<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.22 (Ruby 3.1.3) -->
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc compact="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-nottingham-avoiding-internet-centralization-09" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.16.0 -->
  <front>
    <title abbrev="Internet Centralization and Standards">Internet Centralization: What Can Standards Do?</title>
    <seriesInfo name="Internet-Draft" value="draft-nottingham-avoiding-internet-centralization-09"/>
    <author initials="M." surname="Nottingham" fullname="Mark Nottingham">
      <organization/>
      <address>
        <postal>
          <postalLine>Prahran</postalLine>
          <postalLine>Australia</postalLine>
        </postal>
        <email>mnot@mnot.net</email>
        <uri>https://www.mnot.net/</uri>
      </address>
    </author>
    <date/>
    <area>General</area>
    <keyword>governance</keyword>
    <abstract>
      <t>Despite the Internet being designed and operated as a decentralized network-of-networks, forces often (and increasingly) encourage consolidation of power over its functions into few hands.</t>
      <t>This document discusses centralization in Internet protocols and relates it to consolidation of power, explains why both are undesirable, identifies forces that contribute to them, catalogues limitations of common approaches to decentralization, and explores what Internet standards efforts can do.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-nottingham-avoiding-internet-centralization/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/mnot/avoiding-internet-centralization"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>The Internet has succeeded in no small part because of its purposeful avoidance of any single controlling entity. While originating in a desire to prevent a single technical failure from having a wide impact <xref target="RAND"/>, this stance has also enabled the Internet’s rapid adoption and broad spread. The Internet can accommodate a spectrum of requirements and is now a global public good because permission is not required to connect to it, deploy an application on it, or use it for a particular purpose.</t>
      <t>While maintaining these properties remains a widely shared goal, consistently achieving them has proven more difficult over time. Today, many successful services operate in a centralized fashion -- to the point where some proprietary applications have become so well-known that they are commonly mistaken for the Internet itself. Even when open protocols incorporate techniques intended to prevent consolidation, economic and social factors can drive users to prefer solutions built with or on top of supposedly decentralized technology.</t>
      <t>These difficulties call into question what role architectural design -- in particular, that overseen by open standards bodies such as the IETF -- should play in preventing, mitigating, and controlling consolidation of power on the Internet. This document discusses aspects of centralization that relate to Internet standards efforts, and argues that while the IETF may not be able to prevent these outcomes, there are still meaningful steps it can take to help counteract them.</t>
      <t><xref target="centralization"/> defines centralization and consolidation, explains why and when they are undesirable, and surveys how they occur on the Internet. <xref target="decentralization"/> explores decentralization and highlights some relevant techniques, along with their limitations. Finally, <xref target="considerations"/> considers the role that Internet standards play in avoiding centralization and mitigating its effects.</t>
      <t>The primary audience for this document is the engineers who design and standardize Internet protocols. However, designers of proprietary protocols and applications can benefit from considering these issues, especially if they intend their work to be considered for eventual standardization. Likewise, policymakers can use this document to help identify and evaluate proposed remedies for inappropriately centralized protocols and applications.</t>
    </section>
    <section anchor="centralization">
      <name>Centralization and Consolidation</name>
      <t>This document distinguishes "consolidation" from "centralization" to separate effects from (some of) their causes.</t>
      <t>"Consolidation" is the ability of a single entity or a small group of them to exclusively observe, capture, control, or extract rent from the operation or use of an Internet function.</t>
      <t>Here, "entity" could be a single person, a corporation, or a government. It does not include an organization that operates in a manner that effectively mitigates consolidation (see, e.g., <xref target="multi"/>).</t>
      <t>"Internet function" is used broadly in this document. It might be an enabling protocol already defined by standards, such as IP <xref target="RFC791"/>, BGP <xref target="RFC4271"/>, TCP <xref target="RFC793"/>, or HTTP <xref target="HTTP"/>. It might also be a proposal for a new enabling protocol, or an extension to an existing one.</t>
      <t>Furthermore, Internet functions are not limited to standards-defined protocols. User-visible applications built on top of standard protocols are also vulnerable to consolidation -- for example, social networking, file sharing, financial services, and news dissemination. Likewise,  networking equipment, hardware, operating systems, and software act as enabling technologies that can exhibit consolidation. The supply of Internet connectivity to end users in a particular area or situation can also be subject to consolidation, as can the supply of transit between networks (so called "Tier 1" networks).</t>
      <t>"Centralization" is the source of consolidation that this document focuses upon; it measures the direct or potential contribution of a function's technical design to consolidation. For example, many consider the social networking market to be highly consolidated around a few providers who have used highly centralized architectures (see <xref target="direct"/>) to reinforce their control.</t>
      <t>Centralization is not a binary condition; a function's design might contribute to or be vulnerable to consolidation in multiple ways and in various degrees. Even when decentralization techniques are purposefully used to avoid centralization in a particular aspect of a function, it often appears in other places -- for example, in its governance, implementation, deployment, or in ancillary functions. In summary, "decentralized technology alone does not guarantee decentralized outcomes." <xref target="SCHNEIDER"/> Therefore, we need a more nuanced way to asess it.</t>
      <section anchor="why">
        <name>Assessing Centralization</name>
        <t>By default, Internet protocol designers will avoid an obviously centralized design because the Internet's very nature is incompatible with it. As a "large, heterogeneous collection of interconnected systems" <xref target="BCP95"/> the Internet is often characterised as a "network of networks". These networks relate as peers who agree to facilitate communication, rather than having a relationship of subservience to others' requirements or coercion by them. This focus on independence of action carries through the way the network is architected -- for example, in the concept of an "autonomous system".</t>
        <t>However, as discussed below in <xref target="necessary"/>, not all centralization is avoidable, and in some cases, it is even desirable. With that in mind, centralization on the Internet is most concerning when it is not broadly held to be necessary, when it has no checks, balances, or other mechanisms of accountability, when it selects "favorites" which are difficult (or impossible) to displace, and when it threatens to diminish the success factors that enable the Internet to thrive -- scalability to meet the demands of new users, adaptability to encompass new applications, flexibility to enable deployment of new technologies, and resilience to shocks and changes <xref target="SUCCESS"/>.</t>
        <t>Most often, unacceptable centralization is indicated when a proposal has one or more of the following damaging effects (or the potential for them):</t>
        <ul spacing="normal">
          <li>
            <em>Power Imbalance</em>: When a third party has unavoidable access to communications, the informational and positional advantages gained allow observation of behavior (the "panopticon effect") and shaping or even denial of behavior (the "chokepoint effect") <xref target="INTERMEDIARY-INFLUENCE"/> -- capabilities that those parties (or the states that have authority over them) can use for coercive ends <xref target="INTERDEPENDENCE"/> or even to disrupt society itself. Just as good governance of states requires separation of powers <xref target="FEDERALIST-51"/>, so too does good governance of the Internet require that power not be concentrated in one place without appropriate checks and balances.</li>
          <li>
            <em>Limits on Innovation</em>: Consolidation can preclude the possibility of "permissionless innovation" -- the ability to deploy new, unforeseen applications without requiring coordination with parties other than those you are communicating with.</li>
          <li>
            <em>Constraints on Competition</em>: The Internet and its users benefit from robust competition when applications and services are available from many providers -- especially when those users can build their own applications and services based upon interoperable standards. When a consolidated service or platform must be used because no substitutes are suitable, it effectively becomes an essential facility, which encourages abuse of power.</li>
          <li>
            <em>Reduced Availability</em>: Availability of the Internet (and applications and services built upon it) improves when there are many ways to obtain access. While service availability can benefit from the focused attention of a large consolidated provider, that provider's failure can have a disproportionate impact on availability.</li>
          <li>
            <em>Monoculture</em>: The scale available to a consolidated provider can magnify minor flaws in features to a degree that can have broad consequences. For example, a single codebase for routers elevates the impact of a bug or vulnerability; a single recommendation algorithm for content can have severe social impact. Diversity in functions' implementation leads to a more robust outcome when viewed systemically, because "progress is the outcome of a trial-and-error evolutionary process of many agents interacting freely." <xref target="POLYCENTRIC"/></li>
          <li>
            <em>Self-Reinforcement</em>: As widely noted (see, e.g., <xref target="ACCESS"/>), a consolidated provider's access to data allows it the opportunity to make improvements to its offerings, while denying such access to others.</li>
        </ul>
        <t>However, these are only indicators, and each needs to be evaluated carefully on a case-by-case basis.</t>
        <t>For example, it is important to distinguish centralization from anticompetitive concerns (also known as "antitrust"). While there are many interactions between these concepts and making the Internet more competitive may be a motivation for avoiding consolidation, only courts (and sometimes, regulators) have the authority to define a relevant market and determine that behavior is anti-competitive. Furthermore, what might be considered undesirable consolidation by the technical community might not attract competition regulation. Conversely, what might attract competition regulation might not be of great concern to the technical community if other mitigations are felt to be adequate.</t>
        <t>Likewise, while centralization interacts with availability, they are distinct and any relationship between them cannot be assumed without careful analysis of where and how centralization occurs. Centralized systems might be more available because of factors like the resources available to them, but also have greater impact when they encounter a fault; decentralized systems might be more resilient in the face of local failures, but less able to react to systemic issues. A failure because of a cut cable, power outage, or failed server is qualitatively different from the issues encountered when a core Internet function has a gatekeeper.</t>
        <t>For example, a large variety of Web sites might depend upon a cloud hosting provider or content delivery network; if it were to become unavailable (whether for technical or other reasons), many people's experience of the Internet might be disrupted. Likewise, a mobile Internet access provider might have an outage that affects hundreds, thousands, or more of its users. In both cases, centralization is not indicated by the loss of availability or its scale, but it well might be if the parties relying on the function don't have reasonable options to switch to if they are unhappy with the availability of the service provided, or if friction against switching to an alternative is too great.</t>
      </section>
      <section anchor="kinds">
        <name>How Centralization Occurs</name>
        <t>A function's design can exhibit and encourage centralization in a variety of ways. The subsections below describe different contributors to and expressions of centralization in Internet functions. Note that this is not a taxonomy, in that it is not complete and there may be overlap.</t>
        <section anchor="direct">
          <name>Proprietary Centralization</name>
          <t>Creating of a protocol or application with a fixed role for a specific party is the most obvious form of centralization. Many messaging, videoconferencing, chat, social networking, and similar applications currently operate in this fashion.</t>
          <t>Because they allow control by a single entity, proprietary protocols are often considered simpler to design, more amenable to evolution, and more likely to meet user needs <xref target="MOXIE"/>, compared to decentralized alternatives. However, their centralization is absolute -- if the function has no alternative providers, or switching to those providers is too difficult, its users are "locked in."</t>
          <t>Proprietary protocols and applications are not considered as being part of the Internet per se; instead, they are more properly characterized as being built on top of the Internet. The Internet architecture and associated standards do not control them, beyond the constraints that the underlying protocols (e.g., TCP, IP, HTTP) impose.</t>
        </section>
        <section anchor="necessary">
          <name>Beneficial Centralization</name>
          <t>Some protocols and applications have goals that require centralization, because they rely on it to deliver a particular benefit.</t>
          <t>Often, this is due to technical necessity. For example, a single, globally coordinated “source of truth” is by nature centralized -- such as in the Domain Name System (DNS), which allows human-friendly naming to be converted into network addresses in a globally consistent fashion.</t>
          <t>Or, consider IP addresses allocation. Internet routing requires addresses to be allocated uniquely, but if a single government or company were to capture the addressing function, the entire Internet would be at risk of abuse by that entity. The same benefits and risks can be seen in the Web's trust model, thanks to the Certificate Authority's role in communication between clients and servers</t>
          <t>Protocols that need to solve the "rendezvous problem" to coordinate communication between two parties who are not in direct contact also exhibit beneficial centralization. For example, chat protocols need to coordinate communication between two parties that wish to talk; while the actual communication can be direct between them (so long as the protocol facilitates that), the endpoints' mutual discovery typically requires a third party at some point. From the perspective of those two users, the rendezvous function is centralized.</t>
          <t>Even when not strictly necessary, centralization can be deployed to beneficial ends. <xref target="AMBITION"/> notes that "centralized structures can have virtues, such as enabling publics to focus their limited attention for oversight, or forming a power bloc capable of challenging less-accountable blocs that might emerge. Centralized structures that have earned widespread respect in recent centuries – including governments, corporations, and nonprofit organizations – have done so in no small part because of the intentional design that went into those structures."</t>
          <t>For example, when traffic from many users is mixed in a way that can't be distinguished, censorship becomes more difficult. This "too big to block" phenomenon drives the design of many recent protocols (such as <xref target="ECH"/>), but they require a degree of centralization to meet their goals.</t>
          <t>Likewise, when a function requires governance to realize common goals and protect minority interests, a "choke point" is naturally formed by the chosen governance mechanism, increasing centralization. For example, content moderation functions concentrate decision making to impose community values. Complex and risky functions like financial services (e.g., credit card processing) can be seen as beneficially centralized into relatively few, specialized organizations, where they can received the focused attention that they require.</t>
          <t>When beneficial centralization is present, Internet protocols often attempt to mitigate the associated risks using measures such as federation (see <xref target="federation"/>) or multi-stakeholder governance (see <xref target="multi"/>). Protocols that successfully do so are often reused to avoid the considerable cost and risk of re-implementing those mitigations. For example, if a protocol requires a coordinated, global naming function, reusing the Domain Name System is usually preferable to establishing a new system.</t>
          <t>Ultimately, deciding what is beneficial is a judgment call. Some protocols cannot function without a centralized function; others might be significantly enhanced for certain use cases if a function is centralized, or might merely be more efficient. Such judgments should be made in light of established architectural principles and how benefits accrue to end users.</t>
        </section>
        <section anchor="indirect">
          <name>Concentration</name>
          <t>Even when a function avoids or mitigates other forms of centralization, it might become consolidated in practice when external factors influence its deployment, so that few or even just one entity provides the function. This document refers to this phenomenon as "concentration."
Concentration can be caused by economic, legal, social, and even cognitive factors that encourage use of a central function despite the absence of such a requirement in the protocol itself.</t>
          <t>Concentration is often associated with the network effects that are so often seen on the Internet. While in theory every node on the Internet is equal, in practice some nodes are much more connected than others: for example, just a few sites drive much of the traffic on the Web. While expected and observed in many kinds of networks, these effects award asymmetric power to nodes that act as intermediaries to communication. <xref target="SCALE-FREE"/></t>
          <t>There may be legitimate qualitative reasons for some nodes being favoured over others. However, when it happens because friction against using an alternative prevents switching, benefits are accrued to services rather than users. If choosing an alternate provider requires a significant amount of time, resources, expertise, coordination, loss of functionality, or effort, centralization is indicated.</t>
          <t>Conversely, a function based on a well-defined, open specification designed to minimize switching costs might be considered to have less centralization even when users continue to favor large providers, because ease of switching creates implicit competitive pressure upon them.</t>
          <t>For example, social networking is an application that is currently supplied by a few proprietary platforms despite standardization efforts (see, e.g., <xref target="ACTIVITYSTREAMS"/>), because of the powerful network effects associated. While there has been some competition in social networking, the choices that their peers make often restricts individual choices, because of the coordination required to move to a new service.</t>
          <t>See <xref target="ISOC"/> for a deeper exploration of concentration.</t>
          <t>Concentration is difficult to avoid in protocol design, and federated protocols are particularly vulnerable to it (see <xref target="federation"/>).</t>
        </section>
        <section anchor="network">
          <name>Inherited Centralization</name>
          <t>Most Internet protocols and applications depend on other, "lower-layer" functions and their implementations. The features, deployment, and operation of these dependencies can surface centralization into functions and applications built "on top" of them.</t>
          <t>For example, the network between endpoints can introduce this kind of centralization to application-layer protocols because it is necessary for communication and therefore has power over it. A network might block access to, slow down, or change the content of various application protocols or specific services for financial, political, operational, or criminal reasons, thereby creating a disincentive (or even removing the ability) to use them. By selectively hindering the use of some services but not others, network interventions can be composed to aid concentration in those other services -- intentionally or not.</t>
          <t>Likewise, having only a single implementation of a protocol is a form of inherited centralization, because applications that use it are vulnerable to the control it has over their operation. Even Open Source projects can exhibit this if there are factors that make forking difficult (for example, the cost of maintaining that fork).</t>
          <t>Inherited centralization surfaces when viable alternatives to these dependencies are not available. It is often present when network effects restrict choices, but can also be created by legal mandates and incentives that restrict the options for a function (such as Internet access), its provision, or the range of implementations available.</t>
          <t>Alternatively, it might occur due to scarcity. For example, the exhaustion of IPv4 addresses creates a power differential between those who have addresses and those who do not, which can affect how the protocols that depend on IP connectivity are deployed and used. If those addresses are held by only a few consolidation is the result, in turn leading to ossification because new applications cannot be deployed without their cooperation.</t>
          <t>Some effects of inherited centralization can be mitigated by enforcing layer boundaries using techniques like encryption. When the number of parties who have access to content of communication are limited, parties at lower layers can be prevented from interfering with and observing it. Although those lower-layer parties might still prevent communication, encryption also makes it more difficult to discriminate a target from other users' traffic.</t>
          <t>Note that the prohibitive effect of encryption on inherited centralization is most pronounced when most (if not all) traffic is encrypted. See also <xref target="RFC7258"/>.</t>
        </section>
        <section anchor="platform">
          <name>Platform Centralization</name>
          <t>The complement to inherited centralization is platform centralization -- where a function does not directly define a central role, but could facilitate consolidation in the applications it supports.</t>
          <t>For example, HTTP <xref target="HTTP"/> is not generally considered a centralized protocol; interoperable servers are easy to instantiate, and multiple clients are available. It can be used without central coordination beyond that provided by DNS, as discussed above. However, applications built on top of HTTP (as well as the rest of the “Web Platform”) often exhibit consolidation (for example, social networking). HTTP is therefore an example of platform centralization -- while the protocol itself is not centralized, it facilitates the creation of consolidated services and applications.</t>
          <t>Like concentration, platform centralization is difficult to prevent with protocol design. Because of the layered nature of the Internet, most protocols allow considerable flexibility in how they are used, to promote permissionless innovation.</t>
        </section>
      </section>
    </section>
    <section anchor="decentralization">
      <name>Decentralization</name>
      <t>While the term "decentralization" has a long history of use in economics, politics, religion, and international development, Baran gave one of the first definitions relevant to computer networking, as a condition when "complete reliance upon a single point is not always required." <xref target="RAND"/></t>
      <t>This seemingly straightforward technical definition hides several issues.</t>
      <t>First, identifying which aspects of a function to decentralize and how to do so can be difficult, both because there are often many ways a function might be centralized, and because consolidation sometimes only becomes clear after the function is deployed at scale. Efforts to decentralize often have the effect of merely shifting consolidation to a different place.</t>
      <t>For example, a cloud storage function might be implemented using a distributed consensus protocol, assuring that the failure of any single node will not affect the system's operation or availability. In that sense, it is decentralized. However, if it is operated by a single legal entity, that brings a very different kind of centralization, especially if there are few other options available, or if there is friction against choosing other options.</t>
      <t>Another example is the Web, which was envisioned and widely held to be a decentralizing force in its early life. Its inherent platform centralization only became apparent when large sites successfully leveraged network effects for dominance of social networking, marketplaces, and similar functions.</t>
      <t>Second, different parties might have good-faith differences on what "sufficiently decentralized" means based upon their beliefs, perceptions and goals. Just as centralization is a continuum, so is decentralization, and not everyone agrees one what the "right" level or type is, how to weigh different forms of centralization against each other, or how to weigh potential consolidation against other architectural goals (such as security or privacy).</t>
      <t>These tensions can be seen, for example, in the DNS. While much of the system is decentralized through the distribution of the lookup function to local servers that users have the option to override, the DNS is also a name space -- a single, global "source of truth" with inherent (if beneficial) centralization in its management. ICANN mitigates the associated risk through multi-stakeholder governance (see <xref target="multi"/>). While many believe that this arrangement is sufficient and might even have desirable qualities (such as the ability to impose community standards over the operation of the name space), others reject ICANN's oversight of the DNS as illegitimate, favoring decentralization based upon distributed consensus protocols rather than multistakeholderism. <xref target="MUSIANI"/></t>
      <t>Third, decentralization unavoidably involves adjustments to the power relationships between protocol participants, especially when it opens up the possibility of consolidation elsewhere. As Schneider notes in <xref target="AMBITION"/>, decentralization "appears to operate as a rhetorical strategy that directs attention toward some aspects of a proposed social order and away from others", so "we cannot accept technology as a substitute for taking social, cultural, and political considerations seriously." Or, as more bluntly stated in <xref target="PERSPECTIVE"/>, "without governance mechanisms in place, nodes may collude, people may lie to each other, markets can be rigged, and there can be significant cost to people entering and exiting markets."</t>
      <t>For example, while blockchain-based cryptocurrencies might address the consolidation inherent in traditional currencies through technical means, the concentration of power that many exhibit in terms of voting/mining power, distribution of funds, and diversity of codebase causes some to question how decentralized they actually are. <xref target="AREWEDECENTRALIZEDYET"/> The lack of formal structures brings an opportunity for latent, informal power structures that have their own risks -- including consolidation. <xref target="STRUCTURELESS"/></t>
      <t>In practice, this means that decentralizing a function requires considerable work, is inherently political, and involves a large degree of uncertainty about the outcome. In particular, if one considers decentralization as a larger social goal (in the spirit of how the term is used in other, non-computing contexts), merely rearranging technical functions may lead to frustration. "A distributed network does not automatically yield an egalitarian, equitable or just social, economic, political landscape." <xref target="PERSPECTIVE"/></t>
      <section anchor="techniques">
        <name>Decentralization Techniques</name>
        <t>Over time, a few different techniques have been used to facilitate decentralization of Internet protocols. The subsection below examine some of these techniques, along with their limitations.</t>
        <t>None of them is a panacea; it is not possible to completely remove all forms of centralization from protocols that, at their heart, require agreement between multiple parties. However, when performed properly, decentralization might produce an outcome where that risk is understood, acceptable, and, where possible and appropriate, mitigated.</t>
        <t>There is also no "correct" way to decentralize; it does not require that provision of a function need be distributed in a particular fashion, or to a particular degree. For example, the Domain Name System <xref target="RFC1035"/> is widely agreed to have an acceptable form of centralization, despite it being provided by a limited set of entities.</t>
        <section anchor="federation">
          <name>Federation</name>
          <t>A common technique for addressing centralization in Internet protocols is federation -- designing them in such a way that new instances of a function are easy to create and can maintain interoperability and connectivity with other instances.</t>
          <t>For example, SMTP <xref target="RFC5321"/> is the basis of the e-mail suite of protocols, which has two functions that exhibit centralization:</t>
          <ol spacing="normal" type="1"><li>Giving each user a globally unique address, and</li>
            <li>Routing messages to the user, even when they change network locations or become disconnected for long periods of time.</li>
          </ol>
          <t>E-mail reuses DNS to help mitigate the first. To mitigate the second, it defines a specific role for routing users' messages, the Message Transfer Agent (MTA). By allowing anyone to deploy an MTA and defining rules for interconnecting them, the protocol's users avoid a requirement for a single central router.</t>
          <t>Users can (and often do) choose to delegate that role to someone else, or run their own MTA. However, many now consider running a personal MTA to be impractical because of the likelihood of a small MTA being classified as a spam source. Because large MTA operators are widely known and have greater impact if their operation is affected, they are less likely to be classified as such, concentrating the protocol’s operation (see <xref target="indirect"/>).</t>
          <t>Another example of a federated Internet protocol is XMPP <xref target="RFC6120"/>, supporting "instant messaging" and similar functionality. Like e-mail, it reuses DNS for naming and requires federation to facilitate rendezvous of users from different systems.</t>
          <t>While some deployments of XMPP do support truly federated messaging (i.e., a person using service A can interoperably chat with someone using service B), many of the largest do not. Because federation is voluntary, some operators captured their users into a single service, denying them the benefits of global interoperability.</t>
          <t>The examples above illustrate that, while federation can be a useful technique for avoiding proprietary centralization and managing beneficial centralization, it does not prevent concentration or platform centralization. If a single entity can capture the value provided by a protocol, it may use the protocol as a platform to get a “winner take all” outcome -- a significant risk with many Internet protocols, since network effects often promote such outcomes. Likewise, external factors (such as spam control) might naturally “tilt the table” towards a few operators.</t>
        </section>
        <section anchor="multi">
          <name>Multi-Stakeholder Governance</name>
          <t>Protocol designers sometime attempt to mitigate beneficial centralization (see <xref target="necessary"/>) by delegating that function's governance to a multi-stakeholder body -- an institution that includes representatives of the different kinds of parties that are affected by the system's operation ("stakeholders") in an attempt to make well-reasoned, legitimate, and authoritative decisions.</t>
          <t>The most widely studied example of this technique is the governance of the DNS name space, which as a “single source of truth” exhibits beneficial centralization. The associated risk is managed through administration by <eref target="https://www.icann.org/resources/pages/governance/governance-en">the Internet Corporation for Assigned Names and Numbers (ICANN)</eref>, a global multi-stakeholder body with representation from end users, governments, operators, and others.</t>
          <t>Another example is the governance of the Web's trust model, implemented by Web browsers as relying parties and Certificate Authorities as trust anchors. To promote the operational and security requirements necessary to provide the desired properties, the <eref target="https://cabforum.org">CA/Browser Forum</eref> was established as an oversight body that involves both parties as stakeholders.</t>
          <t>Yet another example of multi-stakeholderism is the standardization of Internet protocols themselves. Because a specification controls implementation behavior, the standardization process can be seen as a single point of control. As a result, Internet standards bodies like the IETF allow open participation and contribution, make decisions in an open and accountable way, have a well-defined process for making (and when necessary, appealing) decisions, considering the views of different stakeholder groups <xref target="RFC8890"/>.</t>
          <t>A major downside of this approach is that setup and ongoing operation of multi-stakeholder bodies is not trivial. Additionally, their legitimacy cannot be assumed, and may be difficult to establish and maintain (see, e.g., <xref target="MULTISTAKEHOLDER"/>). This concern is especially relevant if the function being coordinated is broad, complex, and/or contentious.</t>
        </section>
        <section anchor="distributed">
          <name>Distributed Consensus</name>
          <t>Increasingly, distributed consensus technologies (such as the blockchain) are touted as a solution to consolidation issues. A complete survey of this rapidly changing area is beyond the scope of this document, but we can generalize about its properties.</t>
          <t>These techniques attempt to avoid centralization by distributing functions to members of a sometimes large pool of protocol participants. They typically guarantee proper performance of a function using cryptographic techniques (often, an append-only transaction ledger). A particular task's assignment to a node for handling usually cannot be predicted or controlled.</t>
          <t>Sybil attacks (where a party or coordinated parties cheaply create enough protocol participants to affect how consensus is judged) are a major concern for these protocols. They encourage diversity in the pool of participants using indirect techniques, such as proof-of-work (where each participant has to show significant consumption of resources) or proof-of-stake (where each participant has some other incentive to execute correctly).</t>
          <t>Use of these techniques can create barriers to proprietary and inherited centralization. However, depending upon the application in question, both concentration and platform centralization are still possible.</t>
          <t>Furthermore, a protocol or an application can use distributed consensus for some functions, but still be centralized elsewhere -- either because those functions cannot be decentralized (most commonly, rendezvous and global naming; see <xref target="necessary"/>) or because the designer has chosen not to because of the associated costs and lost opportunities.</t>
          <t>Even when distributed consensus is used for all technical functions of a service, some coordination is still necessary -- whether that be through governance of the function itself, creation of shared implementations, or documentation of shared wire protocols. That represents centralization, just at a different layer (inherited or platform). For example, the Ethereum "merge" demonstrated that the blockchain could address environmental concerns, but only through coordinated community effort and governance. <xref target="ETHEREUM"/></t>
          <t>These potential shortcomings do not rule out the use of distributed consensus technologies in every instance. They do, however, caution against uncritically relying upon these technologies to avoid or mitigate centralization.</t>
        </section>
      </section>
    </section>
    <section anchor="considerations">
      <name>What Should Internet Standards Do?</name>
      <t>Centralization is driven by powerful forces -- both economic and social -- as well as the network effects that come with Internet scale. Bodies like the IETF create voluntary standards; they cannot require adoption, but when a specification succeeds it creates those very network effects. As such, standards bodies cannot prevent all forms of consolidation, but they can still take meaningful steps to prevent some of them. The subsections below suggest a few.</t>
      <section anchor="legitimate">
        <name>Bolster Legitimacy</name>
        <t>Many efforts to address Internet consolidation are likely to take place outside of standards bodies. If the IETF wishes to contribute to these efforts and assure their compatibility with the Internet's architectural goals, it must be seen as legitimate by the relevant parties -- especially, by competition regulators. Otherwise, if the IETF is perceived as representing or being controlled by "big tech" concerns, its ability to guide decisions that affect the Internet will be diminished considerably.</t>
        <t>The IETF already has features that arguably provide considerable legitimacy; for example, open participation and representation by individuals rather than companies both enhance input legitimacy; a well-defined process with multiple layers of appeals and transparency contributes to throughput legitimacy, and a long history of successful Internet standards provides perhaps the strongest source of legitimacy for the IETF -- its output.</t>
        <t>However, it is also widely recognized the considerable costs (not just financial) involved in successfully participating in the IETF have a tendency to favour larger companies over smaller concerns. Likewise, the specialised and highly technical nature of the work creates barriers to entry for non-technical stakeholders. These factors have the potential to reduce the legitimacy of the IETF's decisions, at least in some eyes.</t>
        <t>Efforts to address these shortcomings are ongoing; see, for example, <xref target="RFC8890"/>. Overall, bolstering the legitimacy of the organization should be seen as a continuous effort.</t>
      </section>
      <section anchor="target">
        <name>Engage with Centralization Thoroughly but Realistically</name>
        <t>Some kinds of centralization are easy to manage in standards efforts. For example, if a protocol with a fixed role for a single party were to be proposed to the IETF for publication as a standard, it would be rejected out of hand. There is a growing body of knowledge and experience in managing the risks of beneficial centralization, and a strong inclination to reuse existing infrastructure where possible. As discussed above, encryption is often a way to manage inherited centralization, and has become the norm in standard protocols. These responses are appropriate ways for Internet standards to manage centralization.</t>
        <t>However, mitigating concentration and platform centralization is much more difficult in standards efforts. Because the IETF has no "protocol police", it’s not possible to demand, for example, that someone stop building a proprietary service using a federated protocol; even if it could, doing so would contradict architectural goals like permissionless innovation. While the imprimatur of an Internet Standard is not without value, merely withholding it cannot prevent these sources of consolidation.</t>
        <t>Therefore, committing significant resources to scrutinizing protocols for latent centralization -- especially for concentration and platform centralization -- is unlikely to be effective in preventing Internet consolidation. Almost all existing Internet protocols -- including IP, TCP, HTTP, and DNS -- exhibit concentration or platform centralization. Refusing to standardize a newer protocol because it exhibits similar properties would not be equitable, proportionate, or effective.</t>
        <t>When claims are made that a given proposal is "centralized" or "decentralized", the context of those statements should be examined for presuppositions, assumptions, and omissions. One framework for critical interrogations is offered by <xref target="BACCHI"/>, which can be adapted for centralization-related discussions:</t>
        <ol spacing="normal" type="1"><li>What is the nature of the centralization that is represented as being problematic?</li>
          <li>What deep-seated presuppositions or assumptions (conceptual logics) underlie this representation of the "problem"?</li>
          <li>How has this representation of the problem come about?</li>
          <li>What is left unproblematic in this problem representation? Where are the silences? Can the "problem" be conceptualized differently?</li>
          <li>What effects are produced by this representation of the "problem"?</li>
          <li>How and where has this representation of the "problem" been produced, disseminated and defended? How has it been and/or how can it be disrupted and replaced?</li>
        </ol>
        <t><xref target="SCHNEIDER"/> implores that proposals to decentralize be "really, really clear about what particular features of a system a given design seeks to decentralize" and promotes borrowing remedies from more traditional governance systems, such as separation of powers and accountability.</t>
        <t>When centralization is found, standards efforts should consider its relationship with architectural goals as they consider how to address it. In particular, attention should be paid to how effective standards (as a form of architectural control) is in achieving each goal.</t>
        <t>For example, privacy is often more effectively ensured by ex ante technical constraints, as compared to ex post legal regulation. Conversely (as discussed) some centralization may be more effectively addressed through legal regulation. Thus, a standards effort balancing these concerns might focus primarily on privacy. However, these are often not completely separable goals. Concentration can result in one or a few entities having greater volume and variety of data available exclusively to them, raising significant privacy and security concerns.</t>
      </section>
      <section anchor="up">
        <name>Decentralize Proprietary Functions</name>
        <t>It is worthwhile to create specifications for functions that are currently only available from proprietary providers. Open standards can provide a viable alternative to a consolidated function.</t>
        <t>Such efforts might include large-scale protocols for existing proprietary functions (e.g., chat) as well as smaller efforts to improve interoperability and portability of specific features that are often used to "lock in" users to a platform; for example, a format for lists of contacts in a social network.</t>
        <t>A common objection to this approach is that adoption is voluntary, not mandatory; there are no "standards police" to mandate their use or enforce correct implementation. For example, specifications like <xref target="ACTIVITYSTREAMS"/>) have been available for some time without being used in a federated manner by commercial social networking providers.</t>
        <t>However, while standards aren't mandatory, legal regulation is, and legal mandates for interoperability are increasingly discussed by policymakers as a remedy for competition issues (see, e.g., <xref target="OECD"/>).</t>
        <t>As such, appetite for regulation presents an opportunity for new specifications to decentralize these functions, backed by a legal mandate in combination with changing norms and the resulting market forces <xref target="NEW-CHICAGO"/>. That opportunity also presents a risk, however, if the resulting legal regulation is at odds with the Internet architecture.</t>
        <t>Successfully creating standards that work in concert with legal regulation presents many potential pitfalls, and will require improved and new capabilities (especially liaison, likely originating in the IAB), and considerable effort. If the Internet community does not make that effort, it is likely that regulators will turn to other sources of interoperability specifications -- most likely, with less transparency, more narrow input, limited experience, and without reference to the Internet’s architectural goals.</t>
      </section>
      <section anchor="new">
        <name>Evaluate New Decentralization Techniques</name>
        <t>The decentralization techniques listed in <xref target="techniques"/> are not a closed set; wide interest has spurred development of new approaches, both in general and as solutions to specific problems.</t>
        <t>For example, secure multi-party computation techniques (see, e.g., <xref target="YAO"/>) can be composed to allow parties to compute over private inputs without revealing them. Protocols like <xref target="ENPA"/> and <xref target="PRIO"/> use them to limit the information available to participants in protocols to realize privacy goals; as discussed in <xref target="intermediation"/> doing so might also counteract some sources of centralization. However, as with those covered above, these techniques do not automatically preclude all consolidation; such systems often still require trust, even if it is limited, and that might result in other forms of consolidation emerging.</t>
        <t>Whether use of these techniques (or others) can meaningfully counteract consolidation is still uncertain. Standards bodies (including the IETF) can serve an important function by incubating them, applying (and, where necessary, developing) architectural guidelines for privacy, security, operability, and other goals, and assuring interoperability. When appropriate, publication on the standards track or as experimental can send signals to implementers, users, and regulators about their fitness for particular purposes.</t>
      </section>
      <section anchor="balance">
        <name>Enable Switching</name>
        <t>To minimize centralization, standards-defined functions should have an explicit goal enabling users' switching between implementations and deployments of protocols.</t>
        <t>One necessary condition for this is the availability of alternatives; breadth and diversity of implementation and deployment are required. <xref section="2.1" sectionFormat="of" target="RFC5218"/> explores some factors in protocol design that encourage this outcome.</t>
        <t>Another factor is the cost of substituting an alternative implementation or deployment by users. This implies that the standard needs to be functionally complete and specified precisely enough to allow substitution.</t>
        <t>These goals of completeness and diversity are sometimes in tension. If a standard becomes extremely complex, it may discourage implementation diversity because the cost of a complete implementation is too high (consider: Web browsers). On the other hand, if the specification is too simple, it may not enable easy switching, especially if proprietary extensions are necessary to complete it (see <xref target="evolution"/>).</t>
        <t>One objection to protocols that enable easy switching is that they reduce the incentives for implementation by commercial vendors. While a completely commoditized protocol might not allow implementations to differentiate themselves, they provide opportunities for specialization and improvement elsewhere in the value chain <xref target="ATTRACTIVE-PROFITS"/>. Well-timed standards efforts leverage these forces to focus proprietary interests on top of open technology, rather than as a replacement for it.</t>
      </section>
      <section anchor="intermediation">
        <name>Control Delegation of Power</name>
        <t>Some functions might see substantial benefits if they are provided by a third party in communication. Adding a new party to communication can improve:</t>
        <ul spacing="normal">
          <li>
            <em>Efficiency</em>: Many functions on the Internet are more efficient when performed at a higher scale. For example, a content delivery network can offer services at a fraction of the financial and environmental cost that someone serving content themselves would otherwise pay, because of the scale they operate at. Likewise, a two-sided market platform can introduce sizeable efficiencies over pair-wise buyer/seller trading <xref target="CIRCULAR-CONUNDRUM"/>.</li>
          <li>
            <em>Simplicity</em>: Completely disintermediating communication can shift the burden of functions onto endpoints. This can cause increased cognitive load for users; for example, compare commercial social networking platforms with self-hosted efforts.</li>
          <li>
            <em>Specialization</em>: Having a function concentrated into a few hands can improve outcomes because of the resulting specialization. For example, services overseen by professional administrators are often seen to have a better security posture and improved availability.</li>
          <li>
            <em>Privacy</em>: For some functions, user privacy can be improved by concentrating their activity to prevent individual behaviors from being discriminated from each other.<xref target="MIX"/> Introduction of a third party can also enforce functional boundaries -- for example, to reduce the need for users to trust potentially malicious endpoints, as seen in the so-called "oblivious" protocols (e.g., <xref target="RFC9230"/>) that allow end users to hide their identity from services, while still accessing them.</li>
        </ul>
        <t>However, introducing a new party to communication adds concentration and platform centralization to Internet functions, because it brings opportunities for control and observation. While (as discussed above) standards efforts have a very limited capability to prevent or control the resulting consolidation, designing functions with thoughtful constraints on third party functions can prevent at least the most egregious outcomes.</t>
        <t>Most often, third parties are added to functions as "intermediaries" or in designated "agent" roles. In general, they should only be interposed because of the positive action of at least one of the primary parties, and should have their ability to observe or control communication limited to what is necessary to perform their intended function.</t>
        <t>For example, early deployments of HTTP allowed intermediaries to be interposed by the network without knowledge of the endpoints, and those intermediaries could see and change the full content of traffic by default -- even when they are only intended to perform basic functions such as caching. Because of the introduction of HTTPS and the CONNECT method (see <xref section="9.3.6" sectionFormat="of" target="HTTP"/>), combined with efforts to encourage its adoption, those intermediaries are now required to be explicitly interposed by one endpoint.</t>
        <t>See <xref target="I-D.thomson-tmi"/> for more guidance on protocol intermediation.</t>
        <t>The term "intermediary" is also used (often in legal and regulatory contexts) more broadly than it has been in protocol design; for example, an auction Web site intermediates between buyers and sellers is considered an intermediary, even though it is not formally an intermediary in HTTP (see <xref section="3.7" sectionFormat="of" target="HTTP"/>). Protocol designers can address the centralization associated with this kind of intermediation by standardising the function, rather than restricting the capabilities of the underlying protocols; see <xref target="up"/>.</t>
      </section>
      <section anchor="evolution">
        <name>Consider Extensibility and Modularity Carefully</name>
        <t>The Internet's ability to evolve is critical, allowing it to meet new requirements and adapt to new conditions without requiring a “flag day” to upgrade implementations. Typically, functions accommodate evolution by defining extension interfaces, which allow optional features to be added or change over time in an interoperable fashion.</t>
        <t>However, these interfaces can also be a basis for platform centralization if a powerful entity can change the target for meaningful interoperability by adding proprietary extensions to a standard. This is especially true when the core standard does not itself provide sufficient utility on its own.</t>
        <t>For example, the SOAP protocol's <xref target="SOAP"/> extreme flexibility and failure to provide significant standalone value allowed vendors to require use of their preferred extensions, favoring those who had more market power.</t>
        <t>Therefore, standards efforts should focus on providing concrete utility to the majority of their users as published, rather than being a “framework” where interoperability is not immediately available. Internet functions should not make every aspect of their operation extensible; boundaries between modules should be designed in a way that allows evolution and discourages consolidation, while still offering meaningful functionality.</t>
        <t>Beyond allowing evolution, well-considered interfaces can also aid decentralization efforts. The structural boundaries that emerge between the sub-modules of the function -- as well as those with adjacent functions -- provide touchpoints for interoperability and an opportunity for substitution of providers.</t>
        <t>In particular, if the interfaces of a function are well-defined and stable, there is an opportunity to use different providers for that function. When those interfaces are open standards, change control resides with the Internet community instead of remaining in proprietary hands, further enhancing stability and enabling (but not ensuring) decentralization.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document does not have a direct security impact on Internet protocols. However, failure to consider centralization might cause a myriad of security issues.</t>
    </section>
  </middle>
  <back>
    <displayreference target="RAND" to="BARAN"/>
    <displayreference target="SCALE-FREE" to="BARABASI"/>
    <displayreference target="INTERMEDIARY-INFLUENCE" to="JUDGE"/>
    <displayreference target="INTERDEPENDENCE" to="FARRELL"/>
    <displayreference target="MULTISTAKEHOLDER" to="PALLADINO"/>
    <displayreference target="NEW-CHICAGO" to="LESSIG"/>
    <displayreference target="POLYCENTRIC" to="ALIGIA"/>
    <displayreference target="PIR" to="OLUMOFIN"/>
    <displayreference target="ACCESS" to="ABRAHAMSON"/>
    <displayreference target="SUCCESS" to="KENDE"/>
    <displayreference target="MIX" to="CHAUM"/>
    <displayreference target="FEDERALIST-51" to="MADISON"/>
    <displayreference target="ATTRACTIVE-PROFITS" to="CHRISTENSEN"/>
    <displayreference target="CIRCULAR-CONUNDRUM" to="SPULBER"/>
    <displayreference target="AMBITION" to="SCHNEIDERb"/>
    <displayreference target="PERSPECTIVE" to="BODO"/>
    <displayreference target="STRUCTURELESS" to="FREEMAN"/>
    <displayreference target="SCHNEIDER" to="SCHNEIDERa"/>
    <references>
      <name>Informative References</name>
      <reference anchor="RAND" target="https://www.rand.org/pubs/research_memoranda/RM3420.html">
        <front>
          <title>On Distributed Communications: Introduction to Distributed Communications Networks</title>
          <author initials="P." surname="Baran" fullname="Paul Baran">
            <organization>RAND Corporation</organization>
          </author>
          <date year="1964"/>
        </front>
      </reference>
      <reference anchor="HTTP">
        <front>
          <title>HTTP Semantics</title>
          <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding">
            <organization/>
          </author>
          <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham">
            <organization/>
          </author>
          <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke">
            <organization/>
          </author>
          <date month="June" year="2022"/>
          <abstract>
            <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes. </t>
            <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="97"/>
        <seriesInfo name="RFC" value="9110"/>
        <seriesInfo name="DOI" value="10.17487/RFC9110"/>
      </reference>
      <reference anchor="SOAP" target="https://www.w3.org/TR/2007/REC-soap12-part0-20070427/">
        <front>
          <title>SOAP Version 1.2 Part 0: Primer (Second Edition)</title>
          <author fullname="Nilo Mitra" role="editor"/>
          <author fullname="Yves Lafon" role="editor"/>
          <date day="27" month="April" year="2007"/>
        </front>
        <seriesInfo name="W3C REC" value="REC-soap12-part0-20070427"/>
        <seriesInfo name="W3C" value="REC-soap12-part0-20070427"/>
      </reference>
      <reference anchor="SCALE-FREE" target="https://barabasi.com/f/67.pdf">
        <front>
          <title>Emergence of Scaling in Random Networks</title>
          <author initials="R." surname="Albert" fullname="Réka Albert">
            <organization>University of Notre Dame</organization>
          </author>
          <date year="1999" month="October"/>
        </front>
        <refcontent>SCIENCE, Vol. 286, No. 15, p. 509</refcontent>
      </reference>
      <reference anchor="INTERMEDIARY-INFLUENCE" target="https://scholarship.law.columbia.edu/faculty_scholarship/1856">
        <front>
          <title>Intermediary Influence</title>
          <author initials="K." surname="Judge" fullname="Kathryn Judge">
            <organization>Columbia Law School</organization>
          </author>
          <date year="2014"/>
        </front>
        <refcontent>University of Chicago Law Review, Vol. 82, p. 573</refcontent>
      </reference>
      <reference anchor="INTERDEPENDENCE" target="https://doi.org/10.1162/ISEC_a_00351">
        <front>
          <title>Weaponized Interdependence: How Global Economic Networks Shape State Coercion</title>
          <author initials="H." surname="Farrell" fullname="Henry Farrell">
            <organization>George Washington University</organization>
          </author>
          <author initials="A. L." surname="Newman" fullname="Abraham L. Newman">
            <organization>Georgetown University</organization>
          </author>
          <date year="2019"/>
        </front>
        <refcontent>International Security, Vol. 44, No. 1, p. 42</refcontent>
      </reference>
      <reference anchor="MOXIE" target="https://signal.org/blog/the-ecosystem-is-moving/">
        <front>
          <title>Reflections: The ecosystem is moving</title>
          <author initials="M." surname="Marlinspike" fullname="Moxie Marlinspike">
            <organization>Signal</organization>
          </author>
          <date year="2016" month="May"/>
        </front>
      </reference>
      <reference anchor="MULTISTAKEHOLDER" target="https://link.springer.com/book/10.1007/978-3-030-56131-4">
        <front>
          <title>Legitimacy, Power, and Inequalities in the Multistakeholder Internet Governance</title>
          <author initials="N." surname="Palladino" fullname="Nicola Palladino">
            <organization/>
          </author>
          <author initials="N." surname="Santaniello" fullname="Nauro Santaniello">
            <organization/>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="NEW-CHICAGO" target="https://www.journals.uchicago.edu/doi/10.1086/468039">
        <front>
          <title>The New Chicago School</title>
          <author initials="L." surname="Lessig" fullname="Laurence Lessig">
            <organization/>
          </author>
          <date year="1998" month="June"/>
        </front>
        <refcontent>Journal of Legal Studies, Vol. 27</refcontent>
      </reference>
      <reference anchor="POLYCENTRIC" target="https://onlinelibrary.wiley.com/doi/abs/10.1111/j.1468-0491.2011.01550.x">
        <front>
          <title>Polycentricity: From Polanyi to Ostrom, and Beyond</title>
          <author initials="P. D." surname="Aligia" fullname="Paul D. Aligia">
            <organization/>
          </author>
          <author initials="V." surname="Tarko" fullname="Vlad Tarko">
            <organization/>
          </author>
          <date year="2012" month="April"/>
        </front>
        <refcontent>Governance: An International Journal of Policy, Administration, and Institutions, Vol. 25, No. 2, p. 237</refcontent>
      </reference>
      <reference anchor="PIR" target="https://link.springer.com/chapter/10.1007/978-3-642-27576-0_13">
        <front>
          <title>Revisiting the Computational Practicality of Private Information Retrieval</title>
          <author initials="F." surname="Olumofin" fullname="Femi Olumofin">
            <organization/>
          </author>
          <author initials="I." surname="Goldberg" fullname="Ian Goldberg">
            <organization/>
          </author>
          <date year="2010"/>
        </front>
      </reference>
      <reference anchor="ACCESS" target="https://www.yalelawjournal.org/comment/essential-data">
        <front>
          <title>Essential Data</title>
          <author initials="Z." surname="Abrahamson" fullname="Zachary Abrahamson">
            <organization/>
          </author>
          <date year="2014"/>
        </front>
        <refcontent>Yale Law Journal, Vol. 124, No. 3</refcontent>
      </reference>
      <reference anchor="SUCCESS" target="https://blog.apnic.net/wp-content/uploads/2021/12/MKGRA669-Report-for-APNIC-LACNIC-V3.pdf">
        <front>
          <title>Study on the Internet's Technical Success Factors</title>
          <author initials="M." surname="Kende" fullname="Michael Kende">
            <organization/>
          </author>
          <author initials="A." surname="Kvalbein" fullname="Amund Kvalbein">
            <organization/>
          </author>
          <author initials="J." surname="Allford" fullname="Julia Allford">
            <organization/>
          </author>
          <author initials="D." surname="Abecassis" fullname="David Abecassis">
            <organization/>
          </author>
          <date year="2021" month="December"/>
        </front>
      </reference>
      <reference anchor="OECD" target="https://www.oecd.org/daf/competition/data-portability-interoperability-and-digital-platform-competition-2021.pdf">
        <front>
          <title>Data portability, interoperability and digital platform competition</title>
          <author>
            <organization>OECD</organization>
          </author>
          <date year="2021" month="June"/>
        </front>
      </reference>
      <reference anchor="MIX" target="https://dl.acm.org/doi/10.1145/358549.358563">
        <front>
          <title>Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms</title>
          <author initials="D. L." surname="Chaum" fullname="David L. Chaum">
            <organization/>
          </author>
          <date year="1981" month="February"/>
        </front>
        <refcontent>Communications of the ACM, Vol. 24, No. 2</refcontent>
      </reference>
      <reference anchor="FEDERALIST-51">
        <front>
          <title>The Structure of the Government Must Furnish the Proper Checks and Balances Between the Different Departments</title>
          <author initials="J." surname="Madison" fullname="James Madison">
            <organization/>
          </author>
          <date year="1788" month="February"/>
        </front>
        <refcontent>The Federalist Papers, No. 51</refcontent>
      </reference>
      <reference anchor="ATTRACTIVE-PROFITS">
        <front>
          <title>The Law of Conservation of Attractive Profits</title>
          <author initials="C." surname="Christensen" fullname="Clayton Christensen">
            <organization/>
          </author>
          <date year="2004" month="February"/>
        </front>
        <refcontent>Harvard Business Review, "Breakthrough Ideas for 2004"</refcontent>
      </reference>
      <reference anchor="ACTIVITYSTREAMS" target="https://www.w3.org/TR/2016/CR-activitystreams-core-20161215/">
        <front>
          <title>Activity Streams 2.0</title>
          <author fullname="Evan Prodromou" role="editor"/>
          <author fullname="James Snell" role="editor"/>
          <date day="15" month="December" year="2016"/>
        </front>
        <seriesInfo name="W3C CR" value="CR-activitystreams-core-20161215"/>
        <seriesInfo name="W3C" value="CR-activitystreams-core-20161215"/>
      </reference>
      <reference anchor="CIRCULAR-CONUNDRUM" target="https://wwws.law.northwestern.edu/research-faculty/clbe/workingpapers/documents/spulber_circularconundrum.pdf">
        <front>
          <title>Solving The Circular Conundrum: Communication And Coordination In Internet Markets</title>
          <author initials="D. F." surname="Spulber" fullname="Daniel F. Spulber">
            <organization/>
          </author>
          <date year="2010"/>
        </front>
        <refcontent>Northwestern University Law Review, Vol. 104, No. 2</refcontent>
      </reference>
      <reference anchor="YAO" target="https://dl.acm.org/doi/10.5555/1382436.1382751">
        <front>
          <title>Protocols for secure computations</title>
          <author initials="A. C." surname="Yao" fullname="Andrew C. Yao">
            <organization/>
          </author>
          <date year="1982" month="November"/>
        </front>
        <refcontent>SFCS '82</refcontent>
      </reference>
      <reference anchor="ENPA" target="https://covid19-static.cdn-apple.com/applications/covid19/current/static/contact-tracing/pdf/ENPA_White_Paper.pdf">
        <front>
          <title>Exposure Notification Privacy-preserving Analytics (ENPA) White Paper</title>
          <author>
            <organization>Apple</organization>
          </author>
          <author>
            <organization>Google</organization>
          </author>
          <date year="2021" month="April"/>
        </front>
      </reference>
      <reference anchor="PRIO" target="https://crypto.stanford.edu/prio/paper.pdf">
        <front>
          <title>Prio: Private, Robust, and Scalable Computation of Aggregate Statistics</title>
          <author initials="H." surname="Corrigan-Gibbs" fullname="Henry Corrigan-Gibbs">
            <organization/>
          </author>
          <author initials="D." surname="Boneh" fullname="Dan Boneh">
            <organization/>
          </author>
          <date year="2017" month="March"/>
        </front>
      </reference>
      <reference anchor="AMBITION" target="https://osf.io/m7wyj/">
        <front>
          <title>Decentralization: an incomplete ambition</title>
          <author initials="N." surname="Schneider" fullname="Nathan Schneider">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
        <refcontent>Journal of Cultural Economy, Vol. 12, No. 4</refcontent>
      </reference>
      <reference anchor="AREWEDECENTRALIZEDYET" target="https://bitcoinera.app/arewedecentralizedyet/">
        <front>
          <title>Are We Decentralized Yet?</title>
          <author>
            <organization>bitcoinera</organization>
          </author>
          <date year="2022"/>
        </front>
      </reference>
      <reference anchor="PERSPECTIVE" target="https://doi.org/10.14763/2021.2.1563">
        <front>
          <title>Decentralization: a multidisciplinary perspective</title>
          <author initials="B." surname="Bodó" fullname="Balázs Bodó">
            <organization>University of Amsterdam</organization>
          </author>
          <author initials="J. K." surname="Brekke" fullname="Jaya Klara Brekke">
            <organization>Durham University</organization>
          </author>
          <author initials="J.-H." surname="Hoepman" fullname="Jaap-Henk Hoepman">
            <organization>Radboud University</organization>
          </author>
          <date year="2021" month="June"/>
        </front>
        <refcontent>Internet Policy Review, Vol. 10, No. 2</refcontent>
      </reference>
      <reference anchor="MUSIANI" target="https://link.springer.com/chapter/10.1057/9781137483591_4">
        <front>
          <title>Alternative Technologies as Alternative Institutions: The Case of the Domain Name System</title>
          <author initials="F." surname="Musiani" fullname="Francesca Musiani">
            <organization/>
          </author>
          <date year="2016"/>
        </front>
        <refcontent>The Turn to Infrastructure in Internet Governance</refcontent>
      </reference>
      <reference anchor="STRUCTURELESS" target="https://www.jstor.org/stable/41035187">
        <front>
          <title>The Tyranny of Structurelessness</title>
          <author initials="J." surname="Freeman" fullname="Jo Freeman">
            <organization/>
          </author>
          <date year="1972"/>
        </front>
        <refcontent>Berkeley Journal of Sociology, Vol. 17</refcontent>
      </reference>
      <reference anchor="ISOC" target="https://future.internetsociety.org/2019/">
        <front>
          <title>Consolidation in the Internet Economy</title>
          <author>
            <organization>Internet Society</organization>
          </author>
          <date year="2019"/>
        </front>
        <refcontent>Internet Society Global Internet Report</refcontent>
      </reference>
      <reference anchor="ECH">
        <front>
          <title>TLS Encrypted Client Hello</title>
          <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
            <organization>RTFM, Inc.</organization>
          </author>
          <author fullname="Kazuho Oku" initials="K." surname="Oku">
            <organization>Fastly</organization>
          </author>
          <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
            <organization>Cloudflare</organization>
          </author>
          <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
            <organization>Cloudflare</organization>
          </author>
          <date day="3" month="October" year="2022"/>
          <abstract>
            <t>   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/draft-ietf-tls-esni
   (https://github.com/tlswg/draft-ietf-tls-esni).

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-tls-esni-15"/>
      </reference>
      <reference anchor="SCHNEIDER" target="https://nathanschneider.info/articles/DecentralHacker.html">
        <front>
          <title>What to do once you admit that decentralizing everything never seems to work</title>
          <author initials="N." surname="Schneider" fullname="Nathan Schneider">
            <organization/>
          </author>
          <date year="2022" month="October"/>
        </front>
        <refcontent>Hacker Noon</refcontent>
      </reference>
      <reference anchor="BACCHI" target="https://library.oapen.org/bitstream/handle/20.500.12657/33181/560097.pdf?sequence=1#page=34">
        <front>
          <title>Introducing the ‘What’s the Problem Represented to be?’ approach</title>
          <author initials="C." surname="Bacchi" fullname="Carol Bacchi">
            <organization/>
          </author>
          <date year="2012"/>
        </front>
        <refcontent>Chapter 2, Engaging with Carol Bacchi</refcontent>
      </reference>
      <reference anchor="ETHEREUM" target="https://ethereum.org/en/upgrades/merge/">
        <front>
          <title>The Merge</title>
          <author>
            <organization>Ethereum</organization>
          </author>
          <date year="2023" month="February"/>
        </front>
      </reference>
      <reference anchor="RFC791">
        <front>
          <title>Internet Protocol</title>
          <author fullname="J. Postel" initials="J." surname="Postel">
            <organization/>
          </author>
          <date month="September" year="1981"/>
        </front>
        <seriesInfo name="STD" value="5"/>
        <seriesInfo name="RFC" value="791"/>
        <seriesInfo name="DOI" value="10.17487/RFC0791"/>
      </reference>
      <reference anchor="RFC4271">
        <front>
          <title>A Border Gateway Protocol 4 (BGP-4)</title>
          <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter">
            <organization/>
          </author>
          <author fullname="T. Li" initials="T." role="editor" surname="Li">
            <organization/>
          </author>
          <author fullname="S. Hares" initials="S." role="editor" surname="Hares">
            <organization/>
          </author>
          <date month="January" year="2006"/>
          <abstract>
            <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
            <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems.  This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
            <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR).  These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP.  BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
            <t>This document obsoletes RFC 1771.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4271"/>
        <seriesInfo name="DOI" value="10.17487/RFC4271"/>
      </reference>
      <reference anchor="RFC793">
        <front>
          <title>Transmission Control Protocol</title>
          <author fullname="J. Postel" initials="J." surname="Postel">
            <organization/>
          </author>
          <date month="September" year="1981"/>
        </front>
        <seriesInfo name="RFC" value="793"/>
        <seriesInfo name="DOI" value="10.17487/RFC0793"/>
      </reference>
      <referencegroup anchor="BCP95">
        <reference anchor="RFC3935" target="https://www.rfc-editor.org/info/rfc3935">
          <front>
            <title>A Mission Statement for the IETF</title>
            <author fullname="H. Alvestrand" initials="H." surname="Alvestrand"/>
            <date month="October" year="2004"/>
            <abstract>
              <t>This memo gives a mission statement for the IETF, tries to define the terms used in the statement sufficiently to make the mission statement understandable and useful, argues why the IETF needs a mission statement, and tries to capture some of the debate that led to this point.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="95"/>
          <seriesInfo name="RFC" value="3935"/>
          <seriesInfo name="DOI" value="10.17487/RFC3935"/>
        </reference>
      </referencegroup>
      <reference anchor="RFC7258">
        <front>
          <title>Pervasive Monitoring Is an Attack</title>
          <author fullname="S. Farrell" initials="S." surname="Farrell">
            <organization/>
          </author>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
            <organization/>
          </author>
          <date month="May" year="2014"/>
          <abstract>
            <t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="188"/>
        <seriesInfo name="RFC" value="7258"/>
        <seriesInfo name="DOI" value="10.17487/RFC7258"/>
      </reference>
      <reference anchor="RFC1035">
        <front>
          <title>Domain names - implementation and specification</title>
          <author fullname="P. Mockapetris" initials="P." surname="Mockapetris">
            <organization/>
          </author>
          <date month="November" year="1987"/>
          <abstract>
            <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System.  It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="13"/>
        <seriesInfo name="RFC" value="1035"/>
        <seriesInfo name="DOI" value="10.17487/RFC1035"/>
      </reference>
      <reference anchor="RFC5321">
        <front>
          <title>Simple Mail Transfer Protocol</title>
          <author fullname="J. Klensin" initials="J." surname="Klensin">
            <organization/>
          </author>
          <date month="October" year="2008"/>
          <abstract>
            <t>This document is a specification of the basic protocol for Internet electronic mail transport.  It consolidates, updates, and clarifies several previous documents, making all or parts of most of them obsolete.  It covers the SMTP extension mechanisms and best practices for the contemporary Internet, but does not provide details about particular extensions.  Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a "mail submission" protocol for "split-UA" (User Agent) mail reading systems and mobile environments.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5321"/>
        <seriesInfo name="DOI" value="10.17487/RFC5321"/>
      </reference>
      <reference anchor="RFC6120">
        <front>
          <title>Extensible Messaging and Presence Protocol (XMPP): Core</title>
          <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre">
            <organization/>
          </author>
          <date month="March" year="2011"/>
          <abstract>
            <t>The Extensible Messaging and Presence Protocol (XMPP) is an application profile of the Extensible Markup Language (XML) that enables the near-real-time exchange of structured yet extensible data between any two or more network entities.  This document defines XMPP's core protocol methods: setup and teardown of XML streams, channel encryption, authentication, error handling, and communication primitives for messaging, network availability ("presence"), and request-response interactions.  This document obsoletes RFC 3920.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6120"/>
        <seriesInfo name="DOI" value="10.17487/RFC6120"/>
      </reference>
      <reference anchor="RFC8890">
        <front>
          <title>The Internet is for End Users</title>
          <author fullname="M. Nottingham" initials="M." surname="Nottingham">
            <organization/>
          </author>
          <date month="August" year="2020"/>
          <abstract>
            <t>This document explains why the IAB believes that, when there is a conflict between the interests of end users of the Internet and other parties, IETF decisions should favor end users. It also explores how the IETF can more effectively achieve this.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8890"/>
        <seriesInfo name="DOI" value="10.17487/RFC8890"/>
      </reference>
      <reference anchor="RFC5218">
        <front>
          <title>What Makes for a Successful Protocol?</title>
          <author fullname="D. Thaler" initials="D." surname="Thaler">
            <organization/>
          </author>
          <author fullname="B. Aboba" initials="B." surname="Aboba">
            <organization/>
          </author>
          <date month="July" year="2008"/>
          <abstract>
            <t>The Internet community has specified a large number of protocols to date, and these protocols have achieved varying degrees of success. Based on case studies, this document attempts to ascertain factors that contribute to or hinder a protocol's success.  It is hoped that these observations can serve as guidance for future protocol work.  This memo  provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5218"/>
        <seriesInfo name="DOI" value="10.17487/RFC5218"/>
      </reference>
      <reference anchor="RFC9230">
        <front>
          <title>Oblivious DNS over HTTPS</title>
          <author fullname="E. Kinnear" initials="E." surname="Kinnear">
            <organization/>
          </author>
          <author fullname="P. McManus" initials="P." surname="McManus">
            <organization/>
          </author>
          <author fullname="T. Pauly" initials="T." surname="Pauly">
            <organization/>
          </author>
          <author fullname="T. Verma" initials="T." surname="Verma">
            <organization/>
          </author>
          <author fullname="C.A. Wood" initials="C.A." surname="Wood">
            <organization/>
          </author>
          <date month="June" year="2022"/>
          <abstract>
            <t>This document describes a protocol that allows clients to hide their IP addresses from DNS resolvers via proxying encrypted DNS over HTTPS (DoH) messages. This improves privacy of DNS operations by not allowing any one server entity to be aware of both the client IP address and the content of DNS queries and answers.</t>
            <t>This experimental protocol has been developed outside the IETF and is published here to guide implementation, ensure interoperability among implementations, and enable wide-scale experimentation.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9230"/>
        <seriesInfo name="DOI" value="10.17487/RFC9230"/>
      </reference>
      <reference anchor="I-D.thomson-tmi">
        <front>
          <title>Principles for the Involvement of Intermediaries in Internet Protocols</title>
          <author fullname="Martin Thomson" initials="M." surname="Thomson">
            <organization>Mozilla</organization>
          </author>
          <date day="8" month="September" year="2022"/>
          <abstract>
            <t>   This document proposes a set of principles for designing protocols
   with rules for intermediaries.  The goal of these principles is to
   limit the ways in which intermediaries can produce undesirable
   effects and to protect the useful functions that intermediaries
   legitimately provide.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-thomson-tmi-04"/>
      </reference>
    </references>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>This document benefits from discussions with Brian Trammell during our shared time on the Internet Architecture Board.</t>
      <t>Thanks to Jari Arkko, Kristin Berdan, Christian Huitema, Mallory Knodel, Eliot Lear, Tommy Pauly, and Martin Thomson for their comments and suggestions.</t>
      <t>No machine learning models were used in the production of this document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
