[CCWG-ACCT] way forward and minority statements
gregshatanipc at gmail.com
Fri Jul 31 05:27:03 UTC 2015
It's not "the" tool but it certainly is "a" tool used by various types of
malfeasors to hide. It's an arrow in the quiver, along with the tools you
raise (apologies for mixed metaphor). Indeed, there's a whole playbook,
and we've only scratched the surface. In my experience, the "badder" the
activity and the more sophisticated the "bad guy", the more levels and
types of "tools" are used. Conversely, less sophisticated or devious bad
guys tend to use fewer of these tools.
As for using free email services, I hope you don't think I'm hiding....
On Thu, Jul 30, 2015 at 11:28 PM, Bruce Tonkin <
Bruce.Tonkin at melbourneit.com.au> wrote:
> Hello Greg,
> This is off topic, but I couldn't resist.
> >> Are you referring to the criminal element who knows how to use WHOIS
> to hide themselves?
> I am not sure that WHOIS is the “tool” for hiding themselves.
> They generally use stolen credit cards and fake or stolen identities to
> not just hide themselves, but also avoid actually paying for any of the
> services they use. One of the side effects of this practice is that some
> innocent people actually have their names associated with inappropriate
> domain names and websites in the WHOIS entries.
> One of the most frequent “tools” to hide themselves is to use free email
> services from companies such as Google, Microsoft and Yahoo. They are
> able to then use these email services to confirm that their email address
> is accurate, and hence complete the registration procedure.
> Bruce Tonkin
> Accountability-Cross-Community mailing list
> Accountability-Cross-Community at icann.org
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the Accountability-Cross-Community