<div dir="ltr"><div class="gmail_extra">Hi Robert and the MAT-WG,</div><div class="gmail_extra"><br></div><div class="gmail_extra">This is an interesting proposal and I'm happy to see RIPE open up HTTP requests a bit more. I hope that as you do, the WG can share thoughts on the balance of privacy and security with measurement objectives, since that will better inform concurrent efforts.</div><div class="gmail_extra"><br><div class="gmail_quote">On Mon, Jan 5, 2015 at 8:35 AM, Brian Trammell <span dir="ltr"><<a href="mailto:trammell@tik.ee.ethz.ch" target="_blank">trammell@tik.ee.ethz.ch</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-color:rgb(204,204,204);border-left-style:solid;padding-left:1ex"><div id=":ta" class="" style="overflow:hidden">Since the target will be an anchor which has known expected content, will these measurements include some indication of whether application-layer rewriting was detected?<br></div></blockquote></div><br>Case in point – there are interesting parallels between this proposal and OONI's Header Field Manipulation Test [1]. RIPE might be interested in exploring similar services to return headers to potentially detect inflight modification, or better yet to whitelist OONI's helper services.</div><div class="gmail_extra"><br></div><div class="gmail_extra">Cordially,</div><div class="gmail_extra">Collin</div><div class="gmail_extra"><br clear="all"><div>[1] <a href="https://github.com/TheTorProject/ooni-spec/blob/master/test-specs/ts-006-header-field-manipulation.md">https://github.com/TheTorProject/ooni-spec/blob/master/test-specs/ts-006-header-field-manipulation.md</a></div>-- <br><div class="gmail_signature"><b>Collin David Anderson</b><div><a href="http://averysmallbird.com" target="_blank">averysmallbird.com</a> | @cda | Washington, D.C.</div></div>
</div></div>