http://bugzilla.novell.com/show_bug.cgi?id=587146 http://bugzilla.novell.com/show_bug.cgi?id=587146#c2 Scott Couston <alpha096@virginbroadband.com.au> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEEDINFO |NEW CC| |alpha096@virginbroadband.co | |m.au Info Provider|alpha096@virginbroadband.co | |m.au | --- Comment #2 from Scott Couston <alpha096@virginbroadband.com.au> 2010-03-13 00:05:25 UTC --- I searched via my non real user name. I use a standard user nick of 'zczc2311' which produced the alarming results. I think the indexing is created from a mail archive that is a latter part of the process of both FATE and Bugzilla sessions. We know nothing can index out HTTPS traffic and hence thats one reason why we predominantly use it. A good test of the issue would be to search under your user nick ID and see what has been indexed. I am not aware of how the archived emailing is extracted from FATE, however in this case the Mail archive I quoted DID have an HTTPS URL at the bottom. I am sorry I did not include this. I suppose the decision to prevent ANY further indexing exposure of FATE AND/OR Bugzilla rests with Management and the process of how the email archives are produced is a technical one. This bug is just a further enlightenment of how our protected HTTPS traffic ends up being indexed by Google - your choices and actions are yours to decide and discuss. -- Configure bugmail: http://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.