4.8 • 45 Ratings
🗓️ 14 May 2018
⏱️ 25 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
| 0:00.0 | Welcome to Tech Policy Podcast. I'm Ashken Kazarian. Who is the system used for querying |
| 0:10.7 | databases of information on domain name, registrations, and IP addresses has been vital |
| 0:15.0 | tool for journalists and securities researchers and law enforcement in identifying and tracking |
| 0:19.7 | spammers, fissures, identity |
| 0:21.8 | thieves, and other cybercriminals. However, when the EU's general data protection regulation |
| 0:27.1 | takes effect on May 25th, the service will heavily be limited or possibly shut down completely |
| 0:32.7 | in order to comply with privacy requirements. How will this impact cybersecurity? Does |
| 0:37.4 | who has raised legitimate privacy concerns? We will this impact cybersecurity? Does Who is raise legitimate |
| 0:39.2 | privacy concerns? We're joined by Shane Hughes, president of Logan Circle Strategies and |
| 0:43.8 | visiting fellow at the American Enterprise Institute and Tim Chen CEO of the main tools to discuss. |
| 0:50.7 | Thank you for joining me, Shane, Tim. Thank you for having us. First off, what is Who Is? |
| 0:56.1 | So the Who Is is a very old protocol from Internet years. |
| 1:00.7 | It started in the mid-80s. |
| 1:02.6 | A little strange fact is at one point actually AT&T ran the Who-Is, but couldn't find any reason to make money on it because no one was really on the Internet yet. |
| 1:09.9 | And so they put it back. And the then network solutions, now Verasigned, who run the dot com net, then org, |
| 1:19.5 | started to administer it. What the Who is has in it is two key pieces of information. The administrative contact and the technical contact. |
| 1:29.8 | And the legacy reason for that was the administrative contact was how you got paid. So if they |
| 1:35.7 | didn't pay for their leasing their domain name, you knew who to contact. And the second piece was |
| 1:41.0 | basically if your computer was causing problems, they knew who to bring the IP number back to. |
| 1:47.0 | So it's been like that for a long time. There have been numerous times where people wanted to change it, but there are throughout the years, and it has really been law enforcement and government. And since then, you know, companies that have seen the opportunities of using it as a tool to secure things on the Internet, it has a very long following. |
| 2:08.4 | So the idea of changing the Who is because of a change in the European data protection laws is very challenging to the entire ecosystem of the internet. |
| 2:18.7 | Tim, in a who is lookup, registers must collect and display a range of information. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from TechFreedom, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of TechFreedom and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.