Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

ICANN and the Virtues of Deliberative Policymaking - Part I

In this two-part series article, Andrew McLaughlin takes a critical look at the recently reported study, Public Participation in ICANN, by John Palfrey, Clifford Chen, Sam Hwang, and Noah Eisenkraft at the Berkman Center for Internet & Society at Harvard Law School..."The study's presentation and analysis of data contain much of interest, and much that could assist ICANN (and other policy-making bodies) in improving its use and management of online public forums. But the study's value is diminished by two rather fundamental shortcomings: (1) its misapprehension of both the theory and the practice of ICANN's policy-development process, and (2) the sizeable gap between the broad scope of the study's conclusions and the very narrow -- indeed, myopic -- focus of the analysis from which they are derived. Simply put, the study scrutinizes a small and misleading corner of ICANN (namely, its online public comment forums) and leaps to a sweeping (and, in my view, unwarranted) conclusion." more

How to Keep Track of the New Generic Top-Level Domains (newgTLDs) Now Appearing Weekly

How do you keep track of what new generic top-level domains (newgTLDs) are now available? Particularly when there seem to be new ones being announced weekly? Because I've written about newgTLDs here previously, someone recently asked me those questions... Now, these are the newgTLDs that have been delegated by ICANN, meaning that they now appear in the "root zone" of DNS. This does NOT mean that you can go right now and register a domain underneath one of these new TLDs. more

Key Findings from the 2021 Domain Security Report

With cybercrime on the rise, companies in 2021 have experienced increased ransomware attacks, business email compromise (BEC), phishing attacks, supply chain attacks, and online brand and trademark abuse. While domain cyber risk is rising, the level of action being taken by Forbes Global 2000 companies to improve their domain security posture has remained unchanged, leaving these companies exposed to even more risk. The risk of not addressing your domain security can be catastrophic. more

Only Structural Change Can Save the Mobile Industry

I regularly bring this issue forward, similar to the discussion in relation to the structural separation of the fixed networks, which I began just over a decade ago. What we are seeing in the mobile industry is an infrastructure and a spectrum crunch. The amount of spectrum needed to satisfy people's demand from mobile phones, tablets and soon a range of other smart devices is limitless. Mobile carriers are scrambling for spectrum... more

Spamhaus Appeal: They Win on Substance

The Seventh Circuit has issued its opinion in the continuing saga of E360 Insight vs. the Spamhaus Project. While it is not a complete victory for Spamhaus, they did about as well as anyone could have hoped for under the circumstances. E360 won on the procedural issue, while Spamhaus won on the substance. The procedural issue was whether the default judgement against Spamhaus was properly granted last September. The court session was so odd that the appeals decision quotes several pages of the transcript. more

Is It About to Get Much Harder to Own a Domain Name?

Question: why has air travel become so painful? Because the threat posed by bad actors requires making everyone jump through hoops before letting them board a plane. To the point that, despite obvious requirements to ensure air safety, some are now openly questioning if the cure is not worse than the disease. Registering a domain name could be about to go the same way. more

IGP Asks You to Weigh in on the USG’s .xxx Intervention

Responding to the .xxx intervention by the US Commerce Department, the Internet Governance Project has produced a "STATEMENT OPPOSING POLITICAL INTERVENTION IN THE INTERNET'S CORE TECHNICAL ADMINISTRATIVE FUNCTIONS." You can view the statement here and add your name as a signatory at the bottom. Over 60 people have endorsed it. The Statement claims that "The NTIA's recent intervention in the .xxx proceeding undermines assurances" that the U.S. government's special unilateral authority over ICANN "would never be used to shape policy but was only a means of protecting the stability of the organization and its processes." The NTIA's open acknowledgment of the influence of religious groups made the intervention particularly dangerous. more

Site Finder as Starting Point for True Innovation Above DNS

Well, I have remained silent on this issue for now -- mainly because of conflicts. I was one of a few members of the technical advisory group asked by VeriSign to look at Site Finder and ask the questions -- what does it add, what does it break, and how can we fix anything it breaks? The scope of the group was unlimited by any VeriSign edict and the members were of impeccable individual credentials. This group has now completed its work so I feel able to comment. more

Where is Metadata Anyway?

I can't help but think that the situation in this rather old joke applies very precisely to the current Australian efforts to compel network operators, through some contemplated regulatory instrument, to record and retain network-collected data about their customers' online activities. What I'd like to examine here the emerging picture that while networks, and network operators, make convenient targets for such surveillance efforts, the reality of today's IP network's are far more complex, and Internet networks are increasingly ignorant about what their customers do. more

Google Chrome: Cloud Operating Environment

Rather than blathering on to the blogosphere about the superficial features of Google's new Chrome browser I've spent some time studying the available material and [re]writing a comprehensive Wikipedia article on the subject which I intend for anyone to be free to reuse under a Creative Commons Attribution 3.0 license rather than Wikipedia's usual strong copyleft GNU Free Documentation License (GFDL). This unusual freedom is extended in order to foster learning and critical analysis, particularly in terms of security. more

Unpublished Autobiographical Essay of Steve Lukasik on His Accomplishments at ARPA

Around 2014, as Stephen (Steve) J. Lukasik proceeded well into his 80s, he began to consider ways to capture the enormous sweep of activities and history in which he was a key figure. Indeed, that sweep was so broad and often compartmentalized, and his output so prolific, that even his closest associates only knew of slices of his accomplishments. So he began sorting through his career and produced this autobiographical essay on his accomplishments at ARPA that is being made posthumously available now. more

G7 vs. BRICS: One Cyberworld, Two Summits and Three Approaches for the Governance of the Internet?

Cybersecurity and digitalization were not at the center of the recent summit meetings of the presidents and prime ministers of G7 (US, Canada, UK, Germany, Italy, France, Japan) and BRICS (Brazil, Russia, India, China, South Africa). But cybersecurity and digitalisation are meanwhile too important issues to be ignored if world leaders meet. Insofar it was very natural that both the "XIV BRICS Summit Beijing Declaration" from June 23, 2022, and... more

The Latest DNS Threat Landscape: Why CISOs Must Rethink Blocking Strategies

Cybercriminals live by the tenet "If it ain't broke, don't fix it." They'll use the same tactics repeatedly until they no longer work, then switch things up. That's why CISOs and their security teams maintain constant vigilance. Underscoring this, recent analysis of global DNS activity found that new domains continue to be a major tactic for bad actors. more

Person to Person Security and Privacy Infringement

IT security strategies invariably focus on maintaining impenetrable fortresses around computers and network systems. Firewalls, virtual private networks and anti-virus programs are the tools IT engineers use to create their digital security. Sophisticated defense systems can be very effective at keeping the obvious attackers at bay, yet they often create a false sense of security because the real attacks, the kind that inflict irreparable damage on a system or network, avoid the obvious routes into the secure fortress. more

How Fast is Internet Traffic Growing?

It depends on whose numbers you like. Andrew Odlyzko claims it's up 50-60% over last year, a slower rate of growth than we've seen in recent years. Odlyzko's method is flawed, however, as he only looks at public data, and there is good reason to believed that more and more traffic is moving off the public Internet and its public exchange points to private peering centers. Nemertes collects at least some data on private exchanges and claims a growth rate somewhere between 50-100%. more

Topics

DNS Security

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days