Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Review of potential negative implications #15

Open
ts5746 opened this issue Mar 7, 2020 · 1 comment
Open

Review of potential negative implications #15

ts5746 opened this issue Mar 7, 2020 · 1 comment
Labels
help wanted Extra attention is needed question Further information is requested

Comments

@ts5746
Copy link
Contributor

ts5746 commented Mar 7, 2020

Provided feedback often negative implications that do not seem to be accounted for when it comes to how the Whiteflag protocol can be used. For example:

A civilian can, for example, use Whiteflag to send a notification about an on-going attack nearby their house. This information can then amount to military intelligence that can be useful for belligerents that are not aware of the attack. It might also amount to an act of direct participation in hostilities by the civilian(s) using it, and or might endanger the civilian(s) themselves, if the party/persons carrying out the attack manages to locate them. If this occurs repeatedly, it might even lead the party carrying out the attack (which are then reported on by civilians) to consider that the Whiteflag protocol itself is a tool of the enemy used to gather intelligence.

The question here is whether such an issue is within the Whiteflag problem space (just as IHL as such cannot prevent any misuse of protective signs).

@ts5746 ts5746 added help wanted Extra attention is needed question Further information is requested labels Mar 7, 2020
@ts5746
Copy link
Contributor Author

ts5746 commented Mar 7, 2020

Some additional clarification and considerations:

  • Because of the neutrality principle, Whiteflag has no functionality whatsoever for access control or evaluation/censorship of information; it is for the sender to decide to release any information (to a specific party) and for the receiver to (establish criteria to) decide which sender and information to trust - just as with any other open or closed communications channel;
  • Whiteflag is a low level communications protocol and most risks or misuse (such as the example of the civilian reporting an attack) are no different for Whiteflag than for any other communication channel;
  • Indeed, Whiteflag provides a unique combination of security features for senders to deal with situations where information and the identity of the sender should not be revealed: such as different authentication mechanisms and encryption.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
help wanted Extra attention is needed question Further information is requested
Projects
None yet
Development

No branches or pull requests

1 participant