At 2:58 PM -0800 4/2/03, John Young wrote:
>Ben,
>
>Would you care to comment for publication on web logging
>described in these two files:
>
>  http://cryptome.org/no-logs.htm
>
>  http://cryptome.org/usage-logs.htm
>
>Cryptome invites comments from others who know the capabilities
>of servers to log or not, and other means for protecting user privacy
>by users themselves rather than by reliance upon privacy policies
>of site operators and government regulation.
>
>This relates to the data retention debate and current initiatives
>of law enforcement to subpoena, surveil, steal and manipulate
>log data.
>
>Thanks,
>
>John

The http://cryptome.org/usage-logs.htm URL says:

>Low resolution data in most cases is intended to be sufficient for
>marketing analyses.  It may take the form of IP addresses that have been
>subjected to a one way hash, to refer URLs that exclude information other
>than the high level domain, or temporary cookies.

Note that since IPv4 addresses are 32 bits, anyone willing to dedicate a
computer for a few hours can reverse a one way hash by exhaustive search.
Truncating IPs seems a much more privacy friendly approach.

This problem would be less acute with IPv6 addresses.

Cheers - Bill


-------------------------------------------------------------------------
Bill Frantz           | Due process for all    | Periwinkle -- Consulting
(408)356-8506         | used to be the         | 16345 Englewood Ave.
[EMAIL PROTECTED] | American way.          | Los Gatos, CA 95032, USA



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to