Privacy And Networking Part 4: Logging
In the last post on this topic, I concluded that IP addresses are protected information—operators should handle users’ IP addresses according to privacy best practices. But I also concluded that because IP addresses used for forwarding— Are collected (or carried through the network) only for forwarding The user cannot reasonably expect the network to forward […]
The post Privacy And Networking Part 4: Logging appeared first on Packet Pushers.

