Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Some clean up and adding Signals #16

Merged
merged 4 commits into from
Nov 10, 2021
Merged

Conversation

sysrqb
Copy link
Collaborator

@sysrqb sysrqb commented Nov 1, 2021

  • Tried improved readability
  • Deleted Reputation Requirements section (hopefully only temporarily) - but I felt it was a distraction right now, we can re-add it later
  • Added a new section on replacement signals, and associated commentary.
  • Added a new reference to Private Access Tokens

draft-ip-address-privacy-considerations.md Outdated Show resolved Hide resolved

- $ publisher norms: Standard expections of publishers including identity transparency and conflicts of interest.
- $ protocol improvements: Increasing security of existing protocols.
Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thinking about business email compromise, as an example we use later, are there better and more recent improvements than OpenPGP and S/MIME for authenticating the sender of a message? MLS comes to mind but seems like a stretch without suggesting entirely deprecating email.

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We can delay this one until later. #21


In the following the requirements of reputation signals are listed. Note that by "client(s)" it is intended an end user device (e.g., a PC or a mobile phone), while by "server(s)" it is intended a device offering an Internet service, which belong to an organisation/company but is not a personal device.
- $ ADDRESS_ESCROW: Provides sufficient information for retroactively obtaining a client's IP address.
- $ PEER_INTEGRITY: Provides a secure, remote attestation of hardware and/or software state.
Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Do we have a use case for this? Including this as a replacement signal is a little confusing without it helping solve an anti-abuse use case.

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

device integrity signals can make it harder for bots to go undetected

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

That's a good point, thanks.

@sysrqb
Copy link
Collaborator Author

sysrqb commented Nov 4, 2021

I'll rebase commits before merging.

@sysrqb sysrqb merged commit 9a4c6ee into IRTF-PEARG:main Nov 10, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants