On 1 jul 2010, at 19:07, Andrew Sullivan wrote: > This is useful, but not quite what I was asking. Clearly, the above > means that the logs exist during the meeting, while we are at the host > venue. I think it is safe to say that under some legal regimes, a > government could require the delivery of such existing logs to them. I would very much appreciate assurances that such logging will not occur, and that there will be no "live" feed of such information to third parties, such as government or law enforcement. A week's worth of correlation between my MAC address and the IP addresses that I exchange encrypted information with is not something I think any government needs to have. Of course if a government has cause to believe that a given user is misbehaving they still have the option to talk to the NOC staff and have them obtain information about this user. _______________________________________________ Ietf mailing list Ietf@xxxxxxxx https://www.ietf.org/mailman/listinfo/ietf