
Hi, Andrew Campling <andrew.campling@419.consulting> writes:
Irrespective of any view regarding rights holders, the lack of effective KYC procedures is also a problem in combating both malicious and illegal content
Know Your Customer does require that someone IS their customer, right? Which in very many cases will not be the case for resource users and RIPE. In cases of someone using "fallow" resources without authorization by the formal resource holder, would you also blame the RIPE database for having incorrect info? Let me point out that even a "bulletproof" hoster will not beam their packets onto the Internet but will be connected to an uplink or uplinks, which ought to be readily traceable with a plain traceroute until you find the closest-to-them entity you can identify and that picks up their phones, which likely have a contract either with the hoster or their provider (and maybe even an acceptable use policy). Following that scavenger-hunt wise is sure more work than just looking it up in a phone book (RIR database), but the likelihood of finding entities whose customers the sought-after parties are is distinctly better. Kind regards, Petra Zeidler —————————————————————————— Deutsches Zentrum für Luft- und Raumfahrt e.V. (DLR) Deutsches Fernerkundungsdatenzentrum | DFD-INF | Oberpfaffenhofen, Münchener Str. 20 | 82234 Weßling Petra Zeidler Telefon +49 8153 28 4295 | Telefax +49 8153 28 1448 | petra.zeidler@dlr.de | http://www.dlr.de/eoc ----------------------------------------------------------------------