Skip to content

Commit 4511b6a

Browse files
authored
Fix whitespace and nits
1 parent 58f92ee commit 4511b6a

File tree

1 file changed

+18
-17
lines changed

1 file changed

+18
-17
lines changed

draft-iab-m-ten-workshop.md

Lines changed: 18 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -444,7 +444,7 @@ clients need to protect user's privacy and user security.
444444

445445
Safe browsing, originally created by Google, is one example of a
446446
mechanism that tries to meet both sides of this conflict. It would be
447-
beneficial to standardize this and other similar mechanisms.
447+
beneficial to standardize this and other similar mechanisms.
448448
Operating systems could continually protect their users by ensuring
449449
that malicious destinations are not being reached. This would require
450450
some coordination between cooperating clients and servers offering
@@ -455,29 +455,30 @@ compromise between the tension of privacy vs protection based services
455455
# Conclusions
456456

457457
Looking forward, the workshop participants identified that solving the
458-
entire problem space will be challenging for a number of reasons.
459-
First, scalability of many solutions will likely be an issue as some
460-
solutions are expensive in implementation. Collaboration between
461-
multiple parties will be required for many mechanisms to function.
462-
Finally, there is an unanswered question of whether or not network
463-
operators be willing to participate and allow technologies into their
464-
environment requirements in exchange for technologies that prove their
465-
clients are being good net-citizens? If so, should some of these
466-
solutions be required to exist before increased encryption happens,
467-
for example with TLS/ECH that is being block by some network
458+
entire problem space with a single approach will be challenging for a
459+
number of reasons. First, scalability of many solutions will likely
460+
be an issue as some solutions are expensive in implementation.
461+
Collaboration between multiple parties will be required for many
462+
mechanisms to function. Finally, there is an unanswered question
463+
of whether or not network operators be willing to participate and
464+
allow technologies into their environment requirements in exchange
465+
for technologies that prove their clients are being good net-citizens.
466+
If so, some of these solutions might be required to exist before
467+
networks allow certain type of increased encryption; consider the
468+
example of TLS Encrypted Client Hello being blocked by some network
468469
operators.
469470

470471
The breadth of the problem space itself is another complicating
471472
factor. A wide variety of networks architectures exist that have
472473
different requirements for both data encryption and network
473-
management. Every problem space will have different encumbrances of
474-
multiple types, for example technical, legal, data ownership,
475-
regulations, etc. A new network architecture may be needed to solve
476-
this problem at a larger scope, which would in turn require
477-
interoperability support from all network product vendors. In the
474+
management. Each problem space will have different encumbrances of
475+
multiple types; for example, technical, legal, data ownership,
476+
adn regulatory concerns. New network architectures might be needed to
477+
solve this problem at a larger scope, which would in turn require
478+
interoperability support from network product vendors. In the
478479
end, we should recognize that one solution will not solve all these
479480
cases and it is more likely that different use cases will require
480-
different solutions. Finally education about any solutions will be
481+
different solutions. Education about various solutions will be
481482
required in order to ensure regulation and policy organizations can
482483
understand and thus support the deployment of developed solutions.
483484

0 commit comments

Comments
 (0)