IRC log of privacy on 2014-01-30
Timestamps are in UTC.
- 16:49:40 [RRSAgent]
- RRSAgent has joined #privacy
- 16:49:40 [RRSAgent]
- logging to http://www.w3.org/2014/01/30-privacy-irc
- 16:49:42 [trackbot]
- RRSAgent, make logs 263
- 16:49:44 [trackbot]
- Zakim, this will be
- 16:49:44 [Zakim]
- I don't understand 'this will be', trackbot
- 16:49:45 [trackbot]
- Meeting: Privacy Interest Group Teleconference
- 16:49:45 [trackbot]
- Date: 30 January 2014
- 16:49:51 [npdoty]
- rrsagent, make logs public
- 16:52:02 [tara]
- tara has joined #privacy
- 16:52:50 [rigo]
- zakim, this will be ping
- 16:52:50 [Zakim]
- ok, rigo; I see Team_(privacy)16:49Z scheduled to start 3 minutes ago
- 16:55:21 [Zakim]
- Team_(privacy)16:49Z has now started
- 16:55:28 [Zakim]
- +[Apple]
- 16:55:36 [rigo]
- rigo has changed the topic to: Agenda 30 Jan http://lists.w3.org/Archives/Public/public-privacy/2014JanMar/0009.html
- 16:57:09 [christine]
- christine has joined #privacy
- 16:57:21 [richt]
- richt has joined #privacy
- 16:57:42 [Zakim]
- +[IPcaller]
- 16:57:43 [Zakim]
- -[IPcaller]
- 16:57:57 [christine]
- Zakim, [IPcaller] is me
- 16:57:57 [Zakim]
- sorry, christine, I do not recognize a party named '[IPcaller]'
- 16:58:22 [christine]
- Zakim, IPcaller is me
- 16:58:22 [Zakim]
- sorry, christine, I do not recognize a party named 'IPcaller'
- 16:58:40 [fjh]
- zakim, who is here?
- 16:58:40 [Zakim]
- On the phone I see [Apple]
- 16:58:41 [Zakim]
- On IRC I see richt, christine, tara, RRSAgent, Zakim, npdoty, rigo, glenn, fjh, TallTed, wseltzer, trackbot
- 16:59:13 [Zakim]
- +npdoty
- 16:59:34 [Zakim]
- +[IPcaller]
- 16:59:49 [npdoty]
- Zakim, [Apple] has tara
- 16:59:49 [Zakim]
- +tara; got it
- 17:00:06 [npdoty]
- Zakim, [IPcaller] is richt
- 17:00:06 [Zakim]
- +richt; got it
- 17:00:42 [Zakim]
- +karima
- 17:00:48 [Karima]
- Karima has joined #privacy
- 17:01:14 [Ashok_Malhotra]
- Ashok_Malhotra has joined #privacy
- 17:01:15 [tara]
- Hi everyone. Waiting for a few more folks to join.
- 17:01:18 [Zakim]
- +[IPcaller]
- 17:01:35 [christine]
- Zakim, IPcaller is me
- 17:01:35 [Zakim]
- +christine; got it
- 17:01:51 [Zakim]
- +[IPcaller]
- 17:01:54 [fjh]
- zakim, IPcaller is me
- 17:01:54 [Zakim]
- +fjh; got it
- 17:02:12 [fjh]
- zakim, who is here?
- 17:02:12 [Zakim]
- On the phone I see [Apple], npdoty, richt, karima, christine, fjh
- 17:02:13 [Zakim]
- [Apple] has tara
- 17:02:13 [Zakim]
- On IRC I see Ashok_Malhotra, Karima, richt, christine, tara, RRSAgent, Zakim, npdoty, rigo, glenn, fjh, TallTed, wseltzer, trackbot
- 17:02:21 [Zakim]
- +[CDT]
- 17:02:46 [Zakim]
- +Ashok_Malhotra
- 17:03:43 [JoeHallCDT]
- JoeHallCDT has joined #privacy
- 17:04:08 [Zakim]
- + +1.469.242.aaaa
- 17:04:18 [npdoty]
- scribenick: npdoty
- 17:04:21 [JoeHallCDT]
- alas, I cannot scribe today but promise next time
- 17:04:43 [npdoty]
- Zakim, aaaa is FrankDawson
- 17:04:43 [Zakim]
- +FrankDawson; got it
- 17:05:10 [Zakim]
- +bblfish
- 17:05:26 [npdoty]
- richt: Rich Tibbet from Opera, patches for Chromium/blink and work in standards, Network Services Discovery
- 17:05:38 [bblfish]
- bblfish has joined #privacy
- 17:05:42 [bblfish]
- hi
- 17:05:45 [npdoty]
- Topic: Network Service Discovery
- 17:05:48 [christine]
- http://www.w3.org/TR/discovery-api/
- 17:06:14 [npdoty]
- richt: at a high level, connecting to devices / services on your network
- 17:06:27 [npdoty]
- ... UPNP/Zeroconf, which you may know as Bonjour
- 17:06:35 [npdoty]
- ... these protocols expose endpoint urls that speak http
- 17:06:56 [Zakim]
- -FrankDawson
- 17:06:57 [npdoty]
- ... tried to get to a point where a developer can request a well-known service type so they can communicate with services on different devices
- 17:07:11 [npdoty]
- ... layered on top of HTTP, can use XHR
- 17:07:40 [npdoty]
- ... 1.5 years in; lots of feedback from implementer mailing lists, like from Mozilla / Chromium
- 17:07:53 [npdoty]
- ... some concerns about privacy and security, worry about exposing unsafe devices
- 17:08:04 [npdoty]
- ... extremely wide range of different devices and services
- 17:08:12 [Zakim]
- +Clarke
- 17:08:24 [npdoty]
- ... change volume on your speaker, but also can change configuration of your router
- 17:08:43 [npdoty]
- ... in terms of security, added a requirement to the specification that services that want to be exposed, need to implement CORS
- 17:08:51 [Clarke]
- Clarke has joined #privacy
- 17:08:59 [npdoty]
- ... expose HTTP headers that those services have been audited/cleared for sharing with web pages
- 17:09:14 [npdoty]
- ... that's the main mechanism for security
- 17:09:25 [npdoty]
- ... the other major part is how the user interacts
- 17:09:36 [Clarke]
- Clarke Stevens from CableLabs just joined. I'm on the phone too.
- 17:09:45 [npdoty]
- ... a permissioning prompt where the user selects the services they want to share, like how we do geolocation
- 17:09:57 [npdoty]
- ... a certain degree of privacy and security, but looking for more input
- 17:10:20 [npdoty]
- ... any other ideas of what we can do, and an audit of how it works or whether anyone considers it unsafe
- 17:10:36 [npdoty]
- ... happy to answer questions
- 17:10:43 [fjh]
- Present+ Frederick_Hirsch
- 17:10:52 [tara]
- q?
- 17:10:53 [npdoty]
- http://www.w3.org/TR/discovery-api/
- 17:10:53 [christine]
- +q
- 17:10:53 [Clarke]
- Present+ Clarke_Stevens
- 17:11:04 [npdoty]
- ack christine
- 17:11:11 [wseltzer]
- regrets+ wseltzer
- 17:11:12 [fjh]
- q+
- 17:11:29 [yrlesru]
- yrlesru has joined #privacy
- 17:11:35 [npdoty]
- christine: appreciate your taking the time. forgive my introductory questions
- 17:12:06 [npdoty]
- ... permission prompt point -- what's the granularity or persistence of those permissions?
- 17:12:30 [npdoty]
- richt: have a prototype, but haven't actually built the UI; have some experience with WebRTC and Geolocation previously
- 17:13:07 [npdoty]
- ... site requests a particular type of service, browser searches for a list of candidates, candidates are displayed to the user and can click share
- 17:13:33 [npdoty]
- ... specification describes longevity, that permissions have to be asked again after next loading of a page
- 17:13:47 [npdoty]
- q+ to ask about persistence
- 17:14:35 [npdoty]
- ack fjh
- 17:14:53 [npdoty]
- fjh: for CORS, how do you know which origin corresponds to what?
- 17:15:27 [npdoty]
- richt: look for the existence of CORS headers, looking for wildcard matching
- 17:15:49 [npdoty]
- ... no particularly good way for CORS to specify a local IP address which you don't know ahead of time
- 17:16:02 [npdoty]
- q+ to ask if that's how CORS is intended
- 17:16:17 [npdoty]
- ... indicate to browsers in a general way that they're web-ready
- 17:16:51 [npdoty]
- ... as a user you could whitelist certain device types in your browser
- 17:17:09 [npdoty]
- ... in that case you could connect to legacy devices and services
- 17:17:19 [npdoty]
- ... likely to be an advanced option for users
- 17:17:38 [npdoty]
- ... or browsers could blacklist certain services, like routers, even if the user tries to whitelist them
- 17:17:58 [npdoty]
- ... a remedy for browser-makers to ensure user security
- 17:18:08 [npdoty]
- fjh: how would you blacklist a router? what do you need to know?
- 17:18:24 [npdoty]
- richt: there are well-known service types (defined by upnp), well-known strings
- 17:18:40 [npdoty]
- ack npdoty
- 17:18:40 [Zakim]
- npdoty, you wanted to ask about persistence and to ask if that's how CORS is intended
- 17:18:43 [richt]
- please refer to the editor's draft: https://dvcs.w3.org/hg/dap/raw-file/tip/discovery-api/Overview.html
- 17:19:07 [richt]
- The CORS mechanism has not yet been published in the TR version.
- 17:19:34 [fjh]
- ndoty: is asking for permissions repeatedly intended usage of CORS
- 17:19:46 [fjh]
- s/ndoty/npdoty/
- 17:19:47 [Zakim]
- + +1.214.566.aabb
- 17:20:13 [fjh]
- richt: this approach is necessary, e.g. don't want automatic connection after a delay, e.g. 30 days
- 17:20:43 [fjh]
- npdoty: another question, is this intended use of CORS header or are you just taking advantage of it
- 17:20:59 [yrlesru]
- zakim aabb is yrlesru
- 17:21:19 [fjh]
- richt: once have service endpoint URL it is a resource, so CORS is appropriate, browser enforces CORS mechanism
- 17:21:26 [fjh]
- … using as specified
- 17:21:53 [fjh]
- … but in discovery sending HTTP OPTIONS request, using response to see if CORS supported and has headers
- 17:22:00 [fjh]
- … not changing CORS
- 17:22:22 [fjh]
- … potential issue with CORS regarding limit of exposure to local IP addresses, using wildcards
- 17:22:54 [yrlesru]
- zakim, ??aabb is me
- 17:22:54 [Zakim]
- sorry, yrlesru, I do not recognize a party named '??aabb'
- 17:23:04 [fjh]
- … when searching, knowing requesting web page and origin, check that in service responses so wildcard not needed alwasy
- 17:23:25 [fjh]
- … but sub domains might be an issue (???)
- 17:23:25 [yrlesru]
- zakim, aabb is me
- 17:23:25 [Zakim]
- +yrlesru; got it
- 17:23:33 [fjh]
- s/alwasy/always
- 17:23:42 [npdoty]
- scribenick: npdoty
- 17:23:53 [npdoty]
- tara: any points that haven't been asked about yet?
- 17:24:10 [npdoty]
- richt: CORS, user-whitelisting or ua-blacklisting
- 17:24:37 [npdoty]
- ... different ways we could approach this problem -- building on top of existing APIs like XHR and WebSockets
- 17:24:50 [npdoty]
- ... powerful, but low-level
- 17:24:57 [npdoty]
- q+ to ask about identifiers
- 17:25:30 [npdoty]
- ... right now talking XML, but could next be JSON or WebSocket -- not very specific to UPNP, for example
- 17:26:10 [fjh]
- npdoty: common issue is unique identifiers can be used to correlate activity or re-identify user in unexpected manner
- 17:26:22 [fjh]
- … is identifier being given to endpoint
- 17:26:31 [fjh]
- … can two web services correlate activity?
- 17:26:48 [fjh]
- richt: spec does not deal with this, open DAP issue
- 17:27:12 [fjh]
- … endpoint URL likely to have numeric component, exposing and leaking local IP configuration
- 17:27:18 [fjh]
- … this is a concern
- 17:27:37 [fjh]
- … discussing how to obfuscate local IP addresses, would appreciate PING feedback on this
- 17:27:44 [fjh]
- … might be also an issue in WebRTC?
- 17:27:52 [fjh]
- … probably not a good practice.
- 17:28:19 [fjh]
- … obfuscating may create issue with responses containing IP addresses for media resources etc, so some thought required
- 17:28:30 [fjh]
- … please give feedback on importance of issue and approaches
- 17:28:34 [fjh]
- npdoty: will think about it
- 17:28:39 [npdoty]
- scribenick: npdoty
- 17:28:54 [npdoty]
- tara: may all need a bit more reflection over material from today
- 17:29:18 [fjh]
- q+
- 17:29:19 [npdoty]
- richt: we've concisely covered our issues. leaking IP address configuration is a key issue for feedback
- 17:29:22 [npdoty]
- q-
- 17:29:23 [christine]
- +q
- 17:29:33 [npdoty]
- ... editors' draft best for review (includes CORS)
- 17:29:37 [npdoty]
- https://dvcs.w3.org/hg/dap/raw-file/tip/discovery-api/Overview.html
- 17:29:53 [yrlesru]
- Would an alternative to persistent local IP address be capability for renewal of the identifier at user control?
- 17:30:04 [npdoty]
- richt: any improvements for user privacy or security would be great
- 17:30:05 [fjh]
- q?
- 17:30:08 [fjh]
- ack fjh
- 17:30:14 [npdoty]
- fjh: what's the schedule for review?
- 17:30:44 [npdoty]
- richt: as long as it's not multiple months; blocker on implementation and want to calm concerns about security
- 17:31:09 [npdoty]
- ... privacy and security review takes as long as it takes and implementation is blocked until it's finished
- 17:31:33 [npdoty]
- christine: the sooner the better but not overly demanding schedule
- 17:31:54 [npdoty]
- ... mentioned discussions of IP address leakage and obfuscation within DAP group
- 17:32:14 [npdoty]
- ... could you share the different possible mitigations?
- 17:32:45 [yrlesru]
- 2nd time to express my thoughts. Would an alternative to obfuscation of IP address be ability for user, on demand, to renew their identifier.
- 17:32:46 [npdoty]
- richt: can obfuscate the endpoint URL easily, like a transparent proxy; the hard part is intercepting and rewriting the HTTP responses
- 17:33:20 [npdoty]
- ... any alternatives would be helpful
- 17:33:47 [fjh]
- thanks rich for an excellent overview
- 17:34:18 [npdoty]
- richt: thanks all for the discussion and ongoing review
- 17:34:32 [bblfish]
- hi
- 17:34:34 [npdoty]
- Topic: WebID
- 17:34:35 [christine]
- +q
- 17:34:36 [richt]
- thank you everyone.
- 17:34:51 [npdoty]
- q+ bblfish
- 17:34:53 [npdoty]
- ack christine
- 17:34:56 [bblfish]
- np :-)
- 17:35:19 [npdoty]
- christine: question about group status.
- 17:35:42 [bblfish]
- https://dvcs.w3.org/hg/WebID/raw-file/tip/spec/index.html
- 17:35:44 [npdoty]
- bblfish: was Incubator, now working as a Community Group
- 17:35:55 [fjh]
- is there a link for the CG, participants?
- 17:36:05 [npdoty]
- bblfish: would like to finish, publish specs hopefully by the summer
- 17:36:17 [richt]
- would like to bring https://2x.io/read/security-by-obscurity to the attention of this group. RE: exposing local IP addresses to web pages in WebRTC (as I mentioned earlier on this call).
- 17:37:11 [christine]
- Thanks for the clarification Nick
- 17:37:16 [christine]
- No more from me
- 17:38:00 [npdoty]
- bblfish: would like to push this up to the next stage, five years of work altogether
- 17:38:22 [npdoty]
- ... two specifications and an ontology
- 17:38:52 [npdoty]
- ... Web Identity and, separately, how do you communicate with WebID over TLS
- 17:39:04 [fjh]
- q+ to ask about web id correlation
- 17:39:16 [npdoty]
- ... and then prototypes, for example, using access control for a wiki
- 17:39:26 [npdoty]
- ... using Linked Data
- 17:40:00 [npdoty]
- ... have added Privacy/Security Considerations sections to the two specs
- 17:40:05 [npdoty]
- ... new since we last talked here
- 17:40:18 [npdoty]
- ... looking for feedback on those sections
- 17:41:10 [npdoty]
- ... authentication over TLS, rather frequently implemented/used in browsers
- 17:41:13 [npdoty]
- ack fjh
- 17:41:13 [Zakim]
- fjh, you wanted to ask about web id correlation
- 17:41:21 [npdoty]
- q- bblfish
- 17:41:40 [npdoty]
- fjh: what the requirements are; is there an issue here of correlation which would need obfuscation
- 17:42:17 [npdoty]
- bblfish: WebID does make it easy to link profiles, it is meant for that specifically to support a decentralized Social Web
- 17:42:39 [npdoty]
- ... can create p2p social networks over HTTP, reduces centralization which is advantageous, but leakage of links/URIs
- 17:43:26 [npdoty]
- ... costs are weighed against the benefit of that decentralized social networking
- 17:43:30 [yrlesru]
- Was this the reference to use cases and requirements? , https://dvcs.w3.org/hg/ldpwg/raw-file/default/ldp-ucr.html#maintaining-social-contact-information
- 17:43:47 [npdoty]
- ... communicating over SSL can prevent eavesdropping
- 17:43:55 [npdoty]
- fjh: just important to make the tradeoff clear
- 17:44:24 [npdoty]
- tara: timeline?
- 17:44:44 [fjh]
- thanks for clarifying the potential tradeoff between decentralization and potential for Service provider (web application) correlation based on ids
- 17:44:45 [npdoty]
- bblfish: not a great hurry, but quick review of privacy and security sections would be helpful
- 17:45:21 [npdoty]
- Topic: documents in progress
- 17:45:41 [npdoty]
- tara: various documents in different stages of status
- 17:45:44 [npdoty]
- ... fingerprinting?
- 17:46:35 [fjh]
- npdoty: regarding fingerprinting, made an update before the last call, had questions about feasibility of addressing the concern
- 17:46:46 [fjh]
- … have some ideas but have not had a chance to write up yet
- 17:47:28 [fjh]
- … would like some help with reviewing
- 17:47:29 [christine]
- Thank you fjh - that would be helpful
- 17:47:57 [npdoty]
- scribenick: npdoty
- 17:48:01 [christine]
- yes, I realised that too late, sorry
- 17:48:15 [npdoty]
- tara: comments elicited for EME and getUserMedia
- 17:48:46 [npdoty]
- JoeHallCDT: I sent some notes late last year, a very well-considered document already
- 17:49:05 [npdoty]
- ... lacked a more systematic way of doing a review in a reputable process
- 17:49:36 [christine]
- +q
- 17:49:46 [npdoty]
- ... if we want to do privacy reviews in a more standardized way, happy to do that (have more help inside CDT now)
- 17:49:53 [npdoty]
- ack christine
- 17:50:49 [npdoty]
- christine: pleased to hear your ability to participate
- 17:51:00 [bblfish]
- yrlesru, thanks for the pointer to the WebId use case ( catching up on IRC )
- 17:51:24 [yrlesru]
- ISO/IEC 29100:2011 Information technology -- Security techniques -- Privacy framework Is now publicly available at no cost at http://standards.iso.org/ittf/PubliclyAvailableStandards/c045123_ISO_IEC_29100_2011.zip
- 17:51:25 [npdoty]
- JoeHallCDT: hoping to have more chance to engage, that PING would be a good place to have those discussions
- 17:51:53 [npdoty]
- christine: current status on EME?
- 17:52:28 [yrlesru]
- If Nick Doty can note this in minutes. This standard provides a standard privacy framework (terminology, roles, responsibilities, principles, etc) for privacy that is aligned with proposed EU DP Regulation in many ways.
- 17:52:57 [christine]
- Thanks for the update re status on EME
- 17:52:59 [npdoty]
- JoeHallCDT: a lot of tension, html media group very interested in closing down issues but still quite a bit of principled concern
- 17:53:24 [npdoty]
- ... also a separate alternative proposal in WHATWG
- 17:53:42 [npdoty]
- ... need some guidance
- 17:54:16 [npdoty]
- ... had already done a good job thinking about privacy, in the UA and in the CDMs
- 17:54:38 [yrlesru]
- Joe, I would be available for a workshop on the subject during week of CDT Gala and IAPP in DC.
- 17:54:47 [npdoty]
- ... settle on a coordinated systematic way for doing a privacy review when someone comes up to PING
- 17:55:02 [npdoty]
- ... can't wrap it up without knowing what the framework should be
- 17:55:12 [yrlesru]
- q+
- 17:55:14 [npdoty]
- q+ to ask about learnings from EME
- 17:55:24 [christine]
- +q
- 17:55:41 [npdoty]
- ... is "already looks good" an appropriate response?
- 17:55:55 [npdoty]
- yrlesru: tried offline to start reviewing a number of specs
- 17:56:20 [npdoty]
- ... a number of framework approaches you can take -- classically, look at the data flows from the applicable privacy principles
- 17:56:32 [npdoty]
- ... or look at collection/storage/transfer/processing/
- 17:56:56 [npdoty]
- ... Hannes had proposed an approach that was a standard list of principles and threats, a potential checklist
- 17:57:45 [npdoty]
- ... 1) people come to us after the fact, a checkbox so that they can go to the next phase of implementation
- 17:58:23 [npdoty]
- ... or 2) talk to people earlier during the design alternatives phase, where we think through systematically the different ways we could think through
- 17:58:40 [npdoty]
- ... an ISO standard on privacy principles is now publicly available and may be useful
- 17:58:52 [npdoty]
- http://standards.iso.org/ittf/PubliclyAvailableStandards/c045123_ISO_IEC_29100_2011.zip
- 17:59:20 [npdoty]
- yrlesru: if we want to meet up in person around CDT event and try with a whiteboard, would work for me
- 17:59:34 [npdoty]
- JoeHallCDT: can talk offline; IETF is a potential conflict
- 18:00:17 [npdoty]
- tara: running out of time at this point, wrapping up comments
- 18:00:38 [christine]
- quick point Tara before you close
- 18:00:40 [npdoty]
- yrlesru: one problem that's come up: do we have a clear understanding of what the use cases are for an API?
- 18:00:42 [npdoty]
- q-
- 18:00:48 [npdoty]
- ack yrlesru
- 18:01:00 [npdoty]
- ... have seen that same problem crop up on other specs
- 18:01:02 [npdoty]
- ack christine
- 18:01:15 [bblfish]
- cool please let me know what questions we need to look at, answer :-)
- 18:01:20 [npdoty]
- christine: really appreciate the enthusiasm to work out a structured way for PING to do privacy reviews
- 18:01:40 [npdoty]
- ... a key goal is to develop guidance and to develop the system for reviews
- 18:01:58 [npdoty]
- ... what we've been doing is having informal privacy reviews even while we're in process for developing guidance
- 18:02:40 [npdoty]
- next call -- March 13th?
- 18:02:49 [npdoty]
- (later than the first week of March, because of the IETF conflict)
- 18:02:51 [Zakim]
- -Ashok_Malhotra
- 18:02:56 [Zakim]
- -Clarke
- 18:02:56 [christine]
- I'll also suggest a PING meeting at IETF on the mailing list
- 18:02:57 [bblfish]
- thanks a lot
- 18:03:00 [Zakim]
- -[CDT]
- 18:03:01 [Zakim]
- -yrlesru
- 18:03:02 [Zakim]
- -fjh
- 18:03:03 [Zakim]
- -richt
- 18:03:04 [npdoty]
- tara: thanks all
- 18:03:04 [Zakim]
- -npdoty
- 18:03:06 [Zakim]
- -christine
- 18:03:07 [Zakim]
- -karima
- 18:03:07 [npdoty]
- chair: tara
- 18:03:08 [Zakim]
- -[Apple]
- 18:03:11 [Zakim]
- -bblfish
- 18:03:12 [Zakim]
- Team_(privacy)16:49Z has ended
- 18:03:12 [Zakim]
- Attendees were npdoty, tara, richt, karima, christine, fjh, [CDT], Ashok_Malhotra, +1.469.242.aaaa, FrankDawson, bblfish, Clarke, +1.214.566.aabb, yrlesru
- 18:03:18 [npdoty]
- rrsagent, please draft the minutes
- 18:03:18 [RRSAgent]
- I have made the request to generate http://www.w3.org/2014/01/30-privacy-minutes.html npdoty
- 18:20:22 [JoeHallCDT]
- JoeHallCDT has joined #privacy
- 18:36:33 [JoeHallCDT]
- JoeHallCDT has joined #privacy
- 18:40:00 [richt]
- richt has joined #privacy
- 18:45:40 [JoeHallCDT]
- JoeHallCDT has left #privacy
- 19:32:43 [Karima]
- Karima has joined #privacy
- 20:17:53 [Zakim]
- Zakim has left #privacy
- 20:35:11 [richt]
- richt has joined #privacy
- 20:36:40 [richt_]
- richt_ has joined #privacy
- 20:49:30 [Karima]
- Karima has joined #privacy
- 22:02:03 [richt]
- richt has joined #privacy