What follows is semi-on topic ...
On Fri, Jun 1, 2018 at 11:16 AM Niels ten Oever <lists@xxxxxxxxxxxxxxxxxxxxx> wrote:
On 06/01/2018 06:00 PM, Peter Saint-Andre wrote:
> On 6/1/18 9:10 AM, Nico Williams wrote:
>
>> Require that documents have I18N Considerations sections, require review
>> by an I18N directorate, and you'll see how quickly participants who used
>> to not give a damn about I18 will come around, learn what they have to,
>> and get their I18N work done. Suddenly the I18N directorate will be in
>> demand.
>
> This is worth considering...
>
> Peter
>
l18n is part of the Human Rights Considerations
https://tools.ietf.org/html/rfc8280#section-6.2.5
so you might want to consider joining the Human Rights Review Team and
scope for these issues in drafts:
https://www.ietf.org/mailman/listinfo/Hr-rt
Best,
Niels
To provide background on my +1, I recently received the first HR-RT review I'd ever seen for a doc I'm editing.
The thread starts at https://mailarchive.ietf.org/arch/msg/hr-rt/byJOPkEXzGlHcYISVEQfk_zkbug.
In particular, if you check the review, you'll see this:
Human Rights Considerations===========================Upon consideration of the draft report, no implications forinternationalization ([RFC8280], sec. 6.2.5), heterogeneity support([RFC8280], sec. 6.2.8), accessibility ([RFC8280], sec. 6.2.11) orlocalization ([RFC8280], sec. 6.2.12) have been found. We will furthersuppose that issues relating to Anonymity ([RFC8280], sec. 6.2.9),Pseudonymity ([RFC8280], sec. 6.2.10) and Confidentiality ([RFC8280], sec.6.2.16) have been sufficiently addressed in the draft as is.In the below text, Security ([RFC8280], sec. 6.2.4), Integrity ([RFC8280],sec. 6.2.16) and Authenticity ([RFC8280], sec. 6.2.17) are furtherconsidered to have been addressed, or as in progress of being addressed bythe specific endeavours pointed out in the report. As such, this assessmenthopes to serve as a complement to remaining Human Rights ConsiderationsGuidelines which were not addressed by the MaRNEW draft.## Privacy ([RFC8280], sec. 6.2.2)We laud the general emphasis on considering user privacy concerns paramount[Section 2.1.1, 2.3 etc].In Section 3.1.1, para 1, it would be useful to emphasize that middleboxesthat are "authenticated and invoked explicitly" might not be very effectiveat conserving user privacy if they lead to auto-click through. In practice,"opted-in" middleboxes might not be much better than transparentmiddleboxes. Additionally, this poses the danger of making matters worse ifusers assume that because they haven't been asked for middlebox permission,they are not going through a middlebox. For users accessing the Internet ona browser client: if the connection is MITMed by a middlebox, the browserwould somehow need to convey this effectively and actionably to the user.Whatever effort is expended on this should involve browser vendors.## Connectivity ([RFC8280], sec. 6.2.1)It is a priori obvious that a discussion with mobile network operatorswould touch upon connectivity. As a general comment, the HRPC RG is notconcerned that encrypted internet traffic could create topological problemsin network deployment with respect to density of base stations. It is moresensible to imagine that the density of base stations is kept low bydeployers to save money on infrastructure roll-out.In the MarNEW draft report, middleboxes are brought up frequently as anexample of infrastructure rendered less useful by the ubiquitous adoptionof encryption. Middleboxes may enhance access to content for individuals,and may also interfere with their ability to enjoy content free ofsurveillance, censorship or content manipulation. The focus of the workshopof exploring ways in which encrypted materials can benefit from the samespeed of deliverance as un-encrypted materials is therefore welcome.## Content AgnosticismTraffic prioritisation, whether based on technical or commercial grounds,risks interfering with an individual's right to freedom of _expression_ oropinion, by restricting access or enjoy content of their own choosing. Assuch, prioritisation should be made explicit and obvious, and subject toconsent from the individual, whether the motivations for deployment arecommercial or technical.It is clear that internet filtering and blocking of content of specifictypes, whether motivated by network management or regulatory concerns, doesnot fulfill a content agnosticism criterion. It is the observation of HRPCthat [RFC7725] (An HTTP Status Code to Report Legal Obstacles) may assistcommunication of specific filtering and blocking operations in action.It the the impetus of the Human Rights Guidelines in RFC8280 that contentagnosticism be respected by protocols developed in the IETF, and in generalan accepted view in the global human rights community that contentagnosticism is desirable at all levels of technical infrastructure. Assuch, the HRPC RG is concerned about ideas that traffic be classifiedthrough additional headers or metadata, identifying traffic via 5-tuples,trust models and frameworks, or heuristics.
So, with that as background and speaking only for myself, +1.
If people should be thinking about i18n for their work, HR-RT is a resource that they might not know about.
(and thanks, again, for your review of my doc!)
Spencer