Featured Blogs

Latest

Reflections on the 20th Anniversary of the Dot-Com

Twenty years ago (Monday) on June 8th, 1989, I did the public launch of ClariNet.com, my electronic newspaper business, which would be delivered using USENET protocols (there was no HTTP yet) over the internet. ClariNet was the first company created to use the internet as its platform for business, and as such this event has a claim at being the birth of the "dot-com" concept which so affected the world in the two intervening decades. There are other definitions and other contenders which I discuss... more

China’s “Green Dam Youth Escort” Software

Today's Wall Street Journal has a provocative story headlined 'China Squeezes PC Makers: Beijing Is Set to Require Web Filter That Would Block Government-Censored Sites'... According to a press release dated June 8th China time, after a period of testing and evaluation, the "Green Dam Youth Escort" software received government blessing in April to be made available for free public download. The press release says that the software has been downloaded over 3 million times since the end of March and is being used by approximately 2279 schools... more

Appeals Court Revives the CFIT Anti-Trust Suit Against VeriSign

Back in 2005 an organization called the Coalition for Internet Transparency (CFIT) burst upon the scene at the Vancouver ICANN meeting, and filed an anti-trust suit against VeriSign for their monopoly control of the .COM registry and of the market in expiring .COM domains. They didn't do very well in the trial court, which granted Verisign's motion to dismiss the case. But yesterday the Ninth Circuit reversed the trial court and put the suit back on track. more

Free Broadband: The Shape of Things to Come

The UK's broadband market is one of the most competitive in Europe. The DSL network effectively covers the entire country, while the network of the dominant cable provider Virgin Media covers more than half of all households (about 12.6 million homes). Beginning in 2007, Virgin Media expanded the availability of its services not by increasing the footprint of its cable network but by utilising wholesale LLU services... more

Fight Phishing With Branding

Phishing, stealing personal information by impersonating a trusted organization, is a big problem that's not going away. Most antiphishing techniques to date have attempted to recognize fake e-mail and fake web sites, but this hasn't been particularly effective. A more promising approach is to brand the real mail and real web sites. more

IRT Final Report on Trademark Protection in New Top-Level Domains - Part 1: Uniform Rapid Suspension

The ICANN Implementation Recommendation Team (IRT) working group has published its final report, which I decided to analyze a bit further. I already made a few comments last month, both in the At-Large Advisory Council framework and on my own. There are several issues raised by the recommendations of this report. The Uniform Rapid Suspension system (URS) is one. more

DKIM for Discussion Lists

There's a pernicious meme floating around that DomainKeys Identified Mail (DKIM) doesn't work with discussion lists, particularly those hosted on common open source software packages like MailMan. It's particularly odd to see this claim after I set it up successfully on a stock Debian server in less than half an hour, just a few weeks ago. Here's how it can, should, and does work. more

A Clear Case for ISP Regulation: IP Address Logging

Over on the Network Neutrality Squad yesterday, I noted, without comment, the following quote from the new Time Warner Cable privacy policy bill insert: "Operator's system, in delivering and routing the ISP Services, and the systems of Operator's Affiliated ISPs, may automatically log information concerning Internet addresses you contact, and the duration of your visits to such addresses." Today I will comment, and explain why such logging by ISPs creates a clear case for regulatory intervention, on both privacy and competition grounds. more

China Blocks Twitter, Flickr, Bing, Hotmail, Windows Live, etc. Ahead of Tiananmen 20th Anniversary

On Herdict, the global crowd-sourcing censorship-tracking website, people are reporting censorship of Twitter on networks all over China… with some people adding frustrated commentary, often including the f-word. You can also see blockage reports for Hotmail, Windows Live, Bing, Flickr, YouTube, Blogspot... more

Policy Beyond the Potholes

I cringe whenever I hear the arguments that we can't have community owned infrastructure for connectivity because local governments can't fix potholes. I wouldn't mind it so much if that argument wasn't used to shut off further discussion. We should be asking why we are denied the "dumb-pipes" that provide vital infrastructure and why we allow phone (and TV) companies to horde vital infrastructure. Instead we accept the "pothole" argument as a reason we can't be trusted to communicate on our own. more

Do You Care About Your Privacy?

ICANN is currently going through a complicated process in order to introduce more Top-Level Domains (TLDs). While the launch of new TLDs is something that a lot of people will welcome it is not without its issues. One of the areas that has been receiving quite a bit of attention is in relation to intellectual property rights. So what has this got to do with privacy? more

The Right to Internet Access

President Sarkozy of France recently managed to get his 'Création et Internet' law passed by the National Assembly, and if all goes well in the Senate then French internet users will soon find their activities being supervised by HADOPI, the grandly named 'Haute Autorité pour la Diffusion des Œuvres et la Protection des Droits sur Internet.' The rights it is concerned with are not those of ordinary net users but of copyright owners, and especially the large entertainment companies that have lobbied so hard and so successfully for the power to force internet service providers to terminate the accounts of those accused of downloading unlicensed copies of music, films and software... more

How a Resilient Society Defends Cyberspace

Seventy-five years ago today, on May 29th, 1934, Egyptian private radio stations fell silent, as the government shut them down in favor of a state monopoly on broadcast communication. Egyptian radio "hackers" (as we would style them today) had, over the course of about fifteen years, developed a burgeoning network of unofficial radio stations... It couldn't last. After two days of official radio silence, on May 31st, official state-sponsored radio stations (run by the Marconi company under special contract) began transmitting a clean slate of government-sanctioned programming, and the brief era of grass-roots Egyptian radio was over... more

Contributory Cybersquatting and the Impending Demise of Domain Name Proxy Services?

This case involves an alleged domain name theft. Solid Host is a web host and initial owner of the domain name solidhost.com, which it registered through eNom in 2004. Solid Host claims that in 2008, a security breach at eNom allowed an unknown interloper (Doe) to steal the domain name and move the registration to NameCheap. Doe also acquired NameCheap's "WhoisGuard" service, a domain name proxy service that masked Doe's contact information in the Whois database. Solid Host contacted Doe and sought the domain name; Doe asked for $12,000, and Solid Host took a pass... more

IPv6 and LTE, the Not So Long Term Evolution?

The Wall Street Journal reported that AT&T saw wireless networks about to drown under a deluge of data. To see YouTube content uploaded form an iPhone or Slingbox rerouting a favourite television program to your smart phone gives mobile network operators the shivers. Skype over 3G in the meantime gives sleepless nights, not because of surging megabyte floods but due to nightmares of considerable voice and roaming revenues washing away. Not easy to plan and engineer "managed transitions" under those circumstances. more

Topics

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days