ietf
[Top] [All Lists]

Re: Admission Control to the IETF 78 and IETF 79 Networks

2010-07-01 12:18:36
On 1 jul 2010, at 19:07, Andrew Sullivan wrote:

This is useful, but not quite what I was asking.  Clearly, the above
means that the logs exist during the meeting, while we are at the host
venue.  I think it is safe to say that under some legal regimes, a
government could require the delivery of such existing logs to them.

I would very much appreciate assurances that such logging will not occur, and 
that there will be no "live" feed of such information to third parties, such as 
government or law enforcement.

A week's worth of correlation between my MAC address and the IP addresses that 
I exchange encrypted information with is not something I think any government 
needs to have.

Of course if a government has cause to believe that a given user is misbehaving 
they still have the option to talk to the NOC staff and have them obtain 
information about this user.
_______________________________________________
Ietf mailing list
Ietf(_at_)ietf(_dot_)org
https://www.ietf.org/mailman/listinfo/ietf

<Prev in Thread] Current Thread [Next in Thread>