[Foundation-l] Release of squid log data

David Goodman dgoodmanny at gmail.com
Thu Sep 20 09:21:34 UTC 2007


Without asking for details, how is this accomplished? I can only see
it if he emails, and one replies, or if he tells you about a web site,
and you click on it.

> Yes, I agree that protecting IP address is hard. Just as an example,
> we have one stalker (and I'm using the word advisedly) who posts links
> on people's talk pages to what appears to be Wikipedia articles,
> purportedly asking for advice, but in fact diverting that user to the
> stalker's own website, so he can pick up the IP. He's also sent
> e-mails with disguised links that divert people to a blog he has
> access to.
>  --
David Goodman, Ph.D, M.L.S.



More information about the foundation-l mailing list