<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.13 (Ruby 3.1.2) -->
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc compact="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-nottingham-avoiding-internet-centralization-05" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.13.0 -->
  <front>
    <title abbrev="Centralization">Centralization, Decentralization, and Internet Standards</title>
    <seriesInfo name="Internet-Draft" value="draft-nottingham-avoiding-internet-centralization-05"/>
    <author initials="M." surname="Nottingham" fullname="Mark Nottingham">
      <organization/>
      <address>
        <postal>
          <postalLine>Prahran</postalLine>
          <postalLine>Australia</postalLine>
        </postal>
        <email>mnot@mnot.net</email>
        <uri>https://www.mnot.net/</uri>
      </address>
    </author>
    <date/>
    <area>General</area>
    <keyword>governance</keyword>
    <abstract>
      <t>Despite being designed and operated as a decentralized network-of-networks, the Internet is continuously subjected to forces that encourage centralization.</t>
      <t>This document offers a definition of centralization, explains why it is undesirable, identifies different types of it, catalogues limitations of common approaches to decentralization, and explores what Internet standards efforts can do to address it.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-nottingham-avoiding-internet-centralization/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/mnot/avoiding-internet-centralization"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>The Internet has succeeded in no small part because of its purposeful avoidance of any single controlling entity. Originating in a desire to prevent a single technical failure from having a wide impact <xref target="RAND"/>, this stance has also enabled the Internet's rapid adoption and broad spread. The Internet can accommodate a spectrum of requirements and is now positioned as a global public good because joining, deploying an application on, or using the Internet does not require permission from or ceding control to another entity.</t>
      <t>While avoiding centralization of the Internet remains a widely shared goal, achieving it consistently has proven difficult. Today, many successful protocols and applications on the Internet operate in a centralized fashion -- to the point where some proprietary, centralized services have become so well-known that they are commonly mistaken for the Internet itself. Even when protocols incorporate techniques intended to prevent centralization, economic and social factors can drive users to prefer centralized solutions built with or on top of supposedly decentralized technology.</t>
      <t>These difficulties call into question what role architectural regulation -- in particular, that performed by open standards bodies such as the IETF -- should play in preventing, mitigating, and controlling Internet centralization. This document discusses aspects of centralization that relate to Internet standards efforts, and argues that while the IETF may not be able to prevent centralization, there are still meaningful steps we can take to counteract it.</t>
      <t><xref target="centralization"/> defines centralization, explains why it is undesirable, and surveys some kinds of centralization seen on the Internet. <xref target="decentralization"/> explores decentralization and highlights some relevant techniques, along with their limitations. Finally, <xref target="considerations"/> considers the role that Internet standards play in avoiding centralization and mitigating its effects.</t>
      <t>The primary audience for this document is the engineers who design and standardize Internet protocols. However, designers of proprietary protocols can benefit from considering aspects of centralization, especially if they intend their protocol to be considered for eventual standardisation. Likewise, policymakers can use this document to help identify and remedy inappropriately centralized protocols and applications.</t>
    </section>
    <section anchor="centralization">
      <name>Centralization</name>
      <t>This document defines "centralization" as the ability of a single entity or a small group of them to exclusively observe, capture, control, or extract rent from the operation or use of an Internet function.</t>
      <t>Here, "entity" could be a single person, a corporation, or a government. It does not include an organisation that operates in a manner that effectively mitigates centralization (see, e.g., <xref target="multi"/>).</t>
      <t>"Internet function" is defined broadly. It might be an enabling protocol already defined by standards, such as IP <xref target="RFC791"/>, BGP <xref target="RFC4271"/>, TCP <xref target="RFC793"/>, or HTTP <xref target="HTTP"/>. It might also be a proposal for a new enabling protocol, or an extension to an existing one.</t>
      <t>However, the Internet's functions are not limited to standards-defined protocols. User-visible applications built on top of standard protocols are also vulnerable to centralization -- for example, social networking, file sharing, financial services, and news dissemination. Likewise,  networking equipment, hardware, operating systems, and software act as enabling technologies that can exhibit centralization. The supply of Internet connectivity to end users in a particular area or situation can also be subject to the forces of centralization, as can supply of transit between networks (so called "Tier 1" networks).</t>
      <t>Centralization is not a binary condition; it is a continuum. At one extreme, a function absolutely controlled by a single entity (see <xref target="direct"/>) represents complete centralization; at the other extreme, a function whose value can be realised by any two parties without the possibility of any external interference or influence represents complete decentralization (sometimes referred to as "distributed" or "peer-to-peer").</t>
      <t>While a few functions might occupy the ends of this spectrum, most reside somewhere between the extremes. Therefore, it is often useful to consider the amount of <em>centralization risk</em> associated with a function, depending on the scale, scope, and nature of the influences on it. Note that a function might have more than one source of centralization risk, each with its own characteristics.</t>
      <t>Centralization risk is strongest when it affects the entire Internet. However, it can also be present when a substantial portion of the Internet's users lack options for a function. For example, if there is only one provider for a function in a region or legal jurisdiction, that function is effectively centralized for those users.</t>
      <t>Centralization risk is most obviously created by the direct assignment of a role to a single entity, but it is also created when a single entity takes on that role for other reasons. For example, friction against switching to a substitute provider of a function often leads to concentration (see <xref target="indirect"/>). If switching requires a significant amount of time, resources, expertise, coordination, loss of functionality, or effort, centralization risk is indicated. Conversely, a function based on a well-defined, open specification designed to minimize switching costs might be considered to have less centralization risk even when there are only a few large providers.</t>
      <t>This definition of centralization focuses largely upon the relationships between parties to communication, rather than systems design. For example, a cloud service might use decentralized techniques to improve its resilience but still be operated by a single entity, thereby exhibiting the kind of centralization that this document is concerned with. A failure due to a cut cable, power outage, or failed server is qualitatively different from the issues encountered when a core Internet function has a gatekeeper.</t>
      <t>As a result, the concept of availability is distinct from centralization, and any relationship between them cannot be assumed without careful analysis of where and how centralization occurs. Centralized systems might be more available due to factors like the resources available to them, but also have greater impact when they have a fault; decentralized systems might be more resilient in the face of local failures, but less able to react to systemic issues.</t>
      <t>For example, a large variety of Web sites might depend upon a cloud hosting provider or content delivery network; if it were to become unavailable (whether for technical or other reasons), many people's experience of the Internet might be disrupted. Likewise, a mobile Internet access provider might have an outage that affects hundreds, thousands, or more of its users. In both cases, centralization is not engaged by the loss of availability or its scale, but it well might be if the parties relying on the function don't have reasonable options to switch to if they are unhappy with the availability of the service provided, or if friction against switching to an alternative is too great.</t>
      <t>Also, it is important to distinguish centralization from anti-competitive concerns (also known as "anti-trust"). While there are many interactions between these concepts and making the Internet more competitive may be a motivation for avoiding centralization, only courts have the authority to define a relevant market and determine that behaviour is anti-competitive. Furthermore, what might be considered undesirable consolidation by the technical community might not attract competition regulation, and conversely what might attract competition regulation might not be of great concern to the technical community if other mitigations are felt to be adequate.</t>
      <section anchor="why">
        <name>When Centralization is Undesirable</name>
        <t>There are three overarching reasons why centralization of Internet functions can be concerning.</t>
        <t>First, the Internet's very nature is incompatible with centralization. As a "large, heterogeneous collection of interconnected systems" <xref target="BCP95"/> the Internet is often characterised as a "network of networks". These networks relate as peers who agree to facilitate communication, rather than having a relationship of subservience to others' requirements or coercion by them. This focus on independence of action carries through the way the network is architected -- for example, in the concept of an "autonomous system".</t>
        <t>Second, when a third party has unavoidable access to communications, the informational and positional advantages gained allow observation of behaviour (the "panopticon effect") and shaping or even denial of behaviour (the "chokepoint effect") <xref target="INTERMEDIARY-INFLUENCE"/> -- capabilities that those parties (or the states that have authority over them) can use for coercive ends <xref target="INTERDEPENDENCE"/> or even to disrupt society itself. Just as good governance of states requires separation of powers <xref target="FEDERALIST-51"/>, so too does good governance of the Internet require that power not be concentrated in one place without appropriate checks and balances.</t>
        <t>Finally, centralization of a function can have deleterious effects on the Internet itself, including:</t>
        <ul spacing="normal">
          <li>
            <em>Limiting Innovation</em>: Centralization can preclude the possibility of "permissionless innovation" -- the ability to deploy new, unforeseen applications without requiring coordination with parties other than those you are communicating with.</li>
          <li>
            <em>Constraining Competition</em>: The Internet and its users benefit from robust competition when applications and services are available from many providers -- especially when those users can build their own applications and services based upon interoperable standards. When a centralized service or platform must be used because no substitutes are suitable, it effectively becomes an essential facility, which encourages abuse of power.</li>
          <li>
            <em>Reducing Availability</em>: Availability of the Internet (and applications and services built upon it) improves when there are many ways to obtain access. While centralized services' availability can benefit from the focused attention that their elevated role requires, failure of a large, centralized provider can have a disproportionate impact on availability.</li>
          <li>
            <em>Creating Monoculture</em>: The scale available to a centralized service or application can magnify minor flaws in features to a degree that can have broad consequences. For example, a single codebase for routers elevates the impact of a bug or vulnerability; a single recommendation algorithm for content can have severe social impact. Diversity in these functions' implementation leads to a more robust outcome when viewed systemically. <xref target="POLYCENTRIC"/></li>
          <li>
            <em>Self-Reinforcement</em>: As widely noted (see, e.g., <xref target="ACCESS"/>), a centralized service's access to data allows it the opportunity to make improvements to its offerings, while denying such access to others.</li>
        </ul>
        <t>See also <xref target="SUCCESS"/> for further exploration of how centralization can affect the Internet.</t>
        <t>As discussed below in <xref target="necessary"/>, not all centralization is undesirable or avoidable. <xref target="AMBITION"/> notes that "centralized structures can have virtues, such as enabling publics to focus their limited attention for oversight, or forming a power bloc capable of challenging less-accountable blocs that might emerge. Centralized structures that have earned widespread respect in recent centuries - including governments, corporations, and nonprofit organizations - have done so in no small part because of the intentional design that went into those structures."</t>
        <t>With that in mind, centralization risk on the Internet is most concerning when it is not broadly held to be necessary, when it has no checks, balances, or other mechanisms of accountability, when it selects "favourites" which are difficult (or impossible) to displace, and when it has the damaging effects outlines above, or the potential for them.</t>
      </section>
      <section anchor="kinds">
        <name>Kinds of Centralization</name>
        <t>Centralization on the Internet is not uniform; it presents in a variety of ways, depending on its relationship to the function in question and underlying causes. The subsections below describe different aspects of Internet centralization.</t>
        <section anchor="direct">
          <name>Proprietary Centralization</name>
          <t>Creating of a protocol or application with a fixed role for a specific party is the most straightforward kind of centralization. Many messaging, videoconferencing, chat, social networking, and similar applications operate in this fashion currently.</t>
          <t>Because they allow control by a single entity, proprietary protocols are often considered simpler to design, more amenable to evolution, and more likely to meet user needs <xref target="MOXIE"/>, compared to decentralized alternatives. However, they have corresponding centralization risk -- if the function has no alternative providers, or switching to those providers is too difficult, its users are "locked in."</t>
          <t>Proprietary protocols and applications are not considered as being part of the Internet per se; instead, they are more properly characterized as being built on top of the Internet. The Internet architecture and associated standards do not regulate them, beyond the constraints that the underlying protocols (e.g., TCP, IP, HTTP) impose.</t>
        </section>
        <section anchor="necessary">
          <name>Beneficial Centralization</name>
          <t>Some protocols and applications have goals that require the introduction of a centralized function. In doing so, they are explicitly relying on centralization to deliver a particular benefit.</t>
          <t>For example, a function that needs a single, globally coordinated "source of truth" is by nature centralized -- such as in the Domain Name System (DNS), which allows human-friendly naming to be converted into network addresses in a globally consistent fashion.</t>
          <t>Another function exhibiting beneficial centralization is IP addresses allocation. Internet routing requires addresses to be allocated uniquely, but if a single government or company captured the addressing function, the entire Internet would be at risk of abuse by that entity. Similarly, the need for coordination in the Web's trust model brings centralization risk, because of the Certificate Authority's role in communication between clients and servers.</t>
          <t>Protocols that need to solve the "rendezvous problem" to coordinate communication between two parties who are not in direct contact also suffer from this kind of centralization. For example, chat protocols need to coordinate communication between two parties that wish to talk; while the actual communication can be direct between them (so long as the protocol facilitates that), the endpoints' mutual discovery typically requires a third party at some point. From the perspective of those two users, the rendezvous function has centralization risk.</t>
          <t>Likewise, when a function requires governance to realize common goals and protect minority interests, a "choke point" is naturally formed by the chosen governance mechanism, increasing centralization risk. For example, defining and applying a content moderation policy both have centralization risk.</t>
          <t>Deciding what is beneficial is a judgment call. Some protocols cannot function without a centralized function; others might be significantly enhanced for certain use cases if a function is centralized, or might merely be more efficient. Such judgments should be made in light of established architectural principles and how benefits accrue to end users.</t>
          <t>When beneficial centralization is present, Internet protocols often attempt to mitigate the associated risks using measures such as federation (see <xref target="federation"/>) and multi-stakeholder governance (see <xref target="multi"/>). Protocols that successfully mitigate beneficial centralization are often reused, to avoid the considerable cost and risk of re-implementing those mitigations. For example, if a protocol requires a coordinated, global naming function, reusing the Domain Name System is usually preferable to establishing a new system.</t>
        </section>
        <section anchor="indirect">
          <name>Concentrated Centralization</name>
          <t>Even when a function avoids proprietary centralization and mitigates any beneficial centralization present, it might become centralized in practice when external factors influence its deployment, so that few or even just one entity provides the function. This is often referred to as "concentration." Economic, legal, and social factors that encourage use of a central function despite the absence of such a requirement in the protocol itself can cause concentration.</t>
          <t>Often, the factors driving concentration are related to the network effects that are so often seen on the Internet. While in theory every node on the Internet is equal, in practice some nodes are much more connected than others: for example, just a few sites drive much of the traffic on the Web. While expected and observed in many kinds of networks, network effects award asymmetric power to nodes that act as intermediaries to communication. <xref target="SCALE-FREE"/></t>
          <t>For example, social networking is an application that is currently supplied by a few proprietary platforms despite standardization efforts (see, e.g., <xref target="ACTIVITYSTREAMS"/>), because of the powerful network effects associated. While there has been some competition in social networking, a group of people who wish to communicate are often locked in by the choices that their peers make, because of the coordination required to move to a new service.</t>
          <t>See <xref target="ISOC"/> for a deeper exploration of concentration.</t>
          <t>Concentration is difficult to avoid in protocol design, and federated protocols are particularly vulnerable to it (see <xref target="federation"/>).</t>
        </section>
        <section anchor="network">
          <name>Inherited Centralization</name>
          <t>Most Internet protocols and applications depend on other, "lower-layer" protocols and their implementations. The features, deployment, and operation of these dependencies can surface centralization into functions and applications built "on top" of them.</t>
          <t>For example, the network between endpoints can introduce centralization risk to application-layer protocols, because it is necessary for communication and therefore has power over it. A network might block access to, slow down, or change the content of various application protocols or specific services for financial, political, operational, or criminal reasons, creating pressure to use other services, which can cause their centralization.</t>
          <t>Likewise, having only a single implementation of a protocol is an inherited centralization risk, because applications that use it are vulnerable to the control it has over their operation. Even if it is Open Source, there might be inherited centralization if there are factors that make forking difficult (for example, the cost of maintaining that fork).</t>
          <t>Inherited centralization is often present when network effects restrict choices, but can also be created by legal mandates and incentives that restrict the options for a function (such as Internet access), its provision, or the range of implementations available.</t>
          <t>Some kinds of inherited centralization can be prevented by enforcing layer boundaries through use of techniques like encryption. When the number of parties who have access to content of communication are limited, parties at lower layers can be prevented from interfering with and observing it. Although those lower-layer parties might still prevent communication, encryption also makes it more difficult to discriminate a target from other traffic.</t>
          <t>Note that the prohibitive effect of encryption on inherited centralization is most pronounced when most (if not all) traffic is encrypted. See also <xref target="RFC7258"/>.</t>
        </section>
        <section anchor="platform">
          <name>Platform Centralization</name>
          <t>The complement to inherited centralization is platform centralization -- where a function does not directly define a central role, but could facilitate centralization in the applications it supports.</t>
          <t>For example, HTTP <xref target="HTTP"/> is not considered a centralized protocol; interoperable servers are  easy to instantiate, and multiple clients are available. It can be used without central coordination beyond that provided by DNS, as discussed above.</t>
          <t>However, applications built on top of HTTP (as well as the rest of the "Web Platform") often exhibit centralization (for example, social networking). HTTP is therefore an example of a platform for centralization -- while the protocol itself is not centralized, it facilitates the creation of centralized services and applications.</t>
          <t>Like concentration, platform centralization is difficult to prevent with protocol design. Because of the layered nature of the Internet, most protocols allow considerable flexibility in how they are used, often in a way that it becomes attractive to form a dependency on one party's operation.</t>
        </section>
      </section>
    </section>
    <section anchor="decentralization">
      <name>Decentralization</name>
      <t>While the term "decentralization" has a long history of use in economics, politics, religion, and international development, In <xref target="RAND"/>, Barans gave one of the first definitions relevant to computer networking, as a condition when "complete reliance upon a single point is not always required."</t>
      <t>This seemingly straightforward technical definition hides several issues.</t>
      <t>First, identifying which aspects of a function to decentralize and how to do so can be difficult, both because there are often many ways a function might be centralized, and because centralization sometimes only becomes evident after the function is deployed at scale.</t>
      <t>For example, a cloud storage function might be implemented using a distributed consensus protocol, assuring that the failure of any single node will not affect the system's operation or availability. In that sense, it is decentralized. However, if it is operated by a single legal entity, that brings a very different kind of centralization risk, especially if there are few other options available, or if there is friction against choosing other options.</t>
      <t>Another example is the Web, which was envisioned and widely held to be a decentralizing force in its early life. Its inherent platform centralization only became apparent when large sites successfully leveraged network effects for dominance of social networking, marketplaces, and similar functions.</t>
      <t>Second, different parties might have good-faith differences on what "sufficiently decentralized" means based upon their beliefs, perceptions and goals. Just as centralization is a continuum, so is decentralization, and not everyone agrees one what the "right" level or type is, how to weigh different forms of centralization against each other, or how to weigh centralization against other architectural goals (such as security or privacy).</t>
      <t>This is seen in the DNS as a single, global "source of truth" with inherent (if beneficial) centralization. The associated risk is mitigated through multi-stakeholder governance by ICANN (see <xref target="multi"/>). While many believe that this arrangement is sufficient and might even have desirable qualities (such as the ability to impose community standards over the operation of the name space), others reject ICANN's oversight of the DNS as illegitimate, favouring decentralization based upon distributed consensus protocols rather than multistakeholderism. <xref target="MUSIANI"/></t>
      <t>Third, decentralization unavoidably involves adjustments to the power relationships between protocol participants, especially when decentralizing a function opens up the possibility of centralization elsewhere. As Schneider notes in <xref target="AMBITION"/>, decentralization "appears to operate as a rhetorical strategy that directs attention toward some aspects of a proposed social order and away from others", so "we cannot accept technology as a substitute for taking social, cultural, and political considerations seriously." Or, as more bluntly stated in <xref target="PERSPECTIVE"/>, "without governance mechanisms in place, nodes may collude, people may lie to each other, markets can be rigged, and there can be significant cost to people entering and exiting markets."</t>
      <t>For example, while blockchain-based cryptocurrencies might address the centralization inherent in traditional currencies through technical means, the concentration of power that many exhibit in terms of voting/mining power, distribution of funds, and diversity of codebase causes some to question how decentralized they actually are. <xref target="AREWEDECENTRALIZEDYET"/> The lack of formal structures brings an opportunity for latent, informal power structures that have their own risks -- including centralization. <xref target="STRUCTURELESS"/></t>
      <t>In practice, this means that decentralizing a function requires considerable work, is inherently political, and involves a large degree of uncertainty about the outcome. In particular, if one considers decentralization as a larger social goal (in the spirit of how the term is used in other, non-computing contexts), merely rearranging technical functions may lead to frustration. "A distributed network does not automatically yield an egalitarian, equitable or just social, economic, political landscape." <xref target="PERSPECTIVE"/></t>
      <section anchor="techniques">
        <name>Decentralization Techniques</name>
        <t>In the context of Internet standardization, decentralization is implemented as a two-step process: assessing the nature of centralization risk, followed by the application of techniques to reduce or mitigate it. The subsections below examine some of these techniques.</t>
        <t>Choosing the appropriate techniques for decentralization requires balancing the specific goals of the function against centralization risk, because completely precluding all forms of centralization through technical means is rarely achievable. When performed properly, decentralization might produce an outcome that still has centralization risk, but that risk should be understood, acceptable, and, where possible and appropriate, mitigated.</t>
        <t>Notably, decentralization does not require that provision of a function need be distributed in a particular fashion, or to a particular degree. For example, the Domain Name System <xref target="RFC1035"/> is widely agreed to have acceptable centralization risk, despite it being provided by a limited set of entities.</t>
        <section anchor="federation">
          <name>Federation</name>
          <t>A widely known technique for managing centralization in Internet protocols is federation -- designing them in such a way that new instances of any centralized function are easy to create and can maintain interoperability and connectivity with other instances.</t>
          <t>For example, SMTP <xref target="RFC5321"/> is the basis of the e-mail suite of protocols, which has two functions that have centralization risk:</t>
          <ol spacing="normal" type="1"><li>Giving each user a globally unique address, and</li>
            <li>Routing messages to the user, even when they change network locations or become disconnected for long periods of time.</li>
          </ol>
          <t>E-mail reuses DNS to help mitigate the first risk. To mitigate the second, it defines a specific role for routing users' messages, the Message Transfer Agent (MTA). By allowing anyone to deploy an MTA and defining rules for interconnecting them, the protocol's users avoid a requirement for a single central router.</t>
          <t>Users can (and often do) choose to delegate that role to someone else, or run their own MTA. However, running your own mail server has become difficult, because of the likelihood of a small MTA being classified as a spam source. Because large MTA operators are widely known and have greater impact if their operation is affected, they are less likely to be classified as such, concentrating the protocol's operation (see <xref target="indirect"/>).</t>
          <t>Another example of a federated Internet protocol is XMPP <xref target="RFC6120"/>, supporting "instant messaging" and similar functionality. Like e-mail, it reuses DNS for naming and requires federation to facilitate rendezvous of users from different systems.</t>
          <t>While some deployments of XMPP do support truly federated messaging (i.e., a person using service A can interoperably chat with someone using service B), many of the largest do not. Because federation is voluntary, some operators captured their users into a single service, denying them the benefits of global interoperability.</t>
          <t>The examples above illustrate that, while federation can be a useful technique to avoid proprietary centralization and manage beneficial centralization, it does not prevent concentration or platform centralization. If a single entity can capture the value provided by a protocol, they may use the protocol as a platform to get a "winner take all" outcome -- a significant risk with many Internet protocols, since network effects often promote such outcomes. Likewise, external factors (such as spam control) might naturally "tilt the table" towards a few operators.</t>
        </section>
        <section anchor="multi">
          <name>Multi-Stakeholder Governance</name>
          <t>Protocol designers sometime mitigate the risks associated with a beneficial centralized function (see <xref target="necessary"/>) by delegating that function's governance to a multi-stakeholder body -- an institution that includes representatives of the different kinds of parties that are affected by the system's operation ("stakeholders") in an attempt to make well-reasoned, legitimate, and authoritative decisions.</t>
          <t>The most widely studied example of this technique is the governance of the DNS, which as a "single source of truth" exhibits beneficial centralization in its naming function, as well as the operation of the system overall. To mitigate operational centralization, multiple root servers that are administered by separate operators (themselves diverse in geography) and a selection of corporate entities, non-profits, and government bodies from many jurisdictions and affiliations carry this task out.The name space itself is administered by <eref target="https://www.icann.org/resources/pages/governance/governance-en">the Internet Corporation for Assigned Names and Numbers (ICANN)</eref>, a global multi-stakeholder body with representation from end users, governments, operators, and others.</t>
          <t>Another example is the governance of the Web's trust model, implemented by Web browsers as relying parties and Certificate Authorities as trust anchors. To assure that all parties meet the operational and security requirements necessary to provide the desired properties, the <eref target="https://cabforum.org">CA/Browser Forum</eref> was established as an oversight body that involves both parties as stakeholders.</t>
          <t>Yet another example of multi-stakeholderism is the standardization of Internet protocols themselves. Because a specification controls implementation behavior, the standardization process can be seen as a single point of control. As a result, Internet standards bodies like the IETF allow open participation and contribution, make decisions in an open and accountable way, have a well-defined process for making (and when necessary, appealing) decisions, considering the views of different stakeholder groups <xref target="RFC8890"/>.</t>
          <t>A major downside of this approach is that setup and ongoing operation of multi-stakeholder bodies is not trivial. Additionally, their legitimacy cannot be assumed, and may be difficult to establish and maintain (see, e.g., <xref target="MULTISTAKEHOLDER"/>). This concern is especially relevant if the function being coordinated is broad, complex, and/or contentious.</t>
        </section>
        <section anchor="distributed">
          <name>Distributed Consensus</name>
          <t>Increasingly, distributed consensus technologies (such as the blockchain) are touted as a solution to centralization issues. A complete survey of this rapidly changing area is beyond the scope of this document, but we can generalise about their properties.</t>
          <t>These techniques attempt to avoid centralization risk by distributing functions to members of a sometimes large pool of protocol participants. They typically guarantee proper performance of a function using cryptographic techniques (often, an append-only transaction ledger). A particular task's assignment to a node for handling usually cannot be predicted or controlled.</t>
          <t>Sybil attacks (where a party or coordinated parties cheaply create enough protocol participants to affect how consensus is judged) are a major concern for these protocols. They encourage diversity in the pool of participants using indirect techniques, such as proof-of-work (where each participant has to show significant consumption of resources) or proof-of-stake (where each participant has some other incentive to execute correctly).</t>
          <t>Use of these techniques can create barriers to proprietary and inherited centralization. However, depending upon the application in question, both concentration and platform centralization are still possible.</t>
          <t>Furthermore, distributed consensus technologies have several potential shortcomings that may make them inappropriate -- or at least difficult to use -- for many Internet applications, because their use conflicts with other important goals:</t>
          <ol spacing="normal" type="1"><li>Distributed consensus has significant implications for privacy. Because user activity (such as queries or transactions) is shared with many unknown parties (and often publicly visible due to the nature of the blockchain) they have very different privacy properties than traditional client/server protocols. Potential mitigations (e.g., Private Information Retrieval; see, e.g., <xref target="PIR"/>) are still not suitable for broad deployment.</li>
            <li>Their complexity and "chattiness" typically result in significantly less efficient use of the network (often, to several orders of magnitude). When distributed consensus protocols use proof-of-work, energy consumption can become significant (to the point where some jurisdictions have banned its use).</li>
            <li>Distributed consensus protocols are still not proven to scale to the degree expected of successful Internet protocols. In particular, relying on unknown third parties to deliver functionality can introduce significant variability in latency, availability, and throughput. This is a marked change for applications with high expectations for these properties (e.g., consumer-oriented Web sites).</li>
            <li>By design, distributed consensus protocols diffuse responsibility for a function among several difficult-to-identify parties. While this may be an effective way to prevent some kinds of centralization, it also means that making someone accountable for how the function is performed is difficult, and often impossible. While the protocol might use cryptographic techniques to assure correct operation, they may not capture all requirements, and may not be correctly used by the protocol designers.</li>
            <li>Distributed consensus protocols typically rely on cryptography for identity, rather than trusting a third party's assertions about identity. When a participant loses their keys, the process of recovering their identity exposes additional centralization risk.</li>
          </ol>
          <t>It is also important to recognise that a protocol or an application can use distributed consensus for some functions, but still have centralization risk elsewhere -- either because those functions cannot be decentralized (most commonly, rendezvous and global naming; see <xref target="necessary"/>) or because the designer has chosen not to because of the associated costs and lost opportunities.</t>
          <t>Even when distributed consensus is used for all technical functions of a service, some coordination is still necessary -- whether that be through governance of the function itself, creation of shared implementations, or documentation of shared wire protocols. That represents centralization risk, just at a different layer (inherited or platform).</t>
          <t>These potential shortcomings do not rule out the use of distributed consensus technologies in every instance. They do, however, caution against uncritically relying upon these technologies to avoid centralization.</t>
        </section>
      </section>
    </section>
    <section anchor="considerations">
      <name>What Should Internet Standards Do?</name>
      <t>Centralization is driven by powerful forces -- both economic and social -- as well as the network effects that come with Internet scale. Because permissionless innovation is a core value for the Internet, and yet much of the centralization seen on the Internet is performed by proprietary platforms that take advantage of this nature, the controls available to standards efforts are very limited.</t>
      <t>While standards bodies on their own cannot prevent centralization, the subsections below suggest meaningful steps that can be taken. There are also valuable contributions that standards efforts can make to other relevant forms of regulation.</t>
      <section anchor="target">
        <name>Be Realistic</name>
        <t>Some kinds of centralization risk are easy to manage in standards efforts. For example, if a proprietary protocol were to be proposed to the IETF, it would be rejected out of hand. There is a growing body of knowledge and experience in managing the risk of beneficial centralization, and a strong inclination to reuse existing infrastructure where possible. As discussed above, encryption is often a way to manage inherited centralization, and has become the norm in standard protocols. These responses are appropriate ways for Internet standards to manage centralization risk.</t>
        <t>However, mitigating concentration and platform centralization is much more difficult in standards efforts. Because we have no "protocol police", it's not possible to demand that someone stop building a proprietary service using a purportedly federated protocol. We also cannot stop someone from building centralized services "on top" of standard protocols without abandoning architectural goals like permissionless innovation. While the imprimatur of an Internet Standard is not without value, merely withholding it cannot prevent these kinds of centralization.</t>
        <t>Therefore, committing significant resources to scrutinizing protocols for latent centralization risk -- especially for concentration and platform risks -- is unlikely to be effective in preventing Internet centralization. Almost all existing Internet protocols -- including IP, TCP, HTTP, and DNS -- exhibit concentration or platform centralization. Refusing to standardize a newer protocol because it faces similar risks would not be equitable, proportionate, or effective.</t>
        <t>When we find centralization risk, we should consider its relationship with other architectural goals as we consider how to address it. In particular, attention should be paid to how effective standards (as a form of architectural regulation) is in achieving each goal.</t>
        <t>For example, privacy is often more effectively ensured by ex ante technical constraints, as compared to ex post legal regulation. Conversely (as discussed) some kinds of centralization are likely better addressed through legal regulation. Thus, as a first order concern, a standards effort balancing these concerns might focus primarily on privacy. However, often these are not completely separable goals -- concentration can result in one or a few entities having greater volume and variety of data available exclusively to them, raising significant privacy and security concerns.</t>
      </section>
      <section anchor="up">
        <name>Decentralize Proprietary Functions</name>
        <t>It is worthwhile to create specifications for functions that are currently only satisfied by proprietary providers. By building open specifications on top of already established standards, an alternative to a centralized function can be created.</t>
        <t>A common objection to such efforts is that adoption is voluntary, not mandatory; there are no "standards police" to mandate their use or enforce correct implementation. For example, specifications like <xref target="ACTIVITYSTREAMS"/>) have been available for some time without broad adoption by social networking providers.</t>
        <t>However, while standards aren't mandatory, legal regulation is, and regulators around the globe are now focusing their efforts on the Internet. In particular, legal mandates for interoperability are increasingly discussed as a remedy for competition issues (see, e.g., <xref target="OECD"/>).</t>
        <t>As such, appetite for Internet regulation presents not just a risk to the Internet; it also constitutes an opportunity for new specifications to decentralize these functions, backed by a legal mandate in combination with changing norms and the resulting market forces <xref target="NEW-CHICAGO"/>.</t>
        <t>Successfully creating standards that work in concert with legal regulation is new ground for the IETF, presents many potential pitfalls, and will require new capabilities (especially liaison, likely originating in the IAB) and considerable effort. If the Internet community does not make that effort, it is likely that regulators will turn to other sources of interoperability specifications -- most likely, with less transparency, more narrow input, limited experience, and without reference to the Internet's architectural goals.</t>
      </section>
      <section anchor="new">
        <name>Evaluate New Decentralization Techniques</name>
        <t>The decentralization techniques listed in <xref target="techniques"/> are not a closed set; wide interest has spurred development of new approaches, both in general and as solutions to specific problems.</t>
        <t>For example, secure multi-party computation techniques (see, e.g., <xref target="YAO"/>) can be composed to allow parties to compute over private inputs without revealing them. Protocols like <xref target="ENPA"/> and <xref target="PRIO"/> use them to limit the information available to participants in protocols to realise privacy goals; as discussed in <xref target="intermediation"/> doing so might also counteract some kinds of centralization. However, as in other cases these techniques do not automatically preclude all centralization; such systems often still require trust, even if it is limited. That might cause other forms of centralization.</t>
        <t>Whether use of these techniques (or others) can meaningfully counteract centralization is still uncertain. Standards bodies (including the IETF) can serve an important function by incubating them, applying (and, where necessary, developing) architectural guidelines for privacy, security, operability, and other goals, and assuring interoperability. When appropriate, publication on the standards track or as experimental can signal implementers, users, and regulators about their fitness.</t>
      </section>
      <section anchor="balance">
        <name>Build Robust Ecosystems</name>
        <t>To minimize inherited centralization risk, standards-defined functions should have an explicit goal of broad, diverse implementation and deployment so that users have as many choices as possible.</t>
        <t><xref section="2.1" sectionFormat="of" target="RFC5218"/> explores some factors in protocol design that encourage this outcome.</t>
        <t>This goal can also be furthered by ensuring that the cost of switching to a different implementation or deployment is as low as possible to facilitate subsequent substitution. This implies that the standard is functionally complete and specified precisely enough to result in meaningful interoperability.</t>
        <t>The goals of completeness and diversity are sometimes in tension. If a standard is extremely complex, it may discourage implementation diversity because the cost of a complete implementation is too high (consider: Web browsers). On the other hand, if the specification is too simple, it may not offer enough functionality to be complete, and the resulting proprietary extensions may make switching difficult (see <xref target="evolution"/>).</t>
        <t>Also worthy of attention are the underlying incentives for implementation. While a completely commoditized protocol might not allow implementations to differentiate themselves, they provide opportunities for specialization and improvement elsewhere in the value chain <xref target="ATTRACTIVE-PROFITS"/>. Well-timed standards efforts leverage these forces to focus proprietary interests on top of open technology, rather than as a replacement for it.</t>
        <t>Balancing these factors to build robust ecosystems is difficult, but is often helped by community building and good design -- in particular, appropriate use of layering. It also requires continuing maintenance and evolution of protocols, to assure that they are still relevant and appropriate to their use.</t>
      </section>
      <section anchor="intermediation">
        <name>Control Delegation of Power</name>
        <t>Some functions might see substantial benefits if they are performed by a third party in communication. When used well, adding a new party to communication can improve:</t>
        <ul spacing="normal">
          <li>
            <em>Efficiency</em>: Many functions on the Internet are more efficient when performed at a higher scale. For example, a content delivery network can offer services at a fraction of the financial and environmental cost that someone serving content themselves would otherwise pay, because of the scale they operate at. Likewise, a two-sided market platform can introduce sizeable efficiencies over pair-wise buyer/seller trading <xref target="CIRCULAR-CONUNDRUM"/>.</li>
          <li>
            <em>Simplicity</em>: Completely disintermediating communication can shift the burden of functions onto endpoints. This can cause increased cognitive load for users; for example, compare commercial social networking platforms with self-hosted efforts.</li>
          <li>
            <em>Specialization</em>: Having a function concentrated into a few hands can improve outcomes because of the resulting specialization. For example, services overseen by professional administrators are often seen to have a better security posture and improved availability.</li>
          <li>
            <em>Privacy</em>: For some functions, user privacy can be improved by concentrating their activity to prevent individual behaviors from being discriminated from each other.<xref target="MIX"/> Introduction of a third party can also enforce functional boundaries -- for example, to reduce the need for users to trust potentially malicious endpoints, as seen in the so-called "oblivious" protocols (e.g., <xref target="RFC9230"/>) that allow end users to hide their identity from services, while still accessing them.</li>
        </ul>
        <t>However, introducing a new party to communication adds concentration and platform centralization risk to Internet protocols, because it brings opportunities for control and observation. While (as discussed above) standards efforts have a very limited capability to prevent or control these types of centralization, designing protocols with thoughtful constraints on third party functions can prevent at least the most egregious outcomes.</t>
        <t>Most often, third parties are added to protocols as "intermediaries" or in designated "agent" roles. In general, they should only be interposed because of the positive action of at least one endpoint, and should have their ability to observe or control communication limited to what is necessary to perform their intended function.</t>
        <t>For example, early deployments of HTTP allowed intermediaries to be interposed by the network without knowledge of the endpoints, and those intermediaries could see and change the full content of traffic by default -- even when they are only intended to perform basic functions such as caching. Because of the introduction of HTTPS and the CONNECT method (see <xref section="9.3.6" sectionFormat="of" target="HTTP"/>), combined with efforts to encourage its adoption, those intermediaries are now required to be explicitly interposed by one endpoint.</t>
        <t>See <xref target="I-D.thomson-tmi"/> for more guidance on protocol intermediation.</t>
        <t>The term "intermediary" is also used (often in legal and regulatory contexts) more broadly than it has been in protocol design; for example, an auction Web site intermediates between buyers and sellers is considered an intermediary, even though it is not formally an intermediary in HTTP (see <xref section="3.7" sectionFormat="of" target="HTTP"/>). Protocol designers can address the centralization risk associated with this kind of intermediation by standardising the function, rather than restricting the capabilities of the underlying protocols; see <xref target="up"/>.</t>
      </section>
      <section anchor="evolution">
        <name>Target Extensibility</name>
        <t>An important feature of Internet protocols is their ability to evolve, so that they can meet new requirements and adapt to new conditions without requiring a "flag day" to upgrade implementations. Typically, protocols accommodate evolution through extension mechanisms, which allow optional features to be added over time in an interoperable fashion.</t>
        <t>Extensibility can be viewed as a mechanism for decentralization as well -- by allowing uncoordinated evolution, it promotes autonomy and adaption of a function for local needs. However, protocol extensions can also increase the risk of platform centralization if a powerful entity can change the target for meaningful interoperability by adding proprietary extensions to a standard protocol. This is especially true when the core standard does not itself provide sufficient utility on its own.</t>
        <t>For example, the SOAP protocol's <xref target="SOAP"/> extreme flexibility and failure to provide significant standalone value allowed vendors to require use of their preferred extensions, favouring those who had more market power.</t>
        <t>Therefore, standards efforts should focus on providing concrete utility to the majority of their users as published, rather than being a "framework" where interoperability is not immediately available.  Internet protocols should not make every aspect of their operation extensible; extension points should be reasoned, appropriate boundaries for flexibility and control. When a protocol defines extension points, they should not allow an extension to declare itself to be mandatory-to-interoperate, as that pattern invites abuse.</t>
        <t>Where extensions are allowed, attention should be paid to those that emerge; where appropriate, widely adopted extensions should be put through a standards process to assure that the result adheres to architectural principles and shared goals (see also <xref target="up"/>).</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document does not have a direct security impact on Internet protocols. However, failure to consider centralization risks might cause a myriad of security issues.</t>
    </section>
  </middle>
  <back>
    <displayreference target="RAND" to="BARAN"/>
    <displayreference target="SCALE-FREE" to="BARABASI"/>
    <displayreference target="INTERMEDIARY-INFLUENCE" to="JUDGE"/>
    <displayreference target="INTERDEPENDENCE" to="FARRELL"/>
    <displayreference target="MULTISTAKEHOLDER" to="PALLADINO"/>
    <displayreference target="NEW-CHICAGO" to="LESSIG"/>
    <displayreference target="POLYCENTRIC" to="ALIGIA"/>
    <displayreference target="PIR" to="OLUMOFIN"/>
    <displayreference target="ACCESS" to="VESTAGER"/>
    <displayreference target="SUCCESS" to="KENDE"/>
    <displayreference target="MIX" to="CHAUM"/>
    <displayreference target="FEDERALIST-51" to="MADISON"/>
    <displayreference target="ATTRACTIVE-PROFITS" to="CHRISTENSEN"/>
    <displayreference target="CIRCULAR-CONUNDRUM" to="SPULBER"/>
    <displayreference target="AMBITION" to="SCHNEIDER"/>
    <displayreference target="PERSPECTIVE" to="BODO"/>
    <displayreference target="STRUCTURELESS" to="FREEMAN"/>
    <references>
      <name>Informative References</name>
      <reference anchor="RAND" target="https://www.rand.org/pubs/research_memoranda/RM3420.html">
        <front>
          <title>On Distributed Communications: Introduction to Distributed Communications Networks</title>
          <author initials="P." surname="Baran" fullname="Paul Baran">
            <organization>RAND Corporation</organization>
          </author>
          <date year="1964"/>
        </front>
      </reference>
      <reference anchor="HTTP">
        <front>
          <title>HTTP Semantics</title>
          <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding">
            <organization/>
          </author>
          <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham">
            <organization/>
          </author>
          <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke">
            <organization/>
          </author>
          <date month="June" year="2022"/>
          <abstract>
            <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes. </t>
            <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="97"/>
        <seriesInfo name="RFC" value="9110"/>
        <seriesInfo name="DOI" value="10.17487/RFC9110"/>
      </reference>
      <reference anchor="SOAP" target="https://www.w3.org/TR/2007/REC-soap12-part0-20070427">
        <front>
          <title>SOAP Version 1.2 Part 0: Primer (Second Edition)</title>
          <author fullname="Nilo Mitra" initials="N." surname="Mitra">
            <organization/>
          </author>
          <author fullname="Yves Lafon" initials="Y." surname="Lafon">
            <organization/>
          </author>
          <date day="27" month="April" year="2007"/>
        </front>
        <seriesInfo name="World Wide Web Consortium Recommendation" value="REC-soap12-part0-20070427"/>
      </reference>
      <reference anchor="SCALE-FREE" target="https://barabasi.com/f/67.pdf">
        <front>
          <title>Emergence of Scaling in Random Networks</title>
          <author initials="R." surname="Albert" fullname="Réka Albert">
            <organization>University of Notre Dame</organization>
          </author>
          <date year="1999" month="October"/>
        </front>
        <refcontent>SCIENCE, Vol. 286, No. 15, p. 509</refcontent>
      </reference>
      <reference anchor="INTERMEDIARY-INFLUENCE" target="https://scholarship.law.columbia.edu/faculty_scholarship/1856">
        <front>
          <title>Intermediary Influence</title>
          <author initials="K." surname="Judge" fullname="Kathryn Judge">
            <organization>Columbia Law School</organization>
          </author>
          <date year="2014"/>
        </front>
        <refcontent>University of Chicago Law Review, Vol. 82, p. 573</refcontent>
      </reference>
      <reference anchor="INTERDEPENDENCE" target="https://doi.org/10.1162/ISEC_a_00351">
        <front>
          <title>Weaponized Interdependence: How Global Economic Networks Shape State Coercion</title>
          <author initials="H." surname="Farrell" fullname="Henry Farrell">
            <organization>George Washington University</organization>
          </author>
          <author initials="A. L." surname="Newman" fullname="Abraham L. Newman">
            <organization>Georgetown University</organization>
          </author>
          <date year="2019"/>
        </front>
        <refcontent>International Security, Vol. 44, No. 1, p. 42</refcontent>
      </reference>
      <reference anchor="MOXIE" target="https://signal.org/blog/the-ecosystem-is-moving/">
        <front>
          <title>Reflections: The ecosystem is moving</title>
          <author initials="M." surname="Marlinspike" fullname="Moxie Marlinspike">
            <organization>Signal</organization>
          </author>
          <date year="2016" month="May"/>
        </front>
      </reference>
      <reference anchor="MULTISTAKEHOLDER" target="https://link.springer.com/book/10.1007/978-3-030-56131-4">
        <front>
          <title>Legitimacy, Power, and Inequalities in the Multistakeholder Internet Governance</title>
          <author initials="N." surname="Palladino" fullname="Nicola Palladino">
            <organization/>
          </author>
          <author initials="N." surname="Santaniello" fullname="Nauro Santaniello">
            <organization/>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="NEW-CHICAGO" target="https://www.journals.uchicago.edu/doi/10.1086/468039">
        <front>
          <title>The New Chicago School</title>
          <author initials="L." surname="Lessig" fullname="Laurence Lessig">
            <organization/>
          </author>
          <date year="1998" month="June"/>
        </front>
        <refcontent>Journal of Legal Studies, Vol. 27</refcontent>
      </reference>
      <reference anchor="POLYCENTRIC" target="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2149165">
        <front>
          <title>Polycentricity: From Polanyi to Ostrom, and Beyond</title>
          <author initials="P. D." surname="Aligia" fullname="Paul D. Aligia">
            <organization/>
          </author>
          <author initials="V." surname="Tarko" fullname="Vlad Tarko">
            <organization/>
          </author>
          <date year="2012" month="April"/>
        </front>
        <refcontent>Governance: An International Journal of Policy, Administration, and Institutions, Vol. 25, No. 2, p. 237</refcontent>
      </reference>
      <reference anchor="PIR" target="https://link.springer.com/chapter/10.1007/978-3-642-27576-0_13">
        <front>
          <title>Revisiting the Computational Practicality of Private Information Retrieval</title>
          <author initials="F." surname="Olumofin" fullname="Femi Olumofin">
            <organization/>
          </author>
          <author initials="I." surname="Goldberg" fullname="Ian Goldberg">
            <organization/>
          </author>
          <date year="2010"/>
        </front>
      </reference>
      <reference anchor="ACCESS" target="https://wayback.archive-it.org/12090/20191129202059/https://ec.europa.eu/commission/commissioners/2014-2019/vestager/announcements/defending-competition-digitised-world_en">
        <front>
          <title>Defending Competition in a Digitised World, Address at the European Consumer and Competition Day</title>
          <author initials="M." surname="Vestager" fullname="Margrethe Vestager">
            <organization/>
          </author>
          <date year="2019" month="April"/>
        </front>
      </reference>
      <reference anchor="SUCCESS" target="https://blog.apnic.net/wp-content/uploads/2021/12/MKGRA669-Report-for-APNIC-LACNIC-V3.pdf">
        <front>
          <title>Study on the Internet's Technical Success Factors</title>
          <author initials="M." surname="Kende" fullname="Michael Kende">
            <organization/>
          </author>
          <author initials="A." surname="Kvalbein" fullname="Amund Kvalbein">
            <organization/>
          </author>
          <author initials="J." surname="Allford" fullname="Julia Allford">
            <organization/>
          </author>
          <author initials="D." surname="Abecassis" fullname="David Abecassis">
            <organization/>
          </author>
          <date year="2021" month="December"/>
        </front>
      </reference>
      <reference anchor="OECD" target="https://www.oecd.org/daf/competition/data-portability-interoperability-and-digital-platform-competition-2021.pdf">
        <front>
          <title>Data portability, interoperability and digital platform competition</title>
          <author>
            <organization>OECD</organization>
          </author>
          <date year="2021" month="June"/>
        </front>
      </reference>
      <reference anchor="MIX" target="https://dl.acm.org/doi/10.1145/358549.358563">
        <front>
          <title>Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms</title>
          <author initials="D. L." surname="Chaum" fullname="David L. Chaum">
            <organization/>
          </author>
          <date year="1981" month="February"/>
        </front>
        <refcontent>Communications of the ACM, Vol. 24, No. 2</refcontent>
      </reference>
      <reference anchor="FEDERALIST-51">
        <front>
          <title>The Structure of the Government Must Furnish the Proper Checks and Balances Between the Different Departments</title>
          <author initials="J." surname="Madison" fullname="James Madison">
            <organization/>
          </author>
          <date year="1788" month="February"/>
        </front>
        <refcontent>The Federalist Papers, No. 51</refcontent>
      </reference>
      <reference anchor="ATTRACTIVE-PROFITS">
        <front>
          <title>The Law of Conservation of Attractive Profits</title>
          <author initials="C." surname="Christensen" fullname="Clayton Christensen">
            <organization/>
          </author>
          <date year="2004" month="February"/>
        </front>
        <refcontent>Harvard Business Review, "Breakthrough Ideas for 2004"</refcontent>
      </reference>
      <reference anchor="ACTIVITYSTREAMS" target="https://www.w3.org/TR/2016/CR-activitystreams-core-20161215">
        <front>
          <title>Activity Streams 2.0</title>
          <author fullname="James Snell" initials="J." surname="Snell">
            <organization/>
          </author>
          <author fullname="Evan Prodromou" initials="E." surname="Prodromou">
            <organization/>
          </author>
          <date day="15" month="December" year="2016"/>
        </front>
        <seriesInfo name="World Wide Web Consortium CR" value="CR-activitystreams-core-20161215"/>
      </reference>
      <reference anchor="CIRCULAR-CONUNDRUM" target="https://wwws.law.northwestern.edu/research-faculty/clbe/workingpapers/documents/spulber_circularconundrum.pdf">
        <front>
          <title>Solving The Circular Conundrum: Communication And Coordination In Internet Markets</title>
          <author initials="D. F." surname="Spulber" fullname="Daniel F. Spulber">
            <organization/>
          </author>
          <date year="2010"/>
        </front>
        <refcontent>Northwestern University Law Review, Vol. 104, No. 2</refcontent>
      </reference>
      <reference anchor="YAO" target="https://dl.acm.org/doi/10.5555/1382436.1382751">
        <front>
          <title>Protocols for secure computations</title>
          <author initials="A. C." surname="Yao" fullname="Andrew C. Yao">
            <organization/>
          </author>
          <date year="1982" month="November"/>
        </front>
        <refcontent>SFCS '82</refcontent>
      </reference>
      <reference anchor="ENPA" target="https://covid19-static.cdn-apple.com/applications/covid19/current/static/contact-tracing/pdf/ENPA_White_Paper.pdf">
        <front>
          <title>Exposure Notification Privacy-preserving Analytics (ENPA) White Paper</title>
          <author>
            <organization>Apple</organization>
          </author>
          <author>
            <organization>Google</organization>
          </author>
          <date year="2021" month="April"/>
        </front>
      </reference>
      <reference anchor="PRIO" target="https://crypto.stanford.edu/prio/paper.pdf">
        <front>
          <title>Prio: Private, Robust, and Scalable Computation of Aggregate Statistics</title>
          <author initials="H." surname="Corrigan-Gibbs" fullname="Henry Corrigan-Gibbs">
            <organization/>
          </author>
          <author initials="D." surname="Boneh" fullname="Dan Boneh">
            <organization/>
          </author>
          <date year="2017" month="March"/>
        </front>
      </reference>
      <reference anchor="AMBITION" target="https://osf.io/m7wyj/">
        <front>
          <title>Decentralization: an incomplete ambition</title>
          <author initials="N." surname="Schneider" fullname="Nathan Schneider">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
        <refcontent>Journal of Cultural Economy, Vol. 12, No. 4</refcontent>
      </reference>
      <reference anchor="AREWEDECENTRALIZEDYET" target="https://bitcoinera.app/arewedecentralizedyet/">
        <front>
          <title>Are We Decentralized Yet?</title>
          <author>
            <organization>bitcoinera</organization>
          </author>
          <date year="2022"/>
        </front>
      </reference>
      <reference anchor="PERSPECTIVE" target="https://doi.org/10.14763/2021.2.1563">
        <front>
          <title>Decentralization: a multidisciplinary perspective</title>
          <author initials="B." surname="Bodó" fullname="Balázs Bodó">
            <organization>University of Amsterdam</organization>
          </author>
          <author initials="J. K." surname="Brekke" fullname="Jaya Klara Brekke">
            <organization>Durham University</organization>
          </author>
          <author initials="J.-H." surname="Hoepman" fullname="Jaap-Henk Hoepman">
            <organization>Radboud University</organization>
          </author>
          <date year="2021" month="June"/>
        </front>
        <refcontent>Internet Policy Review, Vol. 10, No. 2</refcontent>
      </reference>
      <reference anchor="MUSIANI" target="https://link.springer.com/chapter/10.1057/9781137483591_4">
        <front>
          <title>Alternative Technologies as Alternative Institutions: The Case of the Domain Name System</title>
          <author initials="F." surname="Musiani" fullname="Francesca Musiani">
            <organization/>
          </author>
          <date year="2016"/>
        </front>
        <refcontent>The Turn to Infrastructure in Internet Governance</refcontent>
      </reference>
      <reference anchor="STRUCTURELESS" target="https://www.jstor.org/stable/41035187">
        <front>
          <title>The Tyranny of Structurelessness</title>
          <author initials="J." surname="Freeman" fullname="Jo Freeman">
            <organization/>
          </author>
          <date year="1972"/>
        </front>
        <refcontent>Berkeley Journal of Sociology, Vol. 17</refcontent>
      </reference>
      <reference anchor="ISOC" target="https://future.internetsociety.org/2019/">
        <front>
          <title>Consolidation in the Internet Economy</title>
          <author>
            <organization>Internet Society</organization>
          </author>
          <date year="2019"/>
        </front>
        <refcontent>Internet Society Global Internet Report</refcontent>
      </reference>
      <reference anchor="RFC791">
        <front>
          <title>Internet Protocol</title>
          <author fullname="J. Postel" initials="J." surname="Postel">
            <organization/>
          </author>
          <date month="September" year="1981"/>
        </front>
        <seriesInfo name="STD" value="5"/>
        <seriesInfo name="RFC" value="791"/>
        <seriesInfo name="DOI" value="10.17487/RFC0791"/>
      </reference>
      <reference anchor="RFC4271">
        <front>
          <title>A Border Gateway Protocol 4 (BGP-4)</title>
          <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter">
            <organization/>
          </author>
          <author fullname="T. Li" initials="T." role="editor" surname="Li">
            <organization/>
          </author>
          <author fullname="S. Hares" initials="S." role="editor" surname="Hares">
            <organization/>
          </author>
          <date month="January" year="2006"/>
          <abstract>
            <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
            <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems.  This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
            <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR).  These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP.  BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
            <t>This document obsoletes RFC 1771.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4271"/>
        <seriesInfo name="DOI" value="10.17487/RFC4271"/>
      </reference>
      <reference anchor="RFC793">
        <front>
          <title>Transmission Control Protocol</title>
          <author fullname="J. Postel" initials="J." surname="Postel">
            <organization/>
          </author>
          <date month="September" year="1981"/>
        </front>
        <seriesInfo name="STD" value="7"/>
        <seriesInfo name="RFC" value="793"/>
        <seriesInfo name="DOI" value="10.17487/RFC0793"/>
      </reference>
      <referencegroup anchor="BCP95" target="https://www.rfc-editor.org/info/bcp95">
        <!-- reference.RFC.3935.xml -->
<reference anchor="RFC3935" target="https://www.rfc-editor.org/info/rfc3935">
          <front>
            <title>A Mission Statement for the IETF</title>
            <author fullname="H. Alvestrand" initials="H." surname="Alvestrand">
              <organization/>
            </author>
            <date month="October" year="2004"/>
            <abstract>
              <t>This memo gives a mission statement for the IETF, tries to define the terms used in the statement sufficiently to make the mission statement understandable and useful, argues why the IETF needs a mission statement, and tries to capture some of the debate that led to this point.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="95"/>
          <seriesInfo name="RFC" value="3935"/>
          <seriesInfo name="DOI" value="10.17487/RFC3935"/>
        </reference>
      </referencegroup>
      <reference anchor="RFC7258">
        <front>
          <title>Pervasive Monitoring Is an Attack</title>
          <author fullname="S. Farrell" initials="S." surname="Farrell">
            <organization/>
          </author>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
            <organization/>
          </author>
          <date month="May" year="2014"/>
          <abstract>
            <t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="188"/>
        <seriesInfo name="RFC" value="7258"/>
        <seriesInfo name="DOI" value="10.17487/RFC7258"/>
      </reference>
      <reference anchor="RFC1035">
        <front>
          <title>Domain names - implementation and specification</title>
          <author fullname="P.V. Mockapetris" initials="P.V." surname="Mockapetris">
            <organization/>
          </author>
          <date month="November" year="1987"/>
          <abstract>
            <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System.  It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="13"/>
        <seriesInfo name="RFC" value="1035"/>
        <seriesInfo name="DOI" value="10.17487/RFC1035"/>
      </reference>
      <reference anchor="RFC5321">
        <front>
          <title>Simple Mail Transfer Protocol</title>
          <author fullname="J. Klensin" initials="J." surname="Klensin">
            <organization/>
          </author>
          <date month="October" year="2008"/>
          <abstract>
            <t>This document is a specification of the basic protocol for Internet electronic mail transport.  It consolidates, updates, and clarifies several previous documents, making all or parts of most of them obsolete.  It covers the SMTP extension mechanisms and best practices for the contemporary Internet, but does not provide details about particular extensions.  Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a "mail submission" protocol for "split-UA" (User Agent) mail reading systems and mobile environments.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5321"/>
        <seriesInfo name="DOI" value="10.17487/RFC5321"/>
      </reference>
      <reference anchor="RFC6120">
        <front>
          <title>Extensible Messaging and Presence Protocol (XMPP): Core</title>
          <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre">
            <organization/>
          </author>
          <date month="March" year="2011"/>
          <abstract>
            <t>The Extensible Messaging and Presence Protocol (XMPP) is an application profile of the Extensible Markup Language (XML) that enables the near-real-time exchange of structured yet extensible data between any two or more network entities.  This document defines XMPP's core protocol methods: setup and teardown of XML streams, channel encryption, authentication, error handling, and communication primitives for messaging, network availability ("presence"), and request-response interactions.  This document obsoletes RFC 3920.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6120"/>
        <seriesInfo name="DOI" value="10.17487/RFC6120"/>
      </reference>
      <reference anchor="RFC8890">
        <front>
          <title>The Internet is for End Users</title>
          <author fullname="M. Nottingham" initials="M." surname="Nottingham">
            <organization/>
          </author>
          <date month="August" year="2020"/>
          <abstract>
            <t>This document explains why the IAB believes that, when there is a conflict between the interests of end users of the Internet and other parties, IETF decisions should favor end users. It also explores how the IETF can more effectively achieve this.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8890"/>
        <seriesInfo name="DOI" value="10.17487/RFC8890"/>
      </reference>
      <reference anchor="RFC5218">
        <front>
          <title>What Makes for a Successful Protocol?</title>
          <author fullname="D. Thaler" initials="D." surname="Thaler">
            <organization/>
          </author>
          <author fullname="B. Aboba" initials="B." surname="Aboba">
            <organization/>
          </author>
          <date month="July" year="2008"/>
          <abstract>
            <t>The Internet community has specified a large number of protocols to date, and these protocols have achieved varying degrees of success. Based on case studies, this document attempts to ascertain factors that contribute to or hinder a protocol's success.  It is hoped that these observations can serve as guidance for future protocol work.  This memo  provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5218"/>
        <seriesInfo name="DOI" value="10.17487/RFC5218"/>
      </reference>
      <reference anchor="RFC9230">
        <front>
          <title>Oblivious DNS over HTTPS</title>
          <author fullname="E. Kinnear" initials="E." surname="Kinnear">
            <organization/>
          </author>
          <author fullname="P. McManus" initials="P." surname="McManus">
            <organization/>
          </author>
          <author fullname="T. Pauly" initials="T." surname="Pauly">
            <organization/>
          </author>
          <author fullname="T. Verma" initials="T." surname="Verma">
            <organization/>
          </author>
          <author fullname="C.A. Wood" initials="C.A." surname="Wood">
            <organization/>
          </author>
          <date month="June" year="2022"/>
          <abstract>
            <t>This document describes a protocol that allows clients to hide their IP addresses from DNS resolvers via proxying encrypted DNS over HTTPS (DoH) messages. This improves privacy of DNS operations by not allowing any one server entity to be aware of both the client IP address and the content of DNS queries and answers.</t>
            <t>This experimental protocol has been developed outside the IETF and is published here to guide implementation, ensure interoperability among implementations, and enable wide-scale experimentation.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9230"/>
        <seriesInfo name="DOI" value="10.17487/RFC9230"/>
      </reference>
      <reference anchor="I-D.thomson-tmi">
        <front>
          <title>Principles for the Involvement of Intermediaries in Internet Protocols</title>
          <author fullname="Martin Thomson">
            <organization>Mozilla</organization>
          </author>
          <date day="7" month="March" year="2022"/>
          <abstract>
            <t>   This document proposes a set of principles for designing protocols
   with rules for intermediaries.  The goal of these principles is to
   limit the ways in which intermediaries can produce undesirable
   effects and to protect the useful functions that intermediaries
   legitimately provide.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-thomson-tmi-03"/>
      </reference>
    </references>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>This document benefits from discussions with Brian Trammell during our shared time on the Internet Architecture Board.</t>
      <t>Thanks to Jari Arkko, Christian Huitema, Eliot Lear, and Martin Thomson for their comments and suggestions.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
