this protection is not typically possible, because with many lists the final recipients are not known to the sender. There have been experimental solutions to address this issue <xref target="Schleuder"/>, but this has not been standardized or widely deployed.</t>

</section>
<section anchor="irc"><name>IRC</name>

<t>Internet Relay Chat (IRC) is an application layer protocol that enables communication in the form of text through a client/server networking model <xref target="RFC2810"/>: a chat service. IRC clients are computer programs that a user can install on their system. These clients communicate with chat servers to transfer messages to other clients. Features of IRC include: federated design, transport encryption, one-to-many routing, creation of topic-based “channels”, and spam or abuse moderation.</t>

<t>For the purposes of civic participation and freedom of association and assembly in particular, it is critical that IRC’s federated design allows many interoperable, yet customisable, instances and basic assurance of confidentiality through transport encryption. IRC differs from email in the sense that it allows for real-time interaction, stimulating the sense of conversation. This allows people to organize, develop ideas as well as joint identities. This is strengthened through the federated nature of IRC, which gives users the ability to use and connect through different servers, contributing to freedom of association. We investigate the particular aspect of agency in membership through moderation in the section 'Block Together Now: IRC and Refusals' below.</t>

</section>
<section anchor="webrtc"><name>WebRTC</name>

<t>Multi-party video conferencing protocols like WebRTC <xref target="RFC6176"/> <xref target="RFC7118"/> allow for robust, bandwidth-adaptive, wideband and super-wideband video and audio discussions in groups. This facilites exchanges over the Internet in a similar manner to IRC, but including the usage of audio and video. WebRTC can be configured as direct peer-to-peer videochat without sending data through a central server. This ability to function without a central server is a strong facilitator of freedom of association and assembly.</t>

<t>However, WebRTC comes with many different configuration options, which can leave users open to unexpected privacy leakages:</t>

<figure><artwork><![CDATA[
‘The WebRTC protocol was designed to enable responsive real-time
communications over the Internet, and is instrumental in 
allowing streaming video and conferencing applications to run in 
the browser. In order to easily facilitate direct connections
between computers (bypassing the need for a central server to act 
as a gatekeeper), WebRTC provides functionality to automatically 
collect the local and public IP addresses of Internet users (ICE 
or STUN). These functions do not require consent from the user,
and can be instantiated by sites that a user visits without their 
awareness. The potential privacy implications of this aspect of 
WebRTC are well documented, and certain browsers have provided 
options to limit its behavior.’ 
]]></artwork></figure>

<t><xref target="AndersonGuarnieri"/></t>

<t>Even though some multi-party video conferencing tools facilitate freedom of assembly and association, their own configuration might might pose concrete risks for those who use them. On the one hand WebRTC is providing resilient channels of communications, but on the other hand it also exposes information about those who are using the tool which might lead to increased surveillance, identification and the consequences that might be derived from that. This is especially concerning because the usage of a VPN does not protect against the exposure of IP addresses <xref target="Crawford"/>.</t>

<t>The risk of surveillance is also exists in offline spaces, but this is generally slightly easier to analyze for the user. Security and privacy expectations of the user could be either improved or made explicit. This in turn would result in a more secure and/or private exercise of the right to freedom of assembly or association.</t>

</section>
<section anchor="peer-to-peer-networking"><name>Peer-to-peer networking</name>

<t>Since the ARPANET project, the original idea behind the Internet was conceived as what we would now call a peer-to-peer system <xref target="RFC0001"/>. Over time it has increasingly shifted towards a client/server model with “millions of consumer clients communicating with a relatively privileged set of servers” <xref target="NelsonHedlun"/>. However, the foundational networking protocol of the modern Internet, the Border Gateway Protocol <xref target="RFC1163"/> <xref target="RFC1164"/> <xref target="RFC4271"/>, still functions like original peer to peer network, with an extensive practice of peering and transit <xref target="MeierHahn2015"/>. For an example higher up the stack one could look at the peer-to-peer architecture of BitTorrent <xref target="RFC5694"/>.</t>

<t>At the organizational level, peer production is one of the most relevant innovations from Internet mediated social practices. According to <xref target="Benkler"/> these networks imply ‘open collaborative innovation and creation, performed by diverse, decentralized groups organized principally by neither price signals nor organizational hierarchy, harnessing heterogeneous motivations, and governed and managed based on principles other than the residual authority of ownership implemented through contract.’ <xref target="Benkler"/>.</t>

<t>In his book The Wealth of Networks, <xref target="Benkler2"/> significantly expands on his definition of commons-based peer production. In his view, what distinguishes commons-based production is that it doesn’t rely upon or propagate proprietary knowledge: “The inputs and outputs of the process are shared, freely or conditionally, in an institutional form that leaves them equally available for all to use as they choose at their individual discretion.” <xref target="Benkler2"/>. To ensure that the knowledge generated is available for free use, commons-based projects are often shared under an open license</t>

<t>Peer-to-peer (P2P) is essentially a model of how people interact in real life because “we deal directly with one another whenever we wish to” <xref target="Vu"/>. Usually if we need something we ask our peers, who in turn refer us to other peers. In this sense, the ideal definition of P2P is that “nodes are able to directly exchange resources and services between themselves without the need for centralized servers” where each participating node typically acts both as a server and as a client <xref target="Vu"/>. <xref target="RFC5694"/> has defined it as peers or nodes that should be able to communicate directly between themselves without passing intermediaries, and that the system should be self-organizing and have decentralized control <xref target="RFC5694"/>. With this in mind, the ultimate model of P2P is a completely decentralized system, which is more resistant to speech regulation, immune to single points of failure and has a higher performance and scalability. Nonetheless, in practice some P2P systems are supported by centralized servers and some others have hybrid models where nodes are organized into two layers: the upper tier servers and the lower tier common nodes <xref target="Vu"/>.</t>

<t>Whether for resource sharing or data sharing, P2P systems are enabling freedom of assembly and association. Not only do they allow for effective dissemination of information, but they leverage computing resources by diminishing costs allowing for the formation of open collectives at the network level. At the same time, in completely decentralized systems the nodes are autonomous and can join or leave the network as they want -a characteristic that makes the system unpredictable: a resource might be only sometimes available, and some other resources might be missing or incomplete <xref target="Vu"/>. Lack of information might in turn makes association or assembly more difficult.</t>

</section>
</section>
<section anchor="universal-access-the-web"><name>Universal Access: The Web</name>

<figure><artwork><![CDATA[
Does protocol development sufficiently consider usable and accessible 
formats and technologies appropriate for persons with different kinds 
of abilities?
]]></artwork></figure>

<section anchor="accessiblity"><name>Accessiblity</name>

<t>The W3C has done significant work to ensure that the Web is accessible to people with diverse physical abilities <xref target="W3C"/>. For example, the implementation of these accessibility standards help people who have issues with seeing or rendering images to understand what the image depicts. Making the Web more accessible for people with diverse physical abilities enables them to exercise their right to online assembly and association. While there are accessibility standards implemented for the Web, this is less the case for the Internet.</t>

</section>
<section anchor="internationalization"><name>Internationalization</name>

<t>The IETF uses English as its primary working language, both in its documentation and in its communication. This is also the case for reference implementations. It is estimated that roughly 20% of the Earth’s population speaks English, whereas only 360 million speak English as their first language. <xref target="RFC2277"/> describes that ‘"Internationalization is for humans. This means that protocols are not subject to internationalization; text strings are.", this implies that protocol developers, as well as people that work with protocols, are not people, or that protocol developers all speak English. This means that it is significantly easier for people who have a command of the English language to become a protocol developer. It could lead to a divergence, with the development of separate protocols that are developed within large language communities that don't use English language or Latin script. This makes it harder for people who seek to shape their own space of association and assembly on the Internet to do so. And is thus driving these communities into, often proprietary and non-interoperable services such as Facebook and Weibo where use of their own script is possible and supported.</t>

<t>When Ramsey Nasser developed the Arabic programming language قلب (transliterated Qalb, Qlb and Alb) <xref target="Nasser"/> he called it ‘engineering performance art’ instead of engineering, because he knew that his language would not work. In part this is because all modern programming tools are based on the ASCII character set, which encodes Latin characters and was based on the English language. This highlights cultural biases of computer science and engineering. Despite long significant efforts, it is still largely impossible to register an email address in a language such as Devanagari, Arabic, or Chinese. Even if it is possible, it is to be expected that there will be a significant failure rate in sending and receiving emails to and from other services. This makes it harder for people who do not speak English and/or don’t use the Latin script to exercise their freedom of association and assembly.</t>

</section>
</section>
<section anchor="block-together-now-irc-and-refusals"><name>Block Together Now: IRC and Refusals</name>

<figure><artwork><![CDATA[
Can a protocol be designed to legitimately exclude someone 
from an association?
]]></artwork></figure>

<t>Previously we spoke about the privacy protecting features of IRC that enable freedom of association and assembly, including transport security. But now we turn to the ability to block users and effectively moderate discussions on IRC as a key feature of the technology that enables agency in membership, a key aspect of freedom of association and assembly.</t>

<t>For order to be kept within the IRC network, special classes of users become “operators” and are allowed to perform general maintenance functions on the network: basic network tasks such as disconnecting (temporary or permanently) and reconnecting servers as needed <xref target="RFC2812"/>. One of the most controversial powers of operators is the ability to remove a user from the connected network by ‘force’, i.e., operators are able to close the connection between any client and server <xref target="RFC2812"/>.</t>

<t>Moderation and de-federation can be a tool to uphold freedom of association and assembly, because it allows groups to have control over their own make up. However, at the same time, these controls can also seriously hamper the ability of a group to get together. Some argue that the low cost of creating a new group is a protection against this, however, this could lead to a repetition of crises of moderation of membership and speech.</t>

<t>IRC servers may deploy different policies for the ability of users to create their own channels or ‘rooms’, and for the delegation of ‘operator’-rights in such spaces. Some IRC servers support SSL/TLS connections for security purposes <xref target="RFC7194"/> which helps stop the use of packet sniffer programs to obtain the passwords of IRC users and barring an ISP or government from knowing which user I am on IRC, but has little use beyond this scope due to the public nature of IRC channels. TLS connections require both client and server support (that may require the user to install TLS binaries and IRC client specific patches or modules on their computers). Some networks also use TLS for server to server connections, and provide a special channel flag (such as +S) to only allow TLS-connected users on the channel, while disallowing operator identification in clear text, to better utilize the advantages that TLS provides.</t>

</section>
</section>
<section anchor="conclusions-what-can-we-learn-from-these-case-studies"><name>Conclusions: What can we learn from these case studies?</name>

<t>Communities, collaboration and joint action lie at the heart of the Internet. Even at a linguistic level, the words "networks" and "associations" are closely related.  Both are groups and assemblies of people who depend on "links" and "relationships" <xref target="Swire"/>. Taking legal definitions given in international human rights law and related normative documents, we can easily conclude that the rights to freedom of assembly and association protect collective activity online. These rights protect gatherings by persons for a specific purpose and groups with a defined aim over time for a variety of peaceful, expressive and non-expressive purposes, if and when participation is voluntary and uncoerced.</t>

<t>Given that the Internet itself was originally designed as a medium of communication for machines that share resources with each other as equals <xref target="RFC0903"/>, the Internet is now one of the most basic infrastructures for assembly and association. Since Internet protocols and the Internet architecture play a central role in the management, development and use of the Internet, we established the relation between protocols and the right to freedom of assembly and association.</t>

<t>After reviewing several cases representative of FAA considerations inherent in protocols standardized at the IETF, we can conclude that the way in which infrastructure is designed and implemented impacts people's ability to exercise their freedom of assembly and association. This is because different technical designs come with different properties and characteristics. These properties and characteristics on the one hand enable people to assemble and associate, but on the other hand also add limiting, or even potentially endangering, characteristics. More often than not, this depends on the context. A clearly identified group for open communications, where messages are sent in cleartext and where people's persistent identities are visible, can help to facilitate an assembly and build trust, but in other contexts the same configuration could pose a significant danger. Endangering characteristics should be mitigated, or at least clearly communicated to the users of these technologies. It is therefore recommended that the the potential impacts of Internet technologies should be assessed, reflecting recommendations of various UN bodies and norms.</t>

<t>Lastly, the increasing shift towards closed and non-interoperable platforms in chat and social media networks have a significant impact on the distributed and open nature of the Internet. Often these non-interoperable platforms are built on open protocols but do not allow for interoperability or data portability. Future research could further investigate how the use of social media platforms has enabled groups to associate, but also how it rendered users unable to change platforms, therefore leading to a sort of “forced association” that inhibits people to fully exercise their freedom of assembly and association.</t>

</section>
<section anchor="acknowledgements"><name>Acknowledgements</name>

<t><list style="symbols">
  <t>Fred Baker and Jefsey for work on Internet definitions.</t>
  <t>Stephane Bortzmeyer, ICNL, and Lisa Vermeer for several concrete text suggestions that found their way in this document.</t>
  <t>Mark Perkins and Gurshabad for finding a lot of typos.</t>
  <t>Nick Doty, Gurshabad Grover, an anonymous reviewer, ICNL, Lisa Vermeer, and Sandra Braman for full reviews.</t>
  <t>The hrpc mailinglist at large for a very constructive discussion on a hard topic.</t>
</list></t>

</section>
<section anchor="work-space"><name>Work Space</name>

<t>Current work on this draft is happening at: https://github.com/IRTF-HRPC/draft-association
Pull requests and issues are welcome.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>As this draft concerns a research document, there are no security considerations.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document has no actions for IANA.</t>

</section>
<section anchor="research-group-information"><name>Research Group Information</name>

<t>The discussion list for the IRTF Human Rights Protocol Considerations Research Group is located at the e-mail address <eref target="mailto:hrpc@ietf.org">hrpc@ietf.org</eref>. Information on the group and information on how to
subscribe to the list is at <eref target="https://www.irtf.org/mailman/listinfo/hrpc">https://www.irtf.org/mailman/listinfo/hrpc</eref></t>

<t>Archives of the list can be found at:
<eref target="https://www.irtf.org/mail-archive/web/hrpc/current/index.html">https://www.irtf.org/mail-archive/web/hrpc/current/index.html</eref></t>

</section>


  </middle>

  <back>



    <references title='Informative References'>





<reference anchor='RFC0001' target='https://www.rfc-editor.org/info/rfc1'>
<front>
<title>Host Software</title>
<author fullname='S. Crocker' initials='S.' surname='Crocker'><organization/></author>
<date month='April' year='1969'/>
</front>
<seriesInfo name='RFC' value='1'/>
<seriesInfo name='DOI' value='10.17487/RFC0001'/>
</reference>



<reference anchor='RFC0155' target='https://www.rfc-editor.org/info/rfc155'>
<front>
<title>ARPA Network mailing lists</title>
<author fullname='J.B. North' initials='J.B.' surname='North'><organization/></author>
<date month='May' year='1971'/>
</front>
<seriesInfo name='RFC' value='155'/>
<seriesInfo name='DOI' value='10.17487/RFC0155'/>
</reference>



<reference anchor='RFC0903' target='https://www.rfc-editor.org/info/rfc903'>
<front>
<title>A Reverse Address Resolution Protocol</title>
<author fullname='R. Finlayson' initials='R.' surname='Finlayson'><organization/></author>
<author fullname='T. Mann' initials='T.' surname='Mann'><organization/></author>
<author fullname='J.C. Mogul' initials='J.C.' surname='Mogul'><organization/></author>
<author fullname='M. Theimer' initials='M.' surname='Theimer'><organization/></author>
<date month='June' year='1984'/>
<abstract><t>This RFC suggests a method for workstations to dynamically find their    protocol address (e.g., their Internet Address), when they know only    their hardware address (e.g., their attached physical network address).    This RFC specifies a proposed protocol for the ARPA Internet community,    and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='STD' value='38'/>
<seriesInfo name='RFC' value='903'/>
<seriesInfo name='DOI' value='10.17487/RFC0903'/>
</reference>



<reference anchor='RFC1163' target='https://www.rfc-editor.org/info/rfc1163'>
<front>
<title>Border Gateway Protocol (BGP)</title>
<author fullname='K. Lougheed' initials='K.' surname='Lougheed'><organization/></author>
<author fullname='Y. Rekhter' initials='Y.' surname='Rekhter'><organization/></author>
<date month='June' year='1990'/>
<abstract><t>This RFC, together with its companion RFC-1164, &quot;Application of the Border Gateway Protocol in the Internet&quot;, specify an inter-autonomous system routing protocol for the Internet.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='1163'/>
<seriesInfo name='DOI' value='10.17487/RFC1163'/>
</reference>



<reference anchor='RFC1164' target='https://www.rfc-editor.org/info/rfc1164'>
<front>
<title>Application of the Border Gateway Protocol in the Internet</title>
<author fullname='J.C. Honig' initials='J.C.' surname='Honig'><organization/></author>
<author fullname='D. Katz' initials='D.' surname='Katz'><organization/></author>
<author fullname='M. Mathis' initials='M.' surname='Mathis'><organization/></author>
<author fullname='Y. Rekhter' initials='Y.' surname='Rekhter'><organization/></author>
<author fullname='J.Y. Yu' initials='J.Y.' surname='Yu'><organization/></author>
<date month='June' year='1990'/>
<abstract><t>This RFC, together with its companion RFC-1163, &quot;A Border Gateway Protocol (BGP)&quot;, specify an inter-autonomous system routing protocol for the Internet.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='1164'/>
<seriesInfo name='DOI' value='10.17487/RFC1164'/>
</reference>



<reference anchor='RFC1211' target='https://www.rfc-editor.org/info/rfc1211'>
<front>
<title>Problems with the maintenance of large mailing lists</title>
<author fullname='A. Westine' initials='A.' surname='Westine'><organization/></author>
<author fullname='J. Postel' initials='J.' surname='Postel'><organization/></author>
<date month='March' year='1991'/>
<abstract><t>This RFC discusses problems with maintaining large mailing lists, especially the processing of error reports.  This memo provides information for the Internet community.  It does not specify an Internet standard.</t></abstract>
</front>
<seriesInfo name='RFC' value='1211'/>
<seriesInfo name='DOI' value='10.17487/RFC1211'/>
</reference>



<reference anchor='RFC1771' target='https://www.rfc-editor.org/info/rfc1771'>
<front>
<title>A Border Gateway Protocol 4 (BGP-4)</title>
<author fullname='Y. Rekhter' initials='Y.' surname='Rekhter'><organization/></author>
<author fullname='T. Li' initials='T.' surname='Li'><organization/></author>
<date month='March' year='1995'/>
<abstract><t>This document, together with its companion document, &quot;Application of the Border Gateway Protocol in the Internet&quot;, define an inter-autonomous system routing protocol for the Internet. [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='1771'/>
<seriesInfo name='DOI' value='10.17487/RFC1771'/>
</reference>



<reference anchor='RFC1930' target='https://www.rfc-editor.org/info/rfc1930'>
<front>
<title>Guidelines for creation, selection, and registration of an Autonomous System (AS)</title>
<author fullname='J. Hawkinson' initials='J.' surname='Hawkinson'><organization/></author>
<author fullname='T. Bates' initials='T.' surname='Bates'><organization/></author>
<date month='March' year='1996'/>
<abstract><t>This memo discusses when it is appropriate to register and utilize an Autonomous System (AS), and lists criteria for such.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='6'/>
<seriesInfo name='RFC' value='1930'/>
<seriesInfo name='DOI' value='10.17487/RFC1930'/>
</reference>



<reference anchor='RFC2277' target='https://www.rfc-editor.org/info/rfc2277'>
<front>
<title>IETF Policy on Character Sets and Languages</title>
<author fullname='H. Alvestrand' initials='H.' surname='Alvestrand'><organization/></author>
<date month='January' year='1998'/>
<abstract><t>This document is the current policies being applied by the Internet Engineering Steering Group (IESG) towards the standardization efforts in the Internet Engineering Task Force (IETF) in order to help Internet protocols fulfill these requirements.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='18'/>
<seriesInfo name='RFC' value='2277'/>
<seriesInfo name='DOI' value='10.17487/RFC2277'/>
</reference>



<reference anchor='RFC2810' target='https://www.rfc-editor.org/info/rfc2810'>
<front>
<title>Internet Relay Chat: Architecture</title>
<author fullname='C. Kalt' initials='C.' surname='Kalt'><organization/></author>
<date month='April' year='2000'/>
<abstract><t>This document is an update describing the architecture of the current IRC protocol and the role of its different components.  Other documents describe in detail the protocol used between the various components defined here.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='2810'/>
<seriesInfo name='DOI' value='10.17487/RFC2810'/>
</reference>



<reference anchor='RFC2812' target='https://www.rfc-editor.org/info/rfc2812'>
<front>
<title>Internet Relay Chat: Client Protocol</title>
<author fullname='C. Kalt' initials='C.' surname='Kalt'><organization/></author>
<date month='April' year='2000'/>
<abstract><t>This document defines the Client Protocol, and assumes that the reader is familiar with the IRC Architecture.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='2812'/>
<seriesInfo name='DOI' value='10.17487/RFC2812'/>
</reference>



<reference anchor='RFC3233' target='https://www.rfc-editor.org/info/rfc3233'>
<front>
<title>Defining the IETF</title>
<author fullname='P. Hoffman' initials='P.' surname='Hoffman'><organization/></author>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='February' year='2002'/>
<abstract><t>This document gives a more concrete definition of &quot;the IETF&quot; as it understood today.  Many RFCs refer to &quot;the IETF&quot;.  Many important IETF documents speak of the IETF as if it were an already-defined entity. However, no IETF document correctly defines what the IETF is.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='58'/>
<seriesInfo name='RFC' value='3233'/>
<seriesInfo name='DOI' value='10.17487/RFC3233'/>
</reference>



<reference anchor='RFC1958' target='https://www.rfc-editor.org/info/rfc1958'>
<front>
<title>Architectural Principles of the Internet</title>
<author fullname='B. Carpenter' initials='B.' role='editor' surname='Carpenter'><organization/></author>
<date month='June' year='1996'/>
<abstract><t>The Internet and its architecture have grown in evolutionary fashion from modest beginnings, rather than from a Grand Plan. While this process of evolution is one of the main reasons for the technology's success, it nevertheless seems useful to record a snapshot of the current principles of the Internet architecture. This is intended for general guidance and general interest, and is in no way intended to be a formal or invariant reference model.  This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind.</t></abstract>
</front>
<seriesInfo name='RFC' value='1958'/>
<seriesInfo name='DOI' value='10.17487/RFC1958'/>
</reference>



<reference anchor='RFC4084' target='https://www.rfc-editor.org/info/rfc4084'>
<front>
<title>Terminology for Describing Internet Connectivity</title>
<author fullname='J. Klensin' initials='J.' surname='Klensin'><organization/></author>
<date month='May' year='2005'/>
<abstract><t>As the Internet has evolved, many types of arrangements have been advertised and sold as &quot;Internet connectivity&quot;.  Because these may differ significantly in the capabilities they offer, the range of options, and the lack of any standard terminology, the effort to distinguish between these services has caused considerable consumer confusion.  This document provides a list of terms and definitions that may be helpful to providers, consumers, and, potentially, regulators in clarifying the type and character of services being offered.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='104'/>
<seriesInfo name='RFC' value='4084'/>
<seriesInfo name='DOI' value='10.17487/RFC4084'/>
</reference>



<reference anchor='RFC4271' target='https://www.rfc-editor.org/info/rfc4271'>
<front>
<title>A Border Gateway Protocol 4 (BGP-4)</title>
<author fullname='Y. Rekhter' initials='Y.' role='editor' surname='Rekhter'><organization/></author>
<author fullname='T. Li' initials='T.' role='editor' surname='Li'><organization/></author>
<author fullname='S. Hares' initials='S.' role='editor' surname='Hares'><organization/></author>
<date month='January' year='2006'/>
<abstract><t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t><t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems.  This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t><t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR).  These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network &quot;class&quot; within BGP.  BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t><t>This document obsoletes RFC 1771.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4271'/>
<seriesInfo name='DOI' value='10.17487/RFC4271'/>
</reference>



<reference anchor='RFC4880' target='https://www.rfc-editor.org/info/rfc4880'>
<front>
<title>OpenPGP Message Format</title>
<author fullname='J. Callas' initials='J.' surname='Callas'><organization/></author>
<author fullname='L. Donnerhacke' initials='L.' surname='Donnerhacke'><organization/></author>
<author fullname='H. Finney' initials='H.' surname='Finney'><organization/></author>
<author fullname='D. Shaw' initials='D.' surname='Shaw'><organization/></author>
<author fullname='R. Thayer' initials='R.' surname='Thayer'><organization/></author>
<date month='November' year='2007'/>
<abstract><t>This document is maintained in order to publish all necessary information needed to develop interoperable applications based on the OpenPGP format.  It is not a step-by-step cookbook for writing an application.  It describes only the format and methods needed to read, check, generate, and write conforming packets crossing any network.  It does not deal with storage and implementation questions. It does, however, discuss implementation issues necessary to avoid security flaws.</t><t>OpenPGP software uses a combination of strong public-key and symmetric cryptography to provide security services for electronic communications and data storage.  These services include confidentiality, key management, authentication, and digital signatures.  This document specifies the message formats used in OpenPGP.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4880'/>
<seriesInfo name='DOI' value='10.17487/RFC4880'/>
</reference>



<reference anchor='RFC5694' target='https://www.rfc-editor.org/info/rfc5694'>
<front>
<title>Peer-to-Peer (P2P) Architecture: Definition, Taxonomies, Examples, and Applicability</title>
<author fullname='G. Camarillo' initials='G.' role='editor' surname='Camarillo'><organization/></author>
<author><organization>IAB</organization></author>
<date month='November' year='2009'/>
<abstract><t>In this document, we provide a survey of P2P (Peer-to-Peer) systems. The survey includes a definition and several taxonomies of P2P systems.  This survey also includes a description of which types of applications can be built with P2P technologies and examples of P2P applications that are currently in use on the Internet.  Finally, we discuss architectural trade-offs and provide guidelines for deciding whether or not a P2P architecture would be suitable to meet the requirements of a given application.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='5694'/>
<seriesInfo name='DOI' value='10.17487/RFC5694'/>
</reference>



<reference anchor='RFC5751' target='https://www.rfc-editor.org/info/rfc5751'>
<front>
<title>Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.2 Message Specification</title>
<author fullname='B. Ramsdell' initials='B.' surname='Ramsdell'><organization/></author>
<author fullname='S. Turner' initials='S.' surname='Turner'><organization/></author>
<date month='January' year='2010'/>
<abstract><t>This document defines Secure/Multipurpose Internet Mail Extensions (S/MIME) version 3.2.  S/MIME provides a consistent way to send and receive secure MIME data.  Digital signatures provide authentication, message integrity, and non-repudiation with proof of origin. Encryption provides data confidentiality.  Compression can be used to reduce data size.  This document obsoletes RFC 3851.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5751'/>
<seriesInfo name='DOI' value='10.17487/RFC5751'/>
</reference>



<reference anchor='RFC6176' target='https://www.rfc-editor.org/info/rfc6176'>
<front>
<title>Prohibiting Secure Sockets Layer (SSL) Version 2.0</title>
<author fullname='S. Turner' initials='S.' surname='Turner'><organization/></author>
<author fullname='T. Polk' initials='T.' surname='Polk'><organization/></author>
<date month='March' year='2011'/>
<abstract><t>This document requires that when Transport Layer Security (TLS) clients and servers establish connections, they never negotiate the use of  Secure Sockets Layer (SSL) version 2.0.  This document updates the  backward compatibility sections found in the Transport Layer Security (TLS). [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6176'/>
<seriesInfo name='DOI' value='10.17487/RFC6176'/>
</reference>



<reference anchor='RFC7118' target='https://www.rfc-editor.org/info/rfc7118'>
<front>
<title>The WebSocket Protocol as a Transport for the Session Initiation Protocol (SIP)</title>
<author fullname='I. Baz Castillo' initials='I.' surname='Baz Castillo'><organization/></author>
<author fullname='J. Millan Villegas' initials='J.' surname='Millan Villegas'><organization/></author>
<author fullname='V. Pascual' initials='V.' surname='Pascual'><organization/></author>
<date month='January' year='2014'/>
<abstract><t>The WebSocket protocol enables two-way real-time communication between clients and servers in web-based applications.  This document specifies a WebSocket subprotocol as a reliable transport mechanism between Session Initiation Protocol (SIP) entities to enable use of SIP in web-oriented deployments.</t></abstract>
</front>
<seriesInfo name='RFC' value='7118'/>
<seriesInfo name='DOI' value='10.17487/RFC7118'/>
</reference>



<reference anchor='RFC7194' target='https://www.rfc-editor.org/info/rfc7194'>
<front>
<title>Default Port for Internet Relay Chat (IRC) via TLS/SSL</title>
<author fullname='R. Hartmann' initials='R.' surname='Hartmann'><organization/></author>
<date month='August' year='2014'/>
<abstract><t>This document describes the commonly accepted practice of listening on TCP port 6697 for incoming Internet Relay Chat (IRC) connections encrypted via TLS/SSL.</t></abstract>
</front>
<seriesInfo name='RFC' value='7194'/>
<seriesInfo name='DOI' value='10.17487/RFC7194'/>
</reference>



<reference anchor='RFC8280' target='https://www.rfc-editor.org/info/rfc8280'>
<front>
<title>Research into Human Rights Protocol Considerations</title>
<author fullname='N. ten Oever' initials='N.' surname='ten Oever'><organization/></author>
<author fullname='C. Cath' initials='C.' surname='Cath'><organization/></author>
<date month='October' year='2017'/>
<abstract><t>This document aims to propose guidelines for human rights considerations, similar to the work done on the guidelines for privacy considerations (RFC 6973).  The other parts of this document explain the background of the guidelines and how they were developed.</t><t>This document is the first milestone in a longer-term research effort.  It has been reviewed by the Human Rights Protocol Considerations (HRPC) Research Group and also by individuals from outside the research group.</t></abstract>
</front>
<seriesInfo name='RFC' value='8280'/>
<seriesInfo name='DOI' value='10.17487/RFC8280'/>
</reference>


<reference anchor="UDHR" target="http://www.un.org/en/documents/udhr/">
  <front>
    <title>The Universal Declaration of Human Rights</title>
    <author >
      <organization>United Nations General Assembly</organization>
    </author>
    <date year="1948"/>
  </front>
</reference>
<reference anchor="ICCPR" target="http://www.ohchr.org/EN/ProfessionalInterest/Pages/CCPR.aspx">
  <front>
    <title>International Covenant on Civil and Political Rights</title>
    <author >
      <organization>United Nations General Assembly</organization>
    </author>
    <date year="1966"/>
  </front>
</reference>
<reference anchor="HussainHoward" target="https://doi.org/10.1111/misr.12020">
  <front>
    <title>What Best Explains Successful Protest Cascades? ICTs and the Fuzzy Causes of the Arab Spring</title>
    <author initials="M. M." surname="Hussain">
      <organization></organization>
    </author>
    <author initials="P. N." surname="Howard">
      <organization></organization>
    </author>
    <date year="2013"/>
  </front>
  <seriesInfo name="Int Stud Rev (2013) 15 (1): 48-66." value=""/>
</reference>
<reference anchor="APC" target="https://www.apc.org/es/system/files/FOAA_online_IndiaMalaysiaPakistan.pdf">
  <front>
    <title>Freedom of assembly and association online in India, Malaysia and Pakistan. Trends, challenges and recommendations.</title>
    <author >
      <organization>Association for Progressive Communications</organization>
    </author>
    <author initials="" surname="Gayathry Venkiteswaran">
      <organization></organization>
    </author>
    <date year="2016"/>
  </front>
</reference>
<reference anchor="Swire" target="https://ssrn.com/abstract=1989516 or http://dx.doi.org/10.2139/ssrn.1989516">
  <front>
    <title>Social Networks, Privacy, and Freedom of Association: Data Empowerment vs. Data Protection</title>
    <author initials="" surname="Peter Swire">
      <organization></organization>
    </author>
    <date year="2012"/>
  </front>
  <seriesInfo name="North Carolina Law Review (2012) 90 (1): 104." value=""/>
</reference>
<reference anchor="UNGA" target="http://www.un.org/en/ga/search/view_doc.asp?symbol=A/59/401 para. 46">
  <front>
    <title>Human rights defenders</title>
    <author initials="" surname="Hina Jilani">
      <organization></organization>
    </author>
    <date year="2004"/>
  </front>
  <seriesInfo name="A/59/401" value=""/>
</reference>
<reference anchor="HafnerandLyon" target="https://doi.org/10.1111/misr.12020">
  <front>
    <title>Where Wizards Stay Up Late. The Origins of the Internet</title>
    <author initials="K." surname="Hafnerand">
      <organization></organization>
    </author>
    <author initials="M." surname="Lyon">
      <organization></organization>
    </author>
    <date year="1998"/>
  </front>
  <seriesInfo name="First Touchstone Edition (1998): 93." value=""/>
</reference>
<reference anchor="Pensado" target="http://revista.drclas.harvard.edu/book/student-activism">
  <front>
    <title>Student Activism. Utopian Dreams.</title>
    <author initials="" surname="Jaime Pensado">
      <organization></organization>
    </author>
    <date year="2012"/>
  </front>
  <seriesInfo name="ReVista. Harvard Review of Latin America (2012)." value=""/>
</reference>
<reference anchor="Abbate" target="https://mitpress.mit.edu/books/inventing-internet">
  <front>
    <title>Inventing the Internet</title>
    <author initials="" surname="Janet Abbate">
      <organization></organization>
    </author>
    <date year="2013"/>
  </front>
  <seriesInfo name="Cambridge: MIT Press (2013): 11." value=""/>
</reference>
<reference anchor="AckermannKargerZhang" target="https://people.csail.mit.edu/axz/papers/mailinglists.pdf">
  <front>
    <title>Mailing Lists: Why Are They Still Here, What’s Wrong With Them, and How Can We Fix Them?</title>
    <author initials="M. S." surname="Ackerman">
      <organization></organization>
    </author>
    <author initials="D. R." surname="Karger">
      <organization></organization>
    </author>
    <author initials="A. X." surname="Zhang">
      <organization></organization>
    </author>
    <date year="2017"/>
  </front>
  <seriesInfo name="Mit. edu (2017): 1." value=""/>
</reference>
<reference anchor="Benkler" target="http://www.benkler.org/Peer%20production%20and%20cooperation%2009.pdf">
  <front>
    <title>Peer Production and Cooperation</title>
    <author initials="Y." surname="Benkler">
      <organization></organization>
    </author>
    <date year="2009"/>
  </front>
</reference>
<reference anchor="AndersonGuarnieri" target="https://iranthreats.github.io/resources/webrtc-deanonymization/">
  <front>
    <title>Fictitious Profiles and WebRTC's Privacy Leaks Used to Identify Iranian Activists</title>
    <author initials="C." surname="Anderson">
      <organization></organization>
    </author>
    <author initials="C." surname="Guarnieri">
      <organization></organization>
    </author>
    <date year="2016"/>
  </front>
</reference>
<reference anchor="NelsonHedlun" target="http://library.uniteddiversity.coop/REconomy_Resource_Pack/More_Inspirational_Videos_and_Useful_Info/Peer_to_Peer-Harnessing_the_Power_of_Disruptive_Technologies.pdf">
  <front>
    <title>A Network of Peers: Models Through the History of the Internet</title>
    <author initials="N." surname="Minar">
      <organization></organization>
    </author>
    <author initials="M." surname="Hedlun">
      <organization></organization>
    </author>
    <date year="2001"/>
  </front>
  <seriesInfo name="Peer to Peer: Harnessing the Power of Disruptive Technologies, ed: Andy Oram" value=""/>
</reference>
<reference anchor="Vu" target="https://www.springer.com/cn/book/9783642035135">
  <front>
    <title>Peer-to-Peer Computing: Principles and Applications</title>
    <author initials="" surname="Vu, Quang Hieu">
      <organization></organization>
    </author>
    <author initials="" surname="Lupu, Mihai">
      <organization></organization>
    </author>
    <author initials="" surname="Ooi, Beng Chin">
      <organization></organization>
    </author>
    <date year="2010"/>
  </front>
</reference>
<reference anchor="Schleuder" target="https://schleuder.nadir.org/">
  <front>
    <title>Schleuder - A gpg-enabled mailinglist with remailing-capabilities.</title>
    <author >
      <organization>Nadir</organization>
    </author>
    <date year="2017"/>
  </front>
</reference>
<reference anchor="Crawford" target="https://www.bestvpn.com/the-webrtc-vpn-bug-and-how-to-fix-it/">
  <front>
    <title>The WebRTC VPN “Bug” and How to Fix</title>
    <author initials="D." surname="Crawford">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
</reference>
<reference anchor="Troncosoetal" target="https://www.petsymposium.org/2017/papers/issue4/paper87-2017-4-source.pdf">
  <front>
    <title>Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments</title>
    <author initials="C." surname="Troncoso">
      <organization></organization>
    </author>
    <author initials="M." surname="Isaakdis">
      <organization></organization>
    </author>
    <author initials="G." surname="Danezis">
      <organization></organization>
    </author>
    <author initials="H." surname="Halpin">
      <organization></organization>
    </author>
    <date year="2017"/>
  </front>
  <seriesInfo name="Proceedings on Privacy Enhancing Technologies ; 2017 (4):307–329" value=""/>
</reference>
<reference anchor="Mainwaringetal" target="http://www.dourish.com/classes/readings/Mainwaring-Infrastructure.pdf">
  <front>
    <title>Infrastructures and Their Discontents: Implications for Ubicomp</title>
    <author initials="S. D." surname="Mainwaring">
      <organization></organization>
    </author>
    <author initials="M. F." surname="Chang">
      <organization></organization>
    </author>
    <author initials="K." surname="Anderson">
      <organization></organization>
    </author>
    <date year="2004"/>
  </front>
  <seriesInfo name="DBLP Conference: Conference: UbiComp 2004: Ubiquitous Computing: 6th International Conference, Nottingham, UK, September 7-10, 2004. Proceedings" value=""/>
</reference>
<reference anchor="Bowker" >
  <front>
    <title>Information mythology and infrastructure</title>
    <author initials="G." surname="Bowker">
      <organization></organization>
    </author>
    <date year="1994"/>
  </front>
  <seriesInfo name="In: L. Bud (Ed.), Information Acumen: The Understanding and use of Knowledge in Modern Business,Routledge,London,1994,pp.231–247" value=""/>
</reference>
<reference anchor="Bloketal" >
  <front>
    <title>Infrastructuring Environments</title>
    <author initials="A." surname="Blok">
      <organization></organization>
    </author>
    <author initials="M." surname="Nakazora">
      <organization></organization>
    </author>
    <author initials="B. R." surname="Winthereik">
      <organization></organization>
    </author>
    <date year="2016"/>
  </front>
  <seriesInfo name="Science as Culture 25:1, 1-22." value=""/>
</reference>
<reference anchor="PipekWulf" >
  <front>
    <title>Infrastructuring: Towards an Integrated Perspective on the Design and Use of Information Technology</title>
    <author initials="V." surname="Pipek">
      <organization></organization>
    </author>
    <author initials="W." surname="Wolf">
      <organization></organization>
    </author>
    <date year="2009"/>
  </front>
  <seriesInfo name="Journal of the Association for Information Systems (10) 5, pp. 306-332" value=""/>
</reference>
<reference anchor="CRC" target="https://www.info.dfat.gov.au/Info/Treaties/treaties.nsf/AllDocIDs/E123F4F71DCAE3E7CA256B4F007F2905">
  <front>
    <title>Lorum</title>
    <author initials="" surname="Wikipedia">
      <organization></organization>
    </author>
    <date year="2000"/>
  </front>
</reference>
<reference anchor="CERD" target="https://www.info.dfat.gov.au/Info/Treaties/treaties.nsf/AllDocIDs/2F70352A0B65EB67CA256B6E0075FE13">
  <front>
    <title>Convention on the Elimination of all forms of Racial Discrimination</title>
    <author >
      <organization>United Nations</organization>
    </author>
    <date year="1966"/>
  </front>
</reference>
<reference anchor="Sauter" >
  <front>
    <title>The Coming Swarm</title>
    <author initials="M." surname="Sauter">
      <organization></organization>
    </author>
    <date year="2014"/>
  </front>
  <seriesInfo name="Bloomsbury" value=""/>
</reference>
<reference anchor="HRPC-charter" target="https://datatracker.ietf.org/doc/charter-irtf-hrpc/">
  <front>
    <title>Charter for Research Group</title>
    <author initials="" surname="Human Rights Protocol Consideration RG">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
</reference>
<reference anchor="CRPD" target="http://www.austlii.edu.au/au/other/dfat/treaties/2008/12.html">
  <front>
    <title>Convention on the Rights of Persons with Disabilities</title>
    <author >
      <organization>United Nations</organization>
    </author>
    <date year="2007"/>
  </front>
</reference>
<reference anchor="Nyokabi" target="https://repository.gchumanrights.org/bitstream/handle/20.500.11825/1582/3.Global%20article%20HRDA_2_2019.pdf?sequence=4&amp;isAllowed=y">
  <front>
    <title>The right to development and internet shutdowns: Assessing the role of information and communications technology in democratic development in Africa</title>
    <author initials="D. M." surname="Nyokabi">
      <organization></organization>
    </author>
    <author initials="N." surname="Diallo">
      <organization></organization>
    </author>
    <author initials="N. W." surname="Ntesang">
      <organization></organization>
    </author>
    <author initials="T. K." surname="White">
      <organization></organization>
    </author>
    <author initials="T." surname="Ilori">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="Stanford" target="https://plato.stanford.edu/entries/freedom-association/">
  <front>
    <title>Freedom of Association</title>
    <author initials="K." surname="Brownlee">
      <organization></organization>
    </author>
    <author initials="D." surname="Jenkins">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="ViennaDeclaration" target="https://www.ohchr.org/en/professionalinterest/pages/vienna.aspx">
  <front>
    <title>Vienna Declaration and Programme of Action</title>
    <author >
      <organization>United Nations</organization>
    </author>
    <date year="1993"/>
  </front>
</reference>
<reference anchor="Loi" target="https://link.springer.com/article/10.1007/s13347-019-00351-0">
  <front>
    <title>Two Concepts of Group Privacy</title>
    <author initials="M." surname="Loi">
      <organization></organization>
    </author>
    <author initials="M." surname="Christen">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
</reference>
<reference anchor="Glasius" target="https://academic.oup.com/isq/article/64/2/453/5823498">
  <front>
    <title>Illiberal Norm Diffusion: How Do Governments Learn to Restrict Nongovernmental Organizations?</title>
    <author initials="M." surname="Glasius">
      <organization></organization>
    </author>
    <author initials="J." surname="Schalk">
      <organization></organization>
    </author>
    <author initials="M." surname="De Lange">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
</reference>
<reference anchor="CoE" target="https://mk0rofifiqa2w3u89nud.kinstacdn.com/wp-content/uploads/COE-report-on-FOAA-rights-on-the-internet-.pdf">
  <front>
    <title>Freedom of assembly and association on the Internet</title>
    <author >
      <organization>Council of Europe</organization>
    </author>
    <date year="2015"/>
  </front>
</reference>
<reference anchor="APCtraining" target="http://itrainonline.org/itrainonline/mmtk/APC_IRHRCurriculum_FOA_Handout.pdf">
  <front>
    <title>Multimedia training kit</title>
    <author initials="D." surname="Sauter">
      <organization></organization>
    </author>
    <author >
      <organization>Association for Progressive Communications</organization>
    </author>
    <date year="2013"/>
  </front>
</reference>
<reference anchor="UNHRC2020" target="https://www.ohchr.org/EN/HRBodies/HRC/RegularSessions/Session44/Documents/A_HRC_44_24_AEV.docx">
  <front>
    <title>Impact of new technologies on the promotion and protection of human rights in the context of assemblies, including peaceful protests. Report of the United Nations High Commissioner for Human Rights A/HRC/44/24, 2020</title>
    <author initials="" surname="Michelle Bachelet">
      <organization></organization>
    </author>
    <author >
      <organization>United Nations</organization>
    </author>
    <date year="2000"/>
  </front>
</reference>
<reference anchor="Benkler2" target="http://is.gd/rxUpTQ">
  <front>
    <title>The wealth of Networks - How social production transforms markets and freedom</title>
    <author initials="Y." surname="Benkler">
      <organization></organization>
    </author>
    <date year="2006"/>
  </front>
  <seriesInfo name="New Haven and London - Yale University Press" value=""/>
</reference>
<reference anchor="W3C" target="https://www.w3.org/standards/webdesign/accessibility">
  <front>
    <title>Accessibility</title>
    <author >
      <organization>W3C</organization>
    </author>
    <date year="2015"/>
  </front>
</reference>
<reference anchor="Nasser" target="https://nas.sr/%D9%82%D9%84%D8%A8/">
  <front>
    <title>قلب</title>
    <author initials="R." surname="Nasser">
      <organization></organization>
    </author>
    <date year="2013"/>
  </front>
</reference>
<reference anchor="UNGPBHR" target="https://www.ohchr.org/documents/publications/guidingprinciplesbusinesshr_en.pdf">
  <front>
    <title>Guiding Principles on Business and Human Rights</title>
    <author >
      <organization>United Nations</organization>
    </author>
    <date year="2011"/>
  </front>
</reference>
<reference anchor="Kaye" target="https://www.ohchr.org/EN/HRbodies/HRC/RegularSessions/Session29/Documents/A.HRC.29.32_AEV.doc">
  <front>
    <title>The use of encryption and anonymity in digital communications</title>
    <author initials="D." surname="Kaye">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
</reference>
<reference anchor="Marcus" target="http://www.cardozoaelj.com/wp-content/uploads/2013/02/Marcus.pdf">
  <front>
    <title>Commercial Speech on the Internet: Spam and the first amendment</title>
    <author initials="J." surname="Marcus">
      <organization></organization>
    </author>
    <date year="1998"/>
  </front>
</reference>
<reference anchor="APC3" target="https://www.apc.org/en/node/36145/#tools">
  <front>
    <title>Closer than ever</title>
    <author >
      <organization>Association for Progressive Communications</organization>
    </author>
    <date year="2020"/>
  </front>
</reference>
<reference anchor="UNHRC2018" target="https://digitallibrary.un.org/record/1639840?ln=en">
  <front>
    <title>UN Human Rights Council Resolution 'The promotion, protection and enjoyment of human rights on the Internet' (A/HRC/32/L.20)</title>
    <author >
      <organization>United Nations Human Rights Council</organization>
    </author>
    <date year="2016"/>
  </front>
</reference>
<reference anchor="UNGC37" target="https://tbinternet.ohchr.org/_layouts/15/treatybodyexternal/TBSearch.aspx?Lang=en&amp;TreatyID=8&amp;DocTypeID=11">
  <front>
    <title>Human Rights Committee “General comment No. 37 (2020) on the right of peaceful assembly (article 21)”, CCPR/C/GC/3</title>
    <author >
      <organization>United Nations Human Rights Committee</organization>
    </author>
    <date year="2020"/>
  </front>
</reference>
<reference anchor="UNSRFOAA2012" target="http://freeassembly.net/wp-content/uploads/2013/10/A-HRC-20-27_en-annual-report-May-2012.pdf">
  <front>
    <title>Report of the Special Rapporteur on the rights to freedom of peaceful assembly and of association", A/HRC/20/27</title>
    <author initials="" surname="Maina Kiai">
      <organization></organization>
    </author>
    <author >
      <organization>United Nations</organization>
    </author>
    <date year="2012"/>
  </front>
</reference>
<reference anchor="FoAdef" target="https://en.wikipedia.org/wiki/Freedom_of_association">
  <front>
    <title>Freedom of association</title>
    <author >
      <organization>Wikipedia</organization>
    </author>
    <date year="2021"/>
  </front>
</reference>
<reference anchor="RutzenZenn" >
  <front>
    <title>Association and Assembly in the Digital Age</title>
    <author initials="D." surname="Rutzen">
      <organization></organization>
    </author>
    <author initials="J." surname="Zenn">
      <organization></organization>
    </author>
    <date year="2011" month="December"/>
  </front>
  <seriesInfo name="The International Journal of Not-for-Profit Law, Volume 13, Issue 4" value=""/>
</reference>
<reference anchor="UNSRFAA2019" target="https://undocs.org/A/HRC/41/41">
  <front>
    <title>Report of the Special Rapporteur on the rights to freedom of peaceful assembly and of association</title>
    <author initials="" surname="Clément Voule">
      <organization></organization>
    </author>
    <author >
      <organization>United Nations</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="MeierHahn2015" target="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2587843">
  <front>
    <title>Creating connectivity: trust, distrust and social microstructures at the core of the internet</title>
    <author initials="" surname="Uta Meier-Hahn">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
</reference>


    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

