<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.22 (Ruby 3.1.3) -->
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc compact="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-nottingham-avoiding-internet-centralization-08" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.16.0 -->
  <front>
    <title abbrev="Internet Centralization and Standards">Internet Centralization: What Can Standards Do?</title>
    <seriesInfo name="Internet-Draft" value="draft-nottingham-avoiding-internet-centralization-08"/>
    <author initials="M." surname="Nottingham" fullname="Mark Nottingham">
      <organization/>
      <address>
        <postal>
          <postalLine>Prahran</postalLine>
          <postalLine>Australia</postalLine>
        </postal>
        <email>mnot@mnot.net</email>
        <uri>https://www.mnot.net/</uri>
      </address>
    </author>
    <date/>
    <area>General</area>
    <keyword>governance</keyword>
    <abstract>
      <t>Despite the Internet being designed and operated as a decentralized network-of-networks, forces that encourage consolidation of power over its functions into few hands continuously emerge.</t>
      <t>This document discusses centralization in Internet protocols and relates it to consolidation of power, explains why both are undesirable, identifies forces that contribute to them, catalogues limitations of common approaches to decentralization, and explores what Internet standards efforts can do.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-nottingham-avoiding-internet-centralization/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/mnot/avoiding-internet-centralization"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>The Internet has succeeded in no small part because of its purposeful avoidance of any single controlling entity. While originating in a desire to prevent a single technical failure from having a wide impact <xref target="RAND"/>, this stance has also enabled the Internet’s rapid adoption and broad spread. The Internet can accommodate a spectrum of requirements and is now a global public good because permission is not required to connect to it, deploy an application on it, or use it for a particular purpose.</t>
      <t>While maintaining these properties remains a widely shared goal for the Internet, consistently achieving them has proven more difficult over time. Today, many successful Internet services operate in a centralized fashion -- to the point where some proprietary applications have become so well-known that they are commonly mistaken for the Internet itself. Even when open protocols incorporate techniques intended to prevent consolidation, economic and social factors can drive users to prefer solutions built with or on top of supposedly decentralized technology.</t>
      <t>These difficulties call into question what role architectural design -- in particular, that overseen by open standards bodies such as the IETF -- should play in preventing, mitigating, and controlling consolidation of power on the Internet. This document discusses aspects of centralization that relate to Internet standards efforts, and argues that while the IETF may not be able to prevent these outcomes, there are still meaningful steps it can take to help counteract them.</t>
      <t><xref target="centralization"/> defines centralization and consolidation, explains why and when they are undesirable, and surveys how they occur on the Internet. <xref target="decentralization"/> explores decentralization and highlights some relevant techniques, along with their limitations. Finally, <xref target="considerations"/> considers the role that Internet standards play in avoiding centralization and mitigating its effects.</t>
      <t>The primary audience for this document is the engineers who design and standardize Internet protocols. However, designers of proprietary protocols and applications can benefit from considering these issues, especially if they intend their work to be considered for eventual standardization. Likewise, policymakers can use this document to help identify and evaluate proposed remedies for inappropriately centralized protocols and applications.</t>
    </section>
    <section anchor="centralization">
      <name>Centralization and Consolidation</name>
      <t>This document distinguishes "consolidation" from "centralization" to separate effects from (some of) their causes.</t>
      <t>"Consolidation" is the ability of a single entity or a small group of them to exclusively observe, capture, control, or extract rent from the operation or use of an Internet function.</t>
      <t>Here, "entity" could be a single person, a corporation, or a government. It does not include an organization that operates in a manner that effectively mitigates consolidation (see, e.g., <xref target="multi"/>).</t>
      <t>"Internet function" is used broadly in this document. It might be an enabling protocol already defined by standards, such as IP <xref target="RFC791"/>, BGP <xref target="RFC4271"/>, TCP <xref target="RFC793"/>, or HTTP <xref target="HTTP"/>. It might also be a proposal for a new enabling protocol, or an extension to an existing one.</t>
      <t>Furthermore, Internet functions are not limited to standards-defined protocols. User-visible applications built on top of standard protocols are also vulnerable to consolidation -- for example, social networking, file sharing, financial services, and news dissemination. Likewise,  networking equipment, hardware, operating systems, and software act as enabling technologies that can exhibit consolidation. The supply of Internet connectivity to end users in a particular area or situation can also be subject to consolidation, as can the supply of transit between networks (so called "Tier 1" networks).</t>
      <t>"Centralization" is the source of consolidation that this document focuses upon; it measures the direct or potential contribution of a function's technical design to consolidation. For example, many consider the social networking market to be highly consolidated around a few providers who have used highly centralized architectures (see <xref target="direct"/>) to reinforce their control.</t>
      <t>Centralization is not a binary condition; a function's design might contribute to or be vulnerable to consolidation in multiple ways and in various degrees. Even when decentralization techniques are purposefully used to avoid centralization in a particular aspect of a function, it often appears in other places -- for example, in its governance, implementation, deployment, or in ancillary functions. In summary, "decentralized technology alone does not guarantee decentralized outcomes." <xref target="SCHNEIDER"/></t>
      <section anchor="why">
        <name>Assessing Centralization</name>
        <t>By default, Internet protocol designers will avoid an obviously centralized design because the Internet's very nature is incompatible with it. As a "large, heterogeneous collection of interconnected systems" <xref target="BCP95"/> the Internet is often characterised as a "network of networks". These networks relate as peers who agree to facilitate communication, rather than having a relationship of subservience to others' requirements or coercion by them. This focus on independence of action carries through the way the network is architected -- for example, in the concept of an "autonomous system".</t>
        <t>However, as discussed below in <xref target="necessary"/>, not all centralization is avoidable, and in some cases, it is even desirable. With that in mind, centralization on the Internet is most concerning when it is not broadly held to be necessary, when it has no checks, balances, or other mechanisms of accountability, when it selects "favorites" which are difficult (or impossible) to displace, and when it threatens to diminish the success factors that enable the Internet to thrive -- scalability to meet the demands of new users, adaptability to encompass new applications, flexibility to enable deployment of new technologies, and resilience to shocks and changes <xref target="SUCCESS"/>.</t>
        <t>Most often, unacceptable centralization is indicated when a proposal has one or more of the following damaging effects (or the potential for them):</t>
        <ul spacing="normal">
          <li>
            <em>Power Imbalance</em>: When a third party has unavoidable access to communications, the informational and positional advantages gained allow observation of behavior (the "panopticon effect") and shaping or even denial of behavior (the "chokepoint effect") <xref target="INTERMEDIARY-INFLUENCE"/> -- capabilities that those parties (or the states that have authority over them) can use for coercive ends <xref target="INTERDEPENDENCE"/> or even to disrupt society itself. Just as good governance of states requires separation of powers <xref target="FEDERALIST-51"/>, so too does good governance of the Internet require that power not be concentrated in one place without appropriate checks and balances.</li>
          <li>
            <em>Limits on Innovation</em>: Consolidation can preclude the possibility of "permissionless innovation" -- the ability to deploy new, unforeseen applications without requiring coordination with parties other than those you are communicating with.</li>
          <li>
            <em>Constraints on Competition</em>: The Internet and its users benefit from robust competition when applications and services are available from many providers -- especially when those users can build their own applications and services based upon interoperable standards. When a consolidated service or platform must be used because no substitutes are suitable, it effectively becomes an essential facility, which encourages abuse of power.</li>
          <li>
            <em>Reduced Availability</em>: Availability of the Internet (and applications and services built upon it) improves when there are many ways to obtain access. While service availability can benefit from the focused attention of a large consolidated provider, that provider's failure can have a disproportionate impact on availability.</li>
          <li>
            <em>Monoculture</em>: The scale available to a consolidated provider can magnify minor flaws in features to a degree that can have broad consequences. For example, a single codebase for routers elevates the impact of a bug or vulnerability; a single recommendation algorithm for content can have severe social impact. Diversity in functions' implementation leads to a more robust outcome when viewed systemically, because "progress is the outcome of a trial-and-error evolutionary process of many agents interacting freely." <xref target="POLYCENTRIC"/></li>
          <li>
            <em>Self-Reinforcement</em>: As widely noted (see, e.g., <xref target="ACCESS"/>), a consolidated provider's access to data allows it the opportunity to make improvements to its offerings, while denying such access to others.</li>
        </ul>
        <t>However, these are only indicators, and each needs to be evaluated carefully on a case-by-case basis.</t>
        <t>For example, it is important to distinguish centralization from anticompetitive concerns (also known as "antitrust"). While there are many interactions between these concepts and making the Internet more competitive may be a motivation for avoiding consolidation, only courts (and sometimes, regulators) have the authority to define a relevant market and determine that behavior is anti-competitive. Furthermore, what might be considered undesirable consolidation by the technical community might not attract competition regulation. Conversely, what might attract competition regulation might not be of great concern to the technical community if other mitigations are felt to be adequate.</t>
        <t>Likewise, while centralization interacts with availability, they are distinct and any relationship between them cannot be assumed without careful analysis of where and how centralization occurs. Centralized systems might be more available because of factors like the resources available to them, but also have greater impact when they encounter a fault; decentralized systems might be more resilient in the face of local failures, but less able to react to systemic issues. A failure because of a cut cable, power outage, or failed server is qualitatively different from the issues encountered when a core Internet function has a gatekeeper.</t>
        <t>For example, a large variety of Web sites might depend upon a cloud hosting provider or content delivery network; if it were to become unavailable (whether for technical or other reasons), many people's experience of the Internet might be disrupted. Likewise, a mobile Internet access provider might have an outage that affects hundreds, thousands, or more of its users. In both cases, centralization is not indicated by the loss of availability or its scale, but it well might be if the parties relying on the function don't have reasonable options to switch to if they are unhappy with the availability of the service provided, or if friction against switching to an alternative is too great.</t>
      </section>
      <section anchor="kinds">
        <name>How Centralization Occurs</name>
        <t>A function's design can exhibit and encourage centralization in a variety of ways. The subsections below describe different contributors to and expressions of centralization in Internet functions. Note that this is not a taxonomy, in that it is not complete and there may be overlap.</t>
        <section anchor="direct">
          <name>Proprietary Centralization</name>
          <t>Creating of a protocol or application with a fixed role for a specific party is the most obvious form of centralization. Many messaging, videoconferencing, chat, social networking, and similar applications currently operate in this fashion.</t>
          <t>Because they allow control by a single entity, proprietary protocols are often considered simpler to design, more amenable to evolution, and more likely to meet user needs <xref target="MOXIE"/>, compared to decentralized alternatives. However, their centralization is absolute -- if the function has no alternative providers, or switching to those providers is too difficult, its users are "locked in."</t>
          <t>Proprietary protocols and applications are not considered as being part of the Internet per se; instead, they are more properly characterized as being built on top of the Internet. The Internet architecture and associated standards do not control them, beyond the constraints that the underlying protocols (e.g., TCP, IP, HTTP) impose.</t>
        </section>
        <section anchor="necessary">
          <name>Beneficial Centralization</name>
          <t>Some protocols and applications have goals that require centralization, because they rely on it to deliver a particular benefit.</t>
          <t>Often, this is due to technical necessity. For example, a single, globally coordinated “source of truth” is by nature centralized -- such as in the Domain Name System (DNS), which allows human-friendly naming to be converted into network addresses in a globally consistent fashion.</t>
          <t>Or, consider IP addresses allocation. Internet routing requires addresses to be allocated uniquely, but if a single government or company were to capture the addressing function, the entire Internet would be at risk of abuse by that entity. The same benefits and risks can be seen in the Web's trust model, thanks to the Certificate Authority's role in communication between clients and servers</t>
          <t>Protocols that need to solve the "rendezvous problem" to coordinate communication between two parties who are not in direct contact also exhibit beneficial centralization. For example, chat protocols need to coordinate communication between two parties that wish to talk; while the actual communication can be direct between them (so long as the protocol facilitates that), the endpoints' mutual discovery typically requires a third party at some point. From the perspective of those two users, the rendezvous function is centralized.</t>
          <t>Even when not strictly necessary, centralization can be deployed to beneficial ends. <xref target="AMBITION"/> notes that "centralized structures can have virtues, such as enabling publics to focus their limited attention for oversight, or forming a power bloc capable of challenging less-accountable blocs that might emerge. Centralized structures that have earned widespread respect in recent centuries – including governments, corporations, and nonprofit organizations – have done so in no small part because of the intentional design that went into those structures."</t>
          <t>For example, when traffic from many users is mixed in a way that can't be distinguished, censorship becomes more difficult. This "too big to block" phenomenon drives the design of many recent protocols (such as <xref target="ECH"/>), but they require a degree of centralization to meet their goals.</t>
          <t>Likewise, when a function requires governance to realize common goals and protect minority interests, a "choke point" is naturally formed by the chosen governance mechanism, increasing centralization. For example, content moderation functions concentrate decision making to impose community values. Complex and risky functions like financial services (e.g., credit card processing) can be seen as beneficially centralized into relatively few, specialized organizations, where they can received the focused attention that they require.</t>
          <t>When beneficial centralization is present, Internet protocols often attempt to mitigate the associated risks using measures such as federation (see <xref target="federation"/>) or multi-stakeholder governance (see <xref target="multi"/>). Protocols that successfully do so are often reused to avoid the considerable cost and risk of re-implementing those mitigations. For example, if a protocol requires a coordinated, global naming function, reusing the Domain Name System is usually preferable to establishing a new system.</t>
          <t>Ultimately, deciding what is beneficial is a judgment call. Some protocols cannot function without a centralized function; others might be significantly enhanced for certain use cases if a function is centralized, or might merely be more efficient. Such judgments should be made in light of established architectural principles and how benefits accrue to end users.</t>
        </section>
        <section anchor="indirect">
          <name>Concentration</name>
          <t>Even when a function avoids or mitigates other forms of centralization, it might become consolidated in practice when external factors influence its deployment, so that few or even just one entity provides the function. This document refers to this phenomenon as "concentration."
Concentration can be caused by economic, legal, social, and even cognitive factors that encourage use of a central function despite the absence of such a requirement in the protocol itself.</t>
          <t>Concentration is often associated with the network effects that are so often seen on the Internet. While in theory every node on the Internet is equal, in practice some nodes are much more connected than others: for example, just a few sites drive much of the traffic on the Web. While expected and observed in many kinds of networks, these effects award asymmetric power to nodes that act as intermediaries to communication. <xref target="SCALE-FREE"/></t>
          <t>There may be legitimate qualitative reasons for some nodes being favoured over others. However, when it happens because friction against using an alternative prevents switching, benefits are accrued to services rather than users. If choosing an alternate provider requires a significant amount of time, resources, expertise, coordination, loss of functionality, or effort, centralization is indicated.</t>
          <t>Conversely, a function based on a well-defined, open specification designed to minimize switching costs might be considered to have less centralization even when users continue to favor large providers, because ease of switching creates implicit competitive pressure upon them.</t>
          <t>For example, social networking is an application that is currently supplied by a few proprietary platforms despite standardization efforts (see, e.g., <xref target="ACTIVITYSTREAMS"/>), because of the powerful network effects associated. While there has been some competition in social networking, the choices that their peers make often restricts individual choices, because of the coordination required to move to a new service.</t>
          <t>See <xref target="ISOC"/> for a deeper exploration of concentration.</t>
          <t>Concentration is difficult to avoid in protocol design, and federated protocols are particularly vulnerable to it (see <xref target="federation"/>).</t>
        </section>
        <section anchor="network">
          <name>Inherited Centralization</name>
          <t>Most Internet protocols and applications depend on other, "lower-layer" functions and their implementations. The features, deployment, and operation of these dependencies can surface centralization into functions and applications built "on top" of them.</t>
          <t>For example, the network between endpoints can introduce this kind of centralization to application-layer protocols because it is necessary for communication and therefore has power over it. A network might block access to, slow down, or change the content of various application protocols or specific services for financial, political, operational, or criminal reasons, thereby creating a disincentive (or even removing the ability) to use them. By selectively hindering the use of some services but not others, network interventions can be composed to aid concentration in those other services -- intentionally or not.</t>
          <t>Likewise, having only a single implementation of a protocol is a form of inherited centralization, because applications that use it are vulnerable to the control it has over their operation. Even Open Source projects can exhibit this if there are factors that make forking difficult (for example, the cost of maintaining that fork).</t>
          <t>Inherited centralization surfaces when viable alternatives to these dependencies are not available. It is often present when network effects restrict choices, but can also be created by legal mandates and incentives that restrict the options for a function (such as Internet access), its provision, or the range of implementations available.</t>
          <t>Alternatively, it might occur due to scarcity. For example, the exhaustion of IPv4 addresses creates a power differential between those who have addresses and those who do not, which can affect how the protocols that depend on IP connectivity are deployed and used. If those addresses are held by only a few consolidation is the result, in turn leading to ossification because new applications cannot be deployed without their cooperation.</t>
          <t>Some effects of inherited centralization can be mitigated by enforcing layer boundaries using techniques like encryption. When the number of parties who have access to content of communication are limited, parties at lower layers can be prevented from interfering with and observing it. Although those lower-layer parties might still prevent communication, encryption also makes it more difficult to discriminate a target from other users' traffic.</t>
          <t>Note that the prohibitive effect of encryption on inherited centralization is most pronounced when most (if not all) traffic is encrypted. See also <xref target="RFC7258"/>.</t>
        </section>
        <section anchor="platform">
          <name>Platform Centralization</name>
          <t>The complement to inherited centralization is platform centralization -- where a function does not directly define a central role, but could facilitate consolidation in the applications it supports.</t>
          <t>For example, HTTP <xref target="HTTP"/> is not generally considered a centralized protocol; interoperable servers are easy to instantiate, and multiple clients are available. It can be used without central coordination beyond that provided by DNS, as discussed above. However, applications built on top of HTTP (as well as the rest of the “Web Platform”) often exhibit consolidation (for example, social networking). HTTP is therefore an example of platform centralization -- while the protocol itself is not centralized, it facilitates the creation of consolidated services and applications.</t>
          <t>Like concentration, platform centralization is difficult to prevent with protocol design. Because of the layered nature of the Internet, most protocols allow considerable flexibility in how they are used, to promote permissionless innovation.</t>
        </section>
      </section>
    </section>
    <section anchor="decentralization">
      <name>Decentralization</name>
      <t>While the term "decentralization" has a long history of use in economics, politics, religion, and international development, Baran gave one of the first definitions relevant to computer networking, as a condition when "complete reliance upon a single point is not always required." <xref target="RAND"/></t>
      <t>This seemingly straightforward technical definition hides several issues.</t>
      <t>First, identifying which aspects of a function to decentralize and how to do so can be difficult, both because there are often many ways a function might be centralized, and because consolidation sometimes only becomes clear after the function is deployed at scale. Efforts to decentralize often have the effect of merely shifting consolidation to a different place.</t>
      <t>For example, a cloud storage function might be implemented using a distributed consensus protocol, assuring that the failure of any single node will not affect the system's operation or availability. In that sense, it is decentralized. However, if it is operated by a single legal entity, that brings a very different kind of centralization, especially if there are few other options available, or if there is friction against choosing other options.</t>
      <t>Another example is the Web, which was envisioned and widely held to be a decentralizing force in its early life. Its inherent platform centralization only became apparent when large sites successfully leveraged network effects for dominance of social networking, marketplaces, and similar functions.</t>
      <t>Second, different parties might have good-faith differences on what "sufficiently decentralized" means based upon their beliefs, perceptions and goals. Just as centralization is a continuum, so is decentralization, and not everyone agrees one what the "right" level or type is, how to weigh different forms of centralization against each other, or how to weigh potential consolidation against other architectural goals (such as security or privacy).</t>
      <t>These tensions can be seen, for example, in the DNS. While much of the system is decentralized through the distribution of the lookup function to local servers that users have the option to override, the DNS is also a name space -- a single, global "source of truth" with inherent (if beneficial) centralization in its management. ICANN mitigates the associated risk through multi-stakeholder governance (see <xref target="multi"/>). While many believe that this arrangement is sufficient and might even have desirable qualities (such as the ability to impose community standards over the operation of the name space), others reject ICANN's oversight of the DNS as illegitimate, favoring decentralization based upon distributed consensus protocols rather than multistakeholderism. <xref target="MUSIANI"/></t>
      <t>Third, decentralization unavoidably involves adjustments to the power relationships between protocol participants, especially when it opens up the possibility of consolidation elsewhere. As Schneider notes in <xref target="AMBITION"/>, decentralization "appears to operate as a rhetorical strategy that directs attention toward some aspects of a proposed social order and away from others", so "we cannot accept technology as a substitute for taking social, cultural, and political considerations seriously." Or, as more bluntly stated in <xref target="PERSPECTIVE"/>, "without governance mechanisms in place, nodes may collude, people may lie to each other, markets can be rigged, and there can be significant cost to people entering and exiting markets."</t>
      <t>For example, while blockchain-based cryptocurrencies might address the consolidation inherent in traditional currencies through technical means, the concentration of power that many exhibit in terms of voting/mining power, distribution of funds, and diversity of codebase causes some to question how decentralized they actually are. <xref target="AREWEDECENTRALIZEDYET"/> The lack of formal structures brings an opportunity for latent, informal power structures that have their own risks -- including consolidation. <xref target="STRUCTURELESS"/></t>
      <t>In practice, this means that decentralizing a function requires considerable work, is inherently political, and involves a large degree of uncertainty about the outcome. In particular, if one considers decentralization as a larger social goal (in the spirit of how the term is used in other, non-computing contexts), merely rearranging technical functions may lead to frustration. "A distributed network does not automatically yield an egalitarian, equitable or just social, economic, political landscape." <xref target="PERSPECTIVE"/></t>
      <section anchor="techniques">
        <name>Decentralization Techniques</name>
        <t>Over time, a few different techniques have been used to facilitate decentralization of Internet protocols. The subsection below examine some of these techniques, along with their limitations.</t>
        <t>None of them is a panacea; it is not possible to completely remove all forms of centralization from protocols that, at their heart, require agreement between multiple parties. However, when performed properly, decentralization might produce an outcome where that risk is understood, acceptable, and, where possible and appropriate, mitigated.</t>
        <t>There is also no "correct" way to decentralize; it does not require that provision of a function need be distributed in a particular fashion, or to a particular degree. For example, the Domain Name System <xref target="RFC1035"/> is widely agreed to have an acceptable form of centralization, despite it being provided by a limited set of entities.</t>
        <section anchor="federation">
          <name>Federation</name>
          <t>A common technique for addressing centralization in Internet protocols is federation -- designing them in such a way that new instances of a function are easy to create and can maintain interoperability and connectivity with other instances.</t>
          <t>For example, SMTP <xref target="RFC5321"/> is the basis of the e-mail suite of protocols, which has two functions that exhibit centralization:</t>
          <ol spacing="normal" type="1"><li>Giving each user a globally unique address, and</li>
            <li>Routing messages to the user, even when they change network locations or become disconnected for long periods of time.</li>
          </ol>
          <t>E-mail reuses DNS to help mitigate the first. To mitigate the second, it defines a specific role for routing users' messages, the Message Transfer Agent (MTA). By allowing anyone to deploy an MTA and defining rules for interconnecting them, the protocol's users avoid a requirement for a single central router.</t>
          <t>Users can (and often do) choose to delegate that role to someone else, or run their own MTA. However, many now consider running a personal MTA to be impractical because of the likelihood of a small MTA being classified as a spam source. Because large MTA operators are widely known and have greater impact if their operation is affected, they are less likely to be classified as such, concentrating the protocol’s operation (see <xref target="indirect"/>).</t>
          <t>Another example of a federated Internet protocol is XMPP <xref target="RFC6120"/>, supporting "instant messaging" and similar functionality. Like e-mail, it reuses DNS for naming and requires federation to facilitate rendezvous of users from different systems.</t>
          <t>While some deployments of XMPP do support truly federated messaging (i.e., a person using service A can interoperably chat with someone using service B), many of the largest do not. Because federation is voluntary, some operators captured their users into a single service, denying them the benefits of global interoperability.</t>
          <t>The examples above illustrate that, while federation can be a useful technique for avoiding proprietary centralization and managing beneficial centralization, it does not prevent concentration or platform centralization. If a single entity can capture the value provided by a protocol, it may use the protocol as a platform to get a “winner take all” outcome -- a significant risk with many Internet protocols, since network effects often promote such outcomes. Likewise, external factors (such as spam control) might naturally “tilt the table” towards a few operators.</t>
        </section>
        <section anchor="multi">
          <name>Multi-Stakeholder Governance</name>
          <t>Protocol designers sometime attempt to mitigate beneficial centralization (see <xref target="necessary"/>) by delegating that function's governance to a multi-stakeholder body -- an institution that includes representatives of the different kinds of parties that are affected by the system's operation ("stakeholders") in an attempt to make well-reasoned, legitimate, and authoritative decisions.</t>
          <t>The most widely studied example of this technique is the governance of the DNS name space, which as a “single source of truth” exhibits beneficial centralization. The associated risk is managed through administration by <eref target="https://www.icann.org/resources/pages/governance/governance-en">the Internet Corporation for Assigned Names and Numbers (ICANN)</eref>, a global multi-stakeholder body with representation from end users, governments, operators, and others.</t>
          <t>Another example is the governance of the Web's trust model, implemented by Web browsers as relying parties and Certificate Authorities as trust anchors. To promote the operational and security requirements necessary to provide the desired properties, the <eref target="https://cabforum.org">CA/Browser Forum</eref> was established as an oversight body that involves both parties as stakeholders.</t>
          <t>Yet another example of multi-stakeholderism is the standardization of Internet protocols themselves. Because a specification controls implementation behavior, the standardization process can be seen as a single point of control. As a result, Internet standards bodies like the IETF allow open participation and contribution, make decisions in an open and accountable way, have a well-defined process for making (and when necessary, appealing) decisions, considering the views of different stakeholder groups <xref target="RFC8890"/>.</t>
          <t>A major downside of this approach is that setup and ongoing operation of multi-stakeholder bodies is not trivial. Additionally, their legitimacy cannot be assumed, and may be difficult to establish and maintain (see, e.g., <xref target="MULTISTAKEHOLDER"/>). This concern is especially relevant if the function being coordinated is broad, complex, and/or contentious.</t>
        </section>
        <section anchor="distributed">
          <name>Distributed Consensus</name>
          <t>Increasingly, distributed consensus technologies (such as the blockchain) are touted as a solution to consolidation issues. A complete survey of this rapidly changing area is beyond the scope of this document, but we can generalize about its properties.</t>
          <t>These techniques attempt to avoid centralization by distributing functions to members of a sometimes large pool of protocol participants. They typically guarantee proper performance of a function using cryptographic techniques (often, an append-only transaction ledger). A particular task's assignment to a node for handling usually cannot be predicted or controlled.</t>
          <t>Sybil attacks (where a party or coordinated parties cheaply create enough protocol participants to affect how consensus is judged) are a major concern for these protocols. They encourage diversity in the pool of participants using indirect techniques, such as proof-of-work (where each participant has to show significant consumption of resources) or proof-of-stake (where each participant has some other incentive to execute correctly).</t>
          <t>Use of these techniques can create barriers to proprietary and inherited centralization. However, depending upon the application in question, both concentration and platform centralization are still possible.</t>
          <t>Furthermore, a protocol or an application can use distributed consensus for some functions, but still be centralized elsewhere -- either because those functions cannot be decentralized (most commonly, rendezvous and global naming; see <xref target="necessary"/>) or because the designer has chosen not to because of the associated costs and lost opportunities.</t>
          <t>Even when distributed consensus is used for all technical functions of a service, some coordination is still necessary -- whether that be through governance of the function itself, creation of shared implementations, or documentation of shared wire protocols. That represents centralization, just at a different layer (inherited or platform). For example, the Ethereum "merge" demonstrated that the blockchain could address environmental concerns, but only through coordinated community effort and governance. <xref target="ETHEREUM"/></t>
          <t>These potential shortcomings do not rule out the use of distributed consensus technologies in every instance. They do, however, caution against uncritically relying upon these technologies to avoid or mitigate centralization.</t>
        </section>
      </section>
    </section>
    <section anchor="considerations">
      <name>What Should Internet Standards Do?</name>
      <t>Centralization is driven by powerful forces -- both economic and social -- as well as the network effects that come with Internet scale. Bodies like the IETF create voluntary standards; they cannot require adoption, but when a specification succeeds it creates those very network effects. As such, standards bodies cannot prevent all forms of consolidation, but they can still take meaningful steps to prevent some of them. The subsections below suggest a few.</t>
      <section anchor="legitimate">
        <name>Bolster Legitimacy</name>
        <t>Many efforts to address Internet consolidation are likely to take place outside of standards bodies. If the IETF wishes to contribute to these efforts and assure their compatibility with the Internet's architectural goals, it must be seen as legitimate by the relevant parties -- especially, by competition regulators. Otherwise, if the IETF is perceived as representing or being controlled by "big tech" concerns, its ability to guide decisions that affect the Internet will be diminished considerably.</t>
        <t>The IETF already has features that arguably provide considerable legitimacy; for example, open participation and representation by individuals rather than companies both enhance input legitimacy; a well-defined process with multiple layers of appeals and transparency contributes to throughput legitimacy, and a long history of successful Internet standards provides perhaps the strongest source of legitimacy for the IETF -- its output.</t>
        <t>However, it is also widely recognized the considerable costs (not just financial) involved in successfully participating in the IETF have a tendency to favour larger companies over smaller concerns. Likewise, the specialised and highly technical nature of the work creates barriers to entry for non-technical stakeholders. These factors have the potential to reduce the legitimacy of the IETF's decisions, at least in some eyes.</t>
        <t>Efforts to address these shortcomings are ongoing; see, for example, <xref target="RFC8890"/>. Overall, bolstering the legitimacy of the organization should be seen as a continuous effort.</t>
      </section>
      <section anchor="target">
        <name>Engage with Centralization Thoroughly but Realistically</name>
        <t>Some kinds of centralization are easy to manage in standards efforts. For example, if a protocol with a fixed role for a single party were to be proposed to the IETF for publication as a standard, it would be rejected out of hand. There is a growing body of knowledge and experience in managing the risks of beneficial centralization, and a strong inclination to reuse existing infrastructure where possible. As discussed above, encryption is often a way to manage inherited centralization, and has become the norm in standard protocols. These responses are appropriate ways for Internet standards to manage centralization.</t>
        <t>However, mitigating concentration and platform centralization is much more difficult in standards efforts. Because the IETF has no "protocol police", it’s not possible to demand, for example, that someone stop building a proprietary service using a federated protocol; even if it could, doing so would contradict architectural goals like permissionless innovation. While the imprimatur of an Internet Standard is not without value, merely withholding it cannot prevent these sources of consolidation.</t>
        <t>Therefore, committing significant resources to scrutinizing protocols for latent centralization -- especially for concentration and platform centralization -- is unlikely to be effective in preventing Internet consolidation. Almost all existing Internet protocols -- including IP, TCP, HTTP, and DNS -- exhibit concentration or platform centralization. Refusing to standardize a newer protocol because it exhibits similar properties would not be equitable, proportionate, or effective.</t>
        <t>When claims are made that a given proposal is "centralized" or "decentralized", the context of those statements should be examined for presuppositions, assumptions, and omissions. <xref target="BACCHI"/> offers one framework for such critical interrogations. <xref target="SCHNEIDER"/> implores that proposals to decentralize be "really, really clear about what particular features of a system a given design seeks to decentralize" and promotes borrowing remedies from more traditional governance systems, such as separation of powers and accountability.</t>
        <t>When centralization is found, standards efforts should consider its relationship with architectural goals as they consider how to address it. In particular, attention should be paid to how effective standards (as a form of architectural control) is in achieving each goal.</t>
        <t>For example, privacy is often more effectively ensured by ex ante technical constraints, as compared to ex post legal regulation. Conversely (as discussed) some centralization may be more effectively addressed through legal regulation. Thus, a standards effort balancing these concerns might focus primarily on privacy. However, these are often not completely separable goals. Concentration can result in one or a few entities having greater volume and variety of data available exclusively to them, raising significant privacy and security concerns.</t>
      </section>
      <section anchor="up">
        <name>Decentralize Proprietary Functions</name>
        <t>It is worthwhile to create specifications for functions that are currently only available from proprietary providers. Open standards can provide a viable alternative to a consolidated function.</t>
        <t>Such efforts might include large-scale protocols for existing proprietary functions (e.g., chat) as well as smaller efforts to improve interoperability and portability of specific features that are often used to "lock in" users to a platform; for example, a format for lists of contacts in a social network.</t>
        <t>A common objection to this approach is that adoption is voluntary, not mandatory; there are no "standards police" to mandate their use or enforce correct implementation. For example, specifications like <xref target="ACTIVITYSTREAMS"/>) have been available for some time without being used in a federated manner by commercial social networking providers.</t>
        <t>However, while standards aren't mandatory, legal regulation is, and legal mandates for interoperability are increasingly discussed by policymakers as a remedy for competition issues (see, e.g., <xref target="OECD"/>).</t>
        <t>As such, appetite for regulation presents an opportunity for new specifications to decentralize these functions, backed by a legal mandate in combination with changing norms and the resulting market forces <xref target="NEW-CHICAGO"/>. That opportunity also presents a risk, however, if the resulting legal regulation is at odds with the Internet architecture.</t>
        <t>Successfully creating standards that work in concert with legal regulation presents many potential pitfalls, and will require improved and new capabilities (especially liaison, likely originating in the IAB), and considerable effort. If the Internet community does not make that effort, it is likely that regulators will turn to other sources of interoperability specifications -- most likely, with less transparency, more narrow input, limited experience, and without reference to the Internet’s architectural goals.</t>
      </section>
      <section anchor="new">
        <name>Evaluate New Decentralization Techniques</name>
        <t>The decentralization techniques listed in <xref target="techniques"/> are not a closed set; wide interest has spurred development of new approaches, both in general and as solutions to specific problems.</t>
        <t>For example, secure multi-party computation techniques (see, e.g., <xref target="YAO"/>) can be composed to allow parties to compute over private inputs without revealing them. Protocols like <xref target="ENPA"/> and <xref target="PRIO"/> use them to limit the information available to participants in protocols to realize privacy goals; as discussed in <xref target="intermediation"/> doing so might also counteract some sources of centralization. However, as with those covered above, these techniques do not automatically preclude all consolidation; such systems often still require trust, even if it is limited, and that might result in other forms of consolidation emerging.</t>
        <t>Whether use of these techniques (or others) can meaningfully counteract consolidation is still uncertain. Standards bodies (including the IETF) can serve an important function by incubating them, applying (and, where necessary, developing) architectural guidelines for privacy, security, operability, and other goals, and assuring interoperability. When appropriate, publication on the standards track or as experimental can send signals to implementers, users, and regulators about their fitness for particular purposes.</t>
      </section>
      <section anchor="balance">
        <name>Enable Switching</name>
        <t>To minimize centralization, standards-defined functions should have an explicit goal enabling users' switching between implementations and deployments of protocols.</t>
        <t>One necessary condition for this is the availability of alternatives; breadth and diversity of implementation and deployment are required. <xref section="2.1" sectionFormat="of" target="RFC5218"/> explores some factors in protocol design that encourage this outcome.</t>
        <t>Another factor is the cost of substituting an alternative implementation or deployment by users. This implies that the standard needs to be functionally complete and specified precisely enough to allow substitution.</t>
        <t>These goals of completeness and diversity are sometimes in tension. If a standard becomes extremely complex, it may discourage implementation diversity because the cost of a complete implementation is too high (consider: Web browsers). On the other hand, if the specification is too simple, it may not enable easy switching, especially if proprietary extensions are necessary to complete it (see <xref target="evolution"/>).</t>
        <t>One objection to protocols that enable easy switching is that they reduce the incentives for implementation by commercial vendors. While a completely commoditized protocol might not allow implementations to differentiate themselves, they provide opportunities for specialization and improvement elsewhere in the value chain <xref target="ATTRACTIVE-PROFITS"/>. Well-timed standards efforts leverage these forces to focus proprietary interests on top of open technology, rather than as a replacement for it.</t>
      </section>
      <section anchor="intermediation">
        <name>Control Delegation of Power</name>
        <t>Some functions might see substantial benefits if they are provided by a third party in communication. Adding a new party to communication can improve:</t>
        <ul spacing="normal">
          <li>
            <em>Efficiency</em>: Many functions on the Internet are more efficient when performed at a higher scale. For example, a content delivery network can offer services at a fraction of the financial and environmental cost that someone serving content themselves would otherwise pay, because of the scale they operate at. Likewise, a two-sided market platform can introduce sizeable efficiencies over pair-wise buyer/seller trading <xref target="CIRCULAR-CONUNDRUM"/>.</li>
          <li>
            <em>Simplicity</em>: Completely disintermediating communication can shift the burden of functions onto endpoints. This can cause increased cognitive load for users; for example, compare commercial social networking platforms with self-hosted efforts.</li>
          <li>
            <em>Specialization</em>: Having a function concentrated into a few hands can improve outcomes because of the resulting specialization. For example, services overseen by professional administrators are often seen to have a better security posture and improved availability.</li>
          <li>
            <em>Privacy</em>: For some functions, user privacy can be improved by concentrating their activity to prevent individual behaviors from being discriminated from each other.<xref target="MIX"/> Introduction of a third party can also enforce functional boundaries -- for example, to reduce the need for users to trust potentially malicious endpoints, as seen in the so-called "oblivious" protocols (e.g., <xref target="RFC9230"/>) that allow end users to hide their identity from services, while still accessing them.</li>
        </ul>
        <t>However, introducing a new party to communication adds concentration and platform centralization to Internet functions, because it brings opportunities for control and observation. While (as discussed above) standards efforts have a very limited capability to prevent or control the resulting consolidation, designing functions with thoughtful constraints on third party functions can prevent at least the most egregious outcomes.</t>
        <t>Most often, third parties are added to functions as "intermediaries" or in designated "agent" roles. In general, they should only be interposed because of the positive action of at least one of the primary parties, and should have their ability to observe or control communication limited to what is necessary to perform their intended function.</t>
        <t>For example, early deployments of HTTP allowed intermediaries to be interposed by the network without knowledge of the endpoints, and those intermediaries could see and change the full content of traffic by default -- even when they are only intended to perform basic functions such as caching. Because of the introduction of HTTPS and the CONNECT method (see <xref section="9.3.6" sectionFormat="of" target="HTTP"/>), combined with efforts to encourage its adoption, those intermediaries are now required to be explicitly interposed by one endpoint.</t>
        <t>See <xref target="I-D.thomson-tmi"/> for more guidance on protocol intermediation.</t>
        <t>The term "intermediary" is also used (often in legal and regulatory contexts) more broadly than it has been in protocol design; for example, an auction Web site intermediates between buyers and sellers is considered an intermediary, even though it is not formally an intermediary in HTTP (see <xref section="3.7" sectionFormat="of" target="HTTP"/>). Protocol designers can address the centralization associated with this kind of intermediation by standardising the function, rather than restricting the capabilities of the underlying protocols; see <xref target="up"/>.</t>
      </section>
      <section anchor="evolution">
        <name>Consider Extensibility and Modularity Carefully</name>
        <t>The Internet's ability to evolve is critical, allowing it to meet new requirements and adapt to new conditions without requiring a “flag day” to upgrade implementations. Typically, functions accommodate evolution by defining extension interfaces, which allow optional features to be added or change over time in an interoperable fashion.</t>
        <t>However, these interfaces can also be a basis for platform centralization if a powerful entity can change the target for meaningful interoperability by adding proprietary extensions to a standard. This is especially true when the core standard does not itself provide sufficient utility on its own.</t>
        <t>For example, the SOAP protocol's <xref target="SOAP"/> extreme flexibility and failure to provide significant standalone value allowed vendors to require use of their preferred extensions, favoring those who had more market power.</t>
        <t>Therefore, standards efforts should focus on providing concrete utility to the majority of their users as published, rather than being a “framework” where interoperability is not immediately available. Internet functions should not make every aspect of their operation extensible; boundaries between modules should be designed in a way that allows evolution and discourages consolidation, while still offering meaningful functionality.</t>
        <t>Beyond allowing evolution, well-considered interfaces can also aid decentralization efforts. The structural boundaries that emerge between the sub-modules of the function -- as well as those with adjacent functions -- provide touchpoints for interoperability and an opportunity for substitution of providers.</t>
        <t>In particular, if the interfaces of a function are well-defined and stable, there is an opportunity to use different providers for that function. When those interfaces are open standards, change control resides with the Internet community instead of remaining in proprietary hands, further enhancing stability and enabling (but not ensuring) decentralization.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document does not have a direct security impact on Internet protocols. However, failure to consider centralization might cause a myriad of security issues.</t>
    </section>
  </middle>
  <back>
    <displayreference target="RAND" to="BARAN"/>
    <displayreference target="SCALE-FREE" to="BARABASI"/>
    <displayreference target="INTERMEDIARY-INFLUENCE" to="JUDGE"/>
    <displayreference target="INTERDEPENDENCE" to="FARRELL"/>
    <displayreference target="MULTISTAKEHOLDER" to="PALLADINO"/>
    <displayreference target="NEW-CHICAGO" to="LESSIG"/>
    <displayreference target="POLYCENTRIC" to="ALIGIA"/>
    <displayreference target="PIR" to="OLUMOFIN"/>
    <displayreference target="ACCESS" to="ABRAHAMSON"/>
    <displayreference target="SUCCESS" to="KENDE"/>
    <displayreference target="MIX" to="CHAUM"/>
    <displayreference target="FEDERALIST-51" to="MADISON"/>
    <displayreference target="ATTRACTIVE-PROFITS" to="CHRISTENSEN"/>
    <displayreference target="CIRCULAR-CONUNDRUM" to="SPULBER"/>
    <displayreference target="AMBITION" to="SCHNEIDERb"/>
    <displayreference target="PERSPECTIVE" to="BODO"/>
    <displayreference target="STRUCTURELESS" to="FREEMAN"/>
    <displayreference target="SCHNEIDER" to="SCHNEIDERa"/>
    <references>
      <name>Informative References</name>
      <reference anchor="RAND" target="https://www.rand.org/pubs/research_memoranda/RM3420.html">
        <front>
          <title>On Distributed Communications: Introduction to Distributed Communications Networks</title>
          <author initials="P." surname="Baran" fullname="Paul Baran">
            <organization>RAND Corporation</organization>
          </author>
          <date year="1964"/>
        </front>
      </reference>
      <reference anchor="HTTP">
        <front>
          <title>HTTP Semantics</title>
          <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding">
            <organization/>
          </author>
          <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham">
            <organization/>
          </author>
          <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke">
            <organization/>
          </author>
          <date month="June" year="2022"/>
          <abstract>
            <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes. </t>
            <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="97"/>
        <seriesInfo name="RFC" value="9110"/>
        <seriesInfo name="DOI" value="10.17487/RFC9110"/>
      </reference>
      <reference anchor="SOAP" target="https://www.w3.org/TR/2007/REC-soap12-part0-20070427/">
        <front>
          <title>SOAP Version 1.2 Part 0: Primer (Second Edition)</title>
          <author fullname="Nilo Mitra" role="editor"/>
          <author fullname="Yves Lafon" role="editor"/>
          <date day="27" month="April" year="2007"/>
        </front>
        <seriesInfo name="W3C REC" value="REC-soap12-part0-20070427"/>
        <seriesInfo name="W3C" value="REC-soap12-part0-20070427"/>
      </reference>
      <reference anchor="SCALE-FREE" target="https://barabasi.com/f/67.pdf">
        <front>
          <title>Emergence of Scaling in Random Networks</title>
          <author initials="R." surname="Albert" fullname="Réka Albert">
            <organization>University of Notre Dame</organization>
          </author>
          <date year="1999" month="October"/>
        </front>
        <refcontent>SCIENCE, Vol. 286, No. 15, p. 509</refcontent>
      </reference>
      <reference anchor="INTERMEDIARY-INFLUENCE" target="https://scholarship.law.columbia.edu/faculty_scholarship/1856">
        <front>
          <title>Intermediary Influence</title>
          <author initials="K." surname="Judge" fullname="Kathryn Judge">
            <organization>Columbia Law School</organization>
          </author>
          <date year="2014"/>
        </front>
        <refcontent>University of Chicago Law Review, Vol. 82, p. 573</refcontent>
      </reference>
      <reference anchor="INTERDEPENDENCE" target="https://doi.org/10.1162/ISEC_a_00351">
        <front>
          <title>Weaponized Interdependence: How Global Economic Networks Shape State Coercion</title>
          <author initials="H." surname="Farrell" fullname="Henry Farrell">
            <organization>George Washington University</organization>
          </author>
          <author initials="A. L." surname="Newman" fullname="Abraham L. Newman">
            <organization>Georgetown University</organization>
          </author>
          <date year="2019"/>
        </front>
        <refcontent>International Security, Vol. 44, No. 1, p. 42</refcontent>
      </reference>
      <reference anchor="MOXIE" target="https://signal.org/blog/the-ecosystem-is-moving/">
        <front>
          <title>Reflections: The ecosystem is moving</title>
          <author initials="M." surname="Marlinspike" fullname="Moxie Marlinspike">
            <organization>Signal</organization>
          </author>
          <date year="2016" month="May"/>
        </front>
      </reference>
      <reference anchor="MULTISTAKEHOLDER" target="https://link.springer.com/book/10.1007/978-3-030-56131-4">
        <front>
          <title>Legitimacy, Power, and Inequalities in the Multistakeholder Internet Governance</title>
          <author initials="N." surname="Palladino" fullname="Nicola Palladino">
            <organization/>
          </author>
          <author initials="N." surname="Santaniello" fullname="Nauro Santaniello">
            <organization/>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="NEW-CHICAGO" target="https://www.journals.uchicago.edu/doi/10.1086/468039">
        <front>
          <title>The New Chicago School</title>
          <author initials="L." surname="Lessig" fullname="Laurence Lessig">
            <organization/>
          </author>
          <date year="1998" month="June"/>
        </front>
        <refcontent>Journal of Legal Studies, Vol. 27</refcontent>
      </reference>
      <reference anchor="POLYCENTRIC" target="https://onlinelibrary.wiley.com/doi/abs/10.1111/j.1468-0491.2011.01550.x">
        <front>
          <title>Polycentricity: From Polanyi to Ostrom, and Beyond</title>
          <author initials="P. D." surname="Aligia" fullname="Paul D. Aligia">
            <organization/>
          </author>
          <author initials="V." surname="Tarko" fullname="Vlad Tarko">
            <organization/>
          </author>
          <date year="2012" month="April"/>
        </front>
        <refcontent>Governance: An International Journal of Policy, Administration, and Institutions, Vol. 25, No. 2, p. 237</refcontent>
      </reference>
      <reference anchor="PIR" target="https://link.springer.com/chapter/10.1007/978-3-642-27576-0_13">
        <front>
          <title>Revisiting the Computational Practicality of Private Information Retrieval</title>
          <author initials="F." surname="Olumofin" fullname="Femi Olumofin">
            <organization/>
          </author>
          <author initials="I." surname="Goldberg" fullname="Ian Goldberg">
            <organization/>
          </author>
          <date year="2010"/>
        </front>
      </reference>
      <reference anchor="ACCESS" target="https://www.yalelawjournal.org/comment/essential-data">
        <front>
          <title>Essential Data</title>
          <author initials="Z." surname="Abrahamson" fullname="Zachary Abrahamson">
            <organization/>
          </author>
          <date year="2014"/>
        </front>
        <refcontent>Yale Law Journal, Vol. 124, No. 3</refcontent>
      </reference>
      <reference anchor="SUCCESS" target="https://blog.apnic.net/wp-content/uploads/2021/12/MKGRA669-Report-for-APNIC-LACNIC-V3.pdf">
        <front>
          <title>Study on the Internet's Technical Success Factors</title>
          <author initials="M." surname="Kende" fullname="Michael Kende">
            <organization/>
          </author>
          <author initials="A." surname="Kvalbein" fullname="Amund Kvalbein">
            <organization/>
          </author>
          <author initials="J." surname="Allford" fullname="Julia Allford">
            <organization/>
          </author>
          <author initials="D." surname="Abecassis" fullname="David Abecassis">
            <organization/>
          </author>
          <date year="2021" month="December"/>
        </front>
      </reference>
      <reference anchor="OECD" target="https://www.oecd.org/daf/competition/data-portability-interoperability-and-digital-platform-competition-2021.pdf">
        <front>
          <title>Data portability, interoperability and digital platform competition</title>
          <author>
            <organization>OECD</organization>
          </author>
          <date year="2021" month="June"/>
        </front>
      </reference>
      <reference anchor="MIX" target="https://dl.acm.org/doi/10.1145/358549.358563">
        <front>
          <title>Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms</title>
          <author initials="D. L." surname="Chaum" fullname="David L. Chaum">
            <organization/>
          </author>
          <date year="1981" month="February"/>
        </front>
        <refcontent>Communications of the ACM, Vol. 24, No. 2</refcontent>
      </reference>
      <reference anchor="FEDERALIST-51">
        <front>
          <title>The Structure of the Government Must Furnish the Proper Checks and Balances Between the Different Departments</title>
          <author initials="J." surname="Madison" fullname="James Madison">
            <organization/>
          </author>
          <date year="1788" month="February"/>
        </front>
        <refcontent>The Federalist Papers, No. 51</refcontent>
      </reference>
      <reference anchor="ATTRACTIVE-PROFITS">
        <front>
          <title>The Law of Conservation of Attractive Profits</title>
          <author initials="C." surname="Christensen" fullname="Clayton Christensen">
            <organization/>
          </author>
          <date year="2004" month="February"/>
        </front>
        <refcontent>Harvard Business Review, "Breakthrough Ideas for 2004"</refcontent>
      </reference>
      <reference anchor="ACTIVITYSTREAMS" target="https://www.w3.org/TR/2016/CR-activitystreams-core-20161215/">
        <front>
          <title>Activity Streams 2.0</title>
          <author fullname="Evan Prodromou" role="editor"/>
          <author fullname="James Snell" role="editor"/>
          <date day="15" month="December" year="2016"/>
        </front>
        <seriesInfo name="W3C CR" value="CR-activitystreams-core-20161215"/>
        <seriesInfo name="W3C" value="CR-activitystreams-core-20161215"/>
      </reference>
      <reference anchor="CIRCULAR-CONUNDRUM" target="https://wwws.law.northwestern.edu/research-faculty/clbe/workingpapers/documents/spulber_circularconundrum.pdf">
        <front>
          <title>Solving The Circular Conundrum: Communication And Coordination In Internet Markets</title>
          <author initials="D. F." surname="Spulber" fullname="Daniel F. Spulber">
            <organization/>
          </author>
          <date year="2010"/>
        </front>
        <refcontent>Northwestern University Law Review, Vol. 104, No. 2</refcontent>
      </reference>
      <reference anchor="YAO" target="https://dl.acm.org/doi/10.5555/1382436.1382751">
        <front>
          <title>Protocols for secure computations</title>
          <author initials="A. C." surname="Yao" fullname="Andrew C. Yao">
            <organization/>
          </author>
          <date year="1982" month="November"/>
        </front>
        <refcontent>SFCS '82</refcontent>
      </reference>
      <reference anchor="ENPA" target="https://covid19-static.cdn-apple.com/applications/covid19/current/static/contact-tracing/pdf/ENPA_White_Paper.pdf">
        <front>
          <title>Exposure Notification Privacy-preserving Analytics (ENPA) White Paper</title>
          <author>
            <organization>Apple</organization>
          </author>
          <author>
            <organization>Google</organization>
          </author>
          <date year="2021" month="April"/>
        </front>
      </reference>
      <reference anchor="PRIO" target="https://crypto.stanford.edu/prio/paper.pdf">
        <front>
          <title>Prio: Private, Robust, and Scalable Computation of Aggregate Statistics</title>
          <author initials="H." surname="Corrigan-Gibbs" fullname="Henry Corrigan-Gibbs">
            <organization/>
          </author>
          <author initials="D." surname="Boneh" fullname="Dan Boneh">
            <organization/>
          </author>
          <date year="2017" month="March"/>
        </front>
      </reference>
      <reference anchor="AMBITION" target="https://osf.io/m7wyj/">
        <front>
          <title>Decentralization: an incomplete ambition</title>
          <author initials="N." surname="Schneider" fullname="Nathan Schneider">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
        <refcontent>Journal of Cultural Economy, Vol. 12, No. 4</refcontent>
      </reference>
      <reference anchor="AREWEDECENTRALIZEDYET" target="https://bitcoinera.app/arewedecentralizedyet/">
        <front>
          <title>Are We Decentralized Yet?</title>
          <author>
            <organization>bitcoinera</organization>
          </author>
          <date year="2022"/>
        </front>
      </reference>
      <reference anchor="PERSPECTIVE" target="https://doi.org/10.14763/2021.2.1563">
        <front>
          <title>Decentralization: a multidisciplinary perspective</title>
          <author initials="B." surname="Bodó" fullname="Balázs Bodó">
            <organization>University of Amsterdam</organization>
          </author>
          <author initials="J. K." surname="Brekke" fullname="Jaya Klara Brekke">
            <organization>Durham University</organization>
          </author>
          <author initials="J.-H." surname="Hoepman" fullname="Jaap-Henk Hoepman">
            <organization>Radboud University</organization>
          </author>
          <date year="2021" month="June"/>
        </front>
        <refcontent>Internet Policy Review, Vol. 10, No. 2</refcontent>
      </reference>
      <reference anchor="MUSIANI" target="https://link.springer.com/chapter/10.1057/9781137483591_4">
        <front>
          <title>Alternative Technologies as Alternative Institutions: The Case of the Domain Name System</title>
          <author initials="F." surname="Musiani" fullname="Francesca Musiani">
            <organization/>
          </author>
          <date year="2016"/>
        </front>
        <refcontent>The Turn to Infrastructure in Internet Governance</refcontent>
      </reference>
      <reference anchor="STRUCTURELESS" target="https://www.jstor.org/stable/41035187">
        <front>
          <title>The Tyranny of Structurelessness</title>
          <author initials="J." surname="Freeman" fullname="Jo Freeman">
            <organization/>
          </author>
          <date year="1972"/>
        </front>
        <refcontent>Berkeley Journal of Sociology, Vol. 17</refcontent>
      </reference>
      <reference anchor="ISOC" target="https://future.internetsociety.org/2019/">
        <front>
          <title>Consolidation in the Internet Economy</title>
          <author>
            <organization>Internet Society</organization>
          </author>
          <date year="2019"/>
        </front>
        <refcontent>Internet Society Global Internet Report</refcontent>
      </reference>
      <reference anchor="ECH">
        <front>
          <title>TLS Encrypted Client Hello</title>
          <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
            <organization>RTFM, Inc.</organization>
          </author>
          <author fullname="Kazuho Oku" initials="K." surname="Oku">
            <organization>Fastly</organization>
          </author>
          <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
            <organization>Cloudflare</organization>
          </author>
          <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
            <organization>Cloudflare</organization>
          </author>
          <date day="3" month="October" year="2022"/>
          <abstract>
            <t>   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/draft-ietf-tls-esni
   (https://github.com/tlswg/draft-ietf-tls-esni).

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-tls-esni-15"/>
      </reference>
      <reference anchor="SCHNEIDER" target="https://nathanschneider.info/articles/DecentralHacker.html">
        <front>
          <title>What to do once you admit that decentralizing everything never seems to work</title>
          <author initials="N." surname="Schneider" fullname="Nathan Schneider">
            <organization/>
          </author>
          <date year="2022" month="October"/>
        </front>
        <refcontent>Hacker Noon</refcontent>
      </reference>
      <reference anchor="BACCHI" target="https://library.oapen.org/bitstream/handle/20.500.12657/33181/560097.pdf?sequence=1#page=34">
        <front>
          <title>Introducing the ‘What’s the Problem Represented to be?’ approach</title>
          <author initials="C." surname="Bacchi" fullname="Carol Bacchi">
            <organization/>
          </author>
          <date year="2012"/>
        </front>
        <refcontent>Chapter 2, Engaging with Carol Bacchi</refcontent>
      </reference>
      <reference anchor="ETHEREUM" target="https://ethereum.org/en/upgrades/merge/">
        <front>
          <title>The Merge</title>
          <author>
            <organization>Ethereum</organization>
          </author>
          <date year="2023" month="February"/>
        </front>
      </reference>
      <reference anchor="RFC791">
        <front>
          <title>Internet Protocol</title>
          <author fullname="J. Postel" initials="J." surname="Postel">
            <organization/>
          </author>
          <date month="September" year="1981"/>
        </front>
        <seriesInfo name="STD" value="5"/>
        <seriesInfo name="RFC" value="791"/>
        <seriesInfo name="DOI" value="10.17487/RFC0791"/>
      </reference>
      <reference anchor="RFC4271">
        <front>
          <title>A Border Gateway Protocol 4 (BGP-4)</title>
          <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter">
            <organization/>
          </author>
          <author fullname="T. Li" initials="T." role="editor" surname="Li">
            <organization/>
          </author>
          <author fullname="S. Hares" initials="S." role="editor" surname="Hares">
            <organization/>
          </author>
          <date month="January" year="2006"/>
          <abstract>
            <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
            <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems.  This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
            <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR).  These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP.  BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
            <t>This document obsoletes RFC 1771.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4271"/>
        <seriesInfo name="DOI" value="10.17487/RFC4271"/>
      </reference>
      <reference anchor="RFC793">
        <front>
          <title>Transmission Control Protocol</title>
          <author fullname="J. Postel" initials="J." surname="Postel">
            <organization/>
          </author>
          <date month="September" year="1981"/>
        </front>
        <seriesInfo name="RFC" value="793"/>
        <seriesInfo name="DOI" value="10.17487/RFC0793"/>
      </reference>
      <referencegroup anchor="BCP95" target="https://www.rfc-editor.org/info/bcp95">
        <reference anchor="RFC3935" target="https://www.rfc-editor.org/info/rfc3935">
          <front>
            <title>A Mission Statement for the IETF</title>
            <author fullname="H. Alvestrand" initials="H." surname="Alvestrand"/>
            <date month="October" year="2004"/>
            <abstract>
              <t>This memo gives a mission statement for the IETF, tries to define the terms used in the statement sufficiently to make the mission statement understandable and useful, argues why the IETF needs a mission statement, and tries to capture some of the debate that led to this point.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="95"/>
          <seriesInfo name="RFC" value="3935"/>
          <seriesInfo name="DOI" value="10.17487/RFC3935"/>
        </reference>
      </referencegroup>
      <reference anchor="RFC7258">
        <front>
          <title>Pervasive Monitoring Is an Attack</title>
          <author fullname="S. Farrell" initials="S." surname="Farrell">
            <organization/>
          </author>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
            <organization/>
          </author>
          <date month="May" year="2014"/>
          <abstract>
            <t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="188"/>
        <seriesInfo name="RFC" value="7258"/>
        <seriesInfo name="DOI" value="10.17487/RFC7258"/>
      </reference>
      <reference anchor="RFC1035">
        <front>
          <title>Domain names - implementation and specification</title>
          <author fullname="P. Mockapetris" initials="P." surname="Mockapetris">
            <organization/>
          </author>
          <date month="November" year="1987"/>
          <abstract>
            <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System.  It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="13"/>
        <seriesInfo name="RFC" value="1035"/>
        <seriesInfo name="DOI" value="10.17487/RFC1035"/>
      </reference>
      <reference anchor="RFC5321">
        <front>
          <title>Simple Mail Transfer Protocol</title>
          <author fullname="J. Klensin" initials="J." surname="Klensin">
            <organization/>
          </author>
          <date month="October" year="2008"/>
          <abstract>
            <t>This document is a specification of the basic protocol for Internet electronic mail transport.  It consolidates, updates, and clarifies several previous documents, making all or parts of most of them obsolete.  It covers the SMTP extension mechanisms and best practices for the contemporary Internet, but does not provide details about particular extensions.  Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a "mail submission" protocol for "split-UA" (User Agent) mail reading systems and mobile environments.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5321"/>
        <seriesInfo name="DOI" value="10.17487/RFC5321"/>
      </reference>
      <reference anchor="RFC6120">
        <front>
          <title>Extensible Messaging and Presence Protocol (XMPP): Core</title>
          <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre">
            <organization/>
          </author>
          <date month="March" year="2011"/>
          <abstract>
            <t>The Extensible Messaging and Presence Protocol (XMPP) is an application profile of the Extensible Markup Language (XML) that enables the near-real-time exchange of structured yet extensible data between any two or more network entities.  This document defines XMPP's core protocol methods: setup and teardown of XML streams, channel encryption, authentication, error handling, and communication primitives for messaging, network availability ("presence"), and request-response interactions.  This document obsoletes RFC 3920.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6120"/>
        <seriesInfo name="DOI" value="10.17487/RFC6120"/>
      </reference>
      <reference anchor="RFC8890">
        <front>
          <title>The Internet is for End Users</title>
          <author fullname="M. Nottingham" initials="M." surname="Nottingham">
            <organization/>
          </author>
          <date month="August" year="2020"/>
          <abstract>
            <t>This document explains why the IAB believes that, when there is a conflict between the interests of end users of the Internet and other parties, IETF decisions should favor end users. It also explores how the IETF can more effectively achieve this.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8890"/>
        <seriesInfo name="DOI" value="10.17487/RFC8890"/>
      </reference>
      <reference anchor="RFC5218">
        <front>
          <title>What Makes for a Successful Protocol?</title>
          <author fullname="D. Thaler" initials="D." surname="Thaler">
            <organization/>
          </author>
          <author fullname="B. Aboba" initials="B." surname="Aboba">
            <organization/>
          </author>
          <date month="July" year="2008"/>
          <abstract>
            <t>The Internet community has specified a large number of protocols to date, and these protocols have achieved varying degrees of success. Based on case studies, this document attempts to ascertain factors that contribute to or hinder a protocol's success.  It is hoped that these observations can serve as guidance for future protocol work.  This memo  provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5218"/>
        <seriesInfo name="DOI" value="10.17487/RFC5218"/>
      </reference>
      <reference anchor="RFC9230">
        <front>
          <title>Oblivious DNS over HTTPS</title>
          <author fullname="E. Kinnear" initials="E." surname="Kinnear">
            <organization/>
          </author>
          <author fullname="P. McManus" initials="P." surname="McManus">
            <organization/>
          </author>
          <author fullname="T. Pauly" initials="T." surname="Pauly">
            <organization/>
          </author>
          <author fullname="T. Verma" initials="T." surname="Verma">
            <organization/>
          </author>
          <author fullname="C.A. Wood" initials="C.A." surname="Wood">
            <organization/>
          </author>
          <date month="June" year="2022"/>
          <abstract>
            <t>This document describes a protocol that allows clients to hide their IP addresses from DNS resolvers via proxying encrypted DNS over HTTPS (DoH) messages. This improves privacy of DNS operations by not allowing any one server entity to be aware of both the client IP address and the content of DNS queries and answers.</t>
            <t>This experimental protocol has been developed outside the IETF and is published here to guide implementation, ensure interoperability among implementations, and enable wide-scale experimentation.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9230"/>
        <seriesInfo name="DOI" value="10.17487/RFC9230"/>
      </reference>
      <reference anchor="I-D.thomson-tmi">
        <front>
          <title>Principles for the Involvement of Intermediaries in Internet Protocols</title>
          <author fullname="Martin Thomson" initials="M." surname="Thomson">
            <organization>Mozilla</organization>
          </author>
          <date day="8" month="September" year="2022"/>
          <abstract>
            <t>   This document proposes a set of principles for designing protocols
   with rules for intermediaries.  The goal of these principles is to
   limit the ways in which intermediaries can produce undesirable
   effects and to protect the useful functions that intermediaries
   legitimately provide.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-thomson-tmi-04"/>
      </reference>
    </references>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>This document benefits from discussions with Brian Trammell during our shared time on the Internet Architecture Board.</t>
      <t>Thanks to Jari Arkko, Kristin Berdan, Christian Huitema, Mallory Knodel, Eliot Lear, Tommy Pauly, and Martin Thomson for their comments and suggestions.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
