Skip to content

Commit 4ea8ab4

Browse files
authored
Update draft-iab-privacy-partitioning.md
Identifiers
1 parent 2f3ae60 commit 4ea8ab4

File tree

1 file changed

+12
-12
lines changed

1 file changed

+12
-12
lines changed

draft-iab-privacy-partitioning.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -223,7 +223,7 @@ In order to define and analyze how various partitioning techniques work, the bou
223223
being partitioned need to be established. This is the role of context separation. In particular,
224224
in order to prevent the correlation of user-specific information across contexts, partitions need
225225
to ensure that any single entity (other than the client itself) does not participate in contexts
226-
where both identities are visible.
226+
where both identifiers are visible.
227227

228228
Context separation can be achieved in different ways, for example, over time, across network paths, based
229229
on (en)coding, etc. The privacy-oriented protocols described in this document generally involve
@@ -236,8 +236,8 @@ application transactions.
236236

237237
These techniques are frequently used in conjunction for context separation. For example,
238238
encrypting an HTTP exchange might prevent a network middlebox that sees a client IP address
239-
from seeing the user account identity, but it doesn't prevent the TLS-terminating server
240-
from observing both identities and correlating them. As such, preventing correlation
239+
from seeing the user account identifier, but it doesn't prevent the TLS-terminating server
240+
from observing both identifiers and correlating them. As such, preventing correlation
241241
requires separating contexts, such as by using proxying to conceal a client's IP address
242242
that would otherwise be used as an identifier.
243243

@@ -584,9 +584,9 @@ information in any given context to only include what is necessary for that
584584
context, and prevent the sharing of data across contexts wherever possible.
585585

586586
The most impactful types of information to partition are (a) user-identifying information,
587-
such as user identity or identities (including account names or IP addresses) that can be
587+
such as user identifiers (including account names or IP addresses) that can be
588588
linked and (b) non-user-identifying information (including content a user
589-
generates or accesses), which can be often sensitive when combined with a user identity.
589+
generates or accesses), which can be often sensitive when combined with a user identifier.
590590

591591
In this section, we discuss considerations for partitioning these types of information.
592592

@@ -633,8 +633,8 @@ ensure that all information exposed in a context serves as few purposes as possi
633633
principle from the start helps mitigate issues that arise if users of the system or protocol inadvertently
634634
ossify on the information available in contexts. Legacy systems that have ossified on information available
635635
in contexts may be difficult to change in practice. As an example, many existing anti-abuse systems
636-
depend on some notion of client identity such as client IP address, coupled with client data, to provide
637-
value. Partitioning contexts in these systems such that they no longer see the client's identity requires new
636+
depend on some client identifier such as client IP address, coupled with client data, to provide
637+
value. Partitioning contexts in these systems such that they no longer determine the client identity requires new
638638
solutions to the anti-abuse problem.
639639

640640
# Limits of Privacy Partitioning {#limits}
@@ -656,9 +656,9 @@ across contexts. Thus, non-collusion is a fundamental requirement for privacy pa
656656
to offer meaningful privacy for end-users. In particular, the trust relationships that users have
657657
with different parties affect the resulting impact on the user's privacy.
658658

659-
As an example, consider OHTTP, wherein the Oblivious Relay knows the Client identity but not
660-
the Client data, and the Oblivious Gateway knows the Client data but not the Client identity.
661-
If the Oblivious Relay and Gateway collude, they can link Client identity and data together
659+
As an example, consider OHTTP, wherein the Oblivious Relay knows the client identity but not
660+
the client data, and the Oblivious Gateway knows the client data but not the client identity.
661+
If the Oblivious Relay and Gateway collude, they can link client identity and data together
662662
for each request and response transaction by simply observing requests in transit.
663663

664664
It is not currently possible to guarantee with technical protocol measures that two
@@ -687,8 +687,8 @@ a relay, the server still learns this directly from the client.
687687

688688
Other relevant examples of insufficient partitioning include TLS Encrypted Client Hello (ECH) {{?I-D.ietf-tls-esni}}
689689
and VPNs. ECH use cryptographic protection (encryption) to hide information from unauthorized parties,
690-
but both clients and servers (two entities) can link user-specific data to user-specific identity (IP address).
691-
Similarly, while VPNs hide identity from end servers, the VPN server has still can see the identity of both the
690+
but both clients and servers (two entities) can link user-specific data to user-specific identifier (IP address).
691+
Similarly, while VPNs hide identifiers from end servers, the VPN server can still see the identifiers of both the
692692
client and server. Applying privacy partitioning would advocate for at least two additional entities to avoid
693693
revealing both identity (who) and user actions (what) from each involved party.
694694

0 commit comments

Comments
 (0)