Return-Path: Delivered-To: apmail-httpd-bugs-archive@httpd.apache.org Received: (qmail 31169 invoked by uid 500); 30 Jan 2003 19:00:23 -0000 Mailing-List: contact bugs-help@httpd.apache.org; run by ezmlm Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: Reply-To: "Apache HTTPD Bugs Notification List" Delivered-To: mailing list bugs@httpd.apache.org Received: (qmail 31157 invoked from network); 30 Jan 2003 19:00:23 -0000 Date: 30 Jan 2003 19:01:51 -0000 Message-ID: <20030130190151.7458.qmail@nagoya.betaversion.org> From: bugzilla@apache.org To: bugs@httpd.apache.org Cc: Subject: DO NOT REPLY [Bug 16601] - mention possibility to connect by CVS_RSH ssh X-Spam-Rating: daedalus.apache.org 1.6.2 0/1000/N DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT . ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND INSERTED IN THE BUG DATABASE. http://nagoya.apache.org/bugzilla/show_bug.cgi?id=16601 mention possibility to connect by CVS_RSH ssh ------- Additional Comments From hauser@acm.org 2003-01-30 19:01 ------- The idea is to keep an as low profile as possible - if my ISP/SysAdmin has no need to know what exactly I am downloading from apache, why should they learn? Especially if the technical means to prevent this are already in place and unless the anoncvs server is close to its computational limits, the extra cost is negligible. Anyway, this is less an integrity than a privacy issue. Principle: Leave as little traces as you can - all the time. Sounds a bit paranoid, I know ;) but unfortunately I guess this won't be a prudent behaviour for everybody in the coming years... minimization of exposure. --------------------------------------------------------------------- To unsubscribe, e-mail: bugs-unsubscribe@httpd.apache.org For additional commands, e-mail: bugs-help@httpd.apache.org