It's been 15 long years since the standard for DNSSEC was developed and sadly adoption has been painfully low until recently, thanks to Dan Kaminsky, the infamous Internet Researcher who indentified that gaping hole in the DNS. The discovery of the fundamental flaw in DNS sparked industry wide attention! Every day, we move a little closer to widespread DNSSEC adoption, so I thought I'd take a moment and highlight some of the most notable milestones... more
Throughout my childhood, I was a practicing member of the Religious Society of Friends (the 'Quakers'). Now, for the first time, I am participating in an ICANN meeting (specifically, the 34th in Mexico City). While at first blush these to two experiences seem to have little in common, it is actually striking how much they are alike... more
It didn't seem to make any headlines, but it is an interesting sign of the Internet times that, effective January 1, 2009 , the United State Patent and Trademark Office ("USPTO") changed the International Classification of "domain name registration services" to Class 45 (defined below). The reason that the move is interesting is that it is just one more indication that the world of the Internet is becoming less and less about technology and more and more about law and policy. more
Wednesday's announcement by the Obama administration, that former Washington state governor Gary Locke has been nominated as the next Secretary of Commerce could be a good sign for Internet governance, and the continued globalization of the ICANN regime. The Chinese-American Locke brings key political capital and experience to the table. He is well respected within and has access to the most senior levels of the Chinese government... more
Open Society Fellow Evgeny Morozov and I have written an Op-Ed for Project Syndicate about how the future of Internet control is not "firewall" censorship but more subtle forms of manipulation and pressure. Recognizing that censorship is too heavy handed and imperfect to be successful on its own, the Chinese government's Internet strategy is placing increasing emphasis on corporate self-censorship... more
Philbrick's Sports is a New Hampshire retailer of sporting goods. eNom's customer registered two domain name variants of Philbrick Sport's website. When the customer didn't pay eNom, eNom took the names back for itself... Each of these domain names were parked with Yahoo, who displayed sponsored ads on the domains. Philbrick's then sued eNom, claiming cybersquatting and trademark infringement. more
Today the Berkman Center announced a new project that might be of interest to readers. Since 2002 I've studied Internet filtering around the world, most recently as part of the OpenNet Initiative. Last year with support of the MacArthur Foundation we published "Access Denied," a study of filtering in about 40 states. Our work so far has been centralized... We're now complementing that effort with a distributed reporting system... more
Our problem isn't the lack of capacity -- it's our inability to achieve simple connectivity. We have abundant capacity but can’t use it because we have gatekeepers who set a price on our ability to communicate and innovate. If we were able to take advantage of what we already have we would find ourselves with a wealth of opportunities rather than having to pay billions to "stimulate" the gatekeepers into letting us create new value. more
I don't want to get into the entire Irish Recorded Music Association (IRMA) vs Eircom and IRMA vs ISPs debacle. The only reason I'm even writing this is because I'm getting a bit tired of all the "quotes" of "quotes" and other unclear and misleading things that people have been saying about ISPs over the last few weeks. more
U.S. Republican politicians on Thursday introduced a bill that would require Internet service providers and network operators to track the use of and maintain records for their publicly accessible wired and wireless networks. Two bills have been introduced... Each of the bills carries the title "Internet Stopping Adults Facilitating the Exploitation of Today’s Youth Act," and is referred to as the "Internet SAFETY Act." more
British Telecom (BT) is hurting because the wireline phone business is inevitably declining. Their new hire is one of the world's most interesting thinkers on possible new businesses for telcos. Martin has been part of the Telco 2.0 group at STL Consultancy, the best small group of European analysts... more
Saipan DataCom, Inc.’s upcoming late March 2009 open launch of chi.mp (“Content Hub & Identity Management Platform) has implications for trademark holders that seem to have gone unnoticed to date. Chi.mp is a free platform that enables social network users to create social hubs on their own stand-alone hosted Web sites... As an attorney representing both trademark owners and domain name registries, I see chi.mp as a unique situation. more
I've been privately talking about the theoretical dangers of HTTPS hacking with the developers of a major web browser since 2006 and earlier last month, I published my warnings about HTTPS web hacking along with a proposed solution. A week later, Google partially implemented some of my recommendations in an early Alpha version of their Chrome 2.0 browser... This week at the Black Hat security conference in Washington DC, Moxie Marlinspike released a tool called SSL Strip... more
In this multipart series I will be presenting some of the leading industry-standard best practices for enterprise network security using Cisco technologies. Each article in the series will cover a different aspect of security technologies and designs and how each can be deployed in the enterprise to provide the best security posture at the lowest possible budgetary and administrative cost. In Part 2 of this series I discussed security risks and vulnerability. In this article we begin to focus on the role Cisco network and security technologies play in ensuring the safety and security of network data. more
ICANN published the second version of its Application Guidebook for new generic top-level domains earlier today (late evening Los Angeles time). Alongside version two of the Guidebook – published by module and in a red-line version – are explanatory memoranda, the opening of a second public comment period (closing 13 April) and an extensive summary and analysis of the public comments made to the process so far. more
Sponsored byWhoisXML API
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byCSC
Sponsored byRadix
Sponsored byVerisign