Re: Admission Control to the IETF 78 and IETF 79 Networks

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 1 jul 2010, at 19:07, Andrew Sullivan wrote:

> This is useful, but not quite what I was asking.  Clearly, the above
> means that the logs exist during the meeting, while we are at the host
> venue.  I think it is safe to say that under some legal regimes, a
> government could require the delivery of such existing logs to them.

I would very much appreciate assurances that such logging will not occur, and that there will be no "live" feed of such information to third parties, such as government or law enforcement.

A week's worth of correlation between my MAC address and the IP addresses that I exchange encrypted information with is not something I think any government needs to have.

Of course if a government has cause to believe that a given user is misbehaving they still have the option to talk to the NOC staff and have them obtain information about this user.
_______________________________________________
Ietf mailing list
Ietf@xxxxxxxx
https://www.ietf.org/mailman/listinfo/ietf


[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Fedora Users]