Salz, Rich <rsalz=40akamai.com@xxxxxxxxxxxxxx> wrote: > * Richard Shockey once observed that telephone numbers as a namespace > are a form of global language. > Please make sure that any system works so that an abused person can > become unavailable (contact, tracking, etc) to their abuser(s), For > example, allowing people to have more than one “name,” and not > requiring proof of possession of the old one when getting the new one. It's a really difficult requirement I think. Mostly because it's very hard, I think to clearly state the requirement. There are a whole long list of "buts" But, I really agree with your thoughts; but I think that what we really want is a way to refuse connections from authenticated entities, and therefore, to refuse connections from designated entities. I think that our current (societal and individual) approaches to (cyber and physical) stalking have been entirely inadequate. What are better approaches is unclear to me. It's an HRPC issue that we need to think about within many of our protocols. If you haven't gone through the https://www.ihollaback.org/ training, I would urge you do. And consider how we can apply some of these things online. -- Michael Richardson <mcr+IETF@xxxxxxxxxxxx> . o O ( IPv6 IøT consulting ) Sandelman Software Works Inc, Ottawa and Worldwide
Attachment:
signature.asc
Description: PGP signature