rfc9707.original.xml   rfc9707.xml 
<?xml version='1.0' encoding='utf-8'?> <?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [ <!DOCTYPE rfc [
<!ENTITY nbsp "&#160;"> <!ENTITY nbsp "&#160;">
<!ENTITY zwsp "&#8203;"> <!ENTITY zwsp "&#8203;">
<!ENTITY nbhy "&#8209;"> <!ENTITY nbhy "&#8209;">
<!ENTITY wj "&#8288;"> <!ENTITY wj "&#8288;">
]> ]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.0. <rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft
2) --> -iab-bias-workshop-report-02" number="9707" updates="" obsoletes="" category="in
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft fo" consensus="true" submissionType="IAB" tocInclude="true" sortRefs="true" symR
-iab-bias-workshop-report-02" category="info" consensus="true" submissionType="I efs="true" version="3" xml:lang="en">
AB" tocInclude="true" sortRefs="true" symRefs="true" version="3">
<!-- xml2rfc v2v3 conversion 3.21.0 -->
<front> <front>
<title abbrev="BIAS Workshop Report">IAB Barriers to Internet Access of Serv <title abbrev="BIAS Workshop Report">Report from the IAB Workshop on Barrier
ices (BIAS) Workshop Report</title> s to Internet Access of Services (BIAS)</title>
<seriesInfo name="Internet-Draft" value="draft-iab-bias-workshop-report-02"/ <seriesInfo name="RFC" value="9707"/>
>
<author fullname="Mirja Kühlewind"> <author fullname="Mirja Kühlewind">
<organization/> <organization/>
<address> <address>
<email>ietf@kuehlewind.net</email> <email>ietf@kuehlewind.net</email>
</address> </address>
</author> </author>
<author fullname="Dhruv Dhody"> <author fullname="Dhruv Dhody">
<organization/> <organization/>
<address> <address>
<email>dd@dhruvdhody.com</email> <email>dd@dhruvdhody.com</email>
</address> </address>
</author> </author>
<author fullname="Mallory Knodel"> <author fullname="Mallory Knodel">
<organization/> <organization/>
<address> <address>
<email>mknodel@cdt.org</email> <email>Mallory.knodel@nyu.edu</email>
</address> </address>
</author> </author>
<date year="2024" month="June" day="20"/> <date year="2024" month="December"/>
<keyword>Internet Access</keyword> <keyword>Internet Access</keyword>
<keyword>Censorship</keyword> <keyword>Censorship</keyword>
<keyword>community networks</keyword> <keyword>Community Networks</keyword>
<keyword>digital divide</keyword> <keyword>digital divide</keyword>
<abstract>
<?line 218?>
<t>The "Barriers for Internet Access of Services (BIAS)" workshop was convened b <abstract>
y the Internet Architecture Board (IAB) from January 15-17, 2024 as a three-day <t>The "Barriers to Internet Access of Services (BIAS)" workshop was convened by
online meeting. Based on the submitted position papers, the workshop covered th the Internet Architecture Board (IAB) from January 15-17, 2024 as a three-day o
ree areas of interest: the role of community networks in Internet Access of Serv nline meeting. Based on the submitted position papers, the workshop covered thr
ices; reports and comments on the observed digital divide; and measurements of c ee areas of interest: the role of Community Networks in Internet access of servi
ensorship and censorship circumvention. This report summarizes the workshop's di ces, reports and comments on the observed digital divide, and measurements of ce
scussion and serves as a reference for reports on the current barriers to Intern nsorship and censorship circumvention. This report summarizes the workshop's dis
et Access.</t> cussions and serves as a reference for reports on the current barriers to Intern
<t>Note that this document is a report on the proceedings of the workshop. et access.</t>
The views and positions documented in this report were expressed during the wo <t>Note that this document is a report on the proceedings of the workshop.
rkshop by participants and do not necessarily reflect IAB's views and positions. The views and positions documented in this report were expressed during the wo
</t> rkshop by participants and do not necessarily reflect the IAB's views and positi
ons.</t>
</abstract> </abstract>
<note removeInRFC="true">
<name>About This Document</name>
<t>
The latest revision of this draft can be found at <eref target="https://
intarchboard.github.io/draft-iab-bias-workshop-report/draft-iab-bias-workshop-re
port.html"/>.
Status information for this document may be found at <eref target="https
://datatracker.ietf.org/doc/draft-iab-bias-workshop-report/"/>.
</t>
<t>Source for this draft and an issue tracker can be found at
<eref target="https://github.com/intarchboard/draft-iab-bias-workshop-re
port"/>.</t>
</note>
</front> </front>
<middle> <middle>
<?line 224?>
<section anchor="introduction"> <section anchor="introduction">
<name>Introduction</name> <name>Introduction</name>
<t>The Internet as part of the critical infrastructure affects many aspect <t>The Internet Architecture Board (IAB) holds occasional workshops
s of our society significantly, although it impacts different parts of society d designed to consider long-term issues and strategies for the
ifferently. The Internet is an important tool to reach the Sustainable Developme Internet, and to suggest future directions for the Internet
nt Goals (SDG) <xref target="SDG"/> and to globally support human rights. Conseq architecture. This long-term planning function of the IAB is
uently, the lack of meaningful access to digital infrastructure and services is complementary to the ongoing engineering efforts performed by working
also a form of disenfranchisement.</t> groups of the Internet Engineering Task Force (IETF).</t>
<t>The Internet as part of the critical infrastructure affects many aspect
s of our society significantly, although it impacts different parts of society d
ifferently. The Internet is an important tool for reaching the Sustainable Devel
opment Goals (SDGs) listed in <xref target="SDGs"/> and for globally supporting
human rights. Consequently, the lack of meaningful access to digital infrastruct
ure and services is also a form of disenfranchisement.</t>
<t>Solely having Internet access is not enough. At the same time as we wor k to connect the next billion people and reduce the digital divide, it is also i mportant to understand persistent and novel inequalities in the digital age when accessing content and services. There are more and more barriers to meaningful access to the services and applications that run on the Internet. Even if Intern et connectivity is available, information and service access may remain challeng ed and unequal.</t> <t>Solely having Internet access is not enough. At the same time as we wor k to connect the next billion people and reduce the digital divide, it is also i mportant to understand persistent and novel inequalities in the digital age when accessing content and services. There are more and more barriers to meaningful access to the services and applications that run on the Internet. Even if Intern et connectivity is available, information and service access may remain challeng ed and unequal.</t>
<t>This IAB workshop has aimed</t> <t>This IAB workshop aimed to</t>
<ul spacing="normal"> <ul spacing="normal">
<li> <li>
<t>to collect reports about barriers to accessing content and services <t>collect reports about barriers to accessing content and services on
on the Internet, e.g. based on filtering, and blocking as well as due to genera the Internet. For example:</t>
l inequality of technological capabilities, like device or protocol limitations. <ul spacing="normal">
</t> <li>
</li> <t>based on filtering.</t>
</li>
<li>
<t>based on blocking.</t>
</li>
<li>
<t>due to general inequality of technological capabilities, e.g., de
vice or protocol limitations.</t>
</li>
</ul>
</li>
</ul>
<ul spacing="normal">
<li> <li>
<t>to help the Internet community get a better understanding of how th e Internet functions in different parts of the world and which technology or tec hniques need to be used to gain access to content.</t> <t>help the Internet community get a better understanding of how the I nternet functions in different parts of the world and which technology or techni ques need to be used to gain access to content.</t>
</li> </li>
<li> <li>
<t>to build an understanding of what "being connected" to the Internet means: What is the Internet to users? What is needed to be meaningfully connect ed? What are the minimum requirements to be able to access certain parts of the content and services provided over the Internet?</t> <t>build an understanding of what "being connected" to the Internet me ans: What is the Internet to users? What is needed to be meaningfully connected? What are the minimum requirements to be able to access certain parts of the con tent and services provided over the Internet?</t>
</li> </li>
</ul> </ul>
<section anchor="about-this-workshop-report-content"> <section anchor="about-this-workshop-report-content">
<name>About this workshop report content</name> <name>About the Content of This Workshop Report</name>
<t>This document is a report on the proceedings of the workshop. The vie <t>This document is a report on the proceedings of the workshop. The vie
ws and positions documented in this report are expressed during the workshop by ws and positions documented in this report were expressed during the workshop by
participants and do not necessarily reflect IAB's views and positions.</t> participants and do not necessarily reflect the IAB's views and positions.</t>
<t>Furthermore, the content of the report comes from presentations given by workshop participants and notes taken during the discussions, without interp retation or validation. Thus, the content of this report follows the flow and d ialogue of the workshop but does not attempt to capture a consensus.</t> <t>Furthermore, the content of the report comes from presentations given by workshop participants and notes taken during the discussions, without interp retation or validation. Thus, the content of this report follows the flow and d ialogue of the workshop but does not attempt to capture a consensus.</t>
</section> </section>
</section> </section>
<section anchor="workshop-scope-and-discussion"> <section anchor="workshop-scope-and-discussion">
<name>Workshop Scope and Discussion</name> <name>Workshop Scope and Discussion</name>
<t>The workshop was organized across three days with all-group discussion slots, one per day. The following topic areas were identified and the program co mmittee organized paper submissions into three main themes for each of the three discussion slots. During each discussion, those papers were presented sequentia lly with open discussion held at the end of each day.</t> <t>The workshop was organized across three days with all-group discussion slots, one per day. The following topic areas were identified, and the program c ommittee organized paper submissions into three main themes for each of the thre e discussion slots. During each discussion, those papers were presented sequenti ally with open discussion held at the end of each day.</t>
<section anchor="session-1-community-networks-their-role-in-internet-acces s-of-services"> <section anchor="session-1-community-networks-their-role-in-internet-acces s-of-services">
<name>Session 1: Community Networks - Their Role in Internet Access of S ervices</name> <name>Session 1: Community Networks - Their Role in Internet Access of S ervices</name>
<t>The first day of the workshop focused on the role of Community Networ ks <xref target="RFC7962"/> as a way to overcome the barriers to Internet Access . Community Networks are self-organized networks wholly owned by the community a nd thus provide an alternative mechanism to bring connectivity and internet serv ices to those places that lack commercial interest.</t> <t>The first day of the workshop focused on the role of Community Networ ks <xref target="RFC7962"/> as a way to overcome the barriers to Internet access . Community Networks are self-organized networks wholly owned by the community a nd thus provide an alternative mechanism to bring connectivity and Internet serv ices to those places that lack commercial interest.</t>
<t>Presentations ranged from highlighting the need for measuring Quality of Experience (QoE) for Community Networks, to the potential role the Content D elivery Network (CDN) can play in Community Networks, to the role of Satellite N etworks, and finally, to the vital role of the spectrum in this space.</t> <t>Presentations ranged from highlighting the need for measuring Quality of Experience (QoE) for Community Networks, to the potential role the Content D elivery Network (CDN) can play in Community Networks, to the role of Satellite N etworks, and finally, to the vital role of the spectrum in this space.</t>
<section anchor="the-quality-of-community-networks"> <section anchor="the-quality-of-community-networks">
<name>The Quality of Community Networks</name> <name>The Quality of Community Networks</name>
<t><xref target="MARTINEZ"/> highlighted the need to address Quality o <t><xref target="MARTINEZ"/> highlighted the need to address QoE in di
f Experience (QoE) in discussions around Community Networks. As a community-driv scussions around Community Networks. As a community-driven deployment, the knowl
en deployment, the knowledge and involvement of individuals can vary; therefore, edge and involvement of individuals can vary; therefore, there are no guarantees
there are no guarantees of connectivity or quality of service. There is a need of connectivity or quality of service. There is a need to focus on user expecta
to focus on user expectations and how they translate to measurable performance i tions and how they translate to measurable performance indicators. Further, it a
ndicators. Further, it asks for better documenting best practices in deploying c sks for better documentation of best practices in deploying Community Networks a
ommunity networks as well as considering manageability considerations for commun s well as careful thought regarding manageability considerations for Community N
ity networks in protocol development. <xref target="GUIFI"/> as an example Commu etworks in protocol development. <xref target="GUIFI"/> as an example Community
nity Network was discussed and some existing resources for Community Networks (< Network was discussed, and some existing resources for Community Networks <xref
xref target="APC"/>, <xref target="ISOC"/>, and <xref target="TBB"/>) were share target="APC"/> <xref target="ISOC"/> <xref target="TBB"/> were shared by the par
d by the participants.</t> ticipants.</t>
<t>The inconsistent quality and performance of Satellite Internet is a <t>The inconsistent quality and performance of Satellite Internet resu
gap for community networks that rely on non-terrestrial networks (NTNs) for int lt in a connectivity gap for Community Networks that rely on non-terrestrial net
ernet access <xref target="HU"/>.</t> works (NTNs) for Internet access <xref target="HU"/>.</t>
</section> </section>
<section anchor="strengthening-community-networks"> <section anchor="strengthening-community-networks">
<name>Strengthening Community Networks</name> <name>Strengthening Community Networks</name>
<t><xref target="BENSON"/> focused on the prohibitive cost of the tran <t><xref target="BENSON"/> focused on the prohibitive cost of transit
sit and Internet service for Community Networks and argued for Content Delivery and Internet services for Community Networks and argued for CDNs to provide tran
Networks (CDNs) to provide transit-like and Internet services at no more than at sit-like and Internet services, at no more than at-cost, in a mutually beneficia
-cost in a mutually beneficial way. Community networks still need backhaul to an l way. Community Networks still need backhaul to and from the CDN's point of pre
d from the CDN's point of presence and models for community-backhaul and open-so sence, and models for community-backhaul and open-source CDNs were highlighted.
urce CDNs were highlighted. Discussion included <xref target="PANGEA"/> project Discussion included the status of Project PANGEA <xref target="PANGEA"/> as well
status as well as legal and commercial considerations in such use of CDNs.</t> as legal and commercial considerations related to such use of CDNs.</t>
<t><xref target="HU"/> highlighted that Satellite Internet provided by <t><xref target="HU"/> highlighted that Satellite Internet provided by
advanced LEO satellite constellations can play a pivotal role in closing the co advanced low-Earth orbit (LEO) Satellite constellations can play a pivotal role
nnectivity gap in the urban-rural digital divide via Satellite-dependent communi in closing the connectivity gap in the urban-rural digital divide via Satellite
ty networks. These existing known performance and management gaps need focus to -dependent Community Networks. These existing known performance and management g
enable Satellite Internet to resolve the divide. Further, research directions su aps need to be focused on, to enable Satellite Internet to resolve the divide. F
ch as multi-layer satellite networking, autonomous maintenance, and integration urther, research directions such as multi-layer Satellite networking, autonomous
between Terrestrial and Non-Terrestrial networks were suggested.</t> maintenance, and integration between terrestrial networks and NTNs were suggest
<t><xref target="RENNO"/> called attention to the coveted 6GHz (part o ed.</t>
f the C-band with a desirable mix of coverage and capacity) as a prime choice fo <t><xref target="RENNO"/> called attention to the coveted 6 GHz (part
r International Mobile Telecommunication (IMT) for 5G technology while it is in of the C-band with a desirable mix of coverage and capacity) as a prime choice f
common unlicensed use in the community networks (and small ISPs). Spectrum alloc or International Mobile Telecommunication (IMT) for 5G technology while it is in
ations directly impact industries and market access with ramifications for commu common unlicensed use in Community Networks (and small ISPs). Spectrum allocati
nity networks. Further, there was a discussion on the geopolitical tension becau ons directly impact industries and market access with ramifications for Communit
se of it.</t> y Networks. Further, there was a discussion on geopolitical tensions because of
these allocations.</t>
</section> </section>
<section anchor="discussion"> <section anchor="discussion">
<name>Discussion</name> <name>Discussion</name>
<t>How can the technical community address the management gap and impr ove best practices for Community Networks? Is the increasing complexity of the I nternet making it more challenging to establish secure connections, and should t his be taken into account in the design of the Internet? What steps need to be t aken to make sure Community Networks are secure? Should the manageability consid eration be expanded to explicitly consider Community Networks? Global Access to the Internet for All (GAIA) <xref target="GAIA"/> research group could be a venu e for further discussion and research. Further discussion highlighted the need f or readily available knowledge and tools for community networks as well as the t ussle with market forces when commercial networks compete with community network s. Also, there is a lack of operational inputs from community network operators in the IETF/IRTF.</t> <t>How can the technical community address the management gaps and imp rove best practices for Community Networks? Is the increasing complexity of the Internet making it more challenging to establish secure connections, and should this be taken into account in the design of the Internet? What steps need to be taken to make sure Community Networks are secure? Should manageability considera tions be expanded to explicitly consider Community Networks? The Global Access t o the Internet for All (GAIA) Research Group <xref target="GAIA"/> could be a ve nue for further discussion and research. Further discussion highlighted the need for readily available knowledge and tools for Community Networks as well as the tussle with market forces when commercial networks compete with Community Netwo rks. Also, there is a lack of operational inputs from Community Network operator s in the IETF/IRTF.</t>
</section> </section>
</section> </section>
<section anchor="session-2-digital-divide-reports-and-comments"> <section anchor="session-2-digital-divide-reports-and-comments">
<name>Session 2: Digital Divide - Reports and Comments</name> <name>Session 2: Digital Divide - Reports and Comments</name>
<t>Critical internet infrastructure affects many aspects of our society <t>Critical Internet infrastructure affects many aspects of our society
significantly, although differently, the inequitable aspects of which are typica significantly, although it impacts different parts of society
lly referred to as "digital inclusion" signifying that in efforts to digitalise differently. The inequitable aspects are typically referred to as
society, there are those left out due to what is typically called the "digital d "digital inclusion"; these aspects signify that in efforts to
ivide", a related term specific to access to the Internet. These concepts togeth digitalize society, there are those left out due to what is
er demonstrate that even if Internet connectivity is available, for some there w typically called the "digital divide", a related term specific to
ill remain challenges towards achieving equality. This becomes especially signif access to the Internet. These concepts together demonstrate that even if Interne
icant as governments view the Internet as an important tool to help them reach t t connectivity is available, for some there will remain challenges towards achie
he Sustainable Development Goals (SDG) <xref target="SDG"/> and to globally supp ving equality. This becomes especially significant as governments view the Inter
ort human rights.</t> net as an important tool for helping them reach the SDGs listed in <xref target=
<t>The second day of workshops was essential to understanding the nature "SDGs"/> and for globally supporting human rights.</t>
of the digital divide. Presentations of reports interrogated at least three key <t>The second day of workshops was essential to understanding the nature
aspects of the digital divide, though there is recognition that there may be mo of the digital divide. Presentations of reports interrogated at least three key
re technical aspects of the digital divide that were not present. Those were: di aspects of the digital divide, though it is recognized that there may be more t
fferences between population demographics in the provision of online resources b echnical aspects of the digital divide that were not addressed. Three of those a
y governments, inequality in the use of multilingualized domains and email addre spects were:</t>
sses, and increased costs for end-user downloads of contemporary websites' sizes <ul spacing="normal">
.</t> <li>differences between population demographics in the provision of online re
sources by governments.</li>
<li>inequality in the use of multilingualized domains and email addresses.</l
i>
<li>increased costs for end-user downloads from websites of contemporary size
s.</li>
</ul>
<section anchor="disparities-in-service-provision"> <section anchor="disparities-in-service-provision">
<name>Disparities in service provision</name> <name>Disparities in Service Provisioning</name>
<t>Ralph Holz presented research that exposes the more limited DNS-med <!-- DNE "evidence that ..." text below from [HOLZ]; verified and corrected -->
iated access to government websites by Indigenous communities in Australia as co <t>Ralph Holz presented research that exposes the more limited DNS-med
mpared to less disadvantaged users in the same population in "Evidence for a dig iated access to government websites by Indigenous communities in Australia as co
ital divide? Measuring DNS dependencies in the context of the Indigenous populat mpared to less disadvantaged users in the same population in "Evidence for a dig
ion of Australia". <xref target="HOLZ"/> DNS dependency trends were analysed bet ital divide? Measuring DNS dependencies in the context of the indigenous populat
ween two lists of domains serving Australian government sites for Indigenous use ion of Australia" <xref target="HOLZ"/>. DNS dependency trends were analyzed bet
rs and the general population. Researchers found, "evidence that dependencies fo ween two lists of domains serving Australian government sites for Indigenous use
r the Indigenous population are indeed differently configured," indicative of a rs and the general population. Researchers found "evidence that dependencies for
difference in service provisioning. However qualitative follow-up research is ne the indigenous population are indeed differently configured," indicative of a d
eded to interrogate both the potential reasons for these differences and whether ifference in service provisioning. However, qualitative follow-up research is ne
the differences contribute to a "digital divide" that is tangible for Indigenou eded to interrogate both the potential reasons for these differences and whether
s users.</t> the differences contribute to a digital divide that is tangible for Indigenous
users.</t>
</section> </section>
<section anchor="lack-of-consistent-acceptance-of-language-scripts"> <section anchor="lack-of-consistent-acceptance-of-language-scripts">
<name>Lack of consistent acceptance of language scripts</name> <name>Lack of Consistent Acceptance of Language Scripts</name>
<t>On the topic of availability of Internet services and content in mu <t>On the topic of availability of Internet services and content in mu
ltiple languages "Universal Acceptance of Domain Names and Email Addresses: A Ke ltiple languages, "Universal Acceptance of Domain Names and Email Addresses: A K
y to Digital Inclusion" was presented by Sarmad Hussain of ICANN. <xref target=" ey to Digital Inclusion" was presented by Sarmad Hussain of ICANN <xref target="
HUSSAIN"/> The ICANN community has increased the options for multilingual identi HUSSAIN"/>. The ICANN community has increased the options for multilingual ident
fiers through the expansion of the Internet's DNS for use in domains and email a ifiers through the expansion of the Internet's DNS for use in domains and email
ddresses. However, while the work of technical specification and policy recommen addresses. However, while the work of technical specifications and policy recomm
dations is complete, much work remains to deploy a multiligualized internet. Tod endations is complete, much work remains to deploy a multilingualized Internet.
ay there are around 150 internationalised domain names (IDNs) but the barriers t Today, there are around 150 internationalized domain names (IDNs), but
o equal rollout of these scripts at the domain level are hindered primarily by s equal rollout of these scripts at the domain level is hindered primarily by soft
oftware and applications that do not yet recognise these new scripts. "Universal ware and applications that do not yet recognize these new scripts. "Universal Ac
Acceptance" is a programme of action for the internet community at large that c ceptance" is a program of action for the Internet community at large that can en
an ensure IDNs are accepted and treated consistently.</t> sure that IDNs are accepted and treated consistently.</t>
</section> </section>
<section anchor="web-affordability-and-inclusiveness"> <section anchor="web-affordability-and-inclusiveness">
<name>Web Affordability and Inclusiveness</name> <name>Web Affordability and Inclusiveness</name>
<t>In "A Framework for Improving Web Affordability and Inclusiveness" <!-- [LB] "geographic variations in ..." is quoted from [HABIB] (verified) -->
Rumaisa Habib presented research on the connection between website size and cost <t>In "A Framework for Improving Web Affordability and Inclusiveness",
to end users. <xref target="HABIB"/> This critical inquiry presents access in t Rumaisa Habib presented research on the connection between website size and cos
erms of affordability and through measurement demonstrates that the material cos t to end users <xref target="HABIB"/>. This critical inquiry presents access in
ts to end users who pay for their connection based on the volume of data they do terms of affordability and through measurement demonstrates that the material co
wnload and upload have risen as the complexity of the web grows. Their research sts to end users who pay for their connection based on the volume of data they d
provides a framework for optimisation based on end-user affordability. This fram ownload and upload have risen as the complexity of the Web grows. Their research
ework is anchored to reality: it proposes a fairness metric and suggests systema provides a framework for optimization based on end-user affordability. This fra
tic adaptations to Web complexity based on "geographic variations in mobile broa mework is anchored in reality: <xref target="HABIB"/> proposes a fairness metric
dband prices and income levels."</t> and suggests systematic adaptations to complexity of the Web based on "geograph
ic variations in mobile broadband prices and income levels."</t>
</section> </section>
<section anchor="discussion-1"> <section anchor="discussion-1">
<name>Discussion</name> <name>Discussion</name>
<t>These three reports discuss very different aspects of current inequ <t>These three reports discuss very different aspects of current inequ
alities in Internet access in various parts of the world: service provision, ava alities in Internet access in various parts of the world: service provisioning,
ilability, and economic costs. Notably, the reports discuss trends that exacerba availability, and economic costs. Notably, the reports discuss trends that exace
te the digital divide beyond the question of connectivity or whether users have rbate the digital divide beyond the question of connectivity or whether users ha
access to the Internet, potentially bringing concrete ways that the IETF communi ve access to the Internet, potentially yielding concrete ways that the IETF comm
ty can address digital inclusion within its remit.</t> unity can address digital inclusion within its remit.</t>
<t>Discussants noted that while there are some interesting aspects to <t>Discussants noted that while there are some interesting aspects to
the problem of the digital divide, such as measurements and frameworks, most of the problem of the digital divide, such as measurements and frameworks, most of
the work is getting this work to the right people at the policy layer so there i the work involves getting this work to the appropriate people at the policy leve
s an importance of communicating this technical evidence to the right people. Th l; therefore, it is important to communicate this technical evidence to the appr
e IETF's role could be to build consensus on the proper solutions presented to d opriate people. The IETF's role could be to build consensus on the proper soluti
ecision-makers that put research and measurement not only in context but also in ons presented to decision-makers that put research and measurement not only in c
a consensus-driven solution space. Another method to better communicate this re ontext but also in a consensus-driven solution space. Another method to better c
search is by telling stories of end users in more relatable and relevant terms, ommunicate this research is by telling stories of end users in more relatable an
which is often a challenge for the technical level and a role for more diverse s d relevant terms; this is often a challenge at the technical level and a role fo
takeholders at the more local level.</t> r more diverse stakeholders at the more local level.</t>
</section> </section>
</section> </section>
<section anchor="session-3-censorship-reports-and-circumvention"> <section anchor="session-3-censorship-reports-and-circumvention">
<name>Session 3: Censorship - Reports and Circumvention</name> <name>Session 3: Censorship - Reports and Circumvention</name>
<t>This session focused on reports of censorship as observed during rece <t>This session focused on reports of censorship as observed in recent y
nt years in different parts of the world, as well as on the use of and expectati ears in different parts of the world; it also focused on the use of, and expecta
on on censorship circumvention tools, mainly the use of secure VPN services.</t> tions for, censorship circumvention tools, mainly the use of secure VPN services
<t>The censorship reports, with a focus on Asia, and specifically India, .</t>
as well as Russia, as an example where censorship has changed significantly rec <t>The censorship reports highlighted legal frameworks and court actions
ently, discussed the legal frameworks and court acts that put legal obligations that put legal obligations on regional network providers to block traffic. The d
on regional network providers to block traffic. Further, measurements to validat iscussion focused on Asia, specifically India, and included Russia as an example
e the blocking as well as analyses of how blocking is implemented were discussed where censorship practices have recently undergone significant changes. Further
, i.e. which protocols are used but also which kind of devices are used to confi , measurements to validate the blocking as well as analyses of how blocking is i
gure the blocking rules and where are they deployed.</t> mplemented were discussed, i.e., which protocols are used but also which kinds o
f devices are used to configure the blocking rules and where they are deployed.<
/t>
<section anchor="censorship-orders-measurements-and-device-analysis"> <section anchor="censorship-orders-measurements-and-device-analysis">
<name>Censorship Orders, Measurements, and Device Analysis</name> <name>Censorship Orders, Measurements, and Device Analysis</name>
<t><xref target="SAMSUDIN"/> reported on confirmed blocking from 10 co <t><xref target="SAMSUDIN"/> reported on confirmed blocking from 10 co
untries (Cambodia, Hong Kong (China), India, Indonesia, Malaysia, Myanmar, Phili untries (Cambodia, Hong Kong (China), India, Indonesia, Malaysia, Myanmar, Phili
ppines, Thailand, Timor-Leste, Vietnam) in the period from 1 July 2022 to 30 Jun ppines, Thailand, Timor-Leste, and Vietnam) in the period from 1 July 2022 to 30
e 2023. The blocking was either confirmed by OONI measurements for existing bloc June 2023. The blocking was confirmed by either (1)&nbsp;Open Observatory of
king fingerprints, heuristics, i.e. for new blocking fingerprints as well as new Network Interference (OONI) measurements for existing blocking fingerprints or h
s reports of blocking orders, or user experiences. Most of these countries block euristics (i.e., for new blocking fingerprints as well as news reports of blocki
specific content such as porn, gambling, or certain news pages. Interestingly t ng orders) or (2)&nbsp;user experiences. Most of these countries block specific
he blocking in Hong Kong and Myanmar is focused on the military and governmental content such as porn, gambling, or certain news pages. Interestingly, the blocki
pages of foreign countries. Blocking is often realized by either DNS tampering ng in Hong Kong and Myanmar is focused on the military and governmental pages of
or HTTP tampering. For DNS, either a decided IP address, a bogon IP address (127 foreign countries. Blocking is often realized by either DNS tampering or HTTP t
.0.0.1), or an empty domain (nxdomain) is used. In case of DNS tampering using a ampering. For DNS, either a chosen IP address, a bogon IP address (e.g., 127.0.0
decided IP address or HTTP tampering some countries provide a block page that e .1), or an empty domain (NXDOMAIN) is used. In the case of DNS tampering using a
xposes the blocking, however, more transparency about blocking is requested by c chosen IP address or HTTP tampering, some countries provide a block page that e
ivil society organizations and the iMAP project.</t> xposes the blocking; however, more transparency related to blocking is requested
<t><xref target="GROVER"/> further focused the discussion on online ce by civil society organizations and the Internet Monitoring Action Project (iMAP
nsorship in India, Pakistan, and Indonesia. In India, where providers are respon ).</t>
sible for implementing the blocking but no method is mandated, the six major ISP <t><xref target="GROVER"/> further focused the discussion on online ce
s (covering 98.82% of all subscribers) were tested on 4379 blocked websites (bas nsorship in India, Pakistan, and Indonesia.</t>
ed on court orders, user reports, and publicly available or leaked government or <t>As discussed in <xref target="Singh2020"/>, in India, where providers are
ders) on DNS poisoning/injection or HTTP/SNI-based censorship. Used censorship t responsible for implementing the blocking but no method is mandated, the six maj
echniques and websites blocked were different across ISPs. Multiple ISPs used tw or ISPs (covering 98.82% of all subscribers) were tested on a total of 4379 bloc
o different techniques (depending on the website), and all but one provided cens ked websites (based on court orders, user reports, and publicly available or lea
orship notices. Providers blocked between 1892 to 3721 (of 4379) pages with only ked government orders) by using DNS poisoning/injection or using censorship base
1115 (27.64%) of pages blocked by all ISPs. <xref target="Singh2020"/> In contr d on HTTP or the Server Name Indication (SNI). The censorship techniques used an
ast, in Pakistan, the government can also order the IPSs to perform blocking and d websites blocked were different across ISPs. Multiple ISPs used two different
blocking has even been observed in the past on the IXP level. Since 2020, there techniques (depending on the website), and all but one provided censorship notic
has also been a central Web Monitoring System deployed at lines of internationa es. A list of 4379 potentially blocked websites was tested; 4033 of those websit
l connectivity. In Indonesia, initially, the government guided ISPs in how to pe es
rform the blocking. The regulations were updated in 2020 to allow Indonesian ISP appeared in at least one ISP's blocklist. Providers blocked between 1892 and 372
s to block websites at their discretion. In 2022, there was a proposal by intern 1 of the 4033 websites, with only 1115 websites (27.64%) blocked by all six ISPs
et service providers to centralise DNS. In Indonesia, a partial block list is pu .</t>
blicly available, but without any indication of why something is blocked. <xref <t>In contrast, in Pakistan, the government can also order the ISPs to
target="Grover2023"/></t> perform blocking, and blocking has even been observed in the past at
<t><xref target="BASSO"/> reported that for Russia a high increase in the Internet Exchange Point (IXP) level. Since 2020, there has also been a centr
additions to the Roskomnadzor's block list was observed in March 2022 as well as al Web Monitoring System deployed at lines of international connectivity. In Ind
in December 2022, foremost covering news pages but also covering human rights o onesia, initially, the government guided ISPs in how to perform the blocking. Th
rganizations and social media, where more than 3500 blocking orders were added t e regulations were updated in 2020 to allow Indonesian ISPs to block websites at
o the list by an "Unknown body". Further, blocking of domains that are not in th their discretion. In 2022, there was a proposal by ISPs to centralize DNS. In I
e official Roskomnadzor's list has been observed as well.</t> ndonesia, a partial blocklist is publicly available, but without any indication
<t>An invited talk presented the work in <xref target="WANG"/> on loca of why something is blocked <xref target="Grover2023"/>.</t>
ting censorship devices by using HTTP and TLS traceroutes, identifying device ve <t><xref target="BASSO"/> reported that for Russia a large increase in
ndors through fingerprinting, and reverse-engineering censorship triggers by the additions to Roskomnadzor's blocklist was observed in March 2022 as well as in
use of fuzzing. E.g. for the case of Azerbaijan and Kazakhstan, they showed tha December 2022, foremost covering news pages but also covering human rights organ
t a significant portion of measurements from remote countries are blocked at the izations and social media, where more than 3500 blocking orders were added to th
endpoint, indicating local policies but connection resets are also happening in e list by an "Unknown body". Further, blocking of domains that are not in the of
Belarus and Russia. Further, they could identify a set of commercial network de ficial Roskomnadzor blocklist has been observed as well.</t>
vices (with filtering techniques such as firewalls) that are used in these count <t>An invited talk included a presentation of the work in <xref target
ries for censorship and show how fuzzing can be used to fingerprint and cluster ="WANG"/> on locating censorship devices by using HTTP and TLS traceroutes, iden
behaviours as well as potentially circumvent the deployed methods.</t> tifying device vendors through fingerprinting, and reverse-engineering censorshi
<t>All speakers called for more transparency by requiring blocking mes p triggers by the use of fuzzing. For example, in the case of Azerbaijan and Kaz
sages as well as publication and auditing of blocklists. Potentially even standa akhstan, they showed that a significant portion of measurements from remote coun
rdization could help.</t> tries is blocked at the endpoint, indicating local policies, but showed that con
nection resets are also happening in Belarus and Russia. Further, they could ide
ntify a set of commercial network devices (with filtering techniques such as fir
ewalls) that are used in these countries for censorship and show how fuzzing can
be used to fingerprint and cluster behaviors as well as potentially circumvent
the deployed methods.</t>
<t>All speakers called for more transparency by requiring blocking mes
sages as well as publication and auditing of blocklists. Potentially, even stand
ardization could help.</t>
</section> </section>
<section anchor="use-of-vpns-for-censorship-circumvents-and-user-expecta <section anchor="use-of-vpns-for-censorship-circumventions-and-user-expe
tions"> ctations">
<name>Use of VPNs for Censorship Circumvents and User Expectations</na <name>Use of VPNs for Censorship Circumventions and User Expectations<
me> /name>
<t>Further on in the session, the possibility and prevalence of using <t>Further on in the session, the possibility and prevalence of using
VPNs for circumvention has been discussed including user expectations and an ana VPNs for circumvention were discussed, including user expectations and an analys
lysis of security shortcomings of commercial VPN services. The analysis presente is of security shortcomings of commercial VPN services. The analysis presented i
d in <xref target="RAMESH"/> has shown various problems that lead to data leaks n <xref target="RAMESH-1"/> has shown various problems that lead to data leaks,
such as leakage of IPv6 traffic, non-browser traffic, or tunnel failure, not uph such as (1)&nbsp;leakage of IPv6 traffic, (2)&nbsp;non-browser traffic, or (3)&n
olding user expectations, especially when used in authoritarian regimes for cens bsp;tunnel failure, in addition to failing to uphold user expectations, especial
orship circumvention or private communication.</t> ly when used in authoritarian regimes for censorship circumvention or private co
<t>The question of how common the use of VPNs for circumvention is and mmunication.</t>
its legal implications, as VPNs are illegal in a few countries, has been discus <t>The question of how common the use of VPNs for circumvention is and
sed. E.g. VPNs are not officially banned in India but VPN providers need to stor its legal implications, as VPNs are illegal in a few countries, was discussed.
e log data and those, who haven't complied, stopped serving India. However, more For example, VPNs are not officially banned in India, but VPN providers need to
data on VPN use and blocking might be needed.</t> store log data and those who haven't complied stopped serving India. However, mo
re data on VPN use and blocking might be needed.</t>
</section> </section>
<section anchor="discussion-2"> <section anchor="discussion-2">
<name>Discussion</name> <name>Discussion</name>
<t>After all, there is a cat-and-mouse game between censors and circum vents, however, continued work on protocol enhancements that protect user privac y is essential.</t> <t>After all, there is a cat-and-mouse game between censorship and cir cumvention; however, continued work on protocol enhancements that protect user p rivacy is essential.</t>
</section> </section>
</section> </section>
<section anchor="key-take-aways"> <section anchor="key-take-aways">
<name>Key Take Aways</name> <name>Key Takeaways</name>
<t>Some key takeaways from the workshop are -</t> <t>Some key takeaways from the workshop are as follows:</t>
<ul spacing="normal"> <ul spacing="normal">
<li> <li>
<t>There is a need for the technical community to address the manage ment gaps in operating Community Networks.</t> <t>There is a need for the technical community to address the manage ment gaps in operating Community Networks.</t>
</li> </li>
<li> <li>
<t>Work should be done in documenting best practices for operating C ommunity Networks.</t> <t>Work should be done to document best practices for operating Comm unity Networks.</t>
</li> </li>
<li> <li>
<t>During the development of protocols, explicit manageability consi derations related to Community Networks should be considered.</t> <t>During the development of protocols, explicit manageability consi derations related to Community Networks should be carefully thought out.</t>
</li> </li>
<li> <li>
<t>Build consensus on solutions that have the most significant impac t in fostering digital inclusion. Further, promoting these solutions ensures tha t efforts to bridge the digital divide are effective and inclusive.</t> <t>Build consensus on solutions that have the most significant impac t in fostering digital inclusion. Further, promoting these solutions ensures tha t efforts to bridge the digital divide are effective and inclusive.</t>
</li> </li>
<li> <li>
<t>Further work to enhance protocols ensuring user privacy should co ntinue.</t> <t>Further work should be done to enhance protocols, ensuring that u ser privacy is preserved.</t>
</li> </li>
<li> <li>
<t>Develop further protocols (or extensions to existing protocols) t hat enable more transparency on filtering and promote their use and deployment.< /t> <t>Develop further protocols (or extensions to existing protocols) t hat enable more transparency on filtering, and promote their use and deployment. </t>
</li> </li>
<li> <li>
<t>Develop new VPN-like services and potentially support measurement s to understand their deployment and use.</t> <t>Develop new VPN-like services and potentially support measurement s to understand their deployment and use.</t>
</li> </li>
<li> <li>
<t>Further discussion of these topics could happen in GAIA, HRPC, PE ARG, and MAPRG based on the relevance to the research group. The management and operations-related discussion can be taken to OPSAWG. The community could also e xplore if a censorship (and its circumvention) focused group could be created.</ t> <t>Further discussion of these topics could happen in the GAIA Resea rch Group, the Human Rights Protocol Considerations (HRPC) Research Group, the P rivacy Enhancements and Assessments Research Group (PEARG), and the Measurement and Analysis for Protocols Research Group (MAPRG), based on relevance to the res earch group. Management-related and operations-related discussions can be taken to the IETF Operations and Management Area Working Group (OPSAWG). The community could also explore whether a group focused on censorship (and its circumvention ) could be created.</t>
</li> </li>
</ul> </ul>
</section> </section>
</section> </section>
<section><name>IANA Considerations</name>
<t>This document has no IANA actions.</t>
</section>
<!-- [LB] Added the Sec. Cons. section per Dhruv for now; will wait
for confirmation from the Doc. Shepherd -->
<!-- [rfced] [Document Shepherd] We see that this document does not
contain a Security Considerations section. Please see Section 4.8.5
of RFC 7322 (https://www.rfc-editor.org/info/rfc7322). Also, please
provide appropriate text for this document. For example, should
"security shortcomings" in Section 2.3.2 be mentioned/addressed?
If you verify that security considerations do not apply to this
document, we could add something like the following (as done in
IAB RFCs 8700 ("Fifty Years of RFCs") and 9419 ("Considerations on
Application - Network Collaboration Using Path Signals")):
4. Security Considerations
This document has no security considerations.
Please review and advise. -->
<section anchor="sec-cons">
<name>Security Considerations</name>
<t>This document has no security considerations.</t>
</section>
</middle> </middle>
<back> <back>
<references anchor="sec-informative-references"> <references anchor="sec-informative-references">
<name>Informative References</name> <name>Informative References</name>
<reference anchor="RFC7962">
<front> <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.796
<title>Alternative Network Deployments: Taxonomy, Characterization, Te 2.xml"/>
chnologies, and Architectures</title>
<author fullname="J. Saldana" initials="J." role="editor" surname="Sal <reference anchor="SDGs" target="https://sdgs.un.org/goals">
dana"/>
<author fullname="A. Arcia-Moret" initials="A." surname="Arcia-Moret"/
>
<author fullname="B. Braem" initials="B." surname="Braem"/>
<author fullname="E. Pietrosemoli" initials="E." surname="Pietrosemoli
"/>
<author fullname="A. Sathiaseelan" initials="A." surname="Sathiaseelan
"/>
<author fullname="M. Zennaro" initials="M." surname="Zennaro"/>
<date month="August" year="2016"/>
<abstract>
<t>This document presents a taxonomy of a set of "Alternative Networ
k Deployments" that emerged in the last decade with the aim of bringing Internet
connectivity to people or providing a local communication infrastructure to ser
ve various complementary needs and objectives. They employ architectures and top
ologies different from those of mainstream networks and rely on alternative gove
rnance and business models.</t>
<t>The document also surveys the technologies deployed in these netw
orks, and their differing architectural characteristics, including a set of defi
nitions and shared properties.</t>
<t>The classification considers models such as Community Networks, W
ireless Internet Service Providers (WISPs), networks owned by individuals but le
ased out to network operators who use them as a low-cost medium to reach the und
erserved population, networks that provide connectivity by sharing wireless reso
urces of the users, and rural utility cooperatives.</t>
</abstract>
</front>
<seriesInfo name="RFC" value="7962"/>
<seriesInfo name="DOI" value="10.17487/RFC7962"/>
</reference>
<reference anchor="SDG" target="https://sdgs.un.org/goals">
<front> <front>
<title>Sustainable Development Goals</title> <title>The 17 Goals</title>
<author> <author>
<organization/> <organization>United Nations Department of Economic and Social Affai rs - Sustainable Development</organization>
</author> </author>
<date>n.d.</date>
</front> </front>
</reference> </reference>
<reference anchor="MARTINEZ" target="https://www.ietf.org/slides/slides-bi asws-community-networks-and-the-quest-for-quality-00.pdf"> <reference anchor="MARTINEZ" target="https://www.ietf.org/slides/slides-bi asws-community-networks-and-the-quest-for-quality-00.pdf">
<front> <front>
<title>Community Networks and the Quest for Quality</title> <title>Community Networks and the Quest for Quality</title>
<author initials="L. M." surname="Martínez-Cervantes" fullname="Luis M iguel Martínez Cervantes"> <author initials="L. M." surname="Martínez-Cervantes" fullname="Luis M iguel Martínez Cervantes">
<organization/> <organization/>
</author> </author>
<author initials="R." surname="Guevara-Martínez" fullname="Rolando Gue vara Martínez"> <author initials="R." surname="Guevara-Martínez" fullname="Rolando Gue vara Martínez">
<organization/> <organization/>
</author> </author>
<date year="2024" month="January"/> <date year="2024" month="January"/>
skipping to change at line 221 skipping to change at line 268
<title>Community Networks and the Quest for Quality</title> <title>Community Networks and the Quest for Quality</title>
<author initials="L. M." surname="Martínez-Cervantes" fullname="Luis M iguel Martínez Cervantes"> <author initials="L. M." surname="Martínez-Cervantes" fullname="Luis M iguel Martínez Cervantes">
<organization/> <organization/>
</author> </author>
<author initials="R." surname="Guevara-Martínez" fullname="Rolando Gue vara Martínez"> <author initials="R." surname="Guevara-Martínez" fullname="Rolando Gue vara Martínez">
<organization/> <organization/>
</author> </author>
<date year="2024" month="January"/> <date year="2024" month="January"/>
</front> </front>
</reference> </reference>
<reference anchor="GUIFI" target="https://guifi.net/en"> <reference anchor="GUIFI" target="https://guifi.net/en">
<front> <front>
<title>Guifi.net</title> <title>guifi.net</title>
<author> <author>
<organization/> <organization/>
</author> </author>
<date>n.d.</date>
</front> </front>
</reference> </reference>
<reference anchor="APC" target="https://www.apc.org/"> <reference anchor="APC" target="https://www.apc.org/">
<front> <front>
<title>The Association for Progressive Communications (APC)</title> <title>The Association for Progressive Communications (APC)</title>
<author> <author>
<organization/> <organization/>
</author> </author>
<date>n.d.</date>
</front> </front>
</reference> </reference>
<reference anchor="ISOC" target="https://www.internetsociety.org/action-pl an/community-networks/"> <reference anchor="ISOC" target="https://www.internetsociety.org/action-pl an/community-networks/">
<front> <front>
<title>Community networks help bridge the connectivity gap</title> <title>Connecting the Unconnected: Community networks help bridge the connectivity gap</title>
<author> <author>
<organization/> <organization>Internet Society</organization>
</author> </author>
<date>n.d.</date>
</front> </front>
</reference> </reference>
<reference anchor="TBB" target="https://tribalbroadbandbootcamp.org/"> <reference anchor="TBB" target="https://tribalbroadbandbootcamp.org/">
<front> <front>
<title>Tribal Broadband Bootcamp</title> <title>Tribal Broadband Bootcamp</title>
<author> <author>
<organization/> <organization/>
</author> </author>
<date>n.d.</date>
</front> </front>
</reference> </reference>
<reference anchor="BENSON" target="https://www.ietf.org/slides/slides-bias ws-a-c-in-cdn-access-service-to-and-from-the-internet-at-cost-for-community-netw orks-00.pdf"> <reference anchor="BENSON" target="https://www.ietf.org/slides/slides-bias ws-a-c-in-cdn-access-service-to-and-from-the-internet-at-cost-for-community-netw orks-00.pdf">
<front> <front>
<title>A 'C' in CDN - Access service to and from the Internet at cost for community networks</title> <title>A 'C' in CDN: Access service to and from the Internet at cost f or community networks</title>
<author initials="T. A." surname="Benson" fullname="Theophilus A. Bens on"> <author initials="T. A." surname="Benson" fullname="Theophilus A. Bens on">
<organization/> <organization/>
</author> </author>
<author initials="M." surname="Fayed" fullname="Marwan Fayed"> <author initials="M." surname="Fayed" fullname="Marwan Fayed">
<organization/> <organization/>
</author> </author>
<date year="2024" month="January"/> <date year="2024" month="January"/>
</front> </front>
</reference> </reference>
<reference anchor="PANGEA" target="https://www.cloudflare.com/en-gb/pangea /"> <reference anchor="PANGEA" target="https://www.cloudflare.com/en-gb/pangea /">
<front> <front>
<title>Project Pangea from Cloudflare</title> <title>Project Pangea: Helping underserved communities expand access t o the Internet for free</title>
<author> <author>
<organization/> <organization>Cloudflare</organization>
</author> </author>
<date>n.d.</date>
</front> </front>
</reference> </reference>
<reference anchor="HU" target="https://www.ietf.org/slides/slides-biasws-c losing-the-performance-and-management-gaps-with-satellite-internet-challenges-ap proaches-and-future-directions-01.pdf"> <reference anchor="HU" target="https://www.ietf.org/slides/slides-biasws-c losing-the-performance-and-management-gaps-with-satellite-internet-challenges-ap proaches-and-future-directions-01.pdf">
<front> <front>
<title>Closing the Performance and Management Gaps with Satellite Inte rnet - Challenges, Approaches, and Future Directions</title> <title>Closing the Performance and Management Gaps with Satellite Inte rnet: Challenges, Approaches, and Future Directions</title>
<author initials="P." surname="Hu" fullname="Peng Hu"> <author initials="P." surname="Hu" fullname="Peng Hu">
<organization/> <organization/>
</author> </author>
<date year="2024" month="January"/> <date year="2024" month="January"/>
</front> </front>
</reference> </reference>
<reference anchor="RENNO" target="https://www.ietf.org/slides/slides-biasw s-position-paper-by-raquel-renno-01.pdf"> <reference anchor="RENNO" target="https://www.ietf.org/slides/slides-biasw s-position-paper-by-raquel-renno-01.pdf">
<front> <front>
<title>Maximising Connectivity - The Spectrum's Vital Role in Technolo gy Access</title> <title>Maximising Connectivity: The Spectrum's Vital Role in Technolog y Access</title>
<author initials="R." surname="Rennó" fullname="Raquel Rennó"> <author initials="R." surname="Rennó" fullname="Raquel Rennó">
<organization/> <organization/>
</author> </author>
<date year="2024" month="January"/> <date year="2024" month="January"/>
</front> </front>
</reference> </reference>
<reference anchor="GAIA" target="https://www.irtf.org/gaia.html"> <reference anchor="GAIA" target="https://www.irtf.org/gaia.html">
<front> <front>
<title>Global Access to the Internet for All Research Group</title> <title>Global Access to the Internet for All Research Group (GAIA)</ti tle>
<author> <author>
<organization/> <organization/>
</author> </author>
<date>n.d.</date>
</front> </front>
</reference> </reference>
<reference anchor="SAMSUDIN" target="https://www.ietf.org/slides/slides-bi
asws-position-paper-by-raquel-renno-01.pdf"> <reference anchor="SAMSUDIN" target="https://www.ietf.org/slides/slides-bi
asws-imap-internet-monitoring-action-project-internet-censorship-report-02.pdf">
<front> <front>
<title>iMAP (Internet Monitoring Action Project) 2023 Internet Censors hip Report</title> <title>iMAP (Internet Monitoring Action Project) 2023 Internet Censors hip Report</title>
<author initials="S." surname="Samsudin" fullname="Siti Nurliza Samsud in"> <author initials="S." surname="Samsudin" fullname="Siti Nurliza Samsud in">
<organization/> <organization/>
</author> </author>
<date year="2024" month="January"/> <date year="2024" month="January"/>
</front> </front>
</reference> </reference>
<reference anchor="GROVER" target="https://datatracker.ietf.org/meeting/in terim-2024-biasws-03/materials/slides-interim-2024-biasws-03-sessa-online-censor ship-in-india-pakistan-and-indonesia-00"> <reference anchor="GROVER" target="https://datatracker.ietf.org/meeting/in terim-2024-biasws-03/materials/slides-interim-2024-biasws-03-sessa-online-censor ship-in-india-pakistan-and-indonesia-00">
<front> <front>
<title>Online censorship in India, Pakistan and Indonesia</title> <title>Online censorship in India, Pakistan and Indonesia</title>
<author initials="G." surname="Grover" fullname="Gurshabad Grover"> <author initials="G." surname="Grover" fullname="Gurshabad Grover">
<organization/> <organization/>
</author> </author>
<date year="2024" month="January"/> <date year="2024" month="January"/>
</front> </front>
</reference> </reference>
<reference anchor="Grover2023" target="https://archive.org/details/eaten-b y-the-internet/"> <reference anchor="Grover2023" target="https://archive.org/details/eaten-b y-the-internet/">
<front> <front>
<title>The infrastructure of censorship in Asia</title> <title>The infrastructure of censorship in Asia</title>
<author initials="G." surname="Grover" fullname="Gurshabad Grover"> <author initials="G." surname="Grover" fullname="Gurshabad Grover">
<organization/> <organization/>
</author> </author>
<author initials="C." surname="Cath" fullname="Corinne Cath (ed.)">
<organization/>
</author>
<date year="2023" month="October"/> <date year="2023" month="October"/>
</front> </front>
<refcontent>in &quot;Eaten by the Internet&quot;, ed. Corinne Cath, pp.
75-81</refcontent>
<refcontent>Internet Archive, Meatspace Press</refcontent>
</reference> </reference>
<reference anchor="Singh2020" target="https://dl.acm.org/doi/abs/10.1145/3
394231.3397891"> <reference anchor="Singh2020" target="https://arxiv.org/pdf/1912.08590">
<front> <front>
<title>How India Censors the Web</title> <title>How India Censors the Web</title>
<author initials="K." surname="Singh" fullname="Kushagra Singh"> <author initials="K." surname="Singh" fullname="Kushagra Singh">
<organization/> <organization/>
</author> </author>
<author initials="G." surname="Grover" fullname="Gurshabad Grover"> <author initials="G." surname="Grover" fullname="Gurshabad Grover">
<organization/> <organization/>
</author> </author>
<author initials="V." surname="Bansal" fullname="Varun Bansal"> <author initials="V." surname="Bansal" fullname="Varun Bansal">
<organization/> <organization/>
</author> </author>
<date year="2020" month="July"/> <date year="2020" month="July"/>
</front> </front>
<refcontent>WebSci '20: Proceedings of the 12th ACM Conference on Web Sc
ience, pp. 21-28</refcontent>
<seriesInfo name="DOI" value="10.1145/3394231.3397891"/>
</reference> </reference>
<reference anchor="BASSO" target="https://datatracker.ietf.org/meeting/int erim-2024-biasws-03/materials/slides-interim-2024-biasws-03-sessa-online-censors hip-in-india-pakistan-and-indonesia-00"> <reference anchor="BASSO" target="https://datatracker.ietf.org/meeting/int erim-2024-biasws-03/materials/slides-interim-2024-biasws-03-sessa-slide-how-inte rnet-censorship-changed-in-russia-during-the-1st-year-of-military-conflict-in-uk raine-00.pdf">
<front> <front>
<title>How Internet censorship changed in Russia during the 1st year o f military conflict in Ukraine</title> <title>How Internet censorship changed in Russia during the 1st year o f military conflict in Ukraine</title>
<author initials="S." surname="Basso" fullname="Simone Basso"> <author initials="S." surname="Basso" fullname="Simone Basso">
<organization/> <organization/>
</author> </author>
<date year="2024" month="January"/> <date year="2024" month="January"/>
</front> </front>
</reference> </reference>
<reference anchor="WANG" target="https://datatracker.ietf.org/meeting/inte
rim-2024-biasws-03/materials/slides-interim-2024-biasws-03-sessa-online-censorsh <reference anchor="WANG" target="https://datatracker.ietf.org/meeting/inte
ip-in-india-pakistan-and-indonesia-00"> rim-2024-biasws-03/materials/slides-interim-2024-biasws-03-sessa-network-measure
ment-methods-for-locating-and-examining-censorship-devices-00.pdf">
<front> <front>
<title>Network Measurement Methods for Locating and Examining Censorsh ip Devices</title> <title>Network Measurement Methods for Locating and Examining Censorsh ip Devices</title>
<author initials="R. S." surname="Raman" fullname="Ram Sundara Raman"> <author initials="R. S." surname="Raman" fullname="Ram Sundara Raman">
<organization/> <organization/>
</author> </author>
<author initials="M." surname="Wang" fullname="Mona Wang"> <author initials="M." surname="Wang" fullname="Mona Wang">
<organization/> <organization/>
</author> </author>
<author initials="J." surname="Dalek" fullname="Jakub Dalek"> <author initials="J." surname="Dalek" fullname="Jakub Dalek">
<organization/> <organization/>
</author> </author>
<author initials="J." surname="Mayer" fullname="Jonathan Mayer"> <author initials="J." surname="Mayer" fullname="Jonathan Mayer">
<organization/> <organization/>
</author> </author>
<author initials="R." surname="Ensafi" fullname="Roya Ensafi"> <author initials="R." surname="Ensafi" fullname="Roya Ensafi">
<organization/> <organization/>
</author> </author>
<date year="2023" month="November"/> <date year="2023" month="November"/>
</front> </front>
</reference> </reference>
<reference anchor="RAMESH" target="https://datatracker.ietf.org/meeting/in
terim-2024-biasws-03/materials/slides-interim-2024-biasws-03-sessa-investigating <reference anchor="RAMESH-1" target="https://datatracker.ietf.org/meeting/
-the-vpn-ecosystem-through-the-lens-of-security-privacy-and-usability-00"> interim-2024-biasws-03/materials/slides-interim-2024-biasws-03-sessa-investigati
ng-the-vpn-ecosystem-through-the-lens-of-security-privacy-and-usability-00">
<front> <front>
<title>Investigating the VPN Ecosystem through the lens of Security, P rivacy, and Usability</title> <title>Investigating the VPN Ecosystem through the lens of Security, P rivacy, and Usability</title>
<author initials="R." surname="Ramesh" fullname="Reethika Ramesh"> <author initials="R." surname="Ramesh" fullname="Reethika Ramesh">
<organization/> <organization/>
</author> </author>
<date year="2024" month="January"/> <date year="2024" month="January"/>
</front> </front>
</reference> </reference>
<reference anchor="HOLZ" target="https://www.ietf.org/slides/slides-biasws -evidence-for-a-digital-divide-measuring-dns-dependencies-in-the-context-of-the- indigenous-population-of-australia-00.pdf"> <reference anchor="HOLZ" target="https://www.ietf.org/slides/slides-biasws -evidence-for-a-digital-divide-measuring-dns-dependencies-in-the-context-of-the- indigenous-population-of-australia-00.pdf">
<front> <front>
<title>Evidence for a digital divide? Measuring DNS dependencies in th e context of the indigenous population of Australia</title> <title>Evidence for a digital divide? Measuring DNS dependencies in th e context of the indigenous population of Australia</title>
<author initials="R." surname="Holz" fullname="Ralph Holz"> <author initials="R." surname="Holz" fullname="Ralph Holz">
<organization/> <organization/>
</author> </author>
<author initials="N." surname="Nazemi" fullname="Niousha Nazemi"> <author initials="N." surname="Nazemi" fullname="Niousha Nazemi">
<organization/> <organization/>
</author> </author>
<author initials="O." surname="Tavallaie" fullname="Omid Tavallaie"> <author initials="O." surname="Tavallaie" fullname="Omid Tavallaie">
skipping to change at line 407 skipping to change at line 465
</author> </author>
<author initials="O." surname="Tavallaie" fullname="Omid Tavallaie"> <author initials="O." surname="Tavallaie" fullname="Omid Tavallaie">
<organization/> <organization/>
</author> </author>
<author initials="A. Y." surname="Zomaya" fullname="Albert Y. Zomaya"> <author initials="A. Y." surname="Zomaya" fullname="Albert Y. Zomaya">
<organization/> <organization/>
</author> </author>
<date year="2023"/> <date year="2023"/>
</front> </front>
</reference> </reference>
<reference anchor="HUSSAIN" target="https://www.ietf.org/slides/slides-bia sws-universal-acceptance-of-domain-names-and-email-addresses-a-key-to-digital-in clusion-01.pdf"> <reference anchor="HUSSAIN" target="https://www.ietf.org/slides/slides-bia sws-universal-acceptance-of-domain-names-and-email-addresses-a-key-to-digital-in clusion-01.pdf">
<front> <front>
<title>Universal Acceptance of Domain Names and Email Addresses - A Ke <title>Universal Acceptance of Domain Names and Email Addresses: A Key
y to Digital Inclusion</title> to Digital Inclusion</title>
<author initials="S." surname="Hussain" fullname="Sarmad Husain"> <author initials="S." surname="Hussain" fullname="Sarmad Hussain">
<organization/> <organization/>
</author> </author>
<date year="2023"/> <date year="2023"/>
</front> </front>
</reference> </reference>
<!-- Used <https://dl.acm.org/doi/10.1145/3603269.3604872> to verify
the author list -->
<reference anchor="HABIB" target="https://www.ietf.org/slides/slides-biasw s-a-framework-for-improving-web-affordability-and-inclusiveness-00.pdf"> <reference anchor="HABIB" target="https://www.ietf.org/slides/slides-biasw s-a-framework-for-improving-web-affordability-and-inclusiveness-00.pdf">
<front> <front>
<title>A Framework for Improving Web Affordability and Inclusiveness</ title> <title>A Framework for Improving Web Affordability and Inclusiveness</ title>
<author initials="R." surname="Habib" fullname="Rumaisa Habib"> <author initials="R." surname="Habib" fullname="Rumaisa Habib">
<organization/> <organization/>
</author> </author>
<author initials="S." surname="Tanveer" fullname="Sarah Tanveer"> <author initials="S." surname="Tanveer" fullname="Sarah Tanveer">
<organization/> <organization/>
</author> </author>
<author initials="A." surname="Inam" fullname="Aimen Inam"> <author initials="A." surname="Inam" fullname="Aimen Inam">
<organization/> <organization/>
</author> </author>
<author initials="H." surname="Ahmed" fullname="Haseeb Ahmed"> <author initials="H." surname="Ahmed" fullname="Haseeb Ahmed">
<organization/> <organization/>
</author> </author>
<author initials="A." surname="Ali" fullname="Ayesha Ali"> <author initials="A." surname="Ali" fullname="Ayesha Ali">
<organization/> <organization/>
</author> </author>
<author initials="Z. A." surname="Uzmi" fullname="Zartash Afzal Uzmi">
<organization/>
</author>
<author initials="Z. A." surname="Qazi" fullname="Zafar Ayyub Qazi">
<organization/>
</author>
<author initials="I. A." surname="Qazi" fullname="Ihsan Ayyub Qazi">
<organization/>
</author>
<date year="2023" month="September"/> <date year="2023" month="September"/>
</front> </front>
<refcontent>ACM SIGCOMM '23, pp. 592-607</refcontent>
<seriesInfo name="DOI" value="10.1145/3603269.3604872"/>
</reference>
<reference anchor="OTT" target="https://www.ietf.org/slides/slides-biasws-
the-internet-only-for-the-fast-00.pdf">
<front>
<title>The Internet: Only for the Fast?</title>
<author initials="J." surname="Ott" fullname="Jörg Ott">
<organization/>
</author>
<author initials="G." surname="Bartolomeo" fullname="Giovanni Bartolom
eo">
<organization/>
</author>
<author initials="M.M." surname="Bese" fullname="Mert Mehmet Bese">
<organization/>
</author>
<author initials="R." surname="Bose" fullname="Rohan Bose">
<organization/>
</author>
<author initials="M." surname="Bosk" fullname="Marcin Bosk">
<organization/>
</author>
<author initials="D." surname="Guzman" fullname="David Guzman">
<organization/>
</author>
<author initials="L." surname="Kärkkäinen" fullname="Ljubica Kärkkäine
n">
<organization/>
</author>
<author initials="M." surname="Kosek" fullname="Mike Kosek">
<organization/>
</author>
<author initials="N." surname="Mohan" fullname="Nitinder Mohan">
<organization/>
</author>
<author initials="D." surname="Trossen" fullname="Dirk Trossen">
<organization/>
</author>
<author initials="M." surname="Welzl" fullname="Michael Welzl">
<organization/>
</author>
<author initials="L." surname="Vogel" fullname="Lucas Vogel">
<organization/>
</author>
<date year="2024" month="January"/>
</front>
</reference> </reference>
<reference anchor="OHLSEN" target="https://www.ietf.org/slides/slides-bias
ws-m-lab-position-paper-01.pdf">
<front>
<title>BIAS workshop - M-Lab Position Paper submission</title>
<author initials="L.Y." surname="Ohlsen" fullname="Lai Yi Ohlsen">
<organization/>
</author>
<date year="2024" month="December"/>
</front>
</reference>
<reference anchor="RAMESH-2" target="https://www.usenix.org/conference/use
nixsecurity23/presentation/ramesh-vpn">
<front>
<title>"All of them claim to be the best": Multi-perspective study of
VPN users and VPN providers</title>
<author initials="R." surname="Ramesh" fullname="Reethika Ramesh">
<organization/>
</author>
<author initials="A." surname="Vyas" fullname="Anjali Vyas">
<organization/>
</author>
<author initials="R." surname="Ensafi" fullname="Roya Ensafi">
<organization/>
</author>
<date year="2023" month="August"/>
</front>
<refcontent>32nd USENIX Security Symposium (USENIX Security '23</refcont
ent>
</reference>
</references> </references>
<?line 336?>
<section anchor="position-papers"> <section anchor="position-papers">
<name>Position Papers</name> <name>Position Papers</name>
<t>19 position papers were submitted to the workshop call for papers. 11 w <t>Nineteen position papers were submitted to the workshop call for papers
ere selected for publication. Papers that were not published either (1) only pro . Twelve were selected for publication. Papers that were not published either (1
vided a very prelimited analysis of an idea that was felt to be incomprehensive )&nbsp;only provided a very prelimited analysis of an idea that was felt to be i
for discussion at the workshop, or (2) addressed problems that were beyond the s ncomprehensive for discussion at the workshop or (2)&nbsp;addressed problems tha
cope as dedicated for the workshop discussion e.g. discussing cyber security thr t were considered beyond the scope of the workshop discussions, e.g., discussing
eads as a barrier for participation or implication of technology in regulation t cybersecurity threats as a barrier to participation or implication of technolog
hat imposes blocking. Both of these topics pose a potentially severe risk on the y in a regulation that imposes blocking. Both of these scenarios pose a potentia
open Internet, however, these risks might provide a high risk for all Internet lly severe risk for the open Internet; however, they might pose a high risk for
users but do not necessarily imply an unbalance.</t> all Internet users but do not necessarily imply an unbalance.</t>
<t>All accepted papers are available at: https://datatracker.ietf.org/grou <t>All accepted papers are available at <eref target="https://datatracker.
p/biasws/materials/</t> ietf.org/group/biasws/materials/" brackets="angle"/>.</t>
<t>This is the list of all published papers:</t> <t>This is the list of all published papers:</t>
<t>Community Networks:</t> <t>Community Networks:</t>
<ul spacing="normal"> <ul spacing="normal">
<li> <li>
<t>L. M. Martínez-Cervantes, R. Guevara-Martínez: Community Network <t>Martínez-Cervantes, L.&nbsp;M. and R.&nbsp;Guevara-Martínez: Commun
s and the Quest for Quality <xref target="MARTINEZ"/></t> ity Networks and the Quest for
Quality <xref target="MARTINEZ"/></t>
</li> </li>
<li> <li>
<t>T. Benson, M. Fayed: A ‘C’ in CDN: Access service to and from the Internet for community networks at-cost <xref target="BENSON"/></t> <t>Benson, T.&nbsp;A. and M.&nbsp;Fayed: A 'C' in CDN: Access service to and from the Internet at cost for community networks <xref target="BENSON"/>< /t>
</li> </li>
<li> <li>
<t>P. Hu: Closing the Performance and Management Gaps with Satellit <t>Hu, P.: Closing the Performance and Management Gaps with Satellite
e Internet: Challenges, Approaches, and Future Directions <xref target="HU"/></t Internet:
> Challenges, Approaches, and Future Directions <xref target="HU"/></t>
</li> </li>
<li> <li>
<t>R. Rennó: Maximising Connectivity: The Spectrum's Vital Role in Tec <t>Rennó, R.: Maximising Connectivity: The Spectrum's Vital Role in Te
hnology Access <xref target="RENNO"/></t> chnology Access <xref
target="RENNO"/></t>
</li> </li>
</ul> </ul>
<t>Digital Divide:</t> <t>Digital Divide:</t>
<ul spacing="normal"> <ul spacing="normal">
<li> <li>
<t>R. Holz, N. Nazemi, O. Tavallaie, A.Y. Zomaya: Evidence for a di <t>Holz, R., Nazemi, N., Tavallaie, O., and A.&nbsp;Y.&nbsp;Zomaya: Ev
gital divide? Measuring DNS dependencies in the context of the indigenous popula idence for a digital divide?
tion of Australia <xref target="HOLZ"/></t> Measuring DNS dependencies in the context of the indigenous population of Austra
lia <xref
target="HOLZ"/></t>
</li> </li>
<li> <li>
<t>S. Hussain: Universal Acceptance of Domain Names and Email Addres <t>Hussain, S.: Universal Acceptance of Domain Names and Email Address
ses: A Key to Digital Inclusion <xref target="HUSSAIN"/></t> es: A Key to
Digital Inclusion <xref target="HUSSAIN"/></t>
</li> </li>
<li> <li>
<t>R. Habib, S. Tanveer, A. Inam, H. Ahmed, A. Ali, Z.A. Uzmi, Z.A. Qa zi, I.A. Qazi: A Framework for Improving Web Affordability and Inclusiveness <xr ef target="HABIB"/></t> <t>Habib, R., Tanveer, S., Inam, A., Ahmed, H., Ali, A., Uzmi, Z.&nbsp ;A., Qazi, Z.&nbsp;A., and I.&nbsp;A.&nbsp;Qazi: A Framework for Improving Web A ffordability and Inclusiveness <xref target="HABIB"/></t>
</li> </li>
<li> <li>
<t>J. Ott, G. Bartolomeo, M.M. Bese, R. Bose, M. Bosk, D. Guzman, L. K ärkkäinen, M. Kosek, N. Mohan: The Internet: Only for the Fast (and Furious)?</t > <t>Ott, J., Bartolomeo, G., Bese, M.M., Bose, R., Bosk, M., Guzman, D. , Kärkkäinen, L., Kosek, M., Mohan, N., Trossen, D., Welzl, M., and L.&nbsp;Voge l: The Internet: Only for the Fast?&nbsp;<xref target="OTT"/></t>
</li> </li>
<li> <li>
<t>L.Y. Ohlsen: BIAS workshop - M-Lab Position Paper submission</t> <t>Ohlsen, L.Y.: BIAS workshop - M-Lab Position Paper submission <xref target="OHLSEN"/></t>
</li> </li>
</ul> </ul>
<t>Censorship:</t> <t>Censorship:</t>
<ul spacing="normal"> <ul spacing="normal">
<li> <li>
<t>S. Nurliza Samsudin: iMAP (Internet Monitoring Action Project) 202 <t>Samsudin, S.: iMAP (Internet Monitoring Action Project) 2023 Intern
3 Internet Censorship Report <xref target="SAMSUDIN"/></t> et
Censorship Report <xref target="SAMSUDIN"/></t>
</li> </li>
<li> <li>
<t>G. Grover: The infrastructure of censorship in Asia <xref target ="Grover2023"/></t> <t>Grover, G.: The infrastructure of censorship in Asia <xref target=" Grover2023"/></t>
</li> </li>
<li> <li>
<t>S. Basso: How Internet censorship changed in Russia during the 1st <t>Basso, S.: How Internet censorship changed in Russia during the 1st
year of military conflict in Ukraine <xref target="BASSO"/></t> year of military
conflict in Ukraine <xref target="BASSO"/></t>
</li> </li>
</ul> </ul>
<t>In addition to the submitted paper two invited talks were presented bas ed on published papers:</t> <t>In addition to the submitted papers, two invited talks were included, b ased on published papers:</t>
<ul spacing="normal"> <ul spacing="normal">
<li> <li>Raman, R.&nbsp;S., Wang, M., Dalek, J., Mayer, J., and R.&nbsp;Ens
<t>R. Sundara Raman, M. Wang, J. Dalek, J. Mayer, R. Ensafi: Network M afi: Network Measurement Methods for Locating and Examining Censorship Devices <
easurement Methods for Locating and Examining Censorship Devices <xref target="W xref target="WANG"/></li>
ANG"/></t> <li>Ramesh, R., Vyas, A., and R.&nbsp;Ensafi: "All of them claim to be
</li> the best": Multi-perspective study of VPN users and VPN providers <xref target=
<li> "RAMESH-2"/></li>
<t>R. Ramesh, A. Vyas, R. Ensafi: “All of them claim to be the best
”: A multi-perspective study of VPN users and VPN providers</t>
</li>
</ul> </ul>
</section> </section>
<section anchor="workshop-participants"> <section anchor="workshop-participants">
<name>Workshop Participants</name> <name>Workshop Participants</name>
<t>The workshop participants were Arnaud Taddei, Carlos Pignataro, Carsten <t>The workshop participants were <contact fullname="Arnaud Taddei"/>,
Bormann, Cindy Morgan, Colin Perkins, Cory Myers, Dan Sexton, David Guzman, Dav <contact fullname="Carlos Pignataro"/>, <contact fullname="Carsten
id Millman, David Schinazi, Dhruv Dhody, Gurshabad Grover, Hanna Kreitem, Jane C Bormann"/>, <contact fullname="Cindy Morgan"/>, <contact fullname="Colin
offin, Jiankang Yao, Jörg Ott, Juan Peirano, Lai Yi Ohlsen, Luis Martinez, Mallo Perkins"/>, <contact fullname="Cory Myers"/>, <contact fullname="Dan
ry Knodel, Marwan Fayed, Matthew Bocci, Michael Welzl, Michuki Mwangi, Mirja Küh Sexton"/>, <contact fullname="David Guzman"/>, <contact fullname="David
lewind, Mona Wang, Peng Hu, Ralph Holz, Raquel Renno, Reethika Ramesh, Rumaisa H Millman"/>, <contact fullname="David Schinazi"/>, <contact
abib, Sarmad Hussain, Simone Basso, Siti Nurliza Samsudin, Suresh Krishnan, Theo fullname="Dhruv Dhody"/>, <contact fullname="Gurshabad Grover"/>,
philus Benson, Tirumaleswar Reddy, Tommy Pauly, Vesna Manojlovic, and Wes Hardak <contact fullname="Hanna Kreitem"/>, <contact fullname="Jane Coffin"/>,
er.</t> <contact fullname="Jiankang Yao"/>, <contact fullname="Jörg Ott"/>,
<contact fullname="Juan Peirano"/>, <contact fullname="Lai Yi Ohlsen"/>,
<contact fullname="Luis Martinez"/>, <contact fullname="Mallory
Knodel"/>, <contact fullname="Marwan Fayed"/>, <contact
fullname="Matthew Bocci"/>, <contact fullname="Michael Welzl"/>,
<contact fullname="Michuki Mwangi"/>, <contact fullname="Mirja
Kühlewind"/>, <contact fullname="Mona Wang"/>, <contact fullname="Peng
Hu"/>, <contact fullname="Ralph Holz"/>, <contact fullname="Raquel
Rennó"/>, <contact fullname="Reethika Ramesh"/>, <contact
fullname="Rumaisa Habib"/>, <contact fullname="Sarmad Hussain"/>,
<contact fullname="Simone Basso"/>, <contact fullname="Siti Nurliza
Samsudin"/>, <contact fullname="Suresh Krishnan"/>, <contact
fullname="Theophilus Benson"/>, <contact fullname="Tirumaleswar
Reddy.K"/>, <contact fullname="Tommy Pauly"/>, <contact fullname="Vesna
Manojlovic"/>, and <contact fullname="Wes Hardaker"/>.</t>
</section> </section>
<section anchor="workshop-program-committee"> <section anchor="workshop-program-committee">
<name>Workshop Program Committee</name> <name>Workshop Program Committee</name>
<t>The workshop program committee members were Christopher Wood (IAB, Clou dflare), Dhruv Dhody (IAB, Huawei), Mallory Knodel (IAB, Center for Democracy an d Technology), Mirja Kühlewind (IAB, Ericsson), and Tommy Pauly (IAB, Apple).</t > <t>The workshop program committee members were <contact fullname="Christop her Wood"/> (IAB, Cloudflare), <contact fullname="Dhruv Dhody"/> (IAB, Huawei), <contact fullname="Mallory Knodel"/> (IAB, NYU), <contact fullname="Mirja Kühlew ind"/> (IAB, Ericsson), and <contact fullname="Tommy Pauly"/> (IAB, Apple).</t>
</section> </section>
<section numbered="false" anchor="iab-members-at-the-time-of-approval"> <section numbered="false" anchor="iab-members-at-the-time-of-approval">
<name>IAB Members at the Time of Approval</name> <name>IAB Members at the Time of Approval</name>
<t>Internet Architecture Board members at the time this document was appro <t>Internet Architecture Board members at the time this document was appro
ved for publication were: TODO</t> ved for publication were:</t>
<ul empty="true" spacing="compact">
<li><t><contact fullname="Matthew Bocci"/></t></li>
<li><t><contact fullname="Alissa Cooper"/></t></li>
<li><t><contact fullname="Roman Danyliw"/></t></li>
<li><t><contact fullname="Dhruv Dhody"/></t></li>
<li><t><contact fullname="Wes Hardaker"/></t></li>
<li><t><contact fullname="Cullen Jennings"/></t></li>
<li><t><contact fullname="Suresh Krishnan"/></t></li>
<li><t><contact fullname="Mirja Kühlewind"/></t></li>
<li><t><contact fullname="Tommy Pauly"/></t></li>
<li><t><contact fullname="Alvaro Retana"/></t></li>
<li><t><contact fullname="David Schinazi"/></t></li>
<li><t><contact fullname="Christopher Wood"/></t></li>
<li><t><contact fullname="Qin Wu"/></t></li>
</ul>
</section> </section>
<section numbered="false" anchor="acknowledgments"> <section numbered="false" anchor="acknowledgments">
<name>Acknowledgments</name> <name>Acknowledgments</name>
<t>Thanks to Arnaud Taddei for helpful suggestions to improve this report. </t> <t>Thanks to <contact fullname="Arnaud Taddei"/> for helpful suggestions t o improve this report.</t>
</section> </section>
</back> </back>
<!-- ##markdown-source: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</rfc> </rfc>
 End of changes. 104 change blocks. 
622 lines changed or deleted 543 lines changed or added

This html diff was produced by rfcdiff 1.48.