Browsed by
Category: 419

WHOIS, Proxies and the GDPR – how consumers lost Security and Privacy

WHOIS, Proxies and the GDPR – how consumers lost Security and Privacy

Artists Against 419 has to say this very clearly: There can be no consumer privacy and security while ICANN Registrars are the custodians of trust on the internet. ICANN has allowed a situation to develop that’s had the exact opposite effect of what the European privacy regulators aimed for, the protection of natural consumer privacy. In turn, this has further not only created a situation where consumers may be trivially deprived of privacy, but also security. Let’s look at this situation with quick examples.

DNS Abuse Dominoes

DNS Abuse Dominoes

While ICANN, the regulators and the various interest groups are debating the definitions of DNS abuse, what constitutes a security threat and is within their responsibility (or rather not), what’s wrong in this area, fraudsters don’t care about these shenanigans. They’re exploiting DNS to their own advantage in well defined illegal activities. The rules made when the Internet was young, seems unable to keep the steps with current realities. The divide between the ideal Internet in the regulators’ model and…

Read More Read More

SlizzySlimzy12@gmail.com – Slizzy Slimzy: Why Your Motorcycle Will Not Arrive

SlizzySlimzy12@gmail.com – Slizzy Slimzy: Why Your Motorcycle Will Not Arrive

Would you trust a Nigerian rapper to successfully run a diverse US and Indian located portfolio of businesses that sells electronic devices and motorcycles, as well as several logistics companies and banks? If your answer to this question is a resounding “no”, then you may have potentially just saved thousands of dollars. By typing the email address slizzyslimzy12@gmail.com into a search engine, to the untrained eye it is possible to see evidence of a “young, talented Afro hip hop artist”…

Read More Read More

Avast highlights the failing in consumer protection

Avast highlights the failing in consumer protection

Sometimes we can learn a lot from what experts in their field of operation publish. Ironically we saw this yesterday again when Avast, a large anti-virus vendor, quoted an article by John Wasik on Forbes: All online scams have one thing in common: They want to tap your greed to get at personal information they can steal. These “phishing” ruses are happening 24/7. A typical banking scam will ask for information so the scammer can access anything from your credit…

Read More Read More

The GDPR and blanket privacy: Hold on – who watches the guardians ICANN?

The GDPR and blanket privacy: Hold on – who watches the guardians ICANN?

ICANN had two complaints they closed, escalated back to them last week. One was a Registrar Standards complaint, one was regarding a rogue reseller proxy at the registrar which is the subject of the first complaint. Why? What happens where we have a registrar that serially accepts and has been accepting weak unverified registration details, for at least the past four years into the registries, in violation of the ICANN RAA and this leads to mass abuse? What happens if…

Read More Read More

Malicious Domains: Heroes and Facilitators

Malicious Domains: Heroes and Facilitators

In a new pending report from the United States Better Business Bureau, they are looking at a new plague that’s hit the United States and the world. While we will not steal their thunder in this most excellent report and the revelations contained in it, it does illustrate certain underlying issues, malicious domains controlled from West Africa. Let’s get some facts straight: A domain registered by a malicious party for malicious purposes, is malicious. This is simple undeniable logic. Such…

Read More Read More