[gnso-rds-pdp-wg] @EXT: RE: Use cases: Fundamental, Incidental, and Theoretical

Ayden Férdeline icann at ferdeline.com
Mon Aug 22 20:05:31 UTC 2016


I share the same view, Carlton. +1 to your comment.

Ayden



-------- Original Message --------
Subject: Re: [gnso-rds-pdp-wg] @EXT: RE: Use cases: Fundamental, Incidental, and Theoretical
Local Time: August 22, 2016 5:02 PM
UTC Time: August 22, 2016 4:02 PM
From: carlton.samuels at gmail.com
To: vgreimann at key-systems.net
gnso-rds-pdp-wg at icann.org





On Mon, Aug 22, 2016 at 2:19 AM, Volker Greimann <vgreimann at key-systems.net> wrote:
Simply put: Anything that can be abused, will be abuse. We therefore need to model our approach on the worst possible actors, not the best.


+1

I cannot see how any other model makes sense in this context.

-Carlton







==============================
Carlton A Samuels
Mobile: 876-818-1799
Strategy, Planning, Governance, Assessment & Turnaround
=============================
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mm.icann.org/pipermail/gnso-rds-pdp-wg/attachments/20160822/fae65752/attachment.html>


More information about the gnso-rds-pdp-wg mailing list