Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

At the 26C3 congress in 2009 there was a talk[1] about just that happening: companies that were looking for abandoned ASNs/IPv4 allocations and then using shady tricks (creating similarly-named companies, ...) to get them in their possession.

1: https://events.ccc.de/congress/2009/Fahrplan/events/3688.en....



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: