Ray,

On 2012-03-31 02:04, Ray Hunter wrote:
...
> The idea being that authorized persons e.g. law enforcement and network
> managers SHOULD be able to correlate activity at a later date (for legal
> compliance, logging, fault finding etc.) whilst an attacker or
> unauthorized person SHOULD NOT.

If you were a blogger sitting in an Internet cafe in a country governed
by a repressive regime, you would probably hold a different view.

    Brian
--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to