On May 2, 2018, at 9:02 AM, Ted Lemon <[email protected]> wrote: > That's a much better approach to take if you want to convince the working > group that this is worth doing.
BTW, if you are going to take that approach, you should bear in mind that most of us assume that pervasive monitoring is going on already—that is, every connection is already being logged, just not by the ISP. That may sound like an extreme position to take, but we've seen buildings built in the desert to house this data, so it's hard not to take it seriously. What we haven't seen, unfortunately, is that data being used for anyone's benefit in terms of preventing or punishing actual online crime. So at the moment it's all stick, no carrot.
_______________________________________________ Int-area mailing list [email protected] https://www.ietf.org/mailman/listinfo/int-area
