@@ -223,7 +223,7 @@ In order to define and analyze how various partitioning techniques work, the bou
223223being partitioned need to be established. This is the role of context separation. In particular,
224224in order to prevent the correlation of user-specific information across contexts, partitions need
225225to ensure that any single entity (other than the client itself) does not participate in contexts
226- where both identities are visible.
226+ where both identifiers are visible.
227227
228228Context separation can be achieved in different ways, for example, over time, across network paths, based
229229on (en)coding, etc. The privacy-oriented protocols described in this document generally involve
@@ -236,8 +236,8 @@ application transactions.
236236
237237These techniques are frequently used in conjunction for context separation. For example,
238238encrypting an HTTP exchange might prevent a network middlebox that sees a client IP address
239- from seeing the user account identity , but it doesn't prevent the TLS-terminating server
240- from observing both identities and correlating them. As such, preventing correlation
239+ from seeing the user account identifier , but it doesn't prevent the TLS-terminating server
240+ from observing both identifiers and correlating them. As such, preventing correlation
241241requires separating contexts, such as by using proxying to conceal a client's IP address
242242that would otherwise be used as an identifier.
243243
@@ -584,9 +584,9 @@ information in any given context to only include what is necessary for that
584584context, and prevent the sharing of data across contexts wherever possible.
585585
586586The most impactful types of information to partition are (a) user-identifying information,
587- such as user identity or identities (including account names or IP addresses) that can be
587+ such as user identifiers (including account names or IP addresses) that can be
588588linked and (b) non-user-identifying information (including content a user
589- generates or accesses), which can be often sensitive when combined with a user identity .
589+ generates or accesses), which can be often sensitive when combined with a user identifier .
590590
591591In this section, we discuss considerations for partitioning these types of information.
592592
@@ -633,8 +633,8 @@ ensure that all information exposed in a context serves as few purposes as possi
633633principle from the start helps mitigate issues that arise if users of the system or protocol inadvertently
634634ossify on the information available in contexts. Legacy systems that have ossified on information available
635635in contexts may be difficult to change in practice. As an example, many existing anti-abuse systems
636- depend on some notion of client identity such as client IP address, coupled with client data, to provide
637- value. Partitioning contexts in these systems such that they no longer see the client's identity requires new
636+ depend on some client identifier such as client IP address, coupled with client data, to provide
637+ value. Partitioning contexts in these systems such that they no longer determine the client identity requires new
638638solutions to the anti-abuse problem.
639639
640640# Limits of Privacy Partitioning {#limits}
@@ -656,9 +656,9 @@ across contexts. Thus, non-collusion is a fundamental requirement for privacy pa
656656to offer meaningful privacy for end-users. In particular, the trust relationships that users have
657657with different parties affect the resulting impact on the user's privacy.
658658
659- As an example, consider OHTTP, wherein the Oblivious Relay knows the Client identity but not
660- the Client data, and the Oblivious Gateway knows the Client data but not the Client identity.
661- If the Oblivious Relay and Gateway collude, they can link Client identity and data together
659+ As an example, consider OHTTP, wherein the Oblivious Relay knows the client identity but not
660+ the client data, and the Oblivious Gateway knows the client data but not the client identity.
661+ If the Oblivious Relay and Gateway collude, they can link client identity and data together
662662for each request and response transaction by simply observing requests in transit.
663663
664664It is not currently possible to guarantee with technical protocol measures that two
@@ -687,8 +687,8 @@ a relay, the server still learns this directly from the client.
687687
688688Other relevant examples of insufficient partitioning include TLS Encrypted Client Hello (ECH) {{?I-D.ietf-tls-esni}}
689689and VPNs. ECH use cryptographic protection (encryption) to hide information from unauthorized parties,
690- but both clients and servers (two entities) can link user-specific data to user-specific identity (IP address).
691- Similarly, while VPNs hide identity from end servers, the VPN server has still can see the identity of both the
690+ but both clients and servers (two entities) can link user-specific data to user-specific identifier (IP address).
691+ Similarly, while VPNs hide identifiers from end servers, the VPN server can still see the identifiers of both the
692692client and server. Applying privacy partitioning would advocate for at least two additional entities to avoid
693693revealing both identity (who) and user actions (what) from each involved party.
694694
0 commit comments