This I agree with, I see no value in collecting “user specific data” outside of their printer configuration.
I do think we need to do the opposite of what Sineos just did though and if this is implemented have a webpage with EXACTLY what data is collected.
Honestly though, There might be things I’m not considering but most information that I can think of that would be useful for development would be contained in the .cfg files. (barring Mainsail.cfg/Moonraker.conf/Fluidd.cfg etc. Only the ones that deal with Klipper).
Because at the top of the printer.cfg you have to add
[include mainsail.cfg]
or
[include fluidd.cfg]
So that tells us what interface they use.
(I don’t use fluidd but I believe that’s correct, dual interface might be different too)
Everything else should be defined in the .cfg files that Klipper uses and most, if not all, of that doesn’t have any identifying information barring some ridiculous level of digital forensics (I’m sure people have a “style” when making gcode macros or how they order their configuration, use of spaces, spelling/style of prefix naming etc.)
Granted there might be some use in knowing what type of things people print to see if they have commonalities in features to drill down on in future improvements. As in lots of zig zags, a lot of sharp corners, anything that is “out of the norm” of a straight line move that might make you stop and think “Hmm, I didn’t realize this came up THAT often, maybe I should go back and revisit that implementation”.
But I don’t see how we could gather that and keep it private and anonymized, that’d also require dumping the moves from the move queue constantly and would be a huge amount of data. So probably not a good idea in general.
The other factor is, finding a way to let people “opt in” and submit while staying anonymous. As in, the mere fact of uploading requires identification in a myriad of ways even assuming there is no login or anything required. Communications come FROM an IP address. Plus have to make sure that if we leave the opt-in path “open” it isn’t maliciously abused by bad actors.
So… Like anything, this would have to be rigorously defined and the different scenarios considered.
Question 1 in my mind would be… What information are we looking for EXACTLY?