Imagine a scenario. Your website analysis shows that your page has stopped receiving visitors, yet there are no complaints that your domain is unreachable. Strange, isn't it? You are certainly wondering: What's going on? Where are my customers? You see, what happened is that you are facing the consequences of the lack of domain name system (DNS) security. more
In the matter relating to O.COM, I've focused on the fact that VeriSign has -- in correspondence to the organization that is counter-party to its .COM and transliterated .COM IDN Registry Agreements, in earnings calls with its investors and financial analysts, and in policy published on its website for every innocent and unsuspecting Tom, Dick, and Harry in the world to be duped by -- stated an unequivocal and unwavering commitment . more
The internet started to take on momentum in the 1990s. At that time many analysts, myself included, marveled at the opportunity of creating a platform that would boost grassroot democracy. There was no need for a middleman and there were few barriers to ordinary people becoming involved. This included organizing groups, discussions and events, sharing knowledge, insights and information, publishing opinions -- just some of the potential attached to the internet. more
ICANN is about to do serious damage to its reputation by making a precipitous, ill-considered leap into the unknown should it follow through on removing price constraints on several legacy extensions, most notably .org. Doing so would expose a global community of non-profits to the risk of quickly-escalating exploitative pricing. The rationale for eliminating price caps relies on three points, all of which are incorrect. more
ICANN has spent years trying to figure out what to do with domain name variants, strings that look different but mean the same thing, for some definition of "the same." They've been trying to deal with them in second level domains for a decade, and are now working on rules to allow variant top-level domains. Unfortunately, variants don't work. The problem isn't putting them in the DNS; it's that once they're in the DNS, they don't work anywhere else. more
In a previous post, I spoke of Amazon's use of customer and market data in restraint of trade, but they are not alone. For example, leaked internal documents show that plans to sell access to user data were discussed for years and received support from Facebook's most senior executives. Facebook gave Amazon extended access to user data because Amazon was spending money on advertising and partnered with them on the launch of the Fire smartphone. more
There is no rest for the wicked. If you think that 2018 was the climax of cybercrime, wait until you see what happens in the next few years as cybercriminals are constantly learning new ways to strike. Take for instance domain-related attacks now coming in a variety of forms. There's domain hijacking which involves gaining of access to domains and making changes without owners' permission. You have typosquatting where phishing is often utilized to steal valuable information. more
Celebrating the 30th anniversary of the internet Berners-Lee, the father of the internet, reiterated his suggestion for a radical change, which would improve the functionality of the internet for the benefit of society. He suggests a sort of refoundation of the web, creating a fresh set of rules, both legal and technical, to unite the world behind a process that can avoid some of the missteps of the past 30 years. While this most certainly would be an excellent development, I am rather pessimistic about a rapid implementation of such a radical change more
There are some who see the regulation of social media platforms as an attack on the open internet and free speech and argue that the way to protect that is to let those platforms continue to self-regulate. While it is true that the open internet is the product of the same freedom to innovate that the platforms have sprung from, it is equally the product of the cooperative, multi-stakeholder organisations where common policy and norms are agreed. more
There was some buzz about the start of the "Reiwa Era" (????) in Japan. New companies are using Reiwa as part of their names already, and it has implications for the Internet Domain Name industry as well. Here's what we found out... In Japan, the reign of each emperor has its own corresponding era. The current era, Heisei, began when Emperor Akihito ascended the throne on January 8, 1989. With Emperor Akihito set to abdicate the throne to his eldest son Naruhito on April 30, 2019, a new era is about to begin. more
I have been following satellite Internet service since the 1990s, but I was surprised when I learned last week that Amazon had filed an application for a 3,236-satellite constellation of low-earth orbit Internet service satellites - Project Kuiper. I shouldn't have been surprised - Amazon was an infrastructure company from the start. In his first post-IPO letter to shareholders in 1997, Jeff Bezos pointed out that their distribution center capacity grew from 50,000 to 285,000 square feet and said their goal remained... more
Who would think that so much could go wrong with something as seemingly innocent as a domain name? As cybercrime continues to evolve, causing devastating reputational and financial losses to businesses and organizations, web addresses are used as a weapon -- and it's not always easy to notice their many faces. In this article, let's take a look at the domain name crime landscape, discuss the current challenges investigators and legitimate registrants face, and talk about some useful techniques. more
I went through the exciting exercise of checking all March 2019 new gTLD reports to extract which domain name extension shows an interesting learning curve (or something strange happening). This is what I noticed for the 20 categories of TLDs... In the list of new gTLDs for Politics, the first new gTLD to have been delegated from the ICANN new gTLD program - .GURU (63,000) - lost 2,000 registrations since January 2018 (not 2019). more
From time to time the IETF seriously grapples with its role with respect to technology relating to users' privacy. Should the IETF publish standard specifications of technologies that facilitate third-party eavesdropping on communications or should it refrain from working on such technologies? Should the IETF take further steps and publish standard specifications of technologies that directly impede various forms of third party eavesdropping on communications? more
David Redl has written to ICANN in relation to the ongoing work around whois and GDPR. The letter, which was shared with the GNSO Council last night, is a mixed bag. On the one hand, it offers the carrot in relation to what's been done so far, but then there's the not so veiled threat, which isn't a revelation by any means, of "domestic legislation." more
Sponsored byCSC
Sponsored byIPv4.Global
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byRadix
Sponsored byWhoisXML API
Sponsored byVerisign