<div dir="ltr">Stephanie, to clarify, my comment was not directed specifically at you but more broadly at this pattern of people bringing up privacy over and over again to push a narrow agenda- ironically arguing with folks who engage in actually implementing privacy. I agree that civility on this list should be improved. I&#39;m told by people that don&#39;t post that they abstain from participating due to the hostility, and commentary about this group is closely followed by commentary about its toxicity, and that this is one of the worst ICANN working groups they&#39;ve seen. I have no history with ICANN working groups and thus nothing compare to, so interpret those comments how you wish.<div><br></div><div>If people abstain from the process due to a desire not to be treated childishly, then it raises a question of how valid the process really is. When I showed up here several months ago, it was clear that my perspective went against the grain and people did not react positively to that. Someone more sensitive would have left.</div><div><br></div><div>You know more about privacy laws than I do, and I&#39;d like to ask that your word use on matters like &quot;personal information&quot; be stated for a layman audience. In the context of the discussions we&#39;ve already had, when you declare something as &quot;personal information&quot;, it carries the implication that it must be private and that queries for it are intrusive in nature. For those of us who want the data to remain open, we&#39;re a bit on the defensive about this already as it is frequently insinuated that we want this data open so we can snoop on people. Which is never the case, but such is post-Snowden privacy politics nowadays.</div><div><br></div><div>You brought up your work experience, which I do not want to disrespect- and my previous comments were intended to take issue with the idea that years of experience could be used to distract from the facts of an argument. You do have numerous accomplishments and it&#39;s clear you know your area of expertise. </div><div><br></div><div>Since we&#39;re sharing, I will state my own experience and perspective as well-</div><div><br></div><div>I work in the private security industry. But as I stated before, security in infosec largely involves confidentiality, so assuming that&#39;s at odds with privacy is absurd. My work involves learning how abuse happens. That is fed into systems that are used to evaluate and block risks. My work is used to reduce the likelihood of data breaches, identity theft, ddos, etc. At no point do we pester domain owners who mind their own business. WHOIS is a major source of information about unknown domains, and its granularity allows us to determine when something is benign. We, collectively, act as gatekeepers to many corporate networks.</div><div><br></div><div>I can tell you, based on my professional experience, what happens when no granularity exists. The Tor network is a cautionary tale. Tor is blocked by many sites, as its traffic is ~94% malicious. Amusingly, blocking has caused outrage in the Tor community, but their only answer to the abuse problem is to deny it exists. I see some similarities with this group&#39;s direction, not taking the abuse problem seriously. Tor is blocked on a growing number of websites, and Tor blocking tools grow in popularity. The Tor community is completely powerless to stop this.</div><div><br class="gmail-Apple-interchange-newline">An outsider&#39;s desire for privacy will never override a private network owner&#39;s absolute right to block.<br></div><div><br></div><div>Forcing anonymity on ICANN domains invites the same. Domain abuse is a massive problem. If granularity cannot be resolved past the registrar level, you can expect to see more registrar level blocks. The registrar&#39;s reputation will have an impact on the value of their domains. Registrars may control ICANN, but on blocklists they are at the mercy of the infosec industry. </div><div><br></div><div>A balance exists right now where a savvy domain owner can maintain their privacy, because they can still be differentiated as benign or malicious. Disrupting this balance threatens the possibility that someone can both be anonymous and treated as benign.  What happened to Tor should be taken much more seriously by people who want to mimic that. </div><div><br></div><div>This isn&#39;t because companies want to snoop for vaguely evil reasons. This is because network operators have an absolute right to block risks. Smearing that motive as &quot;profiling people&quot; or &quot;pretending to be cops&quot; misses the point entirely. And denying that abuse has any relevance in this discussion will result in a worse, and more walled off system, as network operators compensate for the loss of these risk detection mechanisms in ways that you definitely won&#39;t like.</div><div><br></div></div><div class="gmail_extra"><br><div class="gmail_quote">On Thu, Jun 1, 2017 at 10:23 AM, Stephanie Perrin <span dir="ltr">&lt;<a href="mailto:stephanie.perrin@mail.utoronto.ca" target="_blank">stephanie.perrin@mail.utoronto.ca</a>&gt;</span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
  
    
  
  <div bgcolor="#FFFFFF" text="#000000">
    <p><font size="+1"><font face="Lucida Grande">This is not a personal
          &quot;demand&quot;, it is a request that we maintain more civility in
          this discourse. The allegation that those of us who are trying
          to explain the privacy perspective on this matter do not
          understand your work is simply untrue.  Some of us have worked
          on the issues for years. Please, all I am asking for is that
          we tone the rhetoric down and treat each other with respect,
          as is required by ICANN standards of behaviour on working
          groups.</font></font></p>
    <p><font size="+1"><font face="Lucida Grande">With respect to your
          other comments, I have been clarifying in all the calls that I
          attend, that when I raise an objection it is often on
          principle because we need caveats or derogations on some of
          the agreements we reach.  I have clarified several times my
          position on the technical definition of personal information,
          and the fact that this in no way means that because
          information is personal, it cannot be disclosed (eg thin
          data).  I believe my response to Andrew&#39;s latest excellent
          summary yesterday pretty well encapsulates that so I am not
          going to respond point by point to what you have said below.</font></font></p>
    <p><font size="+1"><font face="Lucida Grande">Thanks.</font></font></p><span class="HOEnZb"><font color="#888888">
    <p><font size="+1"><font face="Lucida Grande">Stephanie Perrin<br>
        </font></font></p></font></span><div><div class="h5">
    <br>
    <div class="m_-2309761616268963704moz-cite-prefix">On 2017-05-31 19:04, allison nixon
      wrote:<br>
    </div>
    <blockquote type="cite">
      
      <div dir="ltr">Your e-mail stated:<br>
        &gt;&gt;Data that is gleaned from a file related to an
        individual, ie in this case their registration data, even if it
        is nameservers and the like, is their personal data.
        <div><br>
        </div>
        <div>And it was stated in support of restricting public access
          to this information. </div>
        <div><br>
        </div>
        <div>Eliminating the other data elements may make
          troubleshooting harder, but eliminating nameservers on the
          basis of privacy means the registrars won&#39;t be able to
          disseminate it at all, and it will literally break the
          Internet. Were you thinking of the absurd possibilities when
          you wrote it?</div>
        <div><br>
        </div>
        <div>Your references don&#39;t change the fact of how DNS resolution
          works. If you&#39;re going to object to that characterization,
          then I formally object to this one, which is similar to the
          sentiment that has underpinned this group since the beginning:<br>
        </div>
        <div><br>
        </div>
        <div>&gt;&gt;At a time when increasing imbalance in
          ‘informational power’, when governments and business
          organizations alike amass hitherto unprecedented amounts of
          data about individuals, and are increasingly in the position
          to compile detailed profiles that will predict their behavior
          (reinforcing informational imbalance and reducing their
          autonomy), it is ever more important to ensure that the
          interests of the individuals to preserve their privacy and
          autonomy be protected.</div>
        <div><br>
        </div>
        <div>In the context of WHOIS, it&#39;s ridiculous borderline
          conspiracy theory. A tiny percent of the population owns any
          domains, and an even smaller percent disclose anything in the
          WHOIS. This isn&#39;t intrusive like ad tracking or companies
          selling health data. This is information that people enter
          when they stake a claim in a public space. Blinding defenders
          from being able to judge if we want to interact with inbound
          traffic reduces our autonomy and only empowers the massive
          problem of abuse. Mischaracterizing public WHOIS info, which
          has been public for decades, as some sort of scandalous leak
          of data is ridiculous. It also falsely shades the motivations
          of the people who are asking for it to remain open. The truth
          is that this data is useless for what is insinuated, and we
          aren&#39;t asking to keep the data open so we can snoop on some
          dissident by knowing what their junk email and domain creation
          date is. </div>
        <div><br>
        </div>
        <div>And just because someone in the world is(and they certainly
          are), it doesn&#39;t mean we must shut down the whole system.</div>
        <div><br>
        </div>
        <div>On top of that, no one is forced to disclose damaging info.
          If you want to use an ICANN domain, fill out the form. If you
          don&#39;t want to, get an .onion, get a dynamic domain, go
          somewhere else. Or use WHOIS privacy. Or use junk info.</div>
        <div><br>
        </div>
        <div>You can demand respect, but many arguments in this group do
          not inspire respect. </div>
        <div>
          <ul>
            <li>When people claim to be concerned about spam as a
              motivation for eliminating WHOIS, and then don&#39;t listen
              when actual anti-spam people tell them it will destroy a
              major tool in the fight against spam, that does not
              inspire respect. </li>
            <li>When people propose to put basic functionality on the
              chopping block, that does not inspire respect. <br>
            </li>
            <li>When theoretical edge cases are dreamed up as rebuttals
              to real and frequent issues, that does not inspire
              respect.</li>
            <li>When anti-abuse is judged as anathema to privacy and are
              disrespected, that does not inspire respect.</li>
          </ul>
          <div>I along with many other security professionals here are
            not opposed to following the law. Collectively much of our
            work involves ensuring compliance with the law, including
            privacy laws, HIPAA, data breach laws, et cetera. Despite
            frequently being mischaracterized as wannabe cops by list
            members, we are not cops. We actually implement the
            protection of privacy, including the need to prevent data
            breaches- which can incur massive fines thanks to some
            privacy laws. Yet here we are, butting heads with &quot;privacy
            experts&quot;, who by and large don&#39;t want to hear about
            operational issues or the wider impact of their narrow
            agenda.</div>
        </div>
        <div><br>
        </div>
        <div>This observation isn&#39;t solely about you personally, and
          your work history is irrelevant here. It is an observation
          about the group as a whole since I became active. This isn&#39;t
          privacy versus security. This is quite literally, privacy
          versus privacy. And one side of the argument has operational
          experience. Security in the Internet sense involves-
          confidentiality, integrity, and availability. And most efforts
          are focused on the first item. We are not the NSA hunting
          terrorists or tapping phones or whatever youall imagine we
          are. We are trying to prevent data breaches and identity theft
          and phishing and quite literally everything that privacy laws
          are written to address. That&#39;s why these arguments are so
          ridiculous.</div>
        <div><br>
        </div>
      </div>
      <div class="gmail_extra"><br>
        <div class="gmail_quote">On Wed, May 31, 2017 at 3:42 PM,
          Stephanie Perrin <span dir="ltr">&lt;<a href="mailto:stephanie.perrin@mail.utoronto.ca" target="_blank">stephanie.perrin@mail.<wbr>utoronto.ca</a>&gt;</span>
          wrote:<br>
          <blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
            <div bgcolor="#FFFFFF" text="#000000">
              <p><font size="+1"><font face="Lucida Grande">I would like
                    to formally object to this kind of characterization
                    of the people who are working in good faith on this
                    working group:  &quot;self-proclaimed privacy
                    advocates&quot;.  I can only speak for myself, so I will
                    do only that.....I am not a self-proclaimed privacy
                    advocate.  I have been working as a privacy
                    professional since 1984, when I became one of the
                    first privacy coordinators for the Department of
                    Communications of Canada.  I was the first president
                    in 1986 of CAPA, the privacy professionals
                    association which we formed and which collaborated
                    for many years with ASAP, the US equivalent.  I
                    could go on and on and if you require references as
                    to whether or not our views should be accepted as
                    having merit, regardless of whether you agree with
                    them or not, I am happy to provide them.  But
                    please, let us treat one another with a bit more
                    respect.</font></font></p>
              <span class="m_-2309761616268963704HOEnZb"><font color="#888888">
                  <p><font size="+1"><font face="Lucida Grande">Stephanie
                        Perrin</font></font><br>
                  </p>
                </font></span>
              <div>
                <div class="m_-2309761616268963704h5"> <br>
                  <div class="m_-2309761616268963704m_-3414513183451100299moz-cite-prefix">On
                    2017-05-31 13:39, allison nixon wrote:<br>
                  </div>
                  <blockquote type="cite">
                    <div dir="ltr">Good faith does not excuse ignorance.
                      Such a mistake reveals the extreme tunnel vision
                      by many self proclaimed privacy advocates here. It
                      shows why they butt heads with people who work
                      every day in the trenches to actually protect
                      privacy of real- not theoretical- victims. </div>
                    <div class="gmail_extra"><br>
                      <div class="gmail_quote">On Wed, May 31, 2017 at
                        1:30 PM, Jeremy Malcolm <span dir="ltr">&lt;<a href="mailto:jmalcolm@eff.org" target="_blank">jmalcolm@eff.org</a>&gt;</span>
                        wrote:<br>
                        <blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
                          <div text="#000000" bgcolor="#FFFFFF"> Again,
                            I really think we need to dial down the
                            level of sarcasm here.  The proportionality
                            proposal was made in good faith.<br>
                            <br>
                            However, I&#39;m from a privacy advocacy
                            organization and even I have agreed that
                            there are operational problems with any
                            proposal to limit unauthenticated access to
                            thin WHOIS data.  I agree that while privacy
                            is an absolutely key principle to be upheld,
                            so is the generativity of the Internet, and
                            that unauthenticated access to thin WHOIS
                            data, much of which just replicates the
                            information that end users make available
                            through their own nameservers, is part of
                            the permissionless innovation that underpins
                            many real world Internet applications.
                            <div>
                              <div class="m_-2309761616268963704m_-3414513183451100299h5"><br>
                                <br>
                                <div class="m_-2309761616268963704m_-3414513183451100299m_-4927271185857328544moz-cite-prefix">On
                                  31/5/17 10:14 am, allison nixon wrote:<br>
                                </div>
                              </div>
                            </div>
                            <blockquote type="cite">
                              <div>
                                <div class="m_-2309761616268963704m_-3414513183451100299h5">
                                  <div dir="ltr">Which includes
                                    nameservers, which are collected and
                                    propagated by the registrars. If
                                    this is deemed sensitive
                                    information, then the registrars
                                    should be careful sharing that data
                                    via other outlets without tight
                                    restrictions!</div>
                                  <div class="gmail_extra"><br>
                                    <div class="gmail_quote">On Wed, May
                                      31, 2017 at 1:09 PM, Michael
                                      Peddemors <span dir="ltr">&lt;<a href="mailto:michael@linuxmagic.com" target="_blank">michael@linuxmagic.com</a>&gt;</span>
                                      wrote:<br>
                                      <blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><span>On
                                          17-05-31 10:07 AM, allison
                                          nixon wrote:<br>
                                          <blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"> the
                                            rest of it can&#39;t be. You
                                            can&#39;t put a DNS query behind
                                            a EULA. We<br>
                                            can&#39;t pretend there are
                                            restrictions on this data.<br>
                                            <br>
                                          </blockquote>
                                          <br>
                                        </span> We aren&#39;t discussing DNS
                                        or any other places that data is
                                        available as part of this
                                        working group. Only the informed
                                        consent of data held in whois
                                        thin data.
                                        <div class="m_-2309761616268963704m_-3414513183451100299m_-4927271185857328544HOEnZb">
                                          <div class="m_-2309761616268963704m_-3414513183451100299m_-4927271185857328544h5"><br>
                                            <br>
                                            <br>
                                            -- <br>
                                            &quot;Catch the Magic of
                                            Linux...&quot;<br>
------------------------------<wbr>------------------------------<wbr>------------<br>
                                            Michael Peddemors,
                                            President/CEO LinuxMagic
                                            Inc.<br>
                                            Visit us at <a href="http://www.linuxmagic.com" rel="noreferrer" target="_blank">http://www.linuxmagic.com</a>
                                            @linuxmagic<br>
------------------------------<wbr>------------------------------<wbr>------------<br>
                                            A Wizard IT Company - For
                                            More Info <a href="http://www.wizard.ca" rel="noreferrer" target="_blank">http://www.wizard.ca</a><br>
                                            &quot;LinuxMagic&quot; a Registered
                                            TradeMark of Wizard Tower
                                            TechnoServices Ltd.<br>
------------------------------<wbr>------------------------------<wbr>------------<br>
                                            <a href="tel:604-682-0300" value="+16046820300" target="_blank">604-682-0300</a> Beautiful
                                            British Columbia, Canada<br>
                                            <br>
                                            This email and any
                                            electronic data contained
                                            are confidential and
                                            intended<br>
                                            solely for the use of the
                                            individual or entity to
                                            which they are addressed.<br>
                                            Please note that any views
                                            or opinions presented in
                                            this email are solely<br>
                                            those of the author and are
                                            not intended to represent
                                            those of the company.<br>
                                          </div>
                                        </div>
                                      </blockquote>
                                    </div>
                                    <br>
                                    <br clear="all">
                                    <div><br>
                                    </div>
                                    -- <br>
                                    <div class="m_-2309761616268963704m_-3414513183451100299m_-4927271185857328544gmail_signature" data-smartmail="gmail_signature">______________________________<wbr>___<br>
                                      Note to self: Pillage BEFORE
                                      burning.</div>
                                  </div>
                                  <br>
                                  <fieldset class="m_-2309761616268963704m_-3414513183451100299m_-4927271185857328544mimeAttachmentHeader"></fieldset>
                                  <br>
                                </div>
                              </div>
                              <span>
                                <pre>______________________________<wbr>_________________
gnso-rds-pdp-wg mailing list
<a class="m_-2309761616268963704m_-3414513183451100299m_-4927271185857328544moz-txt-link-abbreviated" href="mailto:gnso-rds-pdp-wg@icann.org" target="_blank">gnso-rds-pdp-wg@icann.org</a>
<a class="m_-2309761616268963704m_-3414513183451100299m_-4927271185857328544moz-txt-link-freetext" href="https://mm.icann.org/mailman/listinfo/gnso-rds-pdp-wg" target="_blank">https://mm.icann.org/mailman/l<wbr>istinfo/gnso-rds-pdp-wg</a></pre>
    </span></blockquote>
    

    <pre class="m_-2309761616268963704m_-3414513183451100299m_-4927271185857328544moz-signature" cols="72">-- 
Jeremy Malcolm
Senior Global Policy Analyst
Electronic Frontier Foundation
<a class="m_-2309761616268963704m_-3414513183451100299m_-4927271185857328544moz-txt-link-freetext" href="https://eff.org" target="_blank">https://eff.org</a>
<a class="m_-2309761616268963704m_-3414513183451100299m_-4927271185857328544moz-txt-link-abbreviated" href="mailto:jmalcolm@eff.org" target="_blank">jmalcolm@eff.org</a>

Tel: <a href="tel:%28415%29%20436-9333" value="+14154369333" target="_blank">415.436.9333 ext 161</a>

:: Defending Your Rights in the Digital World ::

Public key: <a class="m_-2309761616268963704m_-3414513183451100299m_-4927271185857328544moz-txt-link-freetext" href="https://www.eff.org/files/2016/11/27/key_jmalcolm.txt" target="_blank">https://www.eff.org/files/2016<wbr>/11/27/key_jmalcolm.txt</a>
PGP fingerprint: 75D2 4C0D 35EA EA2F 8CA8 8F79 4911 EC4A EDDF 1122</pre>
  </div>


______________________________<wbr>_________________

gnso-rds-pdp-wg mailing list

<a href="mailto:gnso-rds-pdp-wg@icann.org" target="_blank">gnso-rds-pdp-wg@icann.org</a>

<a href="https://mm.icann.org/mailman/listinfo/gnso-rds-pdp-wg" rel="noreferrer" target="_blank">https://mm.icann.org/mailman/l<wbr>istinfo/gnso-rds-pdp-wg</a>
</blockquote></div>

<div>
</div>-- 
<div class="m_-2309761616268963704m_-3414513183451100299gmail_signature" data-smartmail="gmail_signature">______________________________<wbr>___
Note to self: Pillage BEFORE burning.</div>
</div>


<fieldset class="m_-2309761616268963704m_-3414513183451100299mimeAttachmentHeader"></fieldset>
<pre>______________________________<wbr>_________________
gnso-rds-pdp-wg mailing list
<a class="m_-2309761616268963704m_-3414513183451100299moz-txt-link-abbreviated" href="mailto:gnso-rds-pdp-wg@icann.org" target="_blank">gnso-rds-pdp-wg@icann.org</a>
<a class="m_-2309761616268963704m_-3414513183451100299moz-txt-link-freetext" href="https://mm.icann.org/mailman/listinfo/gnso-rds-pdp-wg" target="_blank">https://mm.icann.org/mailman/l<wbr>istinfo/gnso-rds-pdp-wg</a></pre>

</blockquote>
</div></div></div>
______________________________<wbr>_________________

gnso-rds-pdp-wg mailing list

<a href="mailto:gnso-rds-pdp-wg@icann.org" target="_blank">gnso-rds-pdp-wg@icann.org</a>

<a href="https://mm.icann.org/mailman/listinfo/gnso-rds-pdp-wg" rel="noreferrer" target="_blank">https://mm.icann.org/mailman/l<wbr>istinfo/gnso-rds-pdp-wg</a>
</blockquote></div>

<div>
</div>-- 
<div class="m_-2309761616268963704gmail_signature" data-smartmail="gmail_signature">______________________________<wbr>___
Note to self: Pillage BEFORE burning.</div>
</div>



</blockquote>
</div></div></div></blockquote></div><br><br clear="all"><div><br></div>-- <br><div class="gmail_signature" data-smartmail="gmail_signature">_________________________________<br>Note to self: Pillage BEFORE burning.</div>
</div>