Any suggestions on where I should post a slightly more academic version of this analysis? Somehow, posting here on Hacker News seems like I'm talking with friends at a cafe; surely there's a better place for this to be addressed.
I'm not even sure if this kind of thing falls under the aegis of "computer security"
It's a social engineering- or maybe trademark/big online platform loophole engineering attack, sounds like a computer security issue imho. It could certainly be done to scam other sellers as well, and perhaps it has already.