Audit logging for sensitive or identifying information
Create scrubbers for data such as IP addresses, MAC addresses and Tor hidden service addresses. These fields should not be logged verbatim, but may need to be logged in part, or hashed with salt, so that we can understand the logs.