@@ -86,14 +86,16 @@ of privacy partitioning, including OHAI, MASQUE, Privacy Pass, and PPM. This doc
8686work in those groups and describes a framework for reasoning about the resulting privacy posture of different
8787endpoints in practice.
8888
89- {{?RFC6973}} discusses data minimization, especially in the context of
90- user identity and identity management systems.
91- In these systems usually an identify provider issues credentials that can be used to access a
92- service without revealing the user's identity by relying on the authentication assertion from
93- the identity provider (see {{Section 6.1.4 of RFC6973}}). This describes a specific form of
94- privacy partitioning, similar as used for Privacy Pass (see Section {{privacypass}}).
95- Privacy partitioning as defined in this document goes further, to consider different deployment
96- models that can create multiple contexts where data is minimized in each context.
89+ Privacy partitioning is particularly relevant as a tool for data minimization, which is described
90+ in {{Section 6.1 of ?RFC6973}}. {{RFC6973}} provides guidance for privacy considerations in
91+ Internet protocols, along with a set of questions on how to evaluate the data minimization
92+ of a protocol in {{Section 7.1 of ?RFC6973}}. Protocols that employ privacy partitioning
93+ ought to consider the questions in that section when evaluating their design, particularly
94+ with regards to how identifiers and data can be correlated by protocol participants and
95+ observers in each context that has been partitioned. Privacy partitioning can also be
96+ used as a way to separate identity providers from relying parties
97+ (see {{Section 6.1.4 of RFC6973}}), as in the case of Privacy Pass
98+ (see Section {{privacypass}}).
9799
98100# Privacy Partitioning
99101
0 commit comments