The point is that logs are generated and then deleted but companies who do not wish to keep such logs (e.g. IP address of client who connects to the VPN). I2P sure to it’s design, doesn’t even generate such incriminating logs (it might generate other kinds of logs which is a different discussion).
Thanks
=> More informations about this toot | View the thread | More toots from Findmysec@infosec.pub
=> View 1984@lemmy.today profile
text/gemini
This content has been proxied by September (3851b).