On 2018-04-24 15:25, Ted Lemon wrote: > On Apr 24, 2018, at 9:11 AM, <[email protected] > <mailto:[email protected]>> <[email protected] > <mailto:[email protected]>> wrote: >> What sort of trade-offs can be added to Dave’s document? Do you have >> in mind something like: >> (1) >> - Warranting that logging may be misused for tracking users? >> - Logging information can be used for profiling users? >> - Not logging is also an option? > > I don't think Dave's document is a good starting point. Amelia (I > think it was Amelia) already pointed out a number of things to talk > about: for example, if you are going to log source ports, it should be > possible to log them only when doing so is necessary, and not log them > at other times. This is a meaningful technical point that would have > clear implications in the code that got written.
+1 -- Amelia Andersdotter Technical Consultant, Digital Programme ARTICLE19 www.article19.org PGP: 3D5D B6CA B852 B988 055A 6A6F FEF1 C294 B4E8 0B55 _______________________________________________ Int-area mailing list [email protected] https://www.ietf.org/mailman/listinfo/int-area
