Featured Blogs

Latest

Cruz Is Back Now with a Countdown Clock To “Doomsday”

Senator Cruz' crusade against the IANA transition is back in full swing. With the deadline for the expiry of the IANA contract approaching both he and other anti-transition types have been working hard on their campaigns to block the transition. The latest addition to the Cruz website is a special lander page featuring a countdown clock... Yes, that's an image of President Obama shaking hands with China's Xi Jiping. more

Apple.news or News.apple?

In a development that few people will notice but is interesting to us domain geeks, Apple is in the process of retiring its news.apple.com domain in favor of apple.news. Apple is not going to shed light on why it is making this migration. I suspect that anything to take traffic off the .com domain is never a bad idea. Perhaps Apple has a long-term vision for making its News app web-accessible (instead of locked within an app). more

An Internet for Identity

In World of Ends, Doc Searls and Dave Weinberger enumerate the Internet's three virtues: 1. No one owns it. 2. Everyone can use it. 3. Anyone can improve it. ... Online services and interactions are being held back by the lack of identity systems that have the same virtues as the Internet. This post describes what we can expect from an Internet for identity. more

Want to Share Info with the DNSSEC Community? ICANN57 DNSSEC Workshop Seeking Proposals by Sept 15

Do you have information or an idea you would like to share with members of the broader DNS / DNSSEC community? Have you developed a new tool that makes DNSSEC or DANE deployment easier? Have you performed new measurements? Would you like feedback about a new idea you have? Would you like to demonstrate a new service you have? If so, we're seeking proposals for the DNSSEC Workshop to be held at ICANN57 in Hyderabad, India, in early November 2016. more

Trademark Overreaching and Faux Cybersquatting Claims

Trademarks can be strong in two ways: either inherently distinctive (arbitrary or fanciful marks), or composed of common elements that have acquired distinctiveness (descriptive or suggestive marks). Trademarks can also be weak in two ways: either composed of common elements, or lacking significant marketplace presence other than in their home territories. Panelists have seen them all, even by respondents alleging trademark rights registered later in time to complainant's. more

The .Corp, .Home & .Mail Quandary

On 24 August, fifteen applicants for the .corp, .home, or .mail (CHM) new gTLDs sent a letter to the ICANN Board asking for action on the stalled process of the their applications. This points to the answer for the question I asked in march of this year: Whatever happened with namespace collision issues and the gTLD Round of 2012. As the letter from the applicants indicates, ICANN has done little to deal with issues concerned with namespace collisions in the last 2 years. Is it now time for action? more

AfPIF Brings Together Internet Players

If you are passionate about ICT policy, Peering, and Interconnection, then the Africa Peering and Interconnection Forum (AfPIF) is the place to be. The 7th annual AfPIF takes place in Dar es Salaam, Tanzania from 30 August – 1 September 2016. AfPIF is a multistakeholder forum organized by the Internet Society that brings together a diverse range of business leaders, infrastructure providers, Internet service providers (ISPs), Internet Exchange Points (IXPs), international financial institutions, policy-makers, and regulators from all over the world. more

Does Apple’s Cloud Key Vault Answer the Key Escrow Question?

In a recent talk at Black Hat, Apple's head of security engineering (Ivan Krsti?) described many security mechanisms in iOS. One in particular stood out: Apple's Cloud Key Vault, the way that Apple protects cryptographic keys stored in iCloud. A number of people have criticized Apple for this design, saying that they have effectively conceded the "Going Dark" encryption debate to the FBI. They didn't, and what they did was done for very valid business reasons -- but they're taking a serious risk... more

Internet Access: A Chokepoint for Development

In the 1980's internet connectivity meant allowing general public to communicate and share knowledge and expertise with each other instantly and where it was not possible otherwise. Take the story of Anatoly Klyosov, connecting Russia to the western world for the first time in 1982, as an example. A bio-chemist who was not allowed to leave the soviet territory for security reasons. The internet enabled him to participate in meetings with his counterparts at Harvard University, University of Stockholm and beyond. more

Challenging UDRP Awards in Courts of Competent Jurisdiction

The Uniform Domain Name Dispute Resolution Policy (UDRP) is not an exclusive forum for the resolution of domain names accused of cybersquatting even though registration agreements use the word "mandatory" in the event of third-party claims. The UDRP is mandatory only in the sense that respondents are "obliged by virtue of the [registration] agreement to recognize the validity of a proceeding initiated by a third-party claimant." more

China’s QUESS and Quantum Communications

In mid-August China launched "QUESS" (Quantum Experiments at Space Scale), a new type of satellite that it hopes will be capable of "quantum communications" which is supposed to be hack-proof, through the use of "quantum entanglement". This allows the operator to ensure that no one else is listening to your communications by reliably distributing keys that are then used for encryption in order to be absolutely sure that there is no one in the middle intercepting that information. more

Security Against Election Hacking - Part 2: Cyberoffense Is Not the Best Cyberdefense!

State and county election officials across the country employ thousands of computers in election administration, most of them are connected (from time to time) to the internet (or exchange data cartridges with machines that are connected). In my previous post I explained how we must audit elections independently of the computers, so we can trust the results even if the computers are hacked. more

The Impact of Reverse Domain Name Hijacking on Supplemental Filings in UDRP Cases

In another blog post, I wrote about the sometimes confusing circumstances in which domain name dispute panelists will consider supplemental, or additional, filings from the parties (in addition to a complaint and response) in cases under the Uniform Domain Name Dispute Resolution Policy (UDRP). I quoted the WIPO Overview, which states, in part, that supplemental filings may be appropriate where a party can "show its relevance to the case and why it was unable to provide that information in the complaint or response." more

Security Against Election Hacking - Part 1: Software Independence

There's been a lot of discussion of whether the November 2016 U.S. election can be hacked. Should the U.S. Government designate all the states' and counties' election computers as "critical cyber infrastructure" and prioritize the "cyberdefense" of these systems? Will it make any difference to activate those buzzwords with less than 3 months until the election? First, let me explain what can and can't be hacked. Election administrators use computers in (at least) three ways... more

Video: Interview with Jari Arkko at IETF 96 in Berlin

Would you like to understand the major highlights of the 96th meeting of the Internet Engineering Task Force (IETF) last month in Berlin? What were some of the main topics and accomplishments? How many people were there? What else went on? If so, you can watch a short video interview I did below with IETF Chair Jari Arkko. more

Topics

Threat Intelligence

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days