Featured Blogs

Latest

WTSA-2020: Reflecting on a Contemporary ITU-T Role

Every four years – as it has done for nearly a hundred years – the ITU-T as the world's only global intergovernmental standards body for all telecommunication, invites its 196 sovereign state members to a meeting where they examine their work and set the stage for the next four years. There is no treaty prepared, but they do examine major developments and decide needed standardization work, priorities and structure of the organization itself – including their leadership. more

It’s Time to Curtail the Censorship Industry Cartel

Last month INHOPE, a global trade association of child abuse reporting hotlines, rejected a joint call from Prostasia Foundation, the National Coalition Against Censorship, Article 19, and the Comic Book Legal Defense Fund, that its members should stop treating cartoons as if they were images of child sexual abuse. As our joint letter pointed out, INHOPE's conflation of offensive artwork with actual abuse images has resulted in the misdirection of police resources against artists and fans... more

Predicting the Cost of Cryptocurrency Hacks in 2020

The last few years have proven to be a crucial moment for cryptocurrency security. The more cryptocurrency has risen in popularity, the more high profile security breaches have occurred, and the more key institutions have been targeted. The young cryptocurrency industry has always been brimming with opportunity, but with this comes risk, especially when there are lapses in security. more

Can 5G Replace WiFi?

Verizon recently posted a webcast with investors where Ronan Dunne, EVP and CEO of the Verizon Consumer Group said that he believed that 5G hotspots using millimeter wave spectrum would eventually displace WiFi in homes. He cites major benefits of 5G over WiFi. He believes that a 5G network will be more reliable and more secure. He thinks that people will value the safety that comes from having traffic inside their home being encrypted... more

Cracks Appearing in Trump’s Huawei Boycott

It must have been a galling experience for President Trump when his good mate British Prime Minister Boris Johnson failed to step in line with Trump's demand that the UK should also boycott the Chinese firm Huawei by not allowing them to be involved in the rollout of 5G in Britain. However, the involvement of Huawei will be limited. It further proves that boycotting Huawei is a political and not a technical issue. more

Looking Forward to ‘The Conversation We Should Be Having’

No, this topic hasn't yet been exhausted: There's still plenty more conversation we can and should have about the proposed sale of the .ORG registry operator to a private firm. Ideally, that conversation will add more information and more clarity about the issues at stake and the facts that underpin those issues. That's why I'm planning to attend today's event at American University where the sale's proponents, opponents and undecideds will have a tremendous opportunity to better understand one another. more

Deep Sea Diving: The State of Submarine Cable Technology

There is something quite compelling about engineering a piece of state-of-the-art technology that is intended to be dropped off a boat and then operate flawlessly for the next twenty-five years or more in the silent depths of the world's oceans! It brings together advanced physics, marine technology, and engineering to create some truly amazing pieces of networking infrastructure. more

Truth in Web Digital Identity?

Most of us, when we go to a website and see the little lock at the top of the browser, don't think twice and trust that we are communicating with the right company or organization. However, this is no longer the case because of a rather radical development that has largely occurred without notice or intervention by almost everyone. The web now has its own rapidly spreading version of CallerID spoofing that is about to get worse. more

Cyberspace Security in Africa – Where Do We Stand?

Very few African states today have developed a national cybersecurity strategy or have in place cybersecurity and data protection regulations and laws. Yet, the continent has made major headway in developing its digital ecosystem, and moreover, it is home to the largest free trade area in the world, which is predicted to create an entirely new development path harnessing the potential of its resources and people. more

Answering Additional Questions about Ethos’ Acquisition of Public Interest Registry (PIR)

A few good questions have circulated in response to my recent blog post seeking clarity around the following: 1) what we mean with respect to adhering to Public Interest Registry's (PIR) historic practices on pricing, and 2) our interpretation of how the new co-operative proposal would reward speculators. With regard to Ethos' pricing commitments: we are not saying that we will raise prices 10% every year -- our commitment is that any price increase would not exceed 10% per year on average, if at all. more

Addressing Recent Media Mischaracterizations of the .ORG Acquisition

Given the level of public interest in Ethos' acquisition of Public Interest Registry ("PIR") from the Internet Society, it is no surprise that this agreement continues to attract press attention. Ethos welcomes open discussion on this important investment, and we are of course following the media coverage closely. Unfortunately, it is not always possible to respond point-by-point to every article, so I would like to take this opportunity to address several mischaracterizations of the deal recently reported by Wired, Deutsche Welle, and others. more

False Expectations: Attorney’s Fees and Statutory Damages in ACPA Actions

There is a degree of dread in the investor community that prized domain names will be forfeited to trademark owners in proceedings under the Uniform Domain Name Dispute Resolution Policy (UDRP). Since the UDRP has no internal appeal mechanism to correct errors of law or judgment, the sole recourse is an action in a court of competent jurisdiction as spelled out in UDRP paragraph 4(k). In the U.S., this would be a district court under the Anticybersquatting Consumer Protection Act (ACPA). more

EPDP Team Marches Toward Major Milestone

If it feels like the work of the latest group addressing registration data within ICANN has been going on forever, try participating in it! Since the summer of 2018, the team has regularly been meeting for several hours each week, participating in numerous face-to-face meetings and exchanging thousands of emails. Last week in Los Angeles, the team got together once again to continue our Phase 2 work creating policy that will (among other issues) govern the disclosure of non-public registration data to third parties. more

Sovereignty Strikes the Internet: When Two Don’t Become One

On January 28, the UK government was set to announce whether it would allow Huawei, the Chinese information and communication technologies provider, to develop its 5G infrastructure. Given Brexit and its need to form new alliances, the decision was marked as a significant moment for the UK's trade future. Leading up to the day of the decision, the UK was subjected to a significant amount of pressure from the United States government to reject any deal with Huawei. more

5 Broadband Predictions for 2020

The 2010's have been nothing short of transformative in the broadband space. Despite disappointing deployment rates across the U.S., the past decade has been a period of exponential change and innovation. As we look toward the new decade, here are five key predictions based on current trends and developments in the broadband industry. more

Topics

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days