<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version  -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc rfcedstyle="yes"?>
<?rfc toc="yes"?>
<?rfc tocindent="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="-o*+"?>

<rfc ipr="trust200902" docName="draft-irtf-hrpc-association-08" category="info">

  <front>
    <title abbrev="FoA">Freedom of Association on the Internet</title>

    <author initials="N." surname="ten Oever" fullname="Niels ten Oever">
      <organization>Univeristy of Amsterdam</organization>
      <address>
        <email>mail@nielstenoever.net</email>
      </address>
    </author>
    <author initials="G." surname="Perez de Acha" fullname="Gisela Perez de Acha">
      <organization>Derechos Digitales</organization>
      <address>
        <email>gisela@derechosdigitales.org</email>
      </address>
    </author>
    <author initials="S." surname="Couture" fullname="Stéphane Couture">
      <organization>Université de Montréal</organization>
      <address>
        <email>stephane.couture@umontreal.ca</email>
      </address>
    </author>
    <author initials="M." surname="Knodel" fullname="Mallory Knodel">
      <organization>Center for Democracy &amp; Technology</organization>
      <address>
        <email>mknodel@cdt.org</email>
      </address>
    </author>

    <date year="2021" month="April" day="16"/>

    <area>IRTF</area>
    <workgroup>Human Rights Protocol Considerations Research Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document discusses the relationships between the Internet architecture and the ability of people to exercise their right to peaceful assembly and the right to association online. The Internet increasingly mediates our lives, our relationships, and our ability to exercise our human rights. As a global assemblage, the Internet provides a public space, yet it is predominantly built on private infrastructure. Since Internet protocols and architecture play a central role in the management, development, and use of the Internet, we analyze the relation between protocols, architecture, and the rights to assemble and associate to mitigate infringements on those rights.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<figure><artwork><![CDATA[
We shape our tools and, thereafter, our tools shape us. 
     - John Culkin (1967)

Article 21 of the Covenant protects peaceful assemblies wherever they 
take place: outdoors, indoors and online; in public and private spaces; 
or a combination thereof.
     - General Comment 37 of the Human Rights Committee (2020)

In the digital age, the exercise of the rights of peaceful assembly and 
association has become largely dependent on business enterprises, 
whose legal obligations, policies, technical standards, financial models 
and algorithms can affect these freedoms.

     - Annual Report to the UN Human Rights Council by the Special 
     Rapporteur on the rights to freedom of peaceful assembly and 
     of association (2019).
]]></artwork></figure>

<t>The current draft continues the work started in “Research into Human Rights Protocol Considerations” <xref target="RFC8280"/> by investigating the impact of Internet protocols on a specific set of human rights, namely the right to peaceful assembly and the right to association. Taking into consideration the international human rights framework regarding the human right to peaceful assembly and the right to association, the present document seeks to deepen the relationship between this human right and Internet architecture, protocols, and standards. In that way, we continue the work of the Human Rights Protocol Consideration Research Group, as laid out in its charter, where one of the research aims is “to expose the relation between protocols and human rights, with a focus on the rights to freedom of expression and freedom of assembly” <xref target="HRPC-charter"/>. The conclusions may inform the development of new guidelines for protocol developers in draft-irtf-hrpc-guidelines.</t>

<t>The research question of this document is: what are the protocol development considerations for the right to peaceful assembly and the right to association?</t>

</section>
<section anchor="vocabulary-used" title="Vocabulary used">

<t><list style="hanging">
  <t hangText='Architecture'>
  The design of a structure</t>
  <t hangText='Autonomous System (AS)'>
  Autonomous Systems are the unit of routing policy in the modern world of exterior routing <xref target="RFC1930"/>.</t>
  <t>Within the Internet, an autonomous system (AS) is a collection of connected Internet Protocol (IP) routing prefixes under the control of one or more network operators on behalf of a single administrative entity or domain that presents a common, clearly defined routing policy to the Internet <xref target="RFC1930"/>.</t>
  <t>The classic definition of an Autonomous System is a set of routers under a single technical administration, using an interior gateway protocol and common metrics to route packets within the AS, and using an exterior gateway protocol to route packets to other ASs
<xref target="RFC1771"/>.</t>
  <t hangText='Border Gateway Protocol (BGP)'>
  An inter-Autonomous System routing protocol <xref target="RFC4271"/>.</t>
  <t hangText='Connectivity'>
  The extent to which a device or network is able to reach other devices or networks to exchange data. The Internet is the tool for providing global connectivity <xref target="RFC1958"/>. Different types of connectivity are further specified in <xref target="RFC4084"/>. The combination of the end-to-end principle, interoperability, distributed architecture, resilience, reliability and robustness are the enabling factors that result in connectivity to and on the Internet.</t>
  <t hangText='Decentralization'>
  Implementation or deployment of standards, protocols or systems without one single point of control.</t>
  <t hangText='Distributed system'>
  A system with multiple components that have their behavior co-ordinated via message passing. These components are usually
spatially separated and communicate using a network, and may be managed by a single root of trust or authority. <xref target="Troncosoetal"/></t>
  <t hangText='Infrastructure'>
  Underlying basis or structure for a functioning society, organization or community. Because infrastructure is a precondition
for other activities it has a procedural, rather than static, nature due to its social and cultural embeddedness <xref target="PipekWulf"/>
<xref target="Bloketal"/>. This means that infrastructure is always relational: infrastructure always develops in relation to something or someone <xref target="Bowker"/>.</t>
  <t hangText='Internet'>
  The Network of networks, that consists of Autonomous Systems that are connected through the Internet Protocol (IP).</t>
  <t>A persistent socio-technical system over which services are delivered <xref target="Mainwaringetal"/>,</t>
  <t>A techno-social assemblage of devices, users, sensors, networks, routers, governance, administrators, operators and protocols</t>
  <t>An emergent-process-driven thing that is born from the collections of the ASes that happen to be gathered together at any given time. The fact that they tend to interact at any given time means it is an emergent property that happens because they use the protocols defined at IETF.</t>
  <t>Right to peaceful assembly
‘The right of peaceful assembly protects the non-violent gathering by persons for specific purposes, principally expressive ones.1 It constitutes an individual right that is exercised collectively.2 Inherent to the right is thus an associative element.’ <xref target="UNGC37"/></t>
  <t>Right to association
‘The right and freedom of association encompasses both an individual’s right to join or leave groups voluntarily, the right of the group to take collective action to pursue the interests of its members, and the right of an association to accept or decline membership based on certain criteria.’ <xref target="FoAdef"/></t>
</list></t>

</section>
<section anchor="research-question" title="Research question">

<t>The research question of this document is: what are the protocol development considerations for freedom of assembly and association?</t>

</section>
<section anchor="methodology" title="Methodology">

<t>The point of departure of the present work <xref target="RFC8280"/> is an initial effort to expose the relationship between human rights and the Internet architecture, specifically protocols and standards. As such, <xref target="RFC8280"/> was inductive and explorative in nature. The methodology in this previous work was based on the discourse analysis of RFCs, interviews with members of the IETF community, and participant observation in IETF working groups, with the goal to identify technical concepts that relate to human rights. This work resulted in the proposal of guidelines to describe a relationship between the right to peaceful assembly and association and connectivity, security, censorship resistance, anonymity, pseudonymity, accessibility, decentralization, adaptability, and outcome transparency.</t>

<t>In this document, we deepen our exploration of human rights and protocols by assessing one specific set of human rights: freedom of association and assembly, abbreviated here as FAA. Our methodology for doing so is the following: first, we provide a brief twofold literature review addressing the philosophical and legal definitions of FAA and how this right has already been interpreted or analyzed concerning the digital. This literature review is not exhaustive nor systematic but aims at providing some lines of questioning that could later be used for protocol development. The second part of our methodology looks at some cases of Internet protocols that are relevant to the sub-questions highlighted in the literature review, and analyze how these protocols facilitate and inhibit the right to peaceful assembly and association.</t>

</section>
<section anchor="literature-review" title="Literature Review">

<section anchor="faa-definition-and-core-treaties" title="FAA definition and core treaties">

<t>The rights to peaceful assembly and the freedom of association are defined and guaranteed in national law and international treaties, however, in this document we limit outselves to international treaties. Article 20 of the Universal Declaration of Human Rights <xref target="UDHR"/> states that “Everyone has the right to freedom of peaceful assembly and association” and that “No one may be compelled to belong to an association”. Article 23 further guarantees that “Everyone has the right to form and to join trade unions for the protection of his interests”. In the International Covenant on Civil and Political Rights <xref target="ICCPR"/>, article 21 stipulates that “The right of peaceful assembly shall be recognized” and that “No restrictions may be placed on the exercise of this right other than those imposed in conformity with the law and which are necessary in a democratic society in the interests of national security or public safety, public order (ordre public), the protection of public health or morals or the protection of the rights and freedoms of others” while article 22 states that “Everyone shall have the right to freedom of association with others, including the right to form and join trade unions”.</t>

<t>General Comment No. 37 on the right of peaceful assembly by the United Nations Human Rights Committee affirms that the right of  peaceful assembly protects non-violent online gatherings: “associated activities that happen online or otherwise rely upon digital services […] are also protected” <xref target="UNGC37"/>. Interference with emerging communications technologies that offer the opportunity to assemble either wholly or partly online or play an integral role in organizing, participating in and monitoring physical gatherings are assumed to impede assemblies which are protected by this right. Moreover, any restriction on the ‘operation of information dissemination systems’ must conform with the tests for restrictions on freedom of expression (see below).</t>

<t>Other treaties are sometimes cited as the source and framework to the right to freedom of association and assembly. Such as Article 5 of the International Convention on the Elimination of All Forms of Racial Discrimination <xref target="CERD"/> which stipulates freedom of peaceful assembly and association should be guaranteed “without discrimination as to race, colour, national or ethnic origin”; Article 15 of the Convention on the Rights of the Child <xref target="CRC"/> which recognises to child pending the restrictions cited above; and Article 21 of the Convention on the Rights of Persons with Disabilities <xref target="CRPD"/> which insist on usable and accessible formats and technologies appropriate for persons with different kinds of disabilities. The freedoms of peaceful assembly and association are also protected under regional human rights treaties: article 11 of the European Convention on Human Rights, articles 15 and 16 of the American Convention on Human Rights, article 10 and 11 of the African Charter on Human and Peoples’ Rights.</t>

<t>From a more philosophical perspective, Brownlee and Jenkins <xref target="Stanford"/> make some interesting distinctions in particular regarding the concepts of association, assembly and interaction, deviating somewhat from what is established in interpretations of international human rights law. “Interaction” refers to any kind of interpersonal and often incidental engagements in daily life, like encountering strangers on a bus.  Interaction is seen as a “prerequisite” for association. Assembly, according to Brownlee and Jenkins has a more political connotation and is
often used to refer to activists, protesters, or members of a group in a deliberating event. The authors refer to association as more “persistent connections” and distinguish between intimate associations, like friendship, love, or family, and collective association like trade unions, commercial business, or “expressive associations” like civil rights organizations or LGBTQIA associations. For Brownlee and Jenkins <xref target="Stanford"/>, the right to association is linked to different relative freedoms: permission (to associate or dissociate), claim-right (to oppose others interfering with our conduct), power (to alter the status of our association), immunity (from other people interfering in our right). Freedom of association thus refers both to the individual right to join or leave a group and to the collective right to form or dissolve a group.</t>

<t>Freedoms of association and peaceful assembly, however, are relative and not absolute. Excluding someone from an association based on its sex, race or other individual characteristic is also often contentious if not illegal. As mentioned above, international human rights law provides the framework for legitimate restrictions on these rights, as well as the right to privacy and the right to freedom of expression and opinion. Restrictions can be imposed by states, but only if this is lawful and proportionate. States must document how these limitations are necessary in the interests of national security or public safety, public order, the protection of public health or morals, or the protection of the rights and freedoms of others. Finally, states must also protect participants against possible abuses by non-state actors.</t>

<t>The Human Rights Committee explores a few restrictions related to associated activities online or reliant upon digital services, that are also protected under article 21, and stipulates that “States parties must not, for example, block or hinder Internet connectivity in relation to peaceful assemblies.  The same applies to geotargeted or technology-specific interference with connectivity or access to content.”. Additionally, “States should ensure that the activities of Internet service providers and intermediaries do not unduly restrict assemblies or the privacy of assembly participants.” <xref target="UNGC37"/>.</t>

<t>Interpreting international law, the right to freedom of peaceful assembly and the right to freedom of association protects any collective, gathered either permanently or temporarily for “peaceful” purposes, online and offline. It is important to underline the property of “freedom” because the right to freedom of association and assembly is voluntary and uncoerced: anyone can join or leave a group of choice, which in turn means one should not be forced to either join, stay or leave. An assembly is an “intentional and temporary gathering of a collective in a private or public space for a specific purpose: demonstrations, indoor meetings, strikes, processions, rallies, or even sits-in” <xref target="UNGA"/>. Association has a more formal and established nature and refer to a group of individuals or legal entities brought together in order to collectively act, express, promote, pursue, or defend a field of common interests <xref target="UNSRFOAA2012"/>. Think about civil society organizations, clubs, cooperatives, NGOs, religious associations, political parties, trade unions, or foundations.</t>

<t>When talking about the human right of freedom of association and assembly, one should always take into account that ‘all human rights are indivisible, interrelated, unalienable, universal, and mutually reinforcing’ <xref target="ViennaDeclaration"/>. This means that in the analysis of the impact of a certain variable on freedom of association and assembly one should take other human rights into account too. When devising an approach to mitigate a possible negative influence on this right, one should also always take into account the possible impact this might have on other rights. For example, the following rights are often impacted in conjunction with freedom of association and assembly: the right to political participation, the right to (group) privacy, the right to freedom of expression, and access to information. For instance, when the right to political participation is hampered, this often happens in conjunction with a limitation of the freedom of association and assembly because political participation is often done collectively. When the right to privacy is hampered, this privacy of particular groups is also impacted (so-called ‘group privacy’ <xref target="Loi"/>, which potentially has consequences for the right to association and assembly. Where the freedom of expression of a group is hampered, such as in protests or through Internet shutdowns, this both hampers other people’s ability to receive the information of the group, and impact the right to assembly of the people who seek to express themselves as a group <xref target="Nyokabi"/>.</t>

<t>Finally, if the right to association and assembly is limited by national law, this does not mean it is consistent with international human rights law. In such a case, the national law would therefore not be legitimate <xref target="Glasius"/>.</t>

</section>
<section anchor="faa-in-the-digital-era" title="FAA in the digital era">

<t>Before discussing freedom of association and assembly as it pertains to digital environments, we must first recognize that the United Nations Human Rights Council adopted resolutions on the promotion, protection and enjoyment of human rights on the Internet in 2012, 2014, 2016 and 2018, affirming and reaffirming  “… that the same rights that people have offline must also be protected online …” <xref target="UNHRC2018"/>. Therefore the digital environment is no exception to application of this right by any means. Various other resolutions and report have established the online applicability of the freedoms of association and assembly, most recently and authoritatively by the Human Rights Committee in General Comment 37 (2020)<xref target="UNGC37"/>. The questions that remain, however, are how these rights should be conceptualized and implemented in different parts and levels of digital environments.</t>

<t>The right to freedom of assembly and association online is the subject of increasing discussions and analysis. Especially since social media played an important role in several revolutions in 2011, which has led to increasing and ever more sophisticated attacks by autocratic governments on online communities and other associational activities occurring on the Internet <xref target="RutzenZenn"/>. In 2016, the Council of Europe published a report, “Report by the Committee of experts on cross-border flow of Internet traffic and Internet freedom on Freedom of assembly and association on the Internet” <xref target="CoE"/> which noted that while the Internet and technologies are not explicitly mentioned in international treaties, these treaties nevertheless apply to “the online environment”. The report argue the “Internet is the public sphere of the 21st century”, something demonstrated by the fact that informal associations can be gathered at scale in a matter of hours on the Internet, and that digital communication tools often serve to facilitate, publicize or otherwise enable presential associations or assemblies, like a protest or demonstration. They note, on the other hand, the negative ways in which the Internet can also be used to promote or facilitate terrorism, urban violence and hate speech, thus insisting on the “extremely important and urgent” need to fight online terrorist activities such as recruitment or mobilization, while at the same time respecting the right to peaceful assembly and association of other users. The report mentions the following use cases that could be help further our reflection:</t>

<t><list style="symbols">
  <t>Instances of network shutdowns in the Arab Spring, to prevent people from organising themselves or assembling</t>
  <t>California’s Bay Area Rapid Transit (BART) shutdown of mobile phone service, to avoid protester violence and disruption of service</t>
  <t>The wholesale blocking of Google as a violation of freedom of expression</t>
  <t>Telus, a telecom company which blocked customers’ access to websites critical of Telus during a Telecommunications Workers Union strike against it</t>
  <t>The targeting of social media users who call for or organise protests though the Internet in Turkey’s Gezi Park protests</t>
  <t>Mass surveillance or other interferences with privacy in the context of law enforcement and national security</t>
  <t>Use of VPNs (Virtual Private Networks) to the TOR network to ensure anonymity</t>
  <t>Distributed Denial of Service attacks (DDoS) as civil disobedience.</t>
</list></t>

<t>In 2019 the UN Special Rapporteur on the rights to freedom of peaceful assembly and of association, notes the opportunities and challenges posed by digital networks to the rights to freedom of peaceful assembly and of association <xref target="UNSRFAA2019"/>.  The report recommends that international human rights norms and principles should also be used as a framework “that guides digital technology companies’ design, control and governance of digital technologies”. The report states that “technical standards” in particular can affect the freedom of association and assembly, and makes some recommendations on which the following could be relevant to our discussion here:</t>

<t><list style="symbols">
  <t>“[Undertake] human rights impact assessments which incorporate the rights to freedom of peaceful assembly and of association when developing or modifying their products and services,”</t>
  <t>“increase the quality of participation in and implementation of existing multi-stakeholder initiatives,”</t>
  <t>“collaborate with governments and civil society to develop technology that promotes and strengthens human rights,”</t>
  <t>“support the research and development of appropriate technological solutions to online harassment, disinformation and propaganda, including tools to detect and identify State-linked accounts and bots,” and</t>
  <t>“adopt monitoring indicators that include specific concerns related to freedom of peaceful assembly and association.”</t>
</list></t>

<t>In one of their “training kits” <xref target="APCtraining"/>, the Association of Progressive Communications addressed different impacts of the internet on association and assembly and raised three particular issues worthy to note here:</t>

<t><list style="numbers">
  <t>Organization of protests. Internet and social media are enablers of protests, such as it was seen in the “Arab Spring”. Some of these protests - like online petitions or campaigns - are similar to offline association and assembly, but other protest forms are inherent to the Internet capacity like hacking, DDOS and are subject to controversy within the Internet community, some people finding it legitimate, and others not.</t>
  <t>Surveillance. While the Internet facilitates association, the association in turn leaves a lot of traces that can be used in turn for law enforcement but also for repressing political dissents. As they note, even the threat of surveillance can have deter facilitation.</t>
  <t>Anonymity and pseudonymity can be useful protection mechanism for those who’d like to attend legitimate association without facing retribution. On the other hand, anonymity can be used to harm society, such as in online fraud or sexual predation.</t>
</list></t>

<t>Online association and assembly are the starting point of group to mobilization in modern democracies, and even more so where physical gatherings have been impossible or dangerous <xref target="APC"/>. Throughout the world -from the Arab Spring to Latin American student movements and the #WomensMarch- the Internet has played a crucial role by providing means for the fast dissemination of information otherwise mediated by the press, or even forbidden by the government <xref target="Pensado"/>. According to Hussain and Howard the Internet helped to “build solidarity networks and identification of collective identities and goals, extend the range of local coverage to international broadcast networks” and as platform for contestation for “the future of civil society and information infrastructure” <xref target="HussainHoward"/>. The IETF itself, defined as an ‘open global community’ of network designers, operators, vendors, and researchers <xref target="RFC3233"/> is also protected by freedom of assembly and association . Discussions, comments and consensus around RFCs are possible because of the collective expression that freedom of association and assembly allow. The very word “protocol” found its way into the language of computer networking based on the need for collective agreement among a group of assembled network users <xref target="HafnerandLyon"/>.</t>

<t><xref target="RFC8280"/> is a paper by the Human Rights Protocol Consideration Resarch Group in the Internet Research Taskforce on internet protocols and human rights that discusses issues of FAA, specifically:</t>

<t><list style="symbols">
  <t>The expansion of DNS for generic namespace as an enabler of association for minorities. The paper argues that specifically the expansion of the DNS to allow for new generic Top Level Domains (gTLDs) can have negative impacts on freedom of association because of restrictive policies by some registries and registrars, on the other hand could gTLDs also enable communities to build clearly identifiable spaces for association (such as .gay).</t>
  <t>The impact of Distributed Denial of Service attacks on freedom of association. Whereas DDoS has been used as a tool for protest, in many cases this is infringing on other parties freedom of expression. Furthermore,  often devices (such as IoT devices and routers) are inscribed in such DDoS attacks whereas the owner or user did not consent to this. Thus they do not have the possibility to exit this assembly. Therefore the draft concluded that that IETF ”should try to ensure that their protocols cannot be used for DDoS attacks”</t>
  <t>The impact of middleboxes on the ability of users to connect to the Internet and therefore their ability to exercise their right to freedom of association and assembly. The lack of connectivity can significantly impact freedom of assembly and association of a user. Especially if this is done in a way that is not knowable for the user and if there is no possibility to for the user to have access to due process to dispute the lack of (secure or private) connectivity in general or to a specific service.</t>
</list></t>

<t>In June 2020, the United Nations High Commissioner for Human Rights concluded that technologies can be enablers of the excercise of FAA, but technology is also significantly used to interfere with the ability of people to exercise their right to freedom of association and assembly. Specifically, the report mentions network shutdowns, the usage of technology to surveil or crack down on protesters, leading to human rights violations. This includes facial recognition technology, and the uses of other ways to violate the (group) privacy of people engaged in an assembly or association. The report makes it explicit that companies play a significant role enabling, for instance by developing, providing or selling the technology, but also by directly exercising these violations <xref target="UNHRC2020"/>.</t>

</section>
<section anchor="specific-questions-raised-from-the-literature-review" title="Specific questions raised from the literature review">

<t>Here are some questions raised from the literature review that can have implications for protocol design:</t>

<t><list style="numbers">
  <t>Should protocols be designed to enable legitimate limitations on association in the interests of “national security or public safety, public order (ordre public), the protection of public health or morals or the protection of the rights and freedoms of others”, as stated in the ICCPR article 21 <xref target="ICCPR"/>? Where in the stack do we care for FAA?</t>
  <t>Can protocols facilitate agency of membership in associations, assemblies and interactions?</t>
  <t>What are the features of protocols that enable freedom of association and assembly?</t>
  <t>Does protocol development sufficiently consider usable and accessible formats and technologies appropriate for all persons, including those with different kinds of disabilities?</t>
  <t>Can a protocol be designed to legitimately exclude someone from an association?</t>
</list></t>

<t>In the following sections we attempt to answer these questions with specific examples of standardized protocols in the IETF.</t>

</section>
</section>
<section anchor="analysis" title="Analysis">

<t>As the Internet mediates collective action and collaboration, it impacts on freedom of association and assembly. To answer our research question regarding how internet architecture enable and/or inhibits such human right, we researched several independent and typical cases related to protocols that have been either adopted by the IETF, or are widely used on the Internet.  Our goal is to figure out whether they facilitate freedom of assembly and association, or whether they inhibit it through their design or implementation.</t>

<t>We are aware that some of the following examples go beyond the use of Internet protocols and flow over into the application layer or examples in the offline world whereas the purpose of the current document is to break down the relationship between Internet protocols and the right to freedom of assembly and association. Nonetheless, we do recognize that in some cases the line between them and applications, implementations, policies and offline realities are often blurred and hard -if not impossible- to differentiate.</t>

<t>We use the literature review to guide our process of inquiry for each case, and to dive deeper in what can be found interesting about each case as it relates to freedom of association.</t>

<section anchor="got-no-peace-spam-and-ddos" title="Got No Peace: Spam and DDoS">
<figure><artwork><![CDATA[
Should protocols be designed to enable legitimate limitations on 
association in the interests of “national security or public safety, 
public order (ordre public), the protection of public health or morals 
or the protection of the rights and freedoms of others”, as stated in 
the ICCPR article 21 {{ICCPR}}? Where in the stack do we care for FAA?
]]></artwork></figure>

<t>The 2020 report by the United Nations Special Rapporteur on Human Rights <xref target="UNHRC2020"/> described how technology is often used to limit freedom of assembly and association, such as for instance through network shutdowns and the surveillance of groups. Because access to the Internet is crucial not only for freedom of association and assembly, but also for the right to development, and the right to freedom of expression and information <xref target="Nyokabi"/>, the United Nation Special Rapporteur argues that:</t>

<figure><artwork><![CDATA[
(b) Avoid resorting to disruptions and shutdowns of Internet or 
telecommunications networks at all times and particularly during 
assemblies, including those taking place in electoral contexts 
and during times of unrest;
]]></artwork></figure>

<t>Whereas the states have the obligation to protect human rights, there has been an increasing call for non-state actors, such as companies, to respect human rights <xref target="UNGPBHR"/>. The UN adopted guiding principles on business and human rights <xref target="UNGPBHR"/> and talks within the HRC are ongoing about an international legally binding instrument to regulate the activities of transnational corporations and other business enterprises. This includes a chain-responsibility of actors, which means that not just the company’s own processes should not negatively impact human rights, but they should also engage in due diligence processes, such as human rights impact assessments. This includes an assessment of whether the products that are sold, or the services that are provided, can be used to engage in human rights violations, or whether human rights violations occur in any stage of the supply chain  of the company. If this is the case, measures should be taken to mitigate this.</t>

<t>In the case of dual-use technologies, this means that technology could be used for legitimate purposes, but could also be used to limit freedom of association or assembly,  it might mean that producers or sellers should limit the parties they sell to, or even better, ensure that the illegitimate use of the technology is not technically possible anymore, or made more difficult.</t>

<section anchor="spam" title="Spam">

<t>In the 1990s as the internet became more and more commercial, spam came to be defined as irrelevant or unsolicited messages that were posted many times to multiple news groups or mailing lists <xref target="Marcus"/>. Here the question of consent, but also harm, are crucial. In the 2000s a large part of the discussion revolved around the fact that certain corporations. protected by the right to freedom of association, considered spam to be a form of “commercial speech”, thus encompassed by free expression rights <xref target="Marcus"/>. Yet spam can be not only a nuisance, but a threat to systems and users.</t>

<t>This leaves us with an interesting case around spam mitigation: spam is currently handled mostly by mail providers on behalf of the user, next to that countries are increasingly adopting opt-in regimes for mailing lists and commercial e-mail, with a possibility of serious fines in case of violation. Yet many ask is spam not the equivalent of the fliers and handbills ever present in our offline world? The big difference between the proliferation of such messages offline and online is the scale.  It is not hard for a single person to message a lot of people online, whereas if that person needed to go house by house the scale and impact of their actions would be much smaller.  Inversely if it were a common practice to expose people to unlimited unwanted messages online, users would be drowned in such messages. This puts a large burden on filtering, and in both filtering and sifting through many message, other expressions would be drowned out and would be severely hampered.  Allowing illimited sending of unsolicited messages would be a blow against freedom of speech: when everyone talks, nobody listens.</t>

<t>Here the argument is very similar to DDoS attacks, considered next: Legitimate uses of online campaigning, or online protesting, are drowned out by a malicious use which constitutes an attack on the internet infrastructure and thus the assembly or association itself.</t>

</section>
<section anchor="ddos" title="DDoS">

<t>Distributed Denial of Service attacks are leveled against a server or service by a controller of a host or multiple hosts by overloading the server or service’s bandwidth or resources (volume-based floods) or exploit protocol behaviours (protocol attacks). DDoS attacks can thus stifle and complicate the rights to assemble online for media and human rights organisations whose websites are the target of DDoS. At the same time there are comparisons made between DDoS attacks and sit-in protests <xref target="Sauter"/>. However the main distinction is significant: only a small fragment of “participants” (from controllers to compromised device owners) in DDoS attacks are aware or willing <xref target="RFC8280"/>. Notably DDoS attacks are increasingly used to commit crimes such as extortion, which infringe on others’ human rights.</t>

<t>Because of the interrelation of technologies, it cannot be said that there is one point in the technical stack that there are characteristics of “peaceful” or “non-peaceful” association visible to protocol developers. As we can see from the cases of spam blocking and DDoS mitigation that “peaceful or non-peaceful” is not a meaningful heuristic, or even characteristic, of problematic content. If anything, their commonality is scale and volume.</t>

</section>
</section>
<section anchor="holistic-agency-mailing-lists-and-spam" title="Holistic Agency: Mailing Lists and Spam">

<figure><artwork><![CDATA[
Can protocols facilitate agency of membership in associations, 
assemblies and interactions?
]]></artwork></figure>

<section anchor="mailing-lists" title="Mailing lists">

<t>Since the beginning of the Internet mailing lists have been a key site of assembly and association <xref target="RFC0155"/> <xref target="RFC1211"/>. In fact, mailing lists were one of the Internet’s first functionalities <xref target="HafnerandLyon"/>.</t>

<t>In 1971 four years after the invention of email, the first mailing list was created to talk about the idea of using Arpanet for discussion. What had initially propelled the Arpanet project forward as a resource sharing platform was gradually replaced by the idea of a network as a means of bringing people together <xref target="Abbate"/>. More than 45 years after, mailing lists are pervasive and help communities to engage, have discussions, share information, ask questions, and build ties. Even as social media and discussion forums grow, mailing lists continue to be widely used <xref target="AckermannKargerZhang"/> and are still a crucial tool to organise groups and individuals around themes and causes <xref target="APC3"/>.</t>

<t>Mailing lists’ pervasive use are partly explained because they allow for “free” association: people subscribe (join) and unsubscribe (leave) as they please. Mailing lists also allow for association of specific groups on closed lists. This free association online enables agency of membership, a key component of freedom of association and assembly.</t>

</section>
<section anchor="spam-1" title="Spam">

<t>As we mentioned before, there are interesting implications for freedom of association and assembly when looking at spam mitigation. Here we want to specifically note that if we consider that the rights to assembly and association also mean that “no one may be compelled to belong to an association” <xref target="UDHR"/>, spam infringes both rights if an op-out mechanism is not provided and people are obliged to receive unwanted information, or be reached by people they do not know.</t>

</section>
</section>
<section anchor="civics-in-cyberspace-messaging-conferencing-and-networking" title="Civics in Cyberspace: Messaging, Conferencing, and Networking">

<figure><artwork><![CDATA[
What are the features of protocols that enable freedom of 
association and assembly?
]]></artwork></figure>

<t>Civic participation is often expressed as the freedom to associate and assemble, along with a whole other set of enabling rights such as freedom of expression and the right to privacy. Former UN Special Rapporteur David Kaye established a strong relationship between technology that allows anonymity and uses encryption have positive effects on freedom of expression <xref target="Kaye"/>. Here we look at messaging, such as email, mailing lists and internet relay chat; video conferencing and peer-to-peer networking protocols to investigate the common features that enable freedom of association and assembly online.</t>

<section anchor="email" title="Email">

<t>Similarly to freedom of expression’s enabling and universal right to impart one’s ideas openly, “the right to whisper”, or confidentiality, is the ability to limit to whom one imparts one’s ideas. An encrypted email project, the LEAP Encryption Access Project, says, “like free speech, the right to whisper is a necessary precondition for a free society. Without it, civil society languishes and political freedoms are curtailed. As the importance of digital communication for civic participation increases, so too does the importance of the ability to digitally whisper.” <xref target="LEAP"/></t>

</section>
<section anchor="mailing-lists-1" title="Mailing lists">

<t>Not only are mailing lists a good example of how protocols can facilitate the necessary ingredient of agency in freedom of association, mailing lists are an example of messaging technology that has other features that enable freedom of association and assembly.</t>

<t>The archival function of mailing lists allows for posterior accountability and analysis. The ubiquity and interoperability of email, and by extension email lists, provides a low barrier to entry to an inclusive medium.</t>

<t>Association and assembly online can be undermined when right to privacy is at risk. And one of the downsides of mailing lists are similar to the privacy and security concerns generally associated with email. At least with email, end-to-end encryption such as OpenPGP <xref target="RFC4880"/> and S​/​MIME <xref target="RFC5751"/> can keep user communications authenticated and confidential. With mailing lists, this protection is not as possible because with many lists the final recipients are typically too many for . There have been experimental solutions to address this issue such as Schleuder <xref target="Schleuder"/>, but this has not been standardized or widely deployed.</t>

</section>
<section anchor="irc" title="IRC">

<t>Internet Relay Chat (IRC) is an application layer protocol that enables communication in the form of text through a client/server networking model <xref target="RFC2810"/>. In other words, a chat service. IRC clients are computer programs that a user can install on their system. These clients communicate with chat servers to transfer messages to other clients. Features of IRC include: federated design, transport encryption, one-to-many routing, creation of topic-based “channels”, and spam or abuse moderation.</t>

<t>For the purposes of civic participation and freedom of association and assembly in particular it is critical that IRC’s federated design allows many interoperable, yet customisable, instances and basic assurance of confidentiality through transport encryption. We investigate the particular aspect of agency in membership through moderation in the section ‘Block Together Now: IRC and Refusals’ below.</t>

</section>
<section anchor="webrtc" title="WebRTC">
<t>Multi-party video conferencing protocols like WebRTC <xref target="RFC6176"/> <xref target="RFC7118"/> allow for robust, bandwidth-adaptive, wideband and super-wideband video and audio discussions in groups. ‘The WebRTC protocol was designed to enable responsive real-time communications over the Internet, and is instrumental in allowing streaming video and conferencing applications to run in the browser. In order to easily facilitate direct connections between computers (bypassing the need for a central server to act as a gatekeeper), WebRTC provides functionality to automatically collect the local and public IP addresses of Internet users (ICE or STUN). These functions do not require consent from the user, and can be instantiated by sites that a user visits without their awareness. The potential privacy implications of this aspect of WebRTC are well documented, and certain browsers have provided options to limit its behavior.’ <xref target="AndersonGuarnieri"/>.</t>

<t>Even though some multi-party video conferencing tools facilitate freedom of assembly and association, their own configuration might might pose concrete risks for those who use them. One the one hand WebRTC is providing resilient channels of communications, but on the other hand it also exposes information about those who are using the tool which might lead to increased surveillance, identification and the consequences that might be derived from that. This is especially concerning because the usage of a VPN does not protect against the exposure of IP addresses <xref target="Crawford"/>.</t>

<t>The risk of surveillance is also true in an offline space, but this is generally easy to analyze for the end-user. Security and privacy expectations of the end-user could be either improved or made explicit. This in turn would result in a more secure and/or private exercise of the right to freedom of assembly or association.</t>

</section>
<section anchor="peer-to-peer-networking" title="Peer-to-peer networking">
<t>At the organizational level, peer production is one of the most relevant innovations from Internet mediated social practices. According to <xref target="Benkler"/> these networks imply ‘open collaborative innovation and creation, performed by diverse, decentralized groups organized principally by neither price signals nor organizational hierarchy, harnessing heterogeneous motivations, and governed and managed based on principles other than the residual authority of ownership implemented through contract.’ <xref target="Benkler"/>.</t>

<t>In his book The Wealth of Networks, <xref target="Benkler2"/> significantly expands on his definition of commons-based peer production. In his view, what distinguishes commons-based production is that it doesn’t rely upon or propagate proprietary knowledge: “The inputs and outputs of the process are shared, freely or conditionally, in an institutional form that leaves them equally available for all to use as they choose at their individual discretion.” <xref target="Benkler2"/>. To ensure that the knowledge generated is available for free use, commons-based projects are often shared under an open license</t>

<t>Peer-to-peer (P2P) is essentially a model of how people interact in real life because “we deal directly with one another whenever we wish to” <xref target="Vu"/>. Usually if we need something we ask our peers, who in turn refer us to other peers. In this sense, the ideal definition of P2P is that “nodes are able to directly exchange resources and services between themselves without the need for centralized servers” where each participating node typically acts both as a server and as a client <xref target="Vu"/>. <xref target="RFC5694"/> has defined it as peers or nodes that should be able to communicate directly between themselves without passing intermediaries, and that the system should be self-organizing and have decentralized control <xref target="RFC5694"/>. With this in mind, the ultimate model of P2P is a completely decentralized system, which is more resistant to speech regulation, immune to single points of failure and has a higher performance and scalability. Nonetheless, in practice some P2P systems are supported by centralized servers and some others have hybrid models where nodes are organized into two layers: the upper tier servers and the lower tier common nodes <xref target="Vu"/>.</t>

<t>Since the ARPANET project, the original idea behind the Internet was conceived as what we would now call a peer-to-peer system <xref target="RFC0001"/>. Over time it has increasingly shifted towards a client/server model with “millions of consumer clients communicating with a relatively privileged set of servers” <xref target="NelsonHedlun"/>.</t>

<t>Whether for resource sharing or data sharing, P2P systems are enabling freedom of assembly and association. Not only do they allow for effective dissemination of information, but they leverage computing resources by diminishing costs allowing for the formation of open collectives at the network level. At the same time, in completely decentralized systems the nodes are autonomous and can join or leave the network as they want -a characteristic that makes the system unpredictable: a resource might be only sometimes available, and some other resources might be missing or incomplete <xref target="Vu"/>. Lack of information might in turn makes association or assembly more difficult.</t>

<t>Additionally, when architecturally assessing the role of P2P systems we could say that: “the main advantage of centralized P2P systems is that they are able to provide a quick and reliable resource locating. Their limitation, however, is that the scalability of the systems is affected by the use of servers. While decentralized P2P systems are better than centralized P2P systems in this aspect, they require a longer time in resource locating. As a result, hybrid P2P systems have been introduced to take advantage of both centralized and decentralized architectures. Basically, to maintain the scalability, similar to decentralized P2P systems, there are no servers in hybrid P2P systems. However, peer nodes that are more powerful than others can be selected to act as servers to serve others. These nodes are often called super peers. In this way, resource locating can be done by both decentralized search techniques and centralized search techniques (asking super peers), and hence the systems benefit from the search techniques of centralized P2P systems.” <xref target="Vu"/>.</t>

</section>
</section>
<section anchor="universal-access-the-web" title="Universal Access: The Web">

<figure><artwork><![CDATA[
Does protocol development sufficiently consider usable and accessible 
formats and technologies appropriate for persons with different kinds 
of disabilities?
]]></artwork></figure>

<t>The W3C has done significant work to ensure that the Web is accessible to people with diverse physical abilities <xref target="W3C"/>. The implementation of these accessibility standards for instance help
people who have issues with seeing or rendering images to understand what the image actually contains. Making the web more accessible for people with diverse physical abilities enables them to excercise their right to online assembly and association.</t>

<t>The IETF uses English as its primary working language, both in its documentation and in its communication. This is also the case for reference implementations. Whereas it is estimated that roughly 20% of the Earth’s population speaks English, whereas only 360 million speak English as their first language. <xref target="RFC2277"/> describes that ‘”Internationalization is for humans. This means that protocols are not subject to internationalization; text strings are.”, this implies that protocol developers, as well as people that work with protocols, are not people, or that protocol developers are all in command of the English language. This means that it is significantly easier for people who have a command of the English language to become a protocol developer - and it might lead to the development of separate protocols that are developed within large language communities that are not using the English language or the Latin script. This makes it harder for people who seek to shape their own space of association and assembly on the Internet to do so. And is thus driving these communities into, often proprietary and non-interoperable services such as Facebook.</t>

<t>When Ramsey Nasser developed the Arabic programming language قلب (transliterated Qalb, Qlb and Alb) <xref target="Nasser"/> he called it ‘engineering performance art’ instead of engineering, because he knew that his language would not work. In part this is because all modern programming tools are based on the ASCII character set, which encodes Latin Characters and was originally based on the English Language. This highlights cultural biases of computer science and engineering. Despite long significant efforts, it is still largely impossible to register an email address in a language such as Devanagari, Arabic, or Chinese. Even if it is possible - it is to be expected that there will be a significant failure rate in sending and receiving emails with other services. This makes it harder for people who do not speak English and/or don’t use the written Latin script to exercise their freedom of association and assembly.</t>

</section>
<section anchor="block-together-now-irc-and-refusals" title="Block Together Now: IRC and Refusals">

<figure><artwork><![CDATA[
Can a protocol be designed to legitimately exclude someone 
from an association?
]]></artwork></figure>

<t>Previously we spoke about the privacy protecting features of IRC that enable freedom of association and assembly, including transport security. But now we turn to the ability to block users and effectively moderate discussions on IRC as a key feature of the technology that enables agency in membership, a key aspect of freedom of association and assembly.</t>

<t>For order to be kept within the IRC network, special classes of users become “operators” and are allowed to perform general maintenance functions on the network: basic network tasks such as disconnecting (temporary or permanently) and reconnecting servers as needed <xref target="RFC2812"/>. One of the most controversial power of operators is the ability to remove a user from the connected network by ‘force’, i.e., operators are able to close the connection between any client and server <xref target="RFC2812"/>.</t>

<t>IRC servers may deploy different policies for the ability of users to create their own channels or ‘rooms’, and for the delegation of ‘operator’-rights in such spaces. Some IRC servers support SSL/TLS connections for security purposes <xref target="RFC7194"/> which helps stop the use of packet sniffer programs to obtain the passwords of IRC users, but has little use beyond this scope due to the public nature of IRC channels. TLS connections require both client and server support (that may require the user to install TLS binaries and IRC client specific patches or modules on their computers). Some networks also use TLS for server to server connections, and provide a special channel flag (such as +S) to only allow TLS-connected users on the channel, while disallowing operator identification in clear text, to better utilize the advantages that TLS provides.</t>

</section>
</section>
<section anchor="conclusions-can-we-learn-anything-from-the-previous-case-studies" title="Conclusions: Can we learn anything from the previous case studies?">

<t>Communities, collaboration and joint action lie at the heart of the Internet. Even at a linguistic level, the words “networks” and “associations” are closely related.  Both are groups and assemblies of people who depend on “links” and “relationships” <xref target="Swire"/>.  Taking legal definitions given in international human rights law and related normative documents, we could assert that the rights to freedom of assembly and association protect collective activity online.  These rights protect gatherings by persons for a specific purpose and groups with a defined aim over time for a variety of peaceful, expressive and non-expressive, purposes,.  It is voluntary and uncoerced.</t>

<t>Given that the Internet itself was originally designed as a medium of communication for machines that share resources with each other as equals <xref target="RFC0903"/>, the Internet is now one of the most basic infrastructures for the right to freedom of assembly and association. Since Internet protocols and the Internet architecture play a central role in the management, development and use of the Internet, we established the relation between some protocols and the right to freedom of assembly and association.</t>

<t>After reviewing several cases representative of FAA considerations inherent in protocols standardized at the IETF, we can conclude that the way in which infrastructure is designed and implemented impacts people’s ability to exercise their freedom of assembly and association. This is because different technical designs come with different properties and characteristics. These properties and characteristics on the one hand enable people to assemble and associate, but on the other hand also add limiting, or even potentially endangering, characteristics. More often than not, this depends on the context. A clearly identified group for open communications, where messages are sent in cleartext and where peoples persistent identities are visible, can help to facilitate an assembly and build trust, but in other contexts the same configuration could pose a significant danger. Endangering characteristics should be mitigated, or at least clearly communicated to the users of these technologies. It is therefore recommended that the the potential impacts of Internet technologies should be assessed, reflecting recommendations of various UN bodies and norms.</t>

<t>Lastly, the increasing shift towards closed and non-interoperable platforms in chat and social media networks have a significant impact on the distributed and open nature of the Internet. Often these non-interoperable platforms are built on open-protocols but do not allow for interoperability or data-portability. The use of social-media platforms has enabled groups to associate, but it has also rendered users unable to change platforms, therefore leading to a sort of “forced association” that inhibits people to fully exercise their freedom of assembly and association.</t>

</section>
<section anchor="acknowledgements" title="Acknowledgements">

<t><list style="symbols">
  <t>Fred Baker, Jefsey, and Andrew Sullivan for work on Internet definitions.</t>
  <t>Stephane Bortzmeyer, ICNL, and Lisa Vermeer for several concrete text suggestions that found their way in this document.</t>
  <t>Mark Perkins and Gurshabad for finding a lot of typos.</t>
  <t>Gurshabad Grover, an anonymous reviewer, ICNL, Lisa Vermeer, and Sandra Braman for full reviews.</t>
  <t>The hrpc mailinglist at large for a very constructive discussion on a hard topic.</t>
</list></t>

</section>
<section anchor="security-considerations" title="Security Considerations">

<t>As this draft concerns a research document, there are no security considerations.</t>

</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>This document has no actions for IANA.</t>

</section>
<section anchor="research-group-information" title="Research Group Information">

<t>The discussion list for the IRTF Human Rights Protocol Considerations Research Group is located at the e-mail address <eref target="mailto:hrpc@ietf.org">hrpc@ietf.org</eref>. Information on the group and information on how to
subscribe to the list is at <eref target="https://www.irtf.org/mailman/listinfo/hrpc">https://www.irtf.org/mailman/listinfo/hrpc</eref></t>

<t>Archives of the list can be found at:
<eref target="https://www.irtf.org/mail-archive/web/hrpc/current/index.html">https://www.irtf.org/mail-archive/web/hrpc/current/index.html</eref></t>

</section>


  </middle>

  <back>


    <references title='Informative References'>





<reference  anchor="RFC0001" target='https://www.rfc-editor.org/info/rfc1'>
<front>
<title>Host Software</title>
<author initials='S.' surname='Crocker' fullname='S. Crocker'><organization /></author>
<date year='1969' month='April' />
</front>
<seriesInfo name='RFC' value='1'/>
<seriesInfo name='DOI' value='10.17487/RFC0001'/>
</reference>



<reference  anchor="RFC0155" target='https://www.rfc-editor.org/info/rfc155'>
<front>
<title>ARPA Network mailing lists</title>
<author initials='J.B.' surname='North' fullname='J.B. North'><organization /></author>
<date year='1971' month='May' />
</front>
<seriesInfo name='RFC' value='155'/>
<seriesInfo name='DOI' value='10.17487/RFC0155'/>
</reference>



<reference  anchor="RFC0903" target='https://www.rfc-editor.org/info/rfc903'>
<front>
<title>A Reverse Address Resolution Protocol</title>
<author initials='R.' surname='Finlayson' fullname='R. Finlayson'><organization /></author>
<author initials='T.' surname='Mann' fullname='T. Mann'><organization /></author>
<author initials='J.C.' surname='Mogul' fullname='J.C. Mogul'><organization /></author>
<author initials='M.' surname='Theimer' fullname='M. Theimer'><organization /></author>
<date year='1984' month='June' />
<abstract><t>This RFC suggests a method for workstations to dynamically find their    protocol address (e.g., their Internet Address), when they know only    their hardware address (e.g., their attached physical network address).    This RFC specifies a proposed protocol for the ARPA Internet community,    and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='STD' value='38'/>
<seriesInfo name='RFC' value='903'/>
<seriesInfo name='DOI' value='10.17487/RFC0903'/>
</reference>



<reference  anchor="RFC1211" target='https://www.rfc-editor.org/info/rfc1211'>
<front>
<title>Problems with the maintenance of large mailing lists</title>
<author initials='A.' surname='Westine' fullname='A. Westine'><organization /></author>
<author initials='J.' surname='Postel' fullname='J. Postel'><organization /></author>
<date year='1991' month='March' />
<abstract><t>This RFC discusses problems with maintaining large mailing lists, especially the processing of error reports.  This memo provides information for the Internet community.  It does not specify an Internet standard.</t></abstract>
</front>
<seriesInfo name='RFC' value='1211'/>
<seriesInfo name='DOI' value='10.17487/RFC1211'/>
</reference>



<reference  anchor="RFC1771" target='https://www.rfc-editor.org/info/rfc1771'>
<front>
<title>A Border Gateway Protocol 4 (BGP-4)</title>
<author initials='Y.' surname='Rekhter' fullname='Y. Rekhter'><organization /></author>
<author initials='T.' surname='Li' fullname='T. Li'><organization /></author>
<date year='1995' month='March' />
<abstract><t>This document, together with its companion document, &quot;Application of the Border Gateway Protocol in the Internet&quot;, define an inter-autonomous system routing protocol for the Internet. [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='1771'/>
<seriesInfo name='DOI' value='10.17487/RFC1771'/>
</reference>



<reference  anchor="RFC1930" target='https://www.rfc-editor.org/info/rfc1930'>
<front>
<title>Guidelines for creation, selection, and registration of an Autonomous System (AS)</title>
<author initials='J.' surname='Hawkinson' fullname='J. Hawkinson'><organization /></author>
<author initials='T.' surname='Bates' fullname='T. Bates'><organization /></author>
<date year='1996' month='March' />
<abstract><t>This memo discusses when it is appropriate to register and utilize an Autonomous System (AS), and lists criteria for such.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='6'/>
<seriesInfo name='RFC' value='1930'/>
<seriesInfo name='DOI' value='10.17487/RFC1930'/>
</reference>



<reference  anchor="RFC2277" target='https://www.rfc-editor.org/info/rfc2277'>
<front>
<title>IETF Policy on Character Sets and Languages</title>
<author initials='H.' surname='Alvestrand' fullname='H. Alvestrand'><organization /></author>
<date year='1998' month='January' />
<abstract><t>This document is the current policies being applied by the Internet Engineering Steering Group (IESG) towards the standardization efforts in the Internet Engineering Task Force (IETF) in order to help Internet protocols fulfill these requirements.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='18'/>
<seriesInfo name='RFC' value='2277'/>
<seriesInfo name='DOI' value='10.17487/RFC2277'/>
</reference>



<reference  anchor="RFC2810" target='https://www.rfc-editor.org/info/rfc2810'>
<front>
<title>Internet Relay Chat: Architecture</title>
<author initials='C.' surname='Kalt' fullname='C. Kalt'><organization /></author>
<date year='2000' month='April' />
<abstract><t>This document is an update describing the architecture of the current IRC protocol and the role of its different components.  Other documents describe in detail the protocol used between the various components defined here.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='2810'/>
<seriesInfo name='DOI' value='10.17487/RFC2810'/>
</reference>



<reference  anchor="RFC2812" target='https://www.rfc-editor.org/info/rfc2812'>
<front>
<title>Internet Relay Chat: Client Protocol</title>
<author initials='C.' surname='Kalt' fullname='C. Kalt'><organization /></author>
<date year='2000' month='April' />
<abstract><t>This document defines the Client Protocol, and assumes that the reader is familiar with the IRC Architecture.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='2812'/>
<seriesInfo name='DOI' value='10.17487/RFC2812'/>
</reference>



<reference  anchor="RFC3233" target='https://www.rfc-editor.org/info/rfc3233'>
<front>
<title>Defining the IETF</title>
<author initials='P.' surname='Hoffman' fullname='P. Hoffman'><organization /></author>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='2002' month='February' />
<abstract><t>This document gives a more concrete definition of &quot;the IETF&quot; as it understood today.  Many RFCs refer to &quot;the IETF&quot;.  Many important IETF documents speak of the IETF as if it were an already-defined entity. However, no IETF document correctly defines what the IETF is.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='58'/>
<seriesInfo name='RFC' value='3233'/>
<seriesInfo name='DOI' value='10.17487/RFC3233'/>
</reference>



<reference  anchor="RFC1958" target='https://www.rfc-editor.org/info/rfc1958'>
<front>
<title>Architectural Principles of the Internet</title>
<author initials='B.' surname='Carpenter' fullname='B. Carpenter' role='editor'><organization /></author>
<date year='1996' month='June' />
<abstract><t>The Internet and its architecture have grown in evolutionary fashion from modest beginnings, rather than from a Grand Plan. While this process of evolution is one of the main reasons for the technology's success, it nevertheless seems useful to record a snapshot of the current principles of the Internet architecture. This is intended for general guidance and general interest, and is in no way intended to be a formal or invariant reference model.  This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind.</t></abstract>
</front>
<seriesInfo name='RFC' value='1958'/>
<seriesInfo name='DOI' value='10.17487/RFC1958'/>
</reference>



<reference  anchor="RFC4084" target='https://www.rfc-editor.org/info/rfc4084'>
<front>
<title>Terminology for Describing Internet Connectivity</title>
<author initials='J.' surname='Klensin' fullname='J. Klensin'><organization /></author>
<date year='2005' month='May' />
<abstract><t>As the Internet has evolved, many types of arrangements have been advertised and sold as &quot;Internet connectivity&quot;.  Because these may differ significantly in the capabilities they offer, the range of options, and the lack of any standard terminology, the effort to distinguish between these services has caused considerable consumer confusion.  This document provides a list of terms and definitions that may be helpful to providers, consumers, and, potentially, regulators in clarifying the type and character of services being offered.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='104'/>
<seriesInfo name='RFC' value='4084'/>
<seriesInfo name='DOI' value='10.17487/RFC4084'/>
</reference>



<reference  anchor="RFC4271" target='https://www.rfc-editor.org/info/rfc4271'>
<front>
<title>A Border Gateway Protocol 4 (BGP-4)</title>
<author initials='Y.' surname='Rekhter' fullname='Y. Rekhter' role='editor'><organization /></author>
<author initials='T.' surname='Li' fullname='T. Li' role='editor'><organization /></author>
<author initials='S.' surname='Hares' fullname='S. Hares' role='editor'><organization /></author>
<date year='2006' month='January' />
<abstract><t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t><t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems.  This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t><t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR).  These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network &quot;class&quot; within BGP.  BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t><t>This document obsoletes RFC 1771.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4271'/>
<seriesInfo name='DOI' value='10.17487/RFC4271'/>
</reference>



<reference  anchor="RFC4880" target='https://www.rfc-editor.org/info/rfc4880'>
<front>
<title>OpenPGP Message Format</title>
<author initials='J.' surname='Callas' fullname='J. Callas'><organization /></author>
<author initials='L.' surname='Donnerhacke' fullname='L. Donnerhacke'><organization /></author>
<author initials='H.' surname='Finney' fullname='H. Finney'><organization /></author>
<author initials='D.' surname='Shaw' fullname='D. Shaw'><organization /></author>
<author initials='R.' surname='Thayer' fullname='R. Thayer'><organization /></author>
<date year='2007' month='November' />
<abstract><t>This document is maintained in order to publish all necessary information needed to develop interoperable applications based on the OpenPGP format.  It is not a step-by-step cookbook for writing an application.  It describes only the format and methods needed to read, check, generate, and write conforming packets crossing any network.  It does not deal with storage and implementation questions. It does, however, discuss implementation issues necessary to avoid security flaws.</t><t>OpenPGP software uses a combination of strong public-key and symmetric cryptography to provide security services for electronic communications and data storage.  These services include confidentiality, key management, authentication, and digital signatures.  This document specifies the message formats used in OpenPGP.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4880'/>
<seriesInfo name='DOI' value='10.17487/RFC4880'/>
</reference>



<reference  anchor="RFC5694" target='https://www.rfc-editor.org/info/rfc5694'>
<front>
<title>Peer-to-Peer (P2P) Architecture: Definition, Taxonomies, Examples, and Applicability</title>
<author initials='G.' surname='Camarillo' fullname='G. Camarillo' role='editor'><organization /></author>
<author><organization>IAB</organization></author>
<date year='2009' month='November' />
<abstract><t>In this document, we provide a survey of P2P (Peer-to-Peer) systems. The survey includes a definition and several taxonomies of P2P systems.  This survey also includes a description of which types of applications can be built with P2P technologies and examples of P2P applications that are currently in use on the Internet.  Finally, we discuss architectural trade-offs and provide guidelines for deciding whether or not a P2P architecture would be suitable to meet the requirements of a given application.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='5694'/>
<seriesInfo name='DOI' value='10.17487/RFC5694'/>
</reference>



<reference  anchor="RFC5751" target='https://www.rfc-editor.org/info/rfc5751'>
<front>
<title>Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.2 Message Specification</title>
<author initials='B.' surname='Ramsdell' fullname='B. Ramsdell'><organization /></author>
<author initials='S.' surname='Turner' fullname='S. Turner'><organization /></author>
<date year='2010' month='January' />
<abstract><t>This document defines Secure/Multipurpose Internet Mail Extensions (S/MIME) version 3.2.  S/MIME provides a consistent way to send and receive secure MIME data.  Digital signatures provide authentication, message integrity, and non-repudiation with proof of origin. Encryption provides data confidentiality.  Compression can be used to reduce data size.  This document obsoletes RFC 3851.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5751'/>
<seriesInfo name='DOI' value='10.17487/RFC5751'/>
</reference>



<reference  anchor="RFC6176" target='https://www.rfc-editor.org/info/rfc6176'>
<front>
<title>Prohibiting Secure Sockets Layer (SSL) Version 2.0</title>
<author initials='S.' surname='Turner' fullname='S. Turner'><organization /></author>
<author initials='T.' surname='Polk' fullname='T. Polk'><organization /></author>
<date year='2011' month='March' />
<abstract><t>This document requires that when Transport Layer Security (TLS) clients and servers establish connections, they never negotiate the use of  Secure Sockets Layer (SSL) version 2.0.  This document updates the  backward compatibility sections found in the Transport Layer Security (TLS). [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6176'/>
<seriesInfo name='DOI' value='10.17487/RFC6176'/>
</reference>



<reference  anchor="RFC7118" target='https://www.rfc-editor.org/info/rfc7118'>
<front>
<title>The WebSocket Protocol as a Transport for the Session Initiation Protocol (SIP)</title>
<author initials='I.' surname='Baz Castillo' fullname='I. Baz Castillo'><organization /></author>
<author initials='J.' surname='Millan Villegas' fullname='J. Millan Villegas'><organization /></author>
<author initials='V.' surname='Pascual' fullname='V. Pascual'><organization /></author>
<date year='2014' month='January' />
<abstract><t>The WebSocket protocol enables two-way real-time communication between clients and servers in web-based applications.  This document specifies a WebSocket subprotocol as a reliable transport mechanism between Session Initiation Protocol (SIP) entities to enable use of SIP in web-oriented deployments.</t></abstract>
</front>
<seriesInfo name='RFC' value='7118'/>
<seriesInfo name='DOI' value='10.17487/RFC7118'/>
</reference>



<reference  anchor="RFC7194" target='https://www.rfc-editor.org/info/rfc7194'>
<front>
<title>Default Port for Internet Relay Chat (IRC) via TLS/SSL</title>
<author initials='R.' surname='Hartmann' fullname='R. Hartmann'><organization /></author>
<date year='2014' month='August' />
<abstract><t>This document describes the commonly accepted practice of listening on TCP port 6697 for incoming Internet Relay Chat (IRC) connections encrypted via TLS/SSL.</t></abstract>
</front>
<seriesInfo name='RFC' value='7194'/>
<seriesInfo name='DOI' value='10.17487/RFC7194'/>
</reference>



<reference  anchor="RFC8280" target='https://www.rfc-editor.org/info/rfc8280'>
<front>
<title>Research into Human Rights Protocol Considerations</title>
<author initials='N.' surname='ten Oever' fullname='N. ten Oever'><organization /></author>
<author initials='C.' surname='Cath' fullname='C. Cath'><organization /></author>
<date year='2017' month='October' />
<abstract><t>This document aims to propose guidelines for human rights considerations, similar to the work done on the guidelines for privacy considerations (RFC 6973).  The other parts of this document explain the background of the guidelines and how they were developed.</t><t>This document is the first milestone in a longer-term research effort.  It has been reviewed by the Human Rights Protocol Considerations (HRPC) Research Group and also by individuals from outside the research group.</t></abstract>
</front>
<seriesInfo name='RFC' value='8280'/>
<seriesInfo name='DOI' value='10.17487/RFC8280'/>
</reference>


<reference anchor="UDHR" target="http://www.un.org/en/documents/udhr/">
  <front>
    <title>The Universal Declaration of Human Rights</title>
    <author >
      <organization>United Nations General Assembly</organization>
    </author>
    <date year="1948"/>
  </front>
</reference>
<reference anchor="ICCPR" target="http://www.ohchr.org/EN/ProfessionalInterest/Pages/CCPR.aspx">
  <front>
    <title>International Covenant on Civil and Political Rights</title>
    <author >
      <organization>United Nations General Assembly</organization>
    </author>
    <date year="1966"/>
  </front>
</reference>
<reference anchor="HussainHoward" target="https://doi.org/10.1111/misr.12020">
  <front>
    <title>What Best Explains Successful Protest Cascades? ICTs and the Fuzzy Causes of the Arab Spring</title>
    <author initials="M.M." surname="Hussain">
      <organization></organization>
    </author>
    <author initials="P.N." surname="Howard">
      <organization></organization>
    </author>
    <date year="2013"/>
  </front>
  <seriesInfo name="Int Stud Rev (2013) 15 (1): 48-66." value=""/>
</reference>
<reference anchor="UNSRFAA2012" target="http://freeassembly.net/wp-content/uploads/2013/10/A-HRC-20-27_en-annual-report-May-2012.pdf">
  <front>
    <title>Report of the Special Rapporteur on the rights to freedom of peaceful assembly and of association</title>
    <author initials="." surname="Maina Kiai">
      <organization></organization>
    </author>
    <date year="2012"/>
  </front>
  <seriesInfo name="A/HRC/20/27" value=""/>
</reference>
<reference anchor="APC" target="https://www.apc.org/es/system/files/FOAA_online_IndiaMalaysiaPakistan.pdf">
  <front>
    <title>Freedom of assembly and association online in India, Malaysia and Pakistan. Trends, challenges and recommendations.</title>
    <author >
      <organization>Association for Progressive Communications</organization>
    </author>
    <author initials="." surname="Gayathry Venkiteswaran">
      <organization></organization>
    </author>
    <date year="2016"/>
  </front>
</reference>
<reference anchor="Swire" target="https://ssrn.com/abstract=1989516 or http://dx.doi.org/10.2139/ssrn.1989516">
  <front>
    <title>Social Networks, Privacy, and Freedom of Association: Data Empowerment vs. Data Protection</title>
    <author initials="." surname="Peter Swire">
      <organization></organization>
    </author>
    <date year="2012"/>
  </front>
  <seriesInfo name="North Carolina Law Review (2012) 90 (1): 104." value=""/>
</reference>
<reference anchor="UNGA" target="http://www.un.org/en/ga/search/view_doc.asp?symbol=A/59/401 para. 46">
  <front>
    <title>Human rights defenders</title>
    <author initials="." surname="Hina Jilani">
      <organization></organization>
    </author>
    <date year="2004"/>
  </front>
  <seriesInfo name="A/59/401" value=""/>
</reference>
<reference anchor="HafnerandLyon" target="https://doi.org/10.1111/misr.12020">
  <front>
    <title>Where Wizards Stay Up Late. The Origins of the Internet</title>
    <author initials="K." surname="Hafnerand">
      <organization></organization>
    </author>
    <author initials="M." surname="Lyon">
      <organization></organization>
    </author>
    <date year="1998"/>
  </front>
  <seriesInfo name="First Touchstone Edition (1998): 93." value=""/>
</reference>
<reference anchor="Pensado" target="http://revista.drclas.harvard.edu/book/student-activism">
  <front>
    <title>Student Activism. Utopian Dreams.</title>
    <author initials="." surname="Jaime Pensado">
      <organization></organization>
    </author>
    <date year="2012"/>
  </front>
  <seriesInfo name="ReVista. Harvard Review of Latin America (2012)." value=""/>
</reference>
<reference anchor="Abbate" target="https://mitpress.mit.edu/books/inventing-internet">
  <front>
    <title>Inventing the Internet</title>
    <author initials="." surname="Janet Abbate">
      <organization></organization>
    </author>
    <date year="2013"/>
  </front>
  <seriesInfo name="Cambridge: MIT Press (2013): 11." value=""/>
</reference>
<reference anchor="AckermannKargerZhang" target="https://people.csail.mit.edu/axz/papers/mailinglists.pdf">
  <front>
    <title>Mailing Lists: Why Are They Still Here, What’s Wrong With Them, and How Can We Fix Them?</title>
    <author initials="M.S." surname="Ackerman">
      <organization></organization>
    </author>
    <author initials="D.R." surname="Karger">
      <organization></organization>
    </author>
    <author initials="A.X." surname="Zhang">
      <organization></organization>
    </author>
    <date year="2017"/>
  </front>
  <seriesInfo name="Mit. edu (2017): 1." value=""/>
</reference>
<reference anchor="Benkler" target="http://www.benkler.org/Peer%20production%20and%20cooperation%2009.pdf">
  <front>
    <title>Peer Production and Cooperation</title>
    <author initials="Y." surname="Benkler">
      <organization></organization>
    </author>
    <date year="2009"/>
  </front>
</reference>
<reference anchor="AndersonGuarnieri" target="https://iranthreats.github.io/resources/webrtc-deanonymization/">
  <front>
    <title>Fictitious Profiles and WebRTC's Privacy Leaks Used to Identify Iranian Activists</title>
    <author initials="C." surname="Anderson">
      <organization></organization>
    </author>
    <author initials="C." surname="Guarnieri">
      <organization></organization>
    </author>
    <date year="2016"/>
  </front>
</reference>
<reference anchor="NelsonHedlun" target="http://library.uniteddiversity.coop/REconomy_Resource_Pack/More_Inspirational_Videos_and_Useful_Info/Peer_to_Peer-Harnessing_the_Power_of_Disruptive_Technologies.pdf">
  <front>
    <title>A Network of Peers: Models Through the History of the Internet</title>
    <author initials="N." surname="Minar">
      <organization></organization>
    </author>
    <author initials="M." surname="Hedlun">
      <organization></organization>
    </author>
    <date year="2001"/>
  </front>
  <seriesInfo name="Peer to Peer: Harnessing the Power of Disruptive Technologies, ed: Andy Oram" value=""/>
</reference>
<reference anchor="Vu" target="https://www.springer.com/cn/book/9783642035135">
  <front>
    <title>Peer-to-Peer Computing: Principles and Applications</title>
    <author initials="." surname="Vu, Quang Hieu">
      <organization></organization>
    </author>
    <author initials="." surname="Lupu, Mihai">
      <organization></organization>
    </author>
    <author initials="." surname="Ooi, Beng Chin">
      <organization></organization>
    </author>
    <date year="2010"/>
  </front>
</reference>
<reference anchor="Schleuder" target="https://schleuder.nadir.org/">
  <front>
    <title>Schleuder - A gpg-enabled mailinglist with remailing-capabilities.</title>
    <author >
      <organization>Nadir</organization>
    </author>
    <date year="2017"/>
  </front>
</reference>
<reference anchor="Crawford" target="https://www.bestvpn.com/the-webrtc-vpn-bug-and-how-to-fix-it/">
  <front>
    <title>The WebRTC VPN “Bug” and How to Fix</title>
    <author initials="D." surname="Crawford">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
</reference>
<reference anchor="Troncosoetal" target="https://www.petsymposium.org/2017/papers/issue4/paper87-2017-4-source.pdf">
  <front>
    <title>Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments</title>
    <author initials="C." surname="Troncoso">
      <organization></organization>
    </author>
    <author initials="M." surname="Isaakdis">
      <organization></organization>
    </author>
    <author initials="G." surname="Danezis">
      <organization></organization>
    </author>
    <author initials="H." surname="Halpin">
      <organization></organization>
    </author>
    <date year="2017"/>
  </front>
  <seriesInfo name="Proceedings on Privacy Enhancing Technologies ; 2017 (4):307–329" value=""/>
</reference>
<reference anchor="Mainwaringetal" target="http://www.dourish.com/classes/readings/Mainwaring-Infrastructure.pdf">
  <front>
    <title>Infrastructures and Their Discontents: Implications for Ubicomp</title>
    <author initials="S.D." surname="Mainwaring">
      <organization></organization>
    </author>
    <author initials="M.F." surname="Chang">
      <organization></organization>
    </author>
    <author initials="K." surname="Anderson">
      <organization></organization>
    </author>
    <date year="2004"/>
  </front>
  <seriesInfo name="DBLP Conference: Conference: UbiComp 2004: Ubiquitous Computing: 6th International Conference, Nottingham, UK, September 7-10, 2004. Proceedings" value=""/>
</reference>
<reference anchor="Bowker" >
  <front>
    <title>Information mythology and infrastructure</title>
    <author initials="G." surname="Bowker">
      <organization></organization>
    </author>
    <date year="1994"/>
  </front>
  <seriesInfo name="In: L. Bud (Ed.), Information Acumen: The Understanding and use of Knowledge in Modern Business,Routledge,London,1994,pp.231–247" value=""/>
</reference>
<reference anchor="Bloketal" >
  <front>
    <title>Infrastructuring Environments</title>
    <author initials="A." surname="Blok">
      <organization></organization>
    </author>
    <author initials="M." surname="Nakazora">
      <organization></organization>
    </author>
    <author initials="B.R." surname="Winthereik">
      <organization></organization>
    </author>
    <date year="2016"/>
  </front>
  <seriesInfo name="Science as Culture 25:1, 1-22." value=""/>
</reference>
<reference anchor="PipekWulf" >
  <front>
    <title>Infrastructuring: Towards an Integrated Perspective on the Design and Use of Information Technology</title>
    <author initials="V." surname="Pipek">
      <organization></organization>
    </author>
    <author initials="W." surname="Wolf">
      <organization></organization>
    </author>
    <date year="2009"/>
  </front>
  <seriesInfo name="Journal of the Association for Information Systems (10) 5, pp. 306-332" value=""/>
</reference>
<reference anchor="CRC" target="https://www.info.dfat.gov.au/Info/Treaties/treaties.nsf/AllDocIDs/E123F4F71DCAE3E7CA256B4F007F2905">
  <front>
    <title>Lorum</title>
    <author initials="." surname="Wikipedia">
      <organization></organization>
    </author>
    <date year="2000"/>
  </front>
</reference>
<reference anchor="CERD" target="https://www.info.dfat.gov.au/Info/Treaties/treaties.nsf/AllDocIDs/2F70352A0B65EB67CA256B6E0075FE13">
  <front>
    <title>Convention on the Elimination of all forms of Racial Discrimination</title>
    <author >
      <organization>United Nations</organization>
    </author>
    <date year="1966"/>
  </front>
</reference>
<reference anchor="Sauter" >
  <front>
    <title>The Coming Swarm</title>
    <author initials="M." surname="Sauter">
      <organization></organization>
    </author>
    <date year="2014"/>
  </front>
  <seriesInfo name="Bloomsbury" value=""/>
</reference>
<reference anchor="HRPC-charter" target="https://datatracker.ietf.org/doc/charter-irtf-hrpc/">
  <front>
    <title>Charter for Research Group</title>
    <author initials="." surname="Human Rights Protocol Consideration RG">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
</reference>
<reference anchor="CRPD" target="http://www.austlii.edu.au/au/other/dfat/treaties/2008/12.html">
  <front>
    <title>Convention on the Rights of Persons with Disabilities</title>
    <author >
      <organization>United Nations</organization>
    </author>
    <date year="2007"/>
  </front>
</reference>
<reference anchor="Nyokabi" target="https://repository.gchumanrights.org/bitstream/handle/20.500.11825/1582/3.Global%20article%20HRDA_2_2019.pdf?sequence=4&amp;isAllowed=y">
  <front>
    <title>The right to development and internet shutdowns: Assessing the role of information and communications technology in democratic development in Africa</title>
    <author initials="D.M." surname="Nyokabi">
      <organization></organization>
    </author>
    <author initials="N." surname="Diallo">
      <organization></organization>
    </author>
    <author initials="N.W." surname="Ntesang">
      <organization></organization>
    </author>
    <author initials="T.K." surname="White">
      <organization></organization>
    </author>
    <author initials="T." surname="Ilori">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="Stanford" target="https://plato.stanford.edu/entries/freedom-association/">
  <front>
    <title>Freedom of Association</title>
    <author initials="K." surname="Brownlee">
      <organization></organization>
    </author>
    <author initials="D." surname="Jenkins">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="ViennaDeclaration" target="https://www.ohchr.org/en/professionalinterest/pages/vienna.aspx">
  <front>
    <title>Vienna Declaration and Programme of Action</title>
    <author >
      <organization>United Nations</organization>
    </author>
    <date year="1993"/>
  </front>
</reference>
<reference anchor="Loi" target="https://link.springer.com/article/10.1007/s13347-019-00351-0">
  <front>
    <title>Two Concepts of Group Privacy</title>
    <author initials="M." surname="Loi">
      <organization></organization>
    </author>
    <author initials="M." surname="Christen">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
</reference>
<reference anchor="Glasius" target="https://academic.oup.com/isq/article/64/2/453/5823498">
  <front>
    <title>Illiberal Norm Diffusion: How Do Governments Learn to Restrict Nongovernmental Organizations?</title>
    <author initials="M." surname="Glasius">
      <organization></organization>
    </author>
    <author initials="J." surname="Schalk">
      <organization></organization>
    </author>
    <author initials="M." surname="De Lange">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
</reference>
<reference anchor="CoE" target="https://mk0rofifiqa2w3u89nud.kinstacdn.com/wp-content/uploads/COE-report-on-FOAA-rights-on-the-internet-.pdf">
  <front>
    <title>Freedom of assembly and association on the Internet</title>
    <author >
      <organization>Council of Europe</organization>
    </author>
    <date year="2015"/>
  </front>
</reference>
<reference anchor="APCtraining" target="http://itrainonline.org/itrainonline/mmtk/APC_IRHRCurriculum_FOA_Handout.pdf">
  <front>
    <title>Multimedia training kit</title>
    <author initials="D." surname="Sauter">
      <organization></organization>
    </author>
    <author >
      <organization>Association for Progressive Communications</organization>
    </author>
    <date year="2013"/>
  </front>
</reference>
<reference anchor="UNHRC2020" target="https://www.ohchr.org/EN/HRBodies/HRC/RegularSessions/Session44/Documents/A_HRC_44_24_AEV.docx">
  <front>
    <title>Impact of new technologies on the promotion and protection of human rights in the context of assemblies, including peaceful protests. Report of the United Nations High Commissioner for Human Rights A/HRC/44/24, 2020</title>
    <author initials="." surname="Michelle Bachelet">
      <organization></organization>
    </author>
    <author >
      <organization>United Nations</organization>
    </author>
    <date year="2000"/>
  </front>
</reference>
<reference anchor="Benkler2" target="http://is.gd/rxUpTQ">
  <front>
    <title>The wealth of Networks - How social production transforms markets and freedom</title>
    <author initials="Y." surname="Benkler">
      <organization></organization>
    </author>
    <date year="2006"/>
  </front>
  <seriesInfo name="New Haven and London - Yale University Press" value=""/>
</reference>
<reference anchor="W3C" target="https://www.w3.org/standards/webdesign/accessibility">
  <front>
    <title>Accessibility</title>
    <author >
      <organization>W3C</organization>
    </author>
    <date year="2015"/>
  </front>
</reference>
<reference anchor="Nasser" target="https://nas.sr/%D9%82%D9%84%D8%A8/">
  <front>
    <title>قلب</title>
    <author initials="R." surname="Nasser">
      <organization></organization>
    </author>
    <date year="2013"/>
  </front>
</reference>
<reference anchor="UNGPBHR" target="https://www.ohchr.org/documents/publications/guidingprinciplesbusinesshr_en.pdf">
  <front>
    <title>Guiding Principles on Business and Human Rights</title>
    <author >
      <organization>United Nations</organization>
    </author>
    <date year="2011"/>
  </front>
</reference>
<reference anchor="Kaye" target="https://www.ohchr.org/EN/HRbodies/HRC/RegularSessions/Session29/Documents/A.HRC.29.32_AEV.doc">
  <front>
    <title>The use of encryption and anonymity in digital communications</title>
    <author initials="D." surname="Kaye">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
</reference>
<reference anchor="LEAP" target="https://leap.se/en/about-us/vision">
  <front>
    <title>The Right to Whisper</title>
    <author >
      <organization>LEAP</organization>
    </author>
    <date year="2020"/>
  </front>
</reference>
<reference anchor="Marcus" target="http://www.cardozoaelj.com/wp-content/uploads/2013/02/Marcus.pdf">
  <front>
    <title>Commercial Speech on the Internet: Spam and the first amendment</title>
    <author initials="J." surname="Marcus">
      <organization></organization>
    </author>
    <date year="1998"/>
  </front>
</reference>
<reference anchor="APC3" target="https://www.apc.org/en/node/36145/#tools">
  <front>
    <title>Closer than ever</title>
    <author >
      <organization>Association for Progressive Communications</organization>
    </author>
    <date year="2020"/>
  </front>
</reference>
<reference anchor="UNHRC2018" target="https://digitallibrary.un.org/record/1639840?ln=en">
  <front>
    <title>UN Human Rights Council Resolution 'The promotion, protection and enjoyment of human rights on the Internet' (A/HRC/32/L.20)</title>
    <author >
      <organization>United Nations Human Rights Council</organization>
    </author>
    <date year="2016"/>
  </front>
</reference>
<reference anchor="UNGC37" target="https://tbinternet.ohchr.org/_layouts/15/treatybodyexternal/TBSearch.aspx?Lang=en&amp;TreatyID=8&amp;DocTypeID=11">
  <front>
    <title>Human Rights Committee “General comment No. 37 (2020) on the right of peaceful assembly (article 21)”, CCPR/C/GC/3</title>
    <author >
      <organization>United Nations Human Rights Committee</organization>
    </author>
    <date year="2020"/>
  </front>
</reference>
<reference anchor="UNSRFOAA2012" target="http://freeassembly.net/wp-content/uploads/2013/10/A-HRC-20-27_en-annual-report-May-2012.pdf">
  <front>
    <title>Report of the Special Rapporteur on the rights to freedom of peaceful assembly and of association", A/HRC/20/27</title>
    <author initials="." surname="Maina Kiai">
      <organization></organization>
    </author>
    <author >
      <organization>United Nations</organization>
    </author>
    <date year="2012"/>
  </front>
</reference>
<reference anchor="FoAdef" target="https://en.wikipedia.org/wiki/Freedom_of_association">
  <front>
    <title>Freedom of association</title>
    <author >
      <organization>Wikipedia</organization>
    </author>
    <date year="2021"/>
  </front>
</reference>
<reference anchor="RutzenZenn" >
  <front>
    <title>Association and Assembly in the Digital Age</title>
    <author initials="D." surname="Rutzen">
      <organization></organization>
    </author>
    <author initials="J." surname="Zenn">
      <organization></organization>
    </author>
    <date year="2011" month="December"/>
  </front>
  <seriesInfo name="The International Journal of Not-for-Profit Law, Volume 13, Issue 4" value=""/>
</reference>
<reference anchor="UNSRFAA2019" target="https://undocs.org/A/HRC/41/41">
  <front>
    <title>Report of the Special Rapporteur on the rights to freedom of peaceful assembly and of association</title>
    <author initials="." surname="Clément Voule">
      <organization></organization>
    </author>
    <author >
      <organization>United Nations</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>


    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

