@@ -227,6 +227,42 @@ from observing both identities and correlating them. As such, preventing correla
227227requires separating contexts, such as by using proxying to conceal a client IP address
228228that would otherwise be used as an identifier.
229229
230+ # # Approaches to Partitioning
231+
232+ While all of the partitioning protocols described in this document create
233+ separate contexts using encryption and/or connection separation, each one has a
234+ unique approach that results in different sets of contexts. Since many of
235+ these protocols are new, it is yet to be seen how each approach will be
236+ used at scale across the Internet, and what new models will emerge in the
237+ future.
238+
239+ There are multiple factors that lead to a diversity in approaches to
240+ partitioning, including :
241+
242+ - Adding privacy partitioning to existing protocol ecosystems places
243+ requirements and constraints on how contexts are constructed. CONNECT-style
244+ proxying is intended to work with servers that are unaware of privacy contexts,
245+ requiring more intermediaries to provide strong separation guarantees.
246+ Oblivious HTTP, on the other hand, assumes servers that cooperate with context
247+ separation, and thus reduces the overall number of elements in the solution.
248+
249+ - Whether or not information exchange needs to happen bidirectionally in an
250+ interactive fashion determines how contexts can be separated. Some use cases,
251+ like metrics collection for PPM, can occur with information flowing only from
252+ clients to servers, and can function even when clients are no longer connected.
253+ Privacy Pass is an example of a case that can be either interactive or not,
254+ depending on if tokens can be cached and reused. CONNECT-style proxying and
255+ Oblivious HTTP often require bidirectional and interactive communication.
256+
257+ - The degree to which contexts need to be partitioned depends in part
258+ on the client's threat models and level of trust in various protocol participants. For example,
259+ in Oblivious HTTP, clients allow relays to learn that clients are accessing a particular
260+ application-specific gateway. If clients do not trust relays with this information, they can
261+ instead use a multi-hop CONNECT-style proxy approach wherein no single party learns
262+ whether specific clients are accessing a specific application. This is the default trust model
263+ for systems like Tor, where multiple hops are used to drive down the probability of privacy
264+ violations due to collusion or related attacks.
265+
230266# A Survey of Protocols using Partitioning
231267
232268The following section discusses currently on-going work in the IETF
0 commit comments