This article discusses bills S.436 in the Senate and
H.1076 in the House. These two bills describe a proposed act called the Internet Stopping Adults Facilitating the Exploitation of Today's Youth Act or the "Internet SAFETY" act. Specifically, the act would require all ISPs and owners of wireless access points to keep access logs for two years in
(
Read more... )
Comments 4
I told him the same thing I tell my business users. Think out all the "what" you want, "how" it should work from your perspective. Then give a deadline to give the industry time to come up with an implementation.
I told him that what they want will likely require a change to the underlying MAC infrastructure, since it wasn't meant for this. (I can pull the MAC off a network printer in the public library and hack my computer to use that. If someone is already breaking the law, why stop at whatever they are doing)
Perhaps a public-private key with each NIC, which generates a signature with each log record.
But, what they want isn't even actually useful under the current infrastructure.
Reply
Anyone who makes a name to force an acronym has gained my eternal ire.
And what exactly is this for? What is the purpose? To keep track of what children are browsing? To bust people browsing/hosting child porn? To bust people contacting minors on the internet?
Reply
I don't think this has been thought all the way through.
Reply
Reply
Leave a comment