Skip to content

Commit ab6c3d1

Browse files
authored
Merge pull request #51 from intarchboard/tfpauly-patch-5
Explain diversity of approaches
2 parents 87dff76 + 34c0115 commit ab6c3d1

File tree

1 file changed

+36
-0
lines changed

1 file changed

+36
-0
lines changed

draft-iab-privacy-partitioning.md

Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -227,6 +227,42 @@ from observing both identities and correlating them. As such, preventing correla
227227
requires separating contexts, such as by using proxying to conceal a client IP address
228228
that would otherwise be used as an identifier.
229229

230+
## Approaches to Partitioning
231+
232+
While all of the partitioning protocols described in this document create
233+
separate contexts using encryption and/or connection separation, each one has a
234+
unique approach that results in different sets of contexts. Since many of
235+
these protocols are new, it is yet to be seen how each approach will be
236+
used at scale across the Internet, and what new models will emerge in the
237+
future.
238+
239+
There are multiple factors that lead to a diversity in approaches to
240+
partitioning, including:
241+
242+
- Adding privacy partitioning to existing protocol ecosystems places
243+
requirements and constraints on how contexts are constructed. CONNECT-style
244+
proxying is intended to work with servers that are unaware of privacy contexts,
245+
requiring more intermediaries to provide strong separation guarantees.
246+
Oblivious HTTP, on the other hand, assumes servers that cooperate with context
247+
separation, and thus reduces the overall number of elements in the solution.
248+
249+
- Whether or not information exchange needs to happen bidirectionally in an
250+
interactive fashion determines how contexts can be separated. Some use cases,
251+
like metrics collection for PPM, can occur with information flowing only from
252+
clients to servers, and can function even when clients are no longer connected.
253+
Privacy Pass is an example of a case that can be either interactive or not,
254+
depending on if tokens can be cached and reused. CONNECT-style proxying and
255+
Oblivious HTTP often require bidirectional and interactive communication.
256+
257+
- The degree to which contexts need to be partitioned depends in part
258+
on the client's threat models and level of trust in various protocol participants. For example,
259+
in Oblivious HTTP, clients allow relays to learn that clients are accessing a particular
260+
application-specific gateway. If clients do not trust relays with this information, they can
261+
instead use a multi-hop CONNECT-style proxy approach wherein no single party learns
262+
whether specific clients are accessing a specific application. This is the default trust model
263+
for systems like Tor, where multiple hops are used to drive down the probability of privacy
264+
violations due to collusion or related attacks.
265+
230266
# A Survey of Protocols using Partitioning
231267

232268
The following section discusses currently on-going work in the IETF

0 commit comments

Comments
 (0)