Skip to content

Commit 7d52675

Browse files
authored
Merge pull request #72 from intarchboard/caw/generalize-encryption
There is more than encryption
2 parents 87226ef + 2b51bb5 commit 7d52675

File tree

1 file changed

+11
-9
lines changed

1 file changed

+11
-9
lines changed

draft-iab-privacy-partitioning.md

Lines changed: 11 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -230,21 +230,23 @@ on (en)coding, etc. The privacy-oriented protocols described in this document ge
230230
more complex partitioning, but the techniques to partition communication contexts still employ the
231231
same techniques:
232232

233-
1. Encryption allows partitioning of contexts within a given network path.
234-
1. Using separate connections across time or space allows partitioning of contexts for different
235-
application transactions.
233+
1. Cryptographic protection, such as the use of encryption to specific parties, allows
234+
partitioning of contexts between different parties (those with the ability to remove
235+
cryptographic protections, and those without).
236+
1. Connection separation across time or space to allow partitioning of contexts for different
237+
application transactions over the network.
236238

237239
These techniques are frequently used in conjunction for context separation. For example,
238-
encrypting an HTTP exchange might prevent a network middlebox that sees a client IP address
239-
from seeing the user account identifier, but it doesn't prevent the TLS-terminating server
240-
from observing both identifiers and correlating them. As such, preventing correlation
241-
requires separating contexts, such as by using proxying to conceal a client's IP address
242-
that would otherwise be used as an identifier.
240+
encrypting an HTTP exchange using TLS between client and TLS-terminating server might prevent
241+
a network middlebox that sees a client IP address from seeing the user account identifier,
242+
but it doesn't prevent the TLS-terminating server from observing both identifiers and correlating
243+
them. As such, preventing correlation requires separating contexts, such as by using proxying to
244+
conceal a client's IP address that would otherwise be used as an identifier.
243245

244246
## Approaches to Partitioning
245247

246248
While all of the partitioning protocols described in this document create
247-
separate contexts using encryption and/or connection separation, each one has a
249+
separate contexts using cryptographic protection and/or connection separation, each one has a
248250
unique approach that results in different sets of contexts. Since many of
249251
these protocols are new, it is yet to be seen how each approach will be
250252
used at scale across the Internet, and what new models will emerge in the

0 commit comments

Comments
 (0)