In lots of cases an IP address can identify a specific customer of an ISP. Likely in need of a judge to give the order to divulge that.

But endpoint IP address is automatically divulged to the OSM API server by the nature of TCP/IP protocol. You don’t need any judge for that…

Judge could give an order to ISP to associate that specific IP address (at specific time) to specific customer, if you meant that.
But I do not see vast majority of the OSM vandalism cases ever reaching any judge…

Still, IP address is considered PII per GDPR, yes. Which confirms initial claim – it is consider “Personally identifiable information”, because it could be used to help identify (the vandals in this case).
(IOW, if it didn’t help narrow a range of possible actors, it wouldn’t be considered PII).

In case of vandals having half of a brain, that will not be of much use, when they use a mixer/vpn.

To be truthfull, if vandals had half a brain, they wouldn’t be vandalizing (any public property / commons such as OSM etc).
So by the very definition something is wrong with their brains.

Also, there are different grades of IT-vandals, and not every one of them is following top OPSEC recommendations all the time. It’s just so tiresome to do so, and one can easily skip most of them in majority of cases and have much more convenience, so why bother…

If the point is “we’ll never be able to catch 100% of them”, well, yeah. There ain’t no such thing as perfect security, you can ever only try to fix most of the lowest-hanging-fruits with available resources.

But if it helps eliminate 30% of the script kiddies, hey, that is 30% less work and more free resources to dedicate to those harder nuts…

2 Likes