Location: Regency A
Date:         1st Aug 2012,  20:00

We got the room assigned, 3rd floor.
For the people not present, I'll update this list with a summary of
outcomes.

Looking forward to meeting with interested people, johan.
----composed-on-my-mobile----
On Jul 24, 2012 12:06 PM, "Fred Baker (fred)" <[email protected]> wrote:
>
> I'm interested in the effort, but not available at that time (or for that
matter, very many others). Will there be an outcome summarized to the list?
>
> On Jul 23, 2012, at 10:35 AM, Johan Pouwelse wrote:
>
> > Dear All,
> > At the upcoming IETF meeting I'm trying to organize a bar BoF around
enhancing privacy and reducing censorship.
> >
> > Hopefully people on this mailinglist are interested in these matters,
could help improve the discussion document or can even attend this Bar BoF
in person.
> >
> > Bar BoF name:     Media without censorship (CensorFree)
> > Location:              IETF 84, Vancouver, Canada
> > Date:                   1st Aug 2012,  20:00 (Wednesday)
> > Room:                  to be announced
> > Discussion doc:
> > https://datatracker.ietf.org/doc/draft-pouwelse-censorfree-scenarios/
> > Bar BoF status:     approved by Transport area directors (see CC:)
> > Technology status: initial running code
> > Abstract:
> >     This document describes some scenarios in which one can imagine that
> >     the ability of authoritarian regime to censor news dissemination is
> >     reduced.  It tries to draw some conclusions about what's desirable
> >     and what's not acceptable for users in those scenarios.
> >     The CensorFree objective is to standardize the protocols for
> >     microblogging on smartphones with a focus on security and censorship
> >     resistance.  Microblog entries are short text messages, possibly
> >     enriched with pictures or streaming video.  The goal is to devise
> >     protocols which guard against all known forms of censorship such as:
> >     cyberspace sabotage, digital eavesdropping, infiltration, fraud,
> >     Internet kill switches and lawyer-based attacks with the best known
> >     protective methods.
> >
> > The discussion document lists some scenarios, but is still very much a
work in progress.
> > Hopefully the knowledge from draft-iab-privacy-considerations-03 and
draft-iab-privacy-terminology-01 can be included in this doc real soon.
> >
> > Please reply if you are interested in these matters or have ideas on
> > this direction.
> >    -Johan Pouwelse, Delft University of Technology
> > _______________________________________________
> > ietf-privacy mailing list
> > [email protected]
> > https://www.ietf.org/mailman/listinfo/ietf-privacy
>
> ----------------------------------------------------
> The ignorance of how to use new knowledge stockpiles exponentially.
>    - Marshall McLuhan
>
_______________________________________________
ietf-privacy mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ietf-privacy

Reply via email to