Project:Privacy policy
From Computers Wiki
Jump to navigationJump to search
Your IP addresses and request paths are logged so that malicious traffic can be blocked.
Your IP addresses and request paths are logged so that malicious traffic can be blocked.