Suppose for a moment that you are the victim of a wicked ISP that engages in disallowed "throttling" under a "neutral" regime for Internet access. You like to access streaming media from a particular "over the top" service provider. By coincidence, the performance of your favoured application drops at the same time your ISP launches a rival content service of its own. You then complain to the regulator, who investigates... It seems like an open-and-shut case of "throttling" resulting in a disallowed "neutrality violation". Or is it? more
Google's Cuba project has been in the news lately. Mary Anastasia O'Grady wrote a Wall Street Journal article called "Google's Broken Promise to Cubans," criticising Google for being "wholly uninterested in the Cuban struggle for free speech" and assisting the Castro government. The article begins by taking a shot at President Obama who "raved" about an impending Google-Cuba deal "to start setting up more Wi-Fi access and broadband access on the island." more
I opened an email from GoDaddy over the weekend on my phone. Or so I initially thought. I had recently helped a client transfer a domain name to a GoDaddy account (to settle a domain name dispute), so the subject line of the email -- "Confirm this account" -- simply made me think that I needed to take another action to ensure everything was in working order. But quickly, my radar went off. more
With ever more TLDs, where does it make sense to focus resources? After four years and a quadrupling of internet extensions, what metrics continue to make sense in the domain name industry? Which should we discard? And how do you gain understanding of this expanded market? For registries, future success is dependent on grasping the changes that have already come. For registrars, it is increasingly important to identify winners and allocate resources accordingly. The question is: how? more
There's lots of security advice in the press: keep your systems patched, use a password manager, don't click on links in email, etc. But there's one thing these adages omit: an attacker who is targeting you, rather than whoever falls for the phishing email, won't be stopped by one defensive measure. Rather, they'll go after the weakest part of your defenses. You have to protect everything -- including things you hadn't realized were relevant. more
From the Internet's earliest days, the tension between a global communication network and local geography-based laws has been obvious. One scenario is that every jurisdiction's local laws apply to the Internet globally, meaning that the country (or sub-national regulator) with the most restrictive law for any content category sets the global standard for that content. If this scenario comes to pass, the Internet will only contain content that is legal in every jurisdiction in the world... more
Network Address Translation has often been described as an unfortunate aberration in the evolution of the Internet, and one that will be expunged with the completion of the transition of IPv6. I think that this view, which appears to form part of today's conventional wisdom about the Internet unnecessarily vilifies NATs. In my opinion, NATs are far from being an aberration, and instead, I see them as an informative step in the evolution of the Internet, particularly as they relate to possibilities in the evolution of name-based networking. Here's why. more
The Uniform Domain Name Dispute Resolution Policy (UDRP) is not an exclusive remedy for cybersquatting, but it is by far the preferred forum. Direct actions in courts of competent jurisdiction, the Anticybersquatting Consumer Protection Act (ACPA) in the U.S. are minimal in comparison, and it is rare for respondents to remove disputes to a court of competent jurisdiction before a UDRP decision (paragraph 4(k) of the Policy). Less rare (but not copious) are post-UDRP challenges under the ACPA. more
At 03:22 UTC on Friday, 25 August 2017, the Internet experienced the effects of another massive BGP routing leak. This time it was Google who leaked over 160,000 prefixes to Verizon, who in turn accepted these routes and passed them on. Despite the fact that the leak took place in Chicago, Illinois, it had devastating consequences for the internet in Japan, half a world away. Two of Japan's major telecoms (KDDI and NTT's OCN) were severely affected, posting outage notices (KDDI / OCN pictured below). more
The Uniform Domain Name Dispute Resolution Policy (UDRP) is known as an inexpensive alternative to litigation (and that's true), but some proceedings can end up costing a trademark owner more than it may have expected. There are generally two additional types of expenses that can arise during the course of a UDRP proceeding: (1) extra filing fees for certain aspects of a case filed at the Forum, and (2) an increased filing fee if the domain name registrant wants a three-member panel to decide the case. more
Over the past couple of weeks, following the events in Charlottesville, Virginia, there has been significant discussion in social and traditional media about various technology companies removing websites from their servers, or otherwise making them unavailable. As the operators of Canada's Internet domain, we at CIRA are getting numerous inquiries about our stance and policies on this issue. I'd like to use this opportunity to make a couple of clarifications about how CIRA works and what CIRA actually does. more
I recently posted updates on the satellite Internet service projects of SpaceX and OneWeb. OneWeb and SpaceX have received a lot of publicity, but there is a third entry in the global satellite Internet race -- Boeing. Boeing has applied for a license to launch a constellation of 2,956 Internet-access satellites orbiting at an altitude of 1,200 km. (In a subsequent amendment, the orbits were lowered to three different levels). They outlined a two phase plan... more
ICANN's last new gTLD application closed in 2012 with more than 600 brands applying for their dot brand. Dot brand domains associate a keyword or keyphrase and a brand name in a complete domain name... To understand better how the evolution of the dotBrand has been throughout these years, number of websites launched, redirects, registries etc, Dot Brand Observatory prepared a few visual graphics. more
A recent article in the New York Times Dealbook column reported on phone number hijacking, in which a bad guy fraudulently takes over someone's mobile phone number and used it to reset credentials and drain the victim's account. It happens a lot, even to the chief technologist of the FTC. This reminds us that security is hard, and understanding two-factor authentication is harder than it seems. more
Recently, California farmer Craig Thompson got a pretty nifty upgrade for his irrigation: a broadband-connected Hydrawise control system that would automatically manage and monitor the irrigation of his olive and grape fields and collect data to alert him if there was a problem. He woke up the next morning to fields he could have assumed were appropriately hydrated, but the Hydrawise system quickly proved its worth when he looked at the data coming out of it. more
Sponsored byCSC
Sponsored byIPv4.Global
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byRadix
Sponsored byVerisign