Five years ago today, the ICANN Board committed to opening a second application window for the New gTLD Program as expeditiously as possible. The same resolution also directed the ICANN CEO to publish a document describing the work plan required prior to initiating a second application window. Ask a Board member or ICANN staff when they expect the next application window to open, and they will inevitably suggest 2020 -- another three years away. more
There soon will be a central place for Web surfers to dwell in a forbidden cyber land of adult fantasies, sex, dark rituals and total taboos. Finally, ICANN has given in to the pressure and has tossed a big rock across the turbulent e-commerce ocean. It has approved a new suffix, .xxx, for adult-only porn sites, creating ripples and debates in ever so confusing global cyber branding times when cyber global domain name challenges are being fought in the complex earthly trademark realities. Three things are bound to happen. more
There has been a lot of excitement since ICANN revealed the list of 1930 applications for new gTLD yesterday at an event in London yesterday. Even some of the strongest opponents of the ICANN's new gTLD program have acknowledged there is a case to open up new gTLDs for Internationalized Domain Names (IDNs). I am going to focus here on the analysis of the IDN applicants. more
In a 33-page motion filed on Monday, April 5, 2004, ICANN has asked a federal judge in Los Angeles to dismiss VeriSign's recent lawsuit filed against the non-profit organization. More specifically, the filed motion has asked the court to "dismiss VeriSign's first six claims for relief with prejudice," which are... more
Can we trust ICANN to conduct itself in a predictable, open, transparent, and accountable manner if it takes over governance of the Internet's domain name system from the U.S. government? That was the main question up for discussion Wednesday in the House Judiciary Subcommittee on Courts, Intellectual Property, and the Internet, as lawmakers heard feedback from a diverse group of stakeholders about the National Telecommunications and Information Administration (NTIA) plan to relinquish its historical oversight of key technical Internet functions. more
To say that it's been quite a year in the world of domain names would be an understatement. From compromised country code Top-Level Domains (ccTLD) registries, to the delay of new generic Top-Level Domains (gTLDs), some of the events of the past year have been surprising, while others could easily have been predicted. Regardless of whether you could have seen these coming, please find below my list of 2009's most important domain name events...at least, as I see them. more
Erica Wass is the editor and contributing author of the recently published book, "Addressing the World: National Identity and Internet Country Code Domains", (Rowman & Littlefield, October 2003). This book is an edited collection of original essays by domain name administrators, academics, journalists and lawyers that examine the connections between various cultures and the use and regulation of their country code domain names. CircleID recently caught up with Erica Wass to gain a better insight into the work behind this book. What follows is the first article of a three-part series where Erica shares her insight and discoveries that lead her to a sophisticated global perspective on "Addressing the world". She begins by examining cyber-sociology of ccTLDs -- the underlying theme of the book. more
In the transition from IPv4 to IPv6, the preferred solution for network endpoints is to have both native IPv4 and IPv6 connectivity (also called dual-stack connectivity). If a site cannot get native IPv6 connectivity, however, the IPv4 network endpoints can choose from a number of conversion technologies to connect to the IPv6 Internet. The most commonly used conversion mechanisms are 6to4, Teredo and tunnel-brokers. At recent RIPE meetings there have been claims that 6to4 connectivity is quite often broken. We were interested to find out how broken it really is. more
In my last blog post I shared some of the general security challenges that come with the Internet of Things (IoT). In this post, I will focus on one particular security risk: distributed denial of service (DDoS) attacks. Even before the age of IoT, DDoS attacks have been turning multitudes of computers into botnets, attacking a single target and causing denial of services for the target's users. By "multitudes" we can be talking about thousands or even millions of victim devices. Now add IoT into the equation... more
The domain name system (DNS) is vital for businesses as it facilitates customer access to online services and resources. Strategic DNS management plays a pivotal role in cybersecurity, safeguarding against threat vectors and ensuring secure global connectivity across online channels including apps, email, websites, application programming interfaces (APIs) and more. more
I had quite an interesting experience recently. I was hired by a company to perform a vulnerability assessment and penetration test on their network. During the initial meeting, one of the key technical staff presented me with a challenge; He handed over the NTLM hash of the domain Administrator account and challenged me to decipher it. He explained that the complexity and length of the password would prevent me from deciphering it during the time allotted for the project. He was actually quite confident in my impending failure... more
We are on the cusp of a grave risk where unscrupulous groups with various agendas are using digital technologies to wage cultural war to stamp out dissent and gain control and power. The two most prominent recent examples are Donald Trump's "Make America Great Again" (MAGA) and China's Social Credit System (SCS). The following piece was prompted by work on the UDHR and Internet Governance series, for CircleID to deal with UDHR Article 27 and the role of culture, arts, and science in the life of the community. more
The principle behind Chromecast is probably the magic formula that is needed to finally revolutionise television watching. Google's latest product was launched yesterday... TV revolution didn't come from the traditional broadcasters or their suppliers. Everything developed by them has been aimed more at protecting their traditional business than at looking for completely new opportunities - truly new TV innovations will most certainly come from the direction that the broader market has taken since the arrival of the smartphones and the tablets. more
The internet has changed and evolved ever since it's ancestors first came to life in the late 1960's. Some technology fades away and is forgotten; other aspects continue but are overlaid, like geological sediments, so that they are now longer visible but are still present under the surface. The Domain Name System - both the technology of DNS and the deployed naming hierarchy we all use - are among those aspects of the internet that, although they feel solid and immutable, are slowly changing underneath our feet. more
ICANN's new Registry Service Technical Evaluation Service (RSTEP) process is definitely a positive step forward for ICANN. The comment period for the Tralliance proposed new service using the DNS wildcard feature closed Wednesday night. ...Ken Fockler commented "there are no right answers and no wrong answers, just judgments and decisions made on those judgments." In this light, I would be interested in hearing different perspectives on the following questions... more
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byRadix
Sponsored byVerisign
Sponsored byWhoisXML API
Sponsored byCSC
Sponsored byDNIB.com