On 2018-04-24 15:25, Ted Lemon wrote:
> On Apr 24, 2018, at 9:11 AM, <mohamed.boucad...@orange.com
> <mailto:mohamed.boucad...@orange.com>> <mohamed.boucad...@orange.com
> <mailto:mohamed.boucad...@orange.com>> wrote:
>> What sort of trade-offs can be added to Dave’s document? Do you have
>> in mind something like:
>> (1)
>> -    Warranting that logging may be misused for tracking users?  
>> -    Logging information can be used for profiling users?
>> -    Not logging is also an option?
>
> I don't think Dave's document is a good starting point.   Amelia (I
> think it was Amelia) already pointed out a number of things to talk
> about: for example, if you are going to log source ports, it should be
> possible to log them only when doing so is necessary, and not log them
> at other times.   This is a meaningful technical point that would have
> clear implications in the code that got written. 

+1

-- 
Amelia Andersdotter
Technical Consultant, Digital Programme

ARTICLE19
www.article19.org

PGP: 3D5D B6CA B852 B988 055A 6A6F FEF1 C294 B4E8 0B55

_______________________________________________
Int-area mailing list
Int-area@ietf.org
https://www.ietf.org/mailman/listinfo/int-area

Reply via email to