I understand change can be a challenging in particular if someone has done something for many years and it was serving his needs. But there is really no reason to be afraid, become personal or rude (“to this Jonny-come-late”) just because one states a perfectly reasonable suggestion.
I don’t know exactly the specific issues you would be facing in case a more stringent view on security and data privacy but I am certainly open to having a conversation among adults about it. I think that is what “forums or communities” are all about, right?
Perhaps it helps if I add some specifics why this thought came up during setting a device:
I consider adding a network device which you do not fully control an inherited risk for data exposure and intrusion.
I understand that what is considered “sensitive” is a question of opinion. For me it is all data that is exposed.
Whether it is an Internet router, a WIFI speaker or a smart device, I prefer sharing as little information as possible about my network structure, configuration and network devices with the outside world as a security precaution and any measures that help me achieving this, I consider beneficial. It is slightly different if I attach a device to a dedicated isolated lab network where no sensitive devices are attached or service run but for a home or company network I more interested in keeping it under control.
With the above in mind and regardless of the payload content:
Transferring data in a more secure fashion is not uncommon and I would consider it a best practise approach just because it reveals less with undesired parties.
Sharing log files that entail specifics about the device, your network and devices within the network is risky. It should remain an exception and when is required it should be exchanged in a secure fashion not accessible to just anyone within the community.
A problem determination process that fully depends on log data and cannot offer a secure way of sharing is far from ideal because of the exposure mentioned.
Sure, having access to log files can be beneficial in aspects of speeding up problem determination and fix issues. However, It is not impossible to develop something like a support file or an automated diagnostics process supplying relevant data restricted in more confidential fashion.
It is not such a substantial challenge encrypting traffic among devices, infrastructure and management portals either without jeopardizing purpose and function.
Hope this sheds some light into why I suggested this topic and I would be interested understanding your specific concerns beyond avoiding change or adjustment.