Featured Blogs

Latest

Thinking Ahead on Privacy in the Domain Name System

Earlier this year, I wrote about a recent enhancement to privacy in the Domain Name System (DNS) called qname-minimization. Following the principle of minimum disclosure, this enhancement reduces the information content of a DNS query to the minimum necessary to get either an authoritative response from a name server, or a referral to another name server. more

Decoding the WSIS Message - ISOC Releases Matrix of Countries’ WSIS+10 Positions

Over the next few months, major discussions at the United Nations will shape the future of Internet governance. In order to prepare with our community for the ten-year Review of the World Summit on the Information Society (WSIS+10), in New York, USA, on 15 to 16 December 2015, we are publishing today a matrix of the countries' positions on WSIS+10. The matrix draws from their written contributions to the UN this summer, and is designed to help all stakeholders better understand the key issues at the the heart of the negotiations. more

Why We Need Gigabit Networks

There is currently a great deal of debate regarding the need for gigabit networks. There are still a lot of voices, often led by conservative political and media people, who argue that hardly anyone needs such networks. Unfortunately for them, however, their arguments are totally flawed. And who are they, anyway, to set the tone for such new infrastructure. Isn't necessity the mother of invention? more

More Than Just Forwarding: How .brands Like Apple Can Use Defensive Registrations

The domain industry media was abuzz last week with speculation that tech giant Apple may be gearing up to launch its .apple brand TLD. Rumours began when it was discovered that Apple registered 29 .com domain names that to the untrained eye, appear to be strangely worded. These include the likes of imovieapple.com, macbookproapple.com and ipadapple.com, providing hope to many industry pundits that they could potentially be defensive registrations designed to protect Apple from losing traffic when it begins to utilise its .apple TLD. more

Revisiting Internet Governance

You might recall that I played an advisory role to the World Conference on International Telecommunications (WCIT) in 2012 in Dubai. In the run-up to that event -- as well as during and after it -- I gave my opinion on the role of internet governance, plus an analysis of what was happening. At that time I held a more conciliatory position on the issue, but you may have noticed that, in the wake of the Snowden revelations and the illegal NSA activities, as well as many other similar activities from ASIO in Australia and no doubt the Russian, Israeli and Chinese authorities, my position has shifted significantly. more

ICANN Accountability: Beware the Bridge Too Far

Yesterday I had the privilege of delivering the keynote address at the inaugural Internet Society (Canada) Symposium. In my remarks, I took the opportunity to talk about my thoughts on the current status of the IANA stewardship transition and enhancing ICANN accountability processes. Fact is I'm getting increasingly concerned. As we head into what will be a critical meeting of the CCWG-Accountability in Los Angeles today, I fear that the Internet governance community is headed for a showdown, the consequences of which could prove detrimental. more

NTIA Directs Smoke Signals Toward LA

On September 25th-26th the Cross Community Working Group developing enhanced accountability measures to accompany the IANA functions transition, and replace the "backstop" role played by the U.S., will meet in Los Angeles to review the 90 comments filed on their second draft Proposal and consider responsive modifications... As NTIA will be the primary evaluator of whether the transition & accountability package that is eventually forwarded by ICANN meets the criteria it set when it announced the transition in March 2014, CCWG participants in LA will be carefully reading the tea leaves of this latest NTIA statement. more

The ICANN Accountability End Game

It was predictable, and inevitable, I suppose, that the end game of a search for a more accountable ICANN would devolve to a lawyer's contest. When there is money on the table, and when global politics are invoked to one degree or another, it is the lawyers who are tasked to translate lofty goals into precise words on paper that will survive the inspection of judges and courts. And ambitious politicians as well. more

The Empire Strikes Back: ICANN Accountability at the Inflection Point

The members of the ICANN community engaged in the work of the Cross Community Working Group on Enhancing ICANN Accountability (CCWG-ACCT, or just plain "CCWG" for this article) has been engaged since late 2014 in designing an enhanced ICANN accountability plan to accompany the transition of oversight of the IANA root zone functions from the National Telecommunications and Information Administration (NTIA) to the global multistakeholder community. On August 3rd the CCWG released its 2nd Draft Report (Work Stream 1) for a public comment period that closed on September 12th. more

IANA Stewardship Transition: Full Steam Ahead

Last week the IANA Stewardship Transition Coordination Group (ICG) met in Los Angeles to review and discuss public comments concerning the Proposal to Transition the Stewardship of the Internet Assigned Numbers Authority (IANA) Functions. Upon review of the comments received, the ICG decided to continue advancing the proposal as planned, aiming to make as much progress as possible by the time of ICANN 54, scheduled for October 19-22. more

Global Domain Registrations Edge Closer to 300M: Verisign

The number of domain names registered around the world grew by 2.2 million, or 0.8 percent, to 296 million at the end of June according to the latest Domain Name Industry Brief from Verisign. With similar growth, the 300 million mark should be reached around the end of 2015. Worldwide registrations have grown by 16.4 million, or 5.9 percent, year over year. more

Whither Passwords

The primary means of authentication on the Internet is the password -- a half-century old, shared secret mechanism that is difficult to use (especially on mobile devices) and has acknowledged security flaws including attacks at scale. Even so, passwords remain the most prevalent form of authentication with efforts to enhance security typically relying on "bolt on" solutions that increase user friction. more

Ten Years of Secure DNS at .se! (What We Learned)

Ten years ago today, and with 300,000 domains in the zone file, we introduced DNSSEC at .se. It was the end of a fairly long journey, or at least the first stage. The first Swedish workshop to test the new function according to the specifications from the Internet Engineering Task Force was arranged in 1999. At that time, I was still working in the IT Commission's Secretariat, and the standard was far from complete as it turned out. Our ambition was to change the world, at least the world that exists on the internet. more

The Changing Mobile World

Today's Internet is undoubtedly the mobile Internet. Sales of all other forms of personal computers are in decline and the market focus is now squarely on tablets, "smart" phones and wearable peripherals. In 2014 these providers sold 1.5 billion such devices into the global consumer market, and doubtless 2015's numbers will be greater. Half of all Internet-visible devices are now mobile devices and they generate 75% of all access provider revenues. more

55 Days Remain Until the 10th Internet Governance Forum in Joao Pessoa, Brazil

On behalf of the Internet Governance Forum (IGF) Multistakeholder Advisory Group (MAG) I would like to extend the official invitation from the United Nations Secretary-General which cordially invites and encourages all stakeholders to participate in the upcoming 10th annual meeting of the Internet Governance Forum, being held this year in the beautiful coastal city of João Pessoa, Brazil. more

Topics

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Threat Intelligence

Sponsored byWhoisXML API

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days