new forms of identity and dealing with abuse

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Salz, Rich <rsalz=40akamai.com@xxxxxxxxxxxxxx> wrote:
    > *   Richard Shockey once observed that telephone numbers as a namespace
    > are a form of global language.

    > Please make sure that any system works so that an abused person can
    > become unavailable (contact, tracking, etc) to their abuser(s), For
    > example, allowing people to have more than one “name,” and not
    > requiring proof of possession of the old one when getting the new one.

It's a really difficult requirement I think.  Mostly because it's very hard,
I think to clearly state the requirement.  There are a whole long list of "buts"

But, I really agree with your thoughts; but I think that what we really want is a
way to refuse connections from authenticated entities, and therefore, to
refuse connections from designated entities.

I think that our current (societal and individual) approaches to (cyber and
physical) stalking have been entirely inadequate.   What are better
approaches is unclear to me.  It's an HRPC issue that we need to think about
within many of our protocols.

If you haven't gone through the https://www.ihollaback.org/ training, I would
urge you do.  And consider how we can apply some of these things online.

--
Michael Richardson <mcr+IETF@xxxxxxxxxxxx>   . o O ( IPv6 IøT consulting )
           Sandelman Software Works Inc, Ottawa and Worldwide

Attachment: signature.asc
Description: PGP signature


[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux