Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

So, Who Really Did Invent the Internet?

The beginnings of the Internet are shrouded in myth and misunderstandings that have led to some claims of proprietary ownership of the Internet. Where and when did the Internet begin? The only thing Internet historians seem to agree on is that it was not 1969, or the Pentagon, (or for that matter Al Gore). From there on, there is a wide divergence of views as to when, where, and by whom the Internet may have been invented... more

How Decades-Old Decisions Left U.S. Networks Vulnerable to Chinese Cyberintrusion

It seems like there is more disturbing news every day about Chinese infiltration of our telecommunications networks. A recent headline said that nine large ISPs have now been infiltrated. Tom Wheeler, a previous Chairman of the FCC, recently wrote an article for the Brookings Institute that speculates that the ability of the Chinese to infiltrate our networks stems back to decisions made decades ago that have never been updated for the modern world of sophisticated hacking. more

Ten SpaceX Starlink Updates

Starlink now has nearly 500,000 users and is available in 32 countries and nine languages. It is either available, wait-listed, or coming soon in every nation except Afghanistan, Belarus, Cuba, China, Iran, North Korea, Russia, Syria, and Venezuela. There are now 15,000 Starlink terminals in Ukraine with service throughout the nation through connections to ground stations in Poland, Lithuania, and Turkey and they have made a significant contribution in the war with Russia. more

FTC Issues Statement on Whois Databases

A recent statement released by the U.S. Federal Trade Commission emphasized that the Whois databases should be kept "open, transparent, and accessible," allowing agencies like the FTC to protect consumers and consumers to protect themselves: "In short, if ICANN restricts the use of Whois data to technical purposes only, it will greatly impair the FTC's ability to identify Internet malefactors quickly -- and ultimately stop perpetrators of fraud, spam, and spyware from infecting consumers' computers," the statement states." more

The IoT Cyber Seal Fog

For four days in Southern France, cybersecurity experts from a broad array of different countries and sectors gathered for the annual ETSI Security Conference. The event undertaken by one of the world's major industry information-communication (ICT) standards organisations was intended to take stock of the state of cybersecurity and trends. more

Securing the DNS in a Post-Quantum World: Hash-Based Signatures and Synthesized Zone Signing Keys

In my last article, I described efforts underway to standardize new cryptographic algorithms that are designed to be less vulnerable to potential future advances in quantum computing. I also reviewed operational challenges to be considered when adding new algorithms to the DNS Security Extensions (DNSSEC). In this post, I'll look at hash-based signatures, a family of post-quantum algorithms that could be a good match for DNSSEC from the perspective of infrastructure stability. more

Domain Name Lessons from Napster

I first outline a brief history of free file-sharing technology, then draw some general and domain name lessons, then outline the what, how, and why that make your activism effective and necessary... The domain name industry is decentralized and atomic in that anyone from anywhere in the world can register a domain name, keep the ownershp name and address private, and host it from a country where the U.S. and European legal systems don't apply. Thus, legal action will only drive domain owners further underground. more

Data on Cuba’s SNET and a Few Suggestions for ETECSA

I've written several posts on Cuba's user-deployed street networks (SNET), the largest of which is SNET in Havana. (SNET was originally built by the gaming community, but the range of services has grown substantially). My posts and journalist's accounts like this one describe SNET, but a new paper presents SNET measurement data as well as descriptive material. more

Top 4 Lessons from CCTA 2014

Sun, surf, and ... service operators? It's a match made in heaven! The Caribbean cable and telecommunications industry may not be large, but it is an important and fast-growing region. The recent Caribbean Cable & Telecommunications Association (CCTA) Annual Meeting in Puerto Rico threw the spotlight on this slice of paradise and I was there to catch up on some of the trends emerging for the year ahead. more

Top 10 Spam Stories of 2008

Well, it's a yearly tradition in the western hemisphere that at the end of the year, we compose a top 10 list of the 10 most . Since it is now 2009, I thought that I would create my own list of the top 10 spam stories of 2008. Now, not all of these will be universally applicable to everyone, they are the top 10 stories as seen by me. more

WHOIS Review and Beyond 3.7.8

We have posted our support of the WHOIS Policy Review Team Report with two important comments. First, on page 79 of the report it is confirmed that the RAA is unenforceable on WHOIS inaccuracy (we wrote about this while at the last ICANN meeting) because the language of RAA 3.7.8 has no enforcement provision. It is now time for ICANN to confirm this problem officially.  more

What’s in a Name?

What's the difference between .local and .here? Or between .onion and .apple? All four of these labels are capable of being represented in the Internet's Domain Name System as a generic Top Level Domains (gTLDs), but only two of these are in fact delegated names. The other two, .local and .onion not only don't exist in the delegated name space, but by virtue of a registration in the IANA's Special Use Domain Name registry, these names cannot exist in the conventional delegated domain name space. more

ICA Posts Position Paper and Analysis of Snowe “Anti-Phishing” Legislation

The Internet Commerce Association (ICA) has posted a position paper and analysis of S. 2661, introduced on 2/25/08 in the US Senate. While we are firmly opposed to phishing and other criminal activities that may utilize domain names we are very concerned about the provisions of the proposal that appear to provide trademark owners with a means to avoid both UDRP and ACPA actions and alternatively bring private claims against domain names with a lower burden of proof and the potential for far higher monetary damages, without even requiring an allegation that the DN was in any way being utilized in a phishing scheme... more

Examininng Value in New ICANN TLDs on Search and Navigation, Companies, Domain Registries

I outline the implications for value presented by ICANN's proposed introduction of new Top-Level Domains (TLDs) on user search and navigation, companies, and registries... For the new tools to be value adding they should facilitate navigation, reduce search cost, or provide actionable branding information through marketing. Unfortunately, the new TLDs bring in a mixed bag of value-adding and -destroying tools. more

Mandatory Provision of Abuse Contact Information in WHOIS

An industry professional at Abusix is the backbone behind a proposal to improve and create better mitigation of abuse across different global internet networks. Basically, this introduces a mandatory "abuse contact" field for objects in global Whois databases. This provides a more efficient way for abuse reports to reach the correct network contact. Personally - as a Postmaster for a leading, white-label ISP, I applaud this with great happiness for multiple reasons. I also feel people who handle abuse desks, anti-abuse roles, etc. should closely follow this. more

Topics

DNS Security

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days