[gnso-rds-pdp-wg] @EXT: RE: Use cases: Fundamental, Incidental, and Theoretical
Carlton Samuels
carlton.samuels at gmail.com
Mon Aug 22 16:02:19 UTC 2016
On Mon, Aug 22, 2016 at 2:19 AM, Volker Greimann <vgreimann at key-systems.net>
wrote:
> Simply put: Anything that can be abused, will be abuse. We therefore need
> to model our approach on the worst possible actors, not the best.
+1
I cannot see how any other model makes sense in this context.
-Carlton
==============================
*Carlton A Samuels*
*Mobile: 876-818-1799Strategy, Planning, Governance, Assessment &
Turnaround*
=============================
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mm.icann.org/pipermail/gnso-rds-pdp-wg/attachments/20160822/0fb6b190/attachment.html>
More information about the gnso-rds-pdp-wg
mailing list