On May 2, 2018, at 9:02 AM, Ted Lemon <[email protected]> wrote:
> That's a much better approach to take if you want to convince the working 
> group that this is worth doing.

BTW, if you are going to take that approach, you should bear in mind that most 
of us assume that pervasive monitoring is going on already—that is, every 
connection is already being logged, just not by the ISP.   That may sound like 
an extreme position to take, but we've seen buildings built in the desert to 
house this data, so it's hard not to take it seriously.   What we haven't seen, 
unfortunately, is that data being used for anyone's benefit in terms of 
preventing or punishing actual online crime.   So at the moment it's all stick, 
no carrot.

_______________________________________________
Int-area mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/int-area

Reply via email to