I don't agree with your stance.

Hiding whois details doesn't mean you hiding your identity. Normally, this type 
of privacy is also used when you want to hide the actual person that is 
responsible for, lets say paying the domains.

Because, you don't want people calling these phones, about spam, about support 
cases, about things that SHOULD be taken through their ticket system.

But you still want a private phone there, that could be ringing in the middle 
of the night if something went amiss with their payment for their domain, so 
the domain doesn't get snapped by a squatter.

So I would say, this practice is legitimate for larger companies like mailgun.
Just because details are hidden at location A or for automated tools doesn't 
mean they are dubious.
Same if they hide their details on website, but require filling out a captcha 
to get their office address. Doesn't mean they are shady.

You can still find their details on their official website 
https://www.mailgun.com/contact/
With a address to their office even.

If they write: " support [at] mailgun.com " in a ticket in a attempt to combat 
spam, do you mean they have become "anonymous" and hides themselves just 
because automated tools no longer can reach them?

If you do your homework, you can see that they aren't hiding themselves like a 
spammer, but only hides the details of individual employees.


Stop using whois to get contact info about big companies!
Use their official contact ways!

They have homepages, they are in public corporate directories, they are as open 
as they can be without exposing individual employees.


-----Ursprungligt meddelande-----
Från: Michael Peddemors via mailop <mailop@mailop.org> 
Skickat: den 31 maj 2023 00:27
Till: mailop@mailop.org
Ämne: [mailop] Transparency is key... Here is a perfect example.. M3AAWG is 
coming.. time to take a stance

18.156.43.163       (M)           1   guardpost-n08.euc1.mailgun.co
18.157.58.83        (M)           1   guardpost-n07.euc1.mailgun.co
18.157.75.126       (M)           1   guardpost-n01.euc1.mailgun.co
18.158.176.19       (M)           1   guardpost-n02.euc1.mailgun.co
18.197.223.145      (M)           1   guardpost-n05.euc1.mailgun.co

Registrar: NameCheap, Inc.
Registrar IANA ID: 1068
Registrar Abuse Contact Email: ab...@namecheap.com Registrar Abuse Contact 
Phone: +1.6613102107 Domain Status: clientTransferProhibited 
https://icann.org/epp#clientTransferProhibited
Registry Registrant ID: REDACTED FOR PRIVACY

whois on the IP?

18.156.0.0/14 AMAZO-ZFRA
Organization:   A100 ROW GmbH (RG-123)

Company Description:  
Key Principal: A. Masone   See more contacts
Industry: Computer Systems Design and Related Services ,  Computing 
Infrastructure Providers, Data Processing, Web Hosting, and Related Services ,  
Professional, Scientific, and Technical Services ,  Computer facilities 
management ,  Data processing and preparation

whois mailgun.net

Registrar: NAMECHEAP INC
Registrar IANA ID: 1068
Registrar Abuse Contact Email: ab...@namecheap.com Registrar Abuse Contact 
Phone: +1.9854014545
Reseller: NAMECHEAP INC
Domain Status: clientTransferProhibited 
https://icann.org/epp#clientTransferProhibited
Registry Registrant ID:
Registrant Name: Redacted for Privacy
Registrant Organization: Privacy service provided by Withheld for Privacy ehf

http://mailgun.net/  Error 503
http://mailgun.co    (Not responding)

Kind of impossible to see if these companies are even related..

How does the public find abuse contacts?

Doesn't M3AAWG have a lot to say on this subject?

At least mailgun.us has transparent whois..
   (oops, careful, they might have forgotten to hide that one)

Of course, the abuse contact for that one points to mailgun.org, WHICH is again 
'REDACTED' for privacy.. (as is mailgun.com)

Seems that more and more of the world is intentionally hiding behind terms like 
PRIVACY and GDPR, in order to serve their business interests...


If you have to hide behind anonymity, you aren't doing things right as 
ESP, you should professionally stand behind your name.

So, if someone registers mailgun.zip, what do we have to do to ensure 
that it belongs to the right people?

And you would think a company the size of mailgun could run their own 
DNS servers ;)

Name Server: ns-445.awsdns-55.com
Name Server: ns-907.awsdns-49.net
Name Server: ns-1728.awsdns-24.co.uk
Name Server: ns-1471.awsdns-55.org


Just saying people... the more you try to 'hide' who is behind your 
operations, the more it will affect your reputation, AND your pocket book..

Sure, Amazon was one big ones that started this, and got away with it, 
and now we have people hiding on Azure, Google, and many other cloud 
providers... hackers already love hiding behind CloudFlare, and every 
little spam friendly hoster is now rebranding as a 'cloud service' to 
take advantage of the same trends..

But if you REALLY want people to take you seriously, these type of 
business practices have to stop..









-- 
"Catch the Magic of Linux..."
------------------------------------------------------------------------
Michael Peddemors, President/CEO LinuxMagic Inc.
Visit us at http://www.linuxmagic.com @linuxmagic
A Wizard IT Company - For More Info http://www.wizard.ca
"LinuxMagic" a Registered TradeMark of Wizard Tower TechnoServices Ltd.
------------------------------------------------------------------------
604-682-0300 Beautiful British Columbia, Canada

This email and any electronic data contained are confidential and intended
solely for the use of the individual or entity to which they are addressed.
Please note that any views or opinions presented in this email are solely
those of the author and are not intended to represent those of the company.
_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

Reply via email to