I consult on communication issues for Neustar, an Internet infrastructure company. As most CircleIDers know, Neustar works behind the scenes to ensure the smooth operation of many critical systems like DNS, .us and .biz, local number portability and digital rights management. One of the cool things about working for them is the chance to attend the events they sponsor. Last week Neustar held a security briefing for senior federal IT personnel focused on Cybersecurity and Domain Name System Security Extensions (DNSSEC)... more
The 5th African Peering and Interconnection Forum (AfPIF) gets underway today, August 26, 2014, in Dakar, Senegal, with a packed agenda full of sessions focused on the future of peering and interconnection in Africa. There are sessions targeted at Internet Service Providers (ISPs), Internet Exchange Points (IXPs), infrastructure providers, content creators and policy makers and regulators. The event goes through Thursday, August 28, 2014. more
We know from life: There is no rule without exception. The problem is, exceptions create space for interpretations and have the risk to undermine the rule. Take Article 19 of the International Covenant on Political and Civil Rights from 1966. Article 19, paragraphs 1 and 2 define the individual right to freedom of expression. Paragraph 3 adds some exceptions where this right can be restricted to protect, inter alia, national security and public order. This is an understandable justification for a restriction, but it opens the door for misuse... more
Declan McCullagh recently opined that the "FBI [and the] DEA warn [that] IPv6 could shield criminals from police." His post was picked-up relatively widely in the past few days, with the headlines adding more hyperbole along the way. So just how real is this threat? Let's take a look. more
Although this article was first published just a few days ago, on May 8th, there have been several important intervening developments. First, on May 10th ICANN released a News Alert on "NGPC Progress on GAC Advice" that provides a timetable for how the New gTLD program Committee will deal with the GAC Communique. Of particular note is that, as the last action in an initial phase consisting of "actions for soliciting input from Applicants and from the Community', the NGPC will begin to "Review and consider Applicant responses to GAC Advice and Public Comments on how Board should respond to GAC Advice... more
It is one of those surreal, ironic moments in time. This coming week, an event called the Internet Governance Forum (IGF) 2017 will be held at Geneva in the old League of Nations headquarters now known as the Palais des Nations. On its agenda is a workshop to discuss "A Digital Geneva Convention to protect cyberspace." If the IGF participants, as they enter the Palais grounds, simply look in the opposite direction south across the Place des Nations, they would see 100 meters away, a glass cube building provided by the Republic and Canton of Geneva. more
What happens when you open an email and allow it to display embedded images and pixels? You may expect the sender to learn that you've read the email, and which device you used to read it. But in a new paper we find that privacy risks of email tracking extend far beyond senders knowing when emails are viewed. Opening an email can trigger requests to tens of third parties, and many of these requests contain your email address. more
"Breaking the Internet" is really hard to do. The network of networks is decentralized, resilient and has no Single Point Of Failure. That was the paradigm of the first few decades of Internet history, and most people involved in Internet Governance still carry that model around in their heads. Unfortunately, that is changing and changing rapidly due to misguided government intervention. more
The DNS Abuse Institute recently published our sixth monthly report for our project to measure DNS Abuse: DNSAI Compass ('Compass'). Compass is an initiative of the DNS Abuse Institute to measure the use of the DNS for phishing and malware. The intention is to establish a credible source of metrics for addressing DNS Abuse. We hope this will enable focused conversations, and identify opportunities for improvement. more
It was bound to happen of course - someone sued Twitter for not verifying a "celebrity" or brand account. Mashable reports on a lawsuit brought by Tony La Russa, who is apparently a manager for the St. Louis Cardinals baseball team. Mashable and others initially reported that La Russa and Twitter had resolved this one. It turns out they haven't after all. So what to make of Mr. La Russa's claims? more
Early August 2014 the UN General Assembly agreed on the procedures how to review the results of the UN World Summit on the Information Society (WSIS) from 2005. According to the draft resolution, the WSIS 10+ event will be a high level intergovernmental meeting in New York in December 2015. This meeting will adopt an "intergovernmental agreed outcome document"... The outcome document will be negotiated by governments in an "intergovernmental negotiation process". Non-governmental stakeholders from the private sector, civil society and technical community will be invited for "informal interactive consultation" in a parallel process. Wait a minute? What are "informal interactive consultations" in a parallel process? more
The bulk of corporate domain portfolios largely consist of defensive registrations which often include common misspellings, product names, and abbreviations in countries where they may not even be doing business. More than ever, with the launch of new generic Top-Level Domains (gTLDs) expected to occur next year, companies are now taking a hard look at their defensive holdings and asking themselves whether or not they really need all of these registrations. more
Back in 2005 an organization called the Coalition for Internet Transparency (CFIT) burst upon the scene at the Vancouver ICANN meeting, and filed an anti-trust suit against VeriSign for their monopoly control of the .COM registry and of the market in expiring .COM domains. They didn't do very well in the trial court, which granted Verisign's motion to dismiss the case. But yesterday the Ninth Circuit reversed the trial court and put the suit back on track. more
A recent ICANNfocus article discussed the magnitude of ICANN's legal fees. Specifically, ICANNfocus questioned whether the extent of ICANN's legal fees, about 20% of their total revenues, was related to the organization functioning as a regulator instead of simply as a technical manager of the internet. more
The attention of DotConnectAfrica Trust (DCA Trust) has been drawn to a recent blog posting by John Jeffrey, the ICANN General Counsel and Company Secretary, who wrote to clarify what he termed as "misinformation and erroneous reporting that have framed parts of the discussion" regarding the recent DCA vs. ICANN IRP Final Declaration. As we can't see a way of making comments on his blog, DCA Trust as a directly affected party, will respond to the issues Mr. Jeffrey has advanced... more
Sponsored byCSC
Sponsored byIPv4.Global
Sponsored byRadix
Sponsored byDNIB.com
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byVerisign