So no access logs at all then? That sounds effective.