On 1 jul 2010, at 19:07, Andrew Sullivan wrote:
This is useful, but not quite what I was asking. Clearly, the above
means that the logs exist during the meeting, while we are at the host
venue. I think it is safe to say that under some legal regimes, a
government could require the delivery of such existing logs to them.
I would very much appreciate assurances that such logging will not occur, and
that there will be no "live" feed of such information to third parties, such as
government or law enforcement.
A week's worth of correlation between my MAC address and the IP addresses that
I exchange encrypted information with is not something I think any government
needs to have.
Of course if a government has cause to believe that a given user is misbehaving
they still have the option to talk to the NOC staff and have them obtain
information about this user.
Ietf mailing list