In article CAP-JHpmJc=vLFuyfeTf2iKTn4j43PHm9QnaDDhVVypz3MVzB-A@mail.gmail.com, John phoenixoverride@gmail.com writes:
One thing that might work (wouldnt be 100%) would be a method for identifying IP ranges of know abuse where legit collateral is minimal and keeping a database of these and auto-blocking them.
The problem with all these schemes of identifying perpetrators is that they often operate through botnets and the IP address doing the edit has nothing at all to do with the perpetrator.