@@ -230,21 +230,23 @@ on (en)coding, etc. The privacy-oriented protocols described in this document ge
230230more complex partitioning, but the techniques to partition communication contexts still employ the
231231same techniques :
232232
233- 1. Encryption allows partitioning of contexts within a given network path.
234- 1. Using separate connections across time or space allows partitioning of contexts for different
235- application transactions.
233+ 1. Cryptographic protection, such as the use of encryption to specific parties, allows
234+ partitioning of contexts between different parties (those with the ability to remove
235+ cryptographic protections, and those without).
236+ 1. Connection separation across time or space to allow partitioning of contexts for different
237+ application transactions over the network.
236238
237239These techniques are frequently used in conjunction for context separation. For example,
238- encrypting an HTTP exchange might prevent a network middlebox that sees a client IP address
239- from seeing the user account identifier, but it doesn't prevent the TLS-terminating server
240- from observing both identifiers and correlating them. As such, preventing correlation
241- requires separating contexts, such as by using proxying to conceal a client's IP address
242- that would otherwise be used as an identifier.
240+ encrypting an HTTP exchange using TLS between client and TLS-terminating server might prevent
241+ a network middlebox that sees a client IP address from seeing the user account identifier,
242+ but it doesn't prevent the TLS-terminating server from observing both identifiers and correlating
243+ them. As such, preventing correlation requires separating contexts, such as by using proxying to
244+ conceal a client's IP address that would otherwise be used as an identifier.
243245
244246# # Approaches to Partitioning
245247
246248While all of the partitioning protocols described in this document create
247- separate contexts using encryption and/or connection separation, each one has a
249+ separate contexts using cryptographic protection and/or connection separation, each one has a
248250unique approach that results in different sets of contexts. Since many of
249251these protocols are new, it is yet to be seen how each approach will be
250252used at scale across the Internet, and what new models will emerge in the
0 commit comments