On Feb 28, 2018, at 10:33 AM, Paul Hoffman <paul.hoffman@icann.org> wrote:
On Feb 26, 2018, at 4:18 PM, Wessels, Duane <dwessels@verisign.com> wrote:
On Feb 21, 2018, at 2:53 PM, Paul Hoffman <paul.hoffman@icann.org> wrote:
On Feb 13, 2018, at 2:59 PM, Wessels, Duane via rssac-caucus <rssac-caucus@icann.org> wrote:
In addition I would really like to see some kind of summary (table perhaps) that presents the following for the various techniques:
- advantages / disadvantages
I don't think that is possible to do in a clean fashion. The advantages/disadvantages change radically if you are a: - RSO - Researcher - Person who wants your IP address completely anonymized
Really? The document already talks about advantages and disadvantages (sec 3.1, 3.2, 3.3, appendix C) and AFAICT presents them without any commentary on "who" you are. I was proposing a summary table.
Ah, got it. That will be challenging, but I'll make a stab at it.
On re-reading the document, I realized that what I really needed to do was to clarify which party was getting which advantage and disadvantage. I have now done that in an update you will see soon. I started making a grand table of advantages and disadvantages, and they really don't make sense out of context. I think someone really needs to read 3.1, 3.2, 3.3, and Appendix C in full to understand what the choices mean. --Paul Hoffman