[gnso-rds-pdp-wg] @EXT: RE: Use cases: Fundamental, Incidental, and Theoretical

Carlton Samuels carlton.samuels at gmail.com
Mon Aug 22 16:02:19 UTC 2016


On Mon, Aug 22, 2016 at 2:19 AM, Volker Greimann <vgreimann at key-systems.net>
wrote:

> Simply put: Anything that can be abused, will be abuse. We therefore need
> to model our approach on the worst possible actors, not the best.


​+1

I cannot see how any other model makes sense in this context.

-Carlton​



==============================
*Carlton A Samuels*

*Mobile: 876-818-1799Strategy, Planning, Governance, Assessment &
Turnaround*
=============================
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mm.icann.org/pipermail/gnso-rds-pdp-wg/attachments/20160822/0fb6b190/attachment.html>


More information about the gnso-rds-pdp-wg mailing list