IP logging

"We respect authorized court orders and warrants of jurisdictions applicable to us in investigating cases of illegal activity."

 

So basically you do log some data that the authorities might be interested in. What kind of possibly compromising data do you log?

 

In particular, could the data you have be used to connect a user's own IP address to their Freedome IP address? (For example for the purpose of something like the Hedman extortion scheme)

Answers

This discussion has been closed.