@scottjenson Let’s say that we come up with a set of “events” for which we know they don’t need anything that can be used to identify a user or their system. Let’s say I procure that software from a Repo of my choice who’s policy it is to only distribute software leveraging said events for telemetry and we solve the IP address issue with sth like OHTTP we would be able to extend the trust people put into their Repo/distribution provider onto the collection of the metrics.
The repo would compile or configure their public OHTTP gateway as target into the applications they distribute and the source IP leakage is addressed. For non-repo based distribution the trust relationship is already different and maybe the software using the “events” takes a user configurable gateway from the system.
In the end it all comes down to: What’s there to make me believe product x uses telemetry in a privacy preserving way? Just the word of the creator, a party I already trust to deliver me safe software… or do I have the means to prevent (potentially) non-privacy preserving telemetry completely.