EnthusiastXYZ
Limp Gawd
- Joined
- Jun 26, 2020
- Messages
- 221
What are common log sensitization security protocols and procedures? For example, if I want to post my Wireshark log for someone on forums to examine or send a tip to law enforcement or reporters, which parts of the log should I sanitize to prevent identification of my network topology, location, ISP, and other private information, without compromising log data needed to perform the needed analysis.