Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

How Registrants Can Reduce the Threat of Domain Hijacking

Because domain names represent the online identity of individuals, businesses and other organizations, companies and organizations large and small have expressed increasing concern over reports of "domain name hijacking," in which perpetrators fraudulently transfer domain names by password theft or social engineering. The impact of these attacks can be significant, as hijackers are typically able to gain complete control of a victim's domain name - often for a significant period of time. more

How Rampant is Cyber & Typo Squatting? Just Ask WIPO After Reviewing Wipo.com!

How prevalent is cybersquatting and typosquatting? Take a look at www.wipo.com, and then compare it with the World Intellectual Property Organization's web site www.wipo.org. Ironically, the WIPO Arbitration and Mediation Center handles a majority of the UDRP domain dispute arbitrations internationally. The very organization which is invested with the authority by ICANN to resolve cybersquatting and typosquatting disputes internationally under the UDRP is, by all appearances, being squatted. Here are two apparent typosquatters... more

ICANN DNS Resolver Symposium – the Session Had Several Interesting Presentations That I Would Like to Comment On

ICANN hosted a Resolver Operator Forum in mid-December, and the session had several interesting presentations that I would like to comment on here... The first presentation in this forum was from Paul Mockapetris. He pointed to the original academic published paper, Development of the Domain Name System, by Paul Mockapetris and Kevin Dunlap, published in the proceedings of ACM SIGCOMM’88. The paper noted that by 1983 it was obvious that the shared HOSTS.TXT file was not a scalable solution... more

ICANN Board to Vote on Domain Tasting Measure

The ICANN Board will vote today on a new registry service put forward by PIR for .org which is its attempt to solve the domain tasting issue. It takes the form of an amendment [pdf] to the .org contract and enables PIR to charge five cents per domain "when the number of such deleted registrations is in excess of 90 per cent of the total number of initial registrations"... more

Are the Broadband Stats We Are Seeing Somehow Overinflated? What Did the Pandemic Hide?

The growth of broadband customers has looked spectacular over the past year during the pandemic. It's easy to chalk up higher broadband customers nationwide to the need for households to be connected during the pandemic. But as I look back on what's happened during the last year, I can't help but wonder if the broadband stats we are seeing are somehow overinflated. more

Unpublished Autobiographical Essay of Steve Lukasik on His Accomplishments at ARPA

Around 2014, as Stephen (Steve) J. Lukasik proceeded well into his 80s, he began to consider ways to capture the enormous sweep of activities and history in which he was a key figure. Indeed, that sweep was so broad and often compartmentalized, and his output so prolific, that even his closest associates only knew of slices of his accomplishments. So he began sorting through his career and produced this autobiographical essay on his accomplishments at ARPA that is being made posthumously available now. more

Here’s Looking at You…

Much has been said in recent weeks about various forms of cyber spying. The United States has accused the Chinese of cyber espionage and stealing industrial secrets. A former contractor to the United States' NSA, Edward Snowden, has accused various US intelligence agencies of systematic examination of activity on various popular social network services... These days cloud services may be all the vogue, but there is also an emerging understanding that once your data heads into one of these clouds, then it's no longer necessarily entirely your data; it may have become somebody else's data too... more

VeriSign’s New Security Seal Too Trusting?

On November 4, 2003, VeriSign announced a new "trust enhancing" seal which they built using Macromedia's Flash technology...While there are problems inherent to VeriSign's approach that call into question their understanding of "The Value of Trust," there are ways they could have made this particular implementation less trivially spoofable. The flaws I demonstrate on this page are flaws in the concept and the execution rather than anything inherently flawed in Flash. Overall this kind of graphical "trustmark" is extremely easy to forge just by recreating the artwork. But in this case, you don't even have to do that. The seal can still be called directly off the VeriSign servers, yet it is easily modified, without recreating artwork, and without doing anything untoward with VeriSign's servers! more

iPhone 6 VoLTE Will Disrupt the Mobile Industry

As far back as 2011 we predicted that Apple would eventually enter the voice market. We indicated at that time that it was just a matter of time -- in the end it took another three years... While it didn't happen at Christmas that year the company is now ready and will use the VoLTE service to enter this market, which will make it possible to replace Telstra with any other mobile operator around the world... he telcos are not ready for this. While they should be seen as the leaders in the voice call market they are too preoccupied with protecting their traditional business and it is companies like Apple and Samsung who are now leading the charge. more

Spamhaus Appeal: They Win on Substance

The Seventh Circuit has issued its opinion in the continuing saga of E360 Insight vs. the Spamhaus Project. While it is not a complete victory for Spamhaus, they did about as well as anyone could have hoped for under the circumstances. E360 won on the procedural issue, while Spamhaus won on the substance. The procedural issue was whether the default judgement against Spamhaus was properly granted last September. The court session was so odd that the appeals decision quotes several pages of the transcript. more

Yahoo Addresses a Security Problem by Breaking Every Mailing List in the World

DMARC is what one might call an emerging e-mail security scheme. It's emerging pretty fast, since many of the largest mail systems in the world have already implemented it, including Gmail, Hotmail/MSN/Outlook, Comcast, and Yahoo. DMARC lets a domain owner make assertions about mail that has their domain in the address on the 'From:' line. It lets the owner assert that mail will have a DKIM signature with the same domain, or an envelope return (bounce) address in the same domain that will pass SPF validation. more

ICANN and the Virtues of Deliberative Policymaking - Part I

In this two-part series article, Andrew McLaughlin takes a critical look at the recently reported study, Public Participation in ICANN, by John Palfrey, Clifford Chen, Sam Hwang, and Noah Eisenkraft at the Berkman Center for Internet & Society at Harvard Law School..."The study's presentation and analysis of data contain much of interest, and much that could assist ICANN (and other policy-making bodies) in improving its use and management of online public forums. But the study's value is diminished by two rather fundamental shortcomings: (1) its misapprehension of both the theory and the practice of ICANN's policy-development process, and (2) the sizeable gap between the broad scope of the study's conclusions and the very narrow -- indeed, myopic -- focus of the analysis from which they are derived. Simply put, the study scrutinizes a small and misleading corner of ICANN (namely, its online public comment forums) and leaps to a sweeping (and, in my view, unwarranted) conclusion." more

A Collision Between Tech Policy and Foreign Policy: the UN Cybercrime Convention

Sometime by year-end, the UN General Assembly (UNGA) will vote on the proposed UN Convention Against Cybercrime. The treaty is opposed by most civil liberties organizations and Internet businesses, although the US position appears uncertain, mostly for reasons of foreign policy. more

25 Years of John Barlow’s Declaration of Independence in Cyberspace: When Visions Meet Realities

On February 8, 1996, John Perry Barlow published his "Declaration of Independence in Cyberspace" in Davos. Inspired by the "Digital Revolution" and the "Dot-Com-Boom", he predicted a new "Home of Mind," a cyber world without governments. "Governments of the Industrial World", he wrote, "you weary giants of flesh and steel. I come from cyberspace, the new home of Mind. On behalf of the future, I ask you of the past to leave us alone. You are not welcome among us. You have no sovereignty where we gather." more

Registrant Freedom Day

After almost four years, ICANN has announced that they have adopted a new domain name transfer policy that make it much easier for domain name registrants to do business with the ICANN accredited Registrar of their choosing. Highlights from this new policy include; streamlined definition of responsibilities as it relates to the management of the domain name. Under the new policy, only the Administrative Contact or Registrant can authorize a domain name transfer to a new service provider... more

Topics

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

DNS Security

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days