idnits 2.17.00 (12 Aug 2021) /tmp/idnits40457/draft-guerra-feminism-01.txt: Checking boilerplate required by RFC 5378 and the IETF Trust (see https://trustee.ietf.org/license-info): ---------------------------------------------------------------------------- No issues found here. Checking nits according to https://www.ietf.org/id-info/1id-guidelines.txt: ---------------------------------------------------------------------------- No issues found here. Checking nits according to https://www.ietf.org/id-info/checklist : ---------------------------------------------------------------------------- ** The abstract seems to contain references ([RFC8280]), which it shouldn't. Please replace those with straight textual mentions of the documents in question. Miscellaneous warnings: ---------------------------------------------------------------------------- == The copyright year in the IETF Trust and authors Copyright Line does not match the current year -- The document date (July 08, 2019) is 1041 days in the past. Is this intentional? Checking references for intended status: Informational ---------------------------------------------------------------------------- -- Looks like a reference, but probably isn't: '1989' on line 820 == Unused Reference: 'Comninos' is defined on line 838, but no explicit reference was found in the text == Unused Reference: 'RFC1244' is defined on line 876, but no explicit reference was found in the text == Unused Reference: 'RFC1746' is defined on line 880, but no explicit reference was found in the text == Unused Reference: 'RFC1941' is defined on line 884, but no explicit reference was found in the text == Unused Reference: 'RFC2122' is defined on line 893, but no explicit reference was found in the text == Unused Reference: 'RFC2310' is defined on line 897, but no explicit reference was found in the text == Unused Reference: 'RFC3694' is defined on line 905, but no explicit reference was found in the text == Unused Reference: 'RFC4949' is defined on line 910, but no explicit reference was found in the text == Unused Reference: 'Tao' is defined on line 940, but no explicit reference was found in the text -- Obsolete informational reference (is this intentional?): RFC 1244 (Obsoleted by RFC 2196) Summary: 1 error (**), 0 flaws (~~), 10 warnings (==), 3 comments (--). Run idnits with the --verbose option for more detailed information about the items above. -------------------------------------------------------------------------------- 2 Human Rights Protocol Considerations Research Group J. Guerra 3 Internet-Draft Derechos Digitales 4 Intended status: Informational M. Knodel 5 Expires: January 9, 2020 ARTICLE 19 6 July 08, 2019 8 Feminism and protocols 9 draft-guerra-feminism-01 11 Abstract 13 This document aims to describe how internet standards, protocols and 14 its implementations may impact diverse groups and communities. The 15 research on how some protocol can be enabler for specific human 16 rights while possibly restricting others has been documented in 17 [RFC8280]. Similar to how RFC 8280 has taken a human rights lens 18 through which to view engineering and design choices by internet 19 standardisation, this document addresgses the opportunities and 20 vulnerabilities embedded within internet protocols for specific, 21 traditionally maginalised groups. 23 Status of This Memo 25 This Internet-Draft is submitted in full conformance with the 26 provisions of BCP 78 and BCP 79. 28 Internet-Drafts are working documents of the Internet Engineering 29 Task Force (IETF). Note that other groups may also distribute 30 working documents as Internet-Drafts. The list of current Internet- 31 Drafts is at https://datatracker.ietf.org/drafts/current/. 33 Internet-Drafts are draft documents valid for a maximum of six months 34 and may be updated, replaced, or obsoleted by other documents at any 35 time. It is inappropriate to use Internet-Drafts as reference 36 material or to cite them other than as "work in progress." 38 This Internet-Draft will expire on January 9, 2020. 40 Copyright Notice 42 Copyright (c) 2019 IETF Trust and the persons identified as the 43 document authors. All rights reserved. 45 This document is subject to BCP 78 and the IETF Trust's Legal 46 Provisions Relating to IETF Documents 47 (https://trustee.ietf.org/license-info) in effect on the date of 48 publication of this document. Please review these documents 49 carefully, as they describe your rights and restrictions with respect 50 to this document. Code Components extracted from this document must 51 include Simplified BSD License text as described in Section 4.e of 52 the Trust Legal Provisions and are provided without warranty as 53 described in the Simplified BSD License. 55 Table of Contents 57 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 58 1.1. An intersectional perspective . . . . . . . . . . . . . . 3 59 1.1.1. Internet as a matrix of domination . . . . . . . . . 4 60 1.2. Brief history of feminism and the internet . . . . . . . 5 61 2. Methodology . . . . . . . . . . . . . . . . . . . . . . . . . 6 62 3. Feminist Principles . . . . . . . . . . . . . . . . . . . . . 6 63 3.1. Access . . . . . . . . . . . . . . . . . . . . . . . . . 6 64 3.1.1. Internet access . . . . . . . . . . . . . . . . . . . 7 65 3.1.2. Access to information . . . . . . . . . . . . . . . . 7 66 3.1.3. Usage of technology . . . . . . . . . . . . . . . . . 8 67 3.2. Networked . . . . . . . . . . . . . . . . . . . . . . . . 8 68 3.2.1. Resistance . . . . . . . . . . . . . . . . . . . . . 9 69 3.2.2. Movement building . . . . . . . . . . . . . . . . . . 9 70 3.2.3. Internet governance . . . . . . . . . . . . . . . . . 10 71 3.3. Economy . . . . . . . . . . . . . . . . . . . . . . . . . 10 72 3.3.1. Business models . . . . . . . . . . . . . . . . . . . 10 73 3.3.2. Open source . . . . . . . . . . . . . . . . . . . . . 11 74 3.4. Expression . . . . . . . . . . . . . . . . . . . . . . . 11 75 3.4.1. Amplify . . . . . . . . . . . . . . . . . . . . . . . 12 76 3.4.2. Expression . . . . . . . . . . . . . . . . . . . . . 12 77 3.4.3. Pornography . . . . . . . . . . . . . . . . . . . . . 12 78 4. Embodiment . . . . . . . . . . . . . . . . . . . . . . . . . 13 79 4.1. Consent . . . . . . . . . . . . . . . . . . . . . . . . . 14 80 4.1.1. Privacy and data . . . . . . . . . . . . . . . . . . 14 81 4.1.2. Memory . . . . . . . . . . . . . . . . . . . . . . . 15 82 4.1.3. Anonymity . . . . . . . . . . . . . . . . . . . . . . 15 83 4.1.4. Children . . . . . . . . . . . . . . . . . . . . . . 16 84 4.2. Online violence . . . . . . . . . . . . . . . . . . . . . 16 85 5. References not yet referenced . . . . . . . . . . . . . . . . 17 86 6. Security Considerations . . . . . . . . . . . . . . . . . . . 18 87 7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 18 88 8. Informative References . . . . . . . . . . . . . . . . . . . 18 89 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 21 91 1. Introduction 93 This document aims to use a feminist framework to analyse the impacts 94 of internet protocols on society. It is based on a document called 95 The The Feminist Principles of the Internet [FPI], a series of 17 96 statements with a "gender and sexual rights lens on critical 97 internet-related rights" for the purpose of enabling women's rights 98 movements to explore issues related to internet technology. 100 These Principles, as well as most of the experiences and learnings of 101 the feminist movement in the digital age, have focused on invisioning 102 a more just internet as a necessary action in building a more just 103 society, namely one that recognizes differences across a variety of 104 lived experience and identity. 106 This document must not be understood as a set of rules or 107 recommendations, but as an articulation of key issues with feminist 108 policies and approaches, in order to begin to investigate. That is 109 why this document has two main goals: to identify terminology, both 110 in technical and feminist communities, that can be shared in order to 111 start a dialogue; and to analyze the Feminist Principles based on 112 some of the technical discussions that have been taken into account 113 in the development of protocols. 115 In what follows, this document first describes the feminist 116 theoretical framework from which it proposes to analyze the impacts 117 of the protocols on marginalized and discriminated communities. In 118 the second part, describes the methodology used to connect the 119 framework mentioned above with the Feminist Principles of the 120 internet. In the third part, characteristics of each principle, as 121 well as the harms on which they are based, the possible points where 122 they connect with IETF work and related rights, are described. 124 This is still a work in progress so many sections are yet to be done. 125 Coming soon will be added use cases as examples of how protocols and 126 standards can restrict the use of the internet by certain communities 127 and individuals. 129 1.1. An intersectional perspective 131 Imagine a highway that connects two big cities, one capable of 132 withstanding heavy traffic at high speeds. Driving there takes 133 experience and expertise, and just a few streets intersect it so as 134 not to hinder traffic. Imagine this highway as a robust body of 135 rights and those who travel along it as people who have traditionally 136 enjoyed these rights. 138 If someone without enough experience is driving down a road that 139 intersects the highway and wants to get there, that person will be at 140 greater risk of crashing or having an accident. In addition, without 141 a valid license the person will also run the risk of being fined by 142 the traffic authorities. In terms of rights, those intersecting 143 roads are not robust and the risks of accident are forms of 144 discrimination experienced by those who drive on them. What if many 145 small streets intersect at the same point on the highway? 147 Arised in black feminist theory, the concept of intersectionality 148 serves to understand how multiple forms of discrimination overlap 149 [Collins]. As first pointed by [Crenshaw] in the United States, 150 "Black women can experience discrimination in ways that are both 151 similar to and different from those experienced by white women and 152 Black men", so an intersectional approach should be able to recognize 153 this type of discrimination by transcending the one-way perspective 154 with which the justice system, as well as feminist and anti-racist 155 movements, had traditionally operated. 157 From this proposal, the concept has meant a paradigm shift both in 158 feminist thinking [Collins] and movements [Lorde][Davis], and more 159 recently in the design and implementation of public policies 160 [Mason][Hankivsky]. The intersectional approach is not focused on 161 the problem of equality but on difference; discrimination is not 162 analyzed in terms of effective access to rights, but the conditions 163 and capacities that people have to access those rights. 165 Therefore, an intersectional feminist perspective focuses on social 166 location, the multiple layered identities people live, derived from 167 social relations, history and structures of power through which 168 people can experience both oppression and privilege. These 169 oppressions can be structural and dynamic, determined by gender, race 170 or skin color, class, sexuality, ethnicity, age, language, geographic 171 location, abilities or health conditions, among other factors 172 [Symington]. 174 The concept _matrix of domination_, introduced by [Collins] as 175 complementary to _intersectionality_, refers to the way in which the 176 powers that produce and reproduce intersecting oppression are 177 organized. In summary, the concept _intersectionality_ has served to 178 recognize people's different experiences and social locations and 179 with this, the need of a bottom up understanding of discrimination 180 and oppression; in addition, the concept _matrix of domination_ turns 181 the gaze on the context of power -institutional, political, economic 182 and symbolic- in which intersecting oppressions operate. 184 1.1.1. Internet as a matrix of domination 186 The gender and sexual rights lens on critical internet-related rights 187 contained in the Feminist Principles of the Internet has been built 188 bottom up by the feminist movement [FPI], which treats most 189 prominently people who are negatively discriminated against on the 190 basis of their gender and sexuality, but not exclusively. Because 191 the threats to women and queer people, whose bodies and 192 manifestations are already under strong, albeit sometimes invisible, 193 social, cultural and political surveillance, an intersectional 194 feminist analysis makes it possible to recognize how multiple 195 oppressions affect the ways people access, use and participate on the 196 internet. 198 From now on, some of these experiences will be used to identify how 199 the Internet can enable or restrict the possibility of justice and 200 equity among its users. For this purpose, it is useful to understand 201 the internet as a _matrix of domination_ in the sense pointed by 202 [Collins]: as an institutional, political, symbolic and cultural 203 context where different intersecting oppressions are shaped and 204 reinforced. 206 This document addresses the opportunities and vulnerabilities 207 incorporated into Internet protocols for specific, traditionally 208 discriminated groups, on the assumption that these values are 209 inherent in technological design. Through the proposed 210 intersectional perspective, a multilevel description of the factors, 211 processes and social structures that affect different experiences on 212 the Internet is presented below and, based on specific cases, an 213 analysis will be made of how the different protocols intervene in the 214 shaping and reinforcement of intersecting oppressions faced by users 215 on different social locations. 217 1.2. Brief history of feminism and the internet 219 The ways in which feminists have understood, used and mobilised on 220 the internet is significant for a baseline understanding of how 221 internet protocols and feminism intersect. Intersectional feminist 222 action and analysis can be collected into two strategies: addressing 223 the status quo and creating alternatives. Feminists on the early 224 internet embodied both. 226 It is important to note here that there has always existed a gender 227 gap in access to the internet, which is exacerbated by global wealth 228 inequality. 230 Since the 1980s, feminist movements have used the internet to 231 challenge power. Globalisation. Development. Cyberfeminism. 232 Internet governance. There is a deeper connection to the internet 233 and social justice struggles in which communication becomes the 234 primary strategy to address inequality. Indeed, in "A History of 235 Feminist Engagement with Development and Digital Technologies" Anita 236 Gurumurthy writes, "the history of the right to communicate reveals 237 the contestation between powerful status quoist forces and those who 238 seek transformative, global change for justice and equality." 239 At the same time, feminists were using the internet to create 240 feminist space. 242 Author Feminista Jones argues in "Reclaiming Our Space: How Black 243 Feminists Are Changing the World from the Tweets to the Streets" that 244 the feminist alternative spaces have become mainstream and are 245 leading analysis and critique of the status quo, a merging and 246 strengthening of the two strategies that emerge from this particular 247 historical framing. 249 Given these myriad expressions of feminism online and feminist 250 movement building online, one thread is perhaps most instructive to 251 this exercise, which we use as the basis for this document: Feminist 252 Principles of the Internet. More about the nature of the complex 253 community that created the Feminist Principles of the Internet can be 254 found at feministinternet.org. The principles, drafted and revised 255 by hundreds of feminists mostly in the global south, highlight 256 historical feminist themes for the digital age in its main 257 categories: access, movements, economy, expression and embodiment. 259 2. Methodology 261 - Research: Archive review, HRPC-RG documents, Use cases (bottom-up, 262 participative process within feministinternet community (TODO)) 264 - Presentation: principle, harm identified, related protocols and 265 rights. 267 TODO 269 3. Feminist Principles 271 3.1. Access 273 Internet access is recognized as a human right [UNGA], but its 274 effective guarantee depends on different and unequal social, 275 cultural, economic and political conditions. In 2018, barely half of 276 the world's population has access to the internet and in 88% of 277 countries, men have more access than women [ITU]. Geographical 278 location, age, educational and income level, as well as gender, 279 significantly determine how people access to the internet 280 [WebFoundation]. 282 The Feminist Principles of the Internet [FPI] explore a broad 283 understanding of the term beyond technicalities. It seeks to connect 284 the technical fact to gendered and socio-economic realities. 286 3.1.1. Internet access 288 Access must be to a universal, acceptable, affordable, unconditional, 289 open, meaningful and equal internet, which guarantees rights rather 290 than restricts them [FPI]. As some bodies have always been subject 291 to social and cultural surveillance and violence because of their 292 gender and sexuallity, their access to internet will not be satisfied 293 with connected devices, but with safety and useful digital 294 enviroments [SmKee]. 296 Harms: Restricted connectivity. i.e. Middleboxes (which can be 297 Content Delivery Networks, Firewalls, NATs or other intermediary 298 nodes that provide 'services'besides routing). TODO 300 Related protocols: The end-to-end principle is important for the 301 robustness of the network and innovation (RFC1958); Content 302 agnosticism: Treating network traffic identically regardless of 303 content. 305 Related rights: Freedom of expression, freedom of association. 307 3.1.2. Access to information 309 Women and queer people have traditionally had restricted their 310 reproductive and sexual rights. Today their rights are resticted in 311 different levels and qualities in differents countries and regions. 312 It is necessary to guarantee access to relevant information related 313 to sexual and reproductive health and rights, pleasure, safe 314 abortion, access to justice, and LGBTIQ+ issues. 316 Harms: Some goverments and ISPs block pages with this content or 317 monitor online activity by sexual and gender related terminology. 318 Therefore the considerations for anticensorship internet 319 infrastructure technologies also consider, and can possibly 320 alleviate, a gendered component to using the internet. 322 TODO. Blocked sites, Monitoring by content, identify users by IP or 323 type of traffic. 325 Related protocols: Information in one's own language is the first 326 condition, as pointed out with the cencept of 'Localization' 327 [RFC8280], referred to the act of tailoring an application for a 328 different language, script, or culture, and involves not only 329 changing the language interaction but also other relevant changes, 330 such as display of numbers, dates, currency, and so on. 332 TODO. Content agnosticism: Treating network traffic identically 333 regardless of content (but it refers to header content). Censorship 334 resistance. 336 Related rights: FoE, FoA, Right to political participation, Right to 337 participate in cultural life, arts and science. 339 3.1.3. Usage of technology 341 Beyond content, access implies the possibility to use, which means 342 code, design, adapt and critically and sustainably use ICTs. Even 343 though almost 75% of connected individuals are placed in the Global 344 South [WhoseKnowledge], technology is developped mainly in rich 345 countries where student quotas and jobs are filled mainly by men. 347 However, there is still a long way to go in terms of inclusion of 348 more diverse populations in the spaces of technology development and 349 definition of protocoles and standards for the internet 350 infrastructure [RFC7704]. Building and engineering critical internet 351 technology is a component of 'usage' [Knodel], one which chllenges 352 challenge the cultures of sexism and discrimination. 354 Harms: Gender and race bian in algorithms, digital gender gap. 355 Necessary to know the charset, gap. The presence of gendered 356 subjects in the IETF RFCs and drafts archive demonstrates stereotyped 357 male and feminine roles. 359 Related protocols: The concept of 'Internationalization' [RFC6365] 360 refers to the practice of making protocols, standards, and 361 implementations usable in different languages. This is a first step 362 to democratize the development of technology, allowing its 363 implementation in non-English-speaking countries. 365 TODO. [RFC5646] descentralization, reliability. Adaptability 366 (permissionless innovation). 368 Related rights: Right to participate in cultural life, arts and 369 science 371 3.2. Networked 373 In contexts where women do not have their rights fully guaranteed, or 374 where sexual and gender diversity are socially condemned, the Web has 375 served to meet, organize and resist. With the popularization of the 376 internet, the freedom of expression of both women and other gender 377 identities traditionally marginalized from public life and social 378 acceptance (whom we refer to as queer) has been greatly enhanced. 380 By adding content in formats like text, audio and video, these groups 381 have been able to connect with each other, as well as open spaces for 382 discussion and visibility of topics that previously seemed vetoed. 383 The web has become a space for activism, reclamation and protest 384 against injustice and gender inequality. It has allowed the 385 construction of international networks of solidarity, support and 386 mobilization, and with this, the strengthening of feminism and other 387 movements that fight for equal rights and for a fair recognition of 388 difference. 390 3.2.1. Resistance 392 The internet is a space where social norms are negotiated, performed 393 and imposed. For users it increasingly functions as an extension of 394 offline spaces shaped by patriarchy and heteronormativity. Disident 395 content as well as widely accepted norms and values should have the 396 same possibilities to be added, flow and stay on the net. 398 Harms: content blocking, content monitoring and identification, 399 traffic monitoring 401 Related to protocols: Integrity 403 Related rights: Freedom of expression, Freedom of association. 405 3.2.2. Movement building 407 Given the shrinking of civic space offline, the internet provides a 408 global public space, albeit one that relies on private infrastructure 409 [tenOever]. For social causes that push for equality, it is 410 therefore critical that the internet be maintained as a space for 411 alignment, protest, dissent and escape. In the scope of this 412 document, this is a call to maintain and enable the creation of 413 spaces for sustained feminist movement building. Ihe internet 414 provides new and novel ways for communities to come together across 415 borders and without limits of geolocation. 417 Harms: However this positive aspect of internet communications is 418 threatened by centralised systems of control and cooptation, 419 specifically surveillance and other online repression. 421 Related protocols: Association of system architectures is a concept 422 that overlaps neatly with the ideals of real-world associations of 423 organisations and communities. "The ultimate model of P2P is a 424 completely decentralized system, which is more resistant to speech 425 regulation, immune to single points of failure and have a higher 426 performance and scalability [tenOever]." It can be descussed in 427 terms of intersectionailty and what we mentioned about 'different 428 dimensions of freedom'. Maybe the 'solution' is not only P2P because 429 it doesn't take into account different distances from and capacities 430 related to this technology, maybe mixed with another feature?. 431 Integrity. 433 Related rights: Elements of freedom of assocation as explained in the 434 UDHR include individual and collective rights to privacy and 435 anonymity, as discussed in more detail below. 437 3.2.3. Internet governance 439 It is critical for groups who represent civil society interests, 440 social change and the larger public interest to challenge processes 441 and institutions that govern the internet. This requires the 442 inclusion of more feminists and queers at the decision-making table, 443 which can be achieved through democratic policy making. Greater 444 effect will be possible through diffuse ownership of and power in 445 global and local networks. 447 Harms: Gender gap 449 Related to protocols: While there is no agreement regarding the 450 ability of the internet to negatively or positively impact on social 451 behaviors, or shape desirable practices [RFC8280], more women and 452 diverse populations' participation in technical development and 453 decision-making spaces will lead to greater possibilities for ICTs to 454 reflect greater inclusiveness and enable less risky and harmful 455 interactions [RFC7704]. 457 Related rights: Right to participate in cultural life, arts and 458 science 460 3.3. Economy 462 From a feminist perspective, it is necessary to achieve the promise 463 of an internet that facilitates economic cooperation and 464 collaboration. One internet that can challenge models of economic 465 inequality and transcend into other forms where women and queer 466 people are not relegated or in economic dependence. 468 3.3.1. Business models 470 Interrogating the capitalist logic that drives technology towards 471 further privatisation, profit and corporate control implies open 472 discussions on centralisation of services and the logic of vertical 473 integration while holding nuance for the tensions between trust, 474 reliability and diversity. 476 Alternative forms of economic power can be grounded in principles of 477 cooperation, solidarity, commons, environmental sustainability and 478 openness. 480 Harms: TODO 482 Related protocols: Centralisation of services is a current discussion 483 in the IETF that should be informed by feminist critique of 484 capitalist structures [Arkko]. End user centered; W3C, 485 descentralization. 487 Related rights: TODO 489 3.3.2. Open source 491 The digital gender gap has relegated women and other marginalized 492 groups to be internet users, adding content for the benefit of the 493 platforms themselves but without a deep understanding of how these 494 platforms work. This requires shared terminology upon which 495 technology is created to enable experimentation and values exchange. 496 Not only that, but documenting, promoting, disseminating, and sharing 497 knowledge about technology is at the heart of the long-standing free 498 software community's ethos. This aligns with a feminist approach to 499 technology. 501 Given the established community of "free software", it is important 502 to note that freedom is not freedom for everyone, always. It is 503 important to identify different dimensions of freedom and how it is 504 expressed in different contexts. 506 Harms: TODO 508 Related protocols: Promoting transparency [RFC8280] and simplifying 509 technical terminology is necessary to bridge this gap. 510 Interoperabiliy, Open standards are important as they allow for 511 permissionless innovation. Freedom and ability to freely create and 512 deploy new protocols on top of the communications constructs that 513 currently exist. Open standards. 515 Related rights: Right to participate in cultural life, arts and 516 science 518 3.4. Expression 519 3.4.1. Amplify 521 The state, the religious right and other extremist forces who 522 monopolise discourses of morality have traditionally silence women's 523 voices and continue to silence feminist voices and persecute women's 524 human rights defenders. 526 Harms: Blocking and monitoring content, identifiyng site owners, 527 manipulating indexed content on search engines, Trolling, coordinated 528 attackes (DoS and DDoS). 530 Related protocols: Content agnosticism: Treating network traffic 531 identically regardless of content, anti censorship. 533 Related rights: Freedom of expression, Freedom of association, Access 534 to information 536 3.4.2. Expression 538 The political expression of gender has not been limited to voices, 539 but has made use of the body and its representation. However, the 540 use of body as a form of political expression on the internet implies 541 a series of risks and vulnerabilities for the people involved in 542 these movements, especially if they do not understand how internet 543 technology works. 545 Harms: Surveillance, content regulations or restrictions, content 546 blocking. 548 Related protocols: Confidentiality, keeping data secret from 549 unintended listeners [BCP72]. Data protection [RFC1984]. Encryption 551 Related rights: Freedom of expression 553 3.4.3. Pornography 555 Women's sexual expression online is socially condemned and punushed 556 with online gender based violence. On the other hand, queer people 557 online sexuality is usually labeld as "harmful content". These 558 practices evidence how overcontrolled are gendered bodies and tend to 559 confuse the differences between sexual expression and pornography. 561 Users build their own public digital identities while using private 562 communications to disseminate information, explore their sexuality in 563 text, image and video, share their initmity with others. Pornography 564 online, on the other hand, has to do with agency, consent, power and 565 labour. 567 Harms: In internet-connected devices, it has become much easier to 568 mix leisure and work, which implies different risks for users. 570 Related protocols: [RFC3675] 572 Related rights: Freedom of expression 574 4. Embodiment 576 Most of the threats women and queer people face on line, occur on the 577 user levels of application and content. Most adversaries are other 578 users, but also include institutions, platforms and governments. 580 For a long time, perhaps since the internet became popular, its use 581 ceased to be a functional matter and became emotional. The access to 582 chat rooms to connect with people at huge distances, the possibility 583 of having personal e-mails, the appearance of social networks to 584 share music, photos and then video, determined not only the social 585 use of a new tool but also the configuration of digital 586 sensitivities, understood by some as sensory extensions of the body. 588 The internet connections embedded have also meant a radical 589 transformation in the way people access the internet. Much more, 590 considering that today most internet connections, especially in the 591 global south, are mobile connections. 593 Sharing personal information, and often sensitive data, through 594 platforms that are synchronized with email accounts and other 595 platforms where information considered non-sensitive is published, 596 implies losing control over such information. Much more, considering 597 that each platform hosts the information of its users according to 598 their own terms and conditions in the treatment of data. For women 599 and other groups marginalized by race or gender, these risks are 600 greater. 602 Just as the internet connection can be considered an extension of the 603 body, social problems such as discrimination and exclusion have been 604 projected into the digital environment- sometimes intensified, 605 sometimes reconfigured. And once again, women, queers, racialized 606 people are the most vulnerable. Most of the threats they face on 607 line, occur in the user level. Most of their "adversaries" are other 608 users, who also act at the user level, with technical or social 609 skills that threaten participation and expressions. Institutions, 610 platforms and governments who are adversarial have great advantage. 612 At this point, what level of autonomy do these people have as 613 internet users? 615 4.1. Consent 617 Some elements of consent online include but are not limited to the 618 following list of issues, which should be elaborated on: 620 - Data protection * Exposure of personal data 622 - Culture, design, policies and terms of service of internet 623 platforms 625 - Agency lies in informed decisions * Real name policies 627 - Public versus private information * Dissemination of personal or 628 intimate information * Exposure of intimacy * Unauthorized use of 629 photos 631 Harms: TODO 633 Related protocols: TODO 635 Related rights: TODO 637 4.1.1. Privacy and data 639 While mentioned at the intersection of previous issues outlined 640 above, this section is particularly critical for women, queers and 641 marginalised populations who are already at greater risk of control 642 and surveillance: 644 - Right to privacy 646 - Data protection 648 - Profit models 650 - Surveillance and patriarchy by states, individuals, private 651 sector, etc. Those that enable surveillance, eg spouseware. 653 Harms: TODO 655 Related protocols: TODO 657 Related rights: TODO 659 4.1.2. Memory 661 One's consent and control of the information that is available to 662 them and about them online is a key aspect of being a fully empowered 663 individual and community in the digital age. There are several 664 considerations that deserve deeper inspection, such as: 666 - Right to be forgotten 668 - Control over personal history and memory on the internet 670 - Access all our personal data and information online 672 - Delete forever 674 Harms: TODO 676 Related protocols: TODO 678 Related rights: TODO 680 4.1.3. Anonymity 682 While anonymity is never just about technical issues but users 683 protection activities, it becomes more necessary to strenghten the 684 design and functionality of networks, by default. There are several 685 considerations for internet infrastructure related to enabling 686 anonymity for online users. This is particularly important for 687 marginalised groups and can be ennumerated, and expanded upon, 688 thusly: 690 - Right to anonymity 692 - Enables other rights like freedom of expression * Censorship * 693 Defamation, descredit * Affectations to expression channels 695 - Breaking social taboos and heteronormativity * Hate Speech, 696 discriminatory expressions 698 - Discrimination and safety from discrimination 700 Harms: TODO 702 Related protocols: TODO 704 Related rights: TODO 706 4.1.4. Children 708 TODO 710 Harms: TODO 712 Related protocols: TODO 714 Related rights: TODO 716 4.2. Online violence 718 Where women and queer people have traditionally been marginalized, 719 their participation in the internet is rejected through different 720 forms of violence by other users, as well as institutions, platforms 721 and governments. But the effects of these violences, which are 722 nothing more than extensions of the traditional violence that these 723 groups and individuals face in social life, increase to the extent 724 that there is not enough technical knowledge to neutralize them, and 725 this is the case of most people who struggle for the recognition of 726 their gender difference. 728 The security considerations to counter online violence are critical. 729 There is opportunity in a connected world for those who would 730 perpetuate violence against women and other marginalised groups 731 through the use of internet-enabled technologies, from the home to 732 the prison. 734 Privacy is a critical component of security for populations at risk. 735 The control of information is linked to privacy. Where some would 736 like privacy in order to live privately, others need privacy in order 737 to access information and circumvent censorship and surveillance. 738 The protection of privacy is critical for those at risk to prevent 739 vicimisation through extortion, doxxing, and myriad other threats. 740 Lack of privacy leads to risks such as stalking, monitoring and 741 persistent harrassment. 743 While making public otherwise private details about a person can 744 consitute a form of abuse, the converse is also a risk: Being erased 745 from society or having one's online identity controlled by another is 746 a form of control and manipulation. Censorship, misinformation and 747 coersion may consitute violence online. Other forms of non- 748 consensual manipulation of online content includes platform "real 749 name policies", sharing of intimate images and sexual abuse, 750 spreading false accusations, flamming and other tactics. 752 Key to mitigating these threats is the element of consent. 754 Harms: TODO 756 Related protocols: TODO 758 Related rights: TODO 760 5. References not yet referenced 762 In plain sight, on sexuality, rights and the internet in India, Nepal 763 and Sri Lanka https://www.genderit.org/articles/plain-sight- 764 sexuality-rights-and-internet-india-nepal-and-sri-lanka 766 Human Rights and Internet Protocols: Comparing Processes and 767 Principles https://www.apc.org/sites/default/files/ 768 ISSUE_human_rights_2.pdf 770 Principles of Unity for Infraestructuras Feministas 771 https://pad.kefir.red/p/infraestucturas-feministas Feminist 773 Principles of the Internet https://feministinternet.org The UX Guide 774 to Getting Consent https://iapp.org/resources/article/the-ux-guide- 775 to-getting-consent 777 From steel to skin https://fermentos.kefir.red/english/aco-pele 778 Responsible Data https://responsibledata.io 780 Impact for what and for whom? Digital technologies and feminist 781 movement building internet https://www.genderit.org/feminist-talk/ 782 impact-what-and-whom-digital-technologies-and-feminist-movement- 783 building 785 Design Justice https://docs.google.com/presentation/ 786 d/1J3ZWBgxe0QFQ8OmUr-QzE6Be8k_sI7XF0VWu4wfMIVM/ 787 edit#slide=id.gcad8d6cb9_0_198 789 Design Action Collective Points of Unity 790 https://designaction.org/about/points-of-unity 792 CODING RIGHTS; INTERNETLAB. Violencias de genero na internet: 793 diagnostico, solucoes e desafios. Contribuicao conjunta do Brasil 794 para a relatora especial da ONU sobre violencia contra a mulher. Sao 795 Paulo, 2017. https://www.codingrights.org/wp-content/uploads/2017/11/ 796 Relatorio_ViolenciaGenero_v061.pdf 798 Barrera, L. y Rodriguez, C. La violencia en linea contra las mujeres 799 en Mexico. Informe para la Relatora sobre Violencia contra las 800 Mujeres Ms. Dubravka Šimonović. 2017. 802 https://luchadoras.mx/wp-content/uploads/2017/12/ 803 Informe_ViolenciaEnLineaMexico_InternetEsNuestra.pdf 805 Sephard, N. Big Data and Sexual Surveillance. APC issue papers. 806 2016. https://www.apc.org/sites/default/files/ 807 BigDataSexualSurveillance_0_0.pdf 809 6. Security Considerations 811 As this document concerns a research document, there are no security 812 considerations. 814 7. IANA Considerations 816 This document has no actions for IANA. 818 Crenshaw, K. (2018). Demarginalizing the Intersection of Race and 819 Sex: A Black Feminist Critique of Antidiscrimination Doctrine, 820 Feminist Theory, and Antiracist Politics [1989]. In K. T. Bartlett 821 & R. Kennedy (Eds.), Feminist Legal Theory (1st ed., pp. 57-80; By 822 K. Bartlett). https://doi.org/10.4324/9780429500480-5 824 8. Informative References 826 [Arkko] Arkko, J., "Considerations on Internet Consolidation and 827 the Internet Architecture.", 2018, 828 . 831 [BCP72] IETF, "Guidelines for Writing RFC Text on Security 832 Considerations", 2003, 833 . 835 [Collins] Collins, P., "Black Feminist Thought: Knowledge, 836 consciousness and the politics of empowerment.", 2000. 838 [Comninos] 839 Alex Comninos, ., "A cyber security Agenda for civil 840 society: What is at stake?", 2013, 841 . 844 [Crenshaw] 845 Crenshaw, K., "Demarginalizing the Intersection of Race 846 and Sex: A Black Feminist Critique of Antidiscrimination 847 Doctrine, Feminist Theory, and Antiracist Politics.", 848 1989, . 850 [Davis] Davis, ., "unknown.", n.d.. 852 [FPI] "The Feminist Principles of the Internet.", 2015, 853 . 855 [Hankivsky] 856 Hankivsky, O., "Intersectionality 101.", 2014, 857 . 860 [ITU] International Telecommunications Union (ITU), 861 "Statisctics. Global, Regional and Country ICT Data.", 862 2018, . 865 [Knodel] Knodel, M. and N. ten Oever, "Terminology, Power and 866 Offensive Language.", 2018, 867 . 870 [Lorde] Lorde, ., "unknown.", n.d.. 872 [Mason] Mason, C., "Leading at the Intersections: An Introduction 873 to the Intersectional Approach Model for Policy and Social 874 Change.", 2010. 876 [RFC1244] Holbrook, J. and J. Reynolds, "Site Security Handbook", 877 RFC 1244, DOI 10.17487/RFC1244, July 1991, 878 . 880 [RFC1746] Manning, B. and D. Perkins, "Ways to Define User 881 Expectations", RFC 1746, DOI 10.17487/RFC1746, December 882 1994, . 884 [RFC1941] Sellers, J. and J. Robichaux, "Frequently Asked Questions 885 for Schools", FYI 22, RFC 1941, DOI 10.17487/RFC1941, May 886 1996, . 888 [RFC1984] IAB and IESG, "IAB and IESG Statement on Cryptographic 889 Technology and the Internet", BCP 200, RFC 1984, 890 DOI 10.17487/RFC1984, August 1996, 891 . 893 [RFC2122] Mavrakis, D., Layec, H., and K. Kartmann, "VEMMI URL 894 Specification", RFC 2122, DOI 10.17487/RFC2122, March 895 1997, . 897 [RFC2310] Holtman, K., "The Safe Response Header Field", RFC 2310, 898 DOI 10.17487/RFC2310, April 1998, 899 . 901 [RFC3675] Eastlake 3rd, D., ".sex Considered Dangerous", RFC 3675, 902 DOI 10.17487/RFC3675, February 2004, 903 . 905 [RFC3694] Danley, M., Mulligan, D., Morris, J., and J. Peterson, 906 "Threat Analysis of the Geopriv Protocol", RFC 3694, 907 DOI 10.17487/RFC3694, February 2004, 908 . 910 [RFC4949] Shirey, R., "Internet Security Glossary, Version 2", 911 FYI 36, RFC 4949, DOI 10.17487/RFC4949, August 2007, 912 . 914 [RFC5646] Phillips, A., Ed. and M. Davis, Ed., "Tags for Identifying 915 Languages", BCP 47, RFC 5646, DOI 10.17487/RFC5646, 916 September 2009, . 918 [RFC6365] Hoffman, P. and J. Klensin, "Terminology Used in 919 Internationalization in the IETF", BCP 166, RFC 6365, 920 DOI 10.17487/RFC6365, September 2011, 921 . 923 [RFC7704] Crocker, D. and N. Clark, "An IETF with Much Diversity and 924 Professional Conduct", RFC 7704, DOI 10.17487/RFC7704, 925 November 2015, . 927 [RFC8280] ten Oever, N. and C. Cath, "Research into Human Rights 928 Protocol Considerations", RFC 8280, DOI 10.17487/RFC8280, 929 October 2017, . 931 [SmKee] Jac Sm Kee, ., "Imagine a Feminist Internet.", 2018, 932 . 934 [Symington] 935 Symington, A., "Intersectionality: a Tool for Gender and 936 Economic Justice.", 2004, 937 . 940 [Tao] Internet Engineering Task Force, "The Tao of the IETF.", 941 n.d., . 943 [tenOever] 944 ten Oever, N., "Freedom of Association on the Internet.", 945 2017, . 948 [UNGA] United Nations General Assembly, "The promotion, 949 protection and enjoyment of human rights on the 950 Internet.", 2012, . 954 [WebFoundation] 955 Web Foundation, "Advancing Women's Rights Online: Gaps and 956 Opportunities in Policy and Research.", 2018, 957 . 961 [WhoseKnowledge] 962 Whose Knowledge, "Decolonizing the Internet, Summary 963 Report.", 2018, . 966 Authors' Addresses 968 Juliana Guerra 969 Derechos Digitales 971 EMail: juliana@derechosdigitales.org 973 Mallory Knodel 974 ARTICLE 19 976 EMail: mallory@article19.org