Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Facebook, Privacy, and the Loss of Trust

Facebook sure is getting beaten up recently. There's even a crowd-funded initiative to replace it with something open, called Diaspora -- everyone on Facebook is talking about it. Yet it wasn't even two full years ago that Facebook was the darling of the ditherati. For a while it seemed as if nearly everything Facebook did was hailed as the future of messaging, perhaps the future of the Internet - or maybe the Internet didn't matter anymore, except for Facebook. more

Internet Management and National Security: Time for a Federal Action Plan

Former CIA Director George Tenet recently gave a speech highlighting the need for federal action on internet management in order to protect national security. As reported by the online edition of Government Executive, Mr. Tenet explained that, "greater government regulation of the Internet and telecommunications networks is needed in order to guard against terrorist attacks." more

NASA Teething Troubles Teach a DNSSEC Lesson

On January 18, 2012, Comcast customers found they could not access the NASA.gov website. Some users assumed that Comcast was deliberately blocking the website or that NASA, like Wikipedia and Reddit, was participating in the "blackout" protests against the Stop Online Piracy Act (SOPA) going on that day. As it turned out, the truth was much less exciting, but it offers important lessons about DNSSEC. more

The Christmas Goat and IPv6 (Year 5)

This year I didn't even get a good picture of our famous Christmas goat here in the city of Gavle Sweden. The Christmas goat this year survived Christmas but were suddenly on the 28th of December dismounted. The reason for the poor goat's early leave from its own little park downtown Gavle is that it is now the year of the goat in China, and the city of Gavle has a sister-town in China -- Zhuhai. more

Please, Keep the Core Neutral

Many in the technical community attribute the rapid growth and spread of the Internet to innovation that took place at the "edge" of the network, while its "core" was left largely application neutral to provide a universal and predictable building block for innovation. It is this core neutrality that provides a basis for the security and stability of the Internet as a whole. And it is this same core neutrality that is critical to the continued spread of the Internet across the Digital Divide. Unfortunately, when the politics of censorship rather than solely technical concerns drive the coordination of these "core" Internet resources, it threatens the future security and stability of the Internet. This paper proposes a paradigm upon which all the governments of the world have equal access to these core Internet resources to empower them and their citizens with the rights acknowledged in the WSIS Declaration of Principles. more

Will VeriSign Be Able to Engage in Tiered Pricing for .com Soon?

According to the draft of new Generic Top-level Domains (gTLD) contracts for Section 7.3, "Price controls have been removed for 2008 in favor of the transparent pricing model outlined above." Section 3.2.b) of the .com registry agreement states: "ICANN shall not apply standards, policies, procedures or practices arbitrarily, unjustifiably, or inequitably and shall not single out Registry Operator for disparate treatment unless justified by substantial and reasonable cause." In my opinion, VeriSign (and other existing gTLD operators) are almost being invited to ask for their contracts to be amended... more

IPv6 and the Fear of Brokenness

Brokenness refers to the situation whereby a website is made accessible in dual stack, meaning both IPv4 and IP6, using records referred to as A's for IPv4 and quad A's for IPv6. Some end-users can experience slower access to the website or in some rarer instances no access at all. Brokenness is mostly attributable to older versions of the Mac Os operating system... The brokenness issue has been very well described by Eric Vyncke... more

Epsilon Interactive Breach the Fukushima of the Email Industry

A series of attacks on the Email Service Provider (ESP) community began in late 2009. The criminals spear-phish their way into these companies that provide out-sourced mailing infrastructure to their clients, who are companies of all types and sizes. ... On March 30, the Epsilon Interactive division of Alliance Data Marketing (ADS on NASDAQ) suffered a massive breach that upped the ante, substantially. Email lists of at least eight financial institutions were stolen. more

Some Observations from NANOG 62

NANOG 62 was held at Baltimore from the 6th to the 9th October. These are my observations on some of the presentations that occurred at this meeting. .. One of the more memorable sides in this presentation was a reference to "map" drawn by Charles Minard in 1869 describing the statistics relating to the Napoleonic military campaign in Russia, and the subsequent retreat. more

ICANN’s Accountability Mechanisms – in Name Only?

On December 14, 2021, Dot Hip Hop, LLC (DHH) filed an Urgent Reconsideration Request following ICANN staff inaction (for its over four-month delay) of its Assignment Request for the .hiphop Registry Agreement. Not only did the ICANN Board Accountability Mechanisms Committee (BAMC) decide against considering the Reconsideration Request on an urgent basis, but on its last day of business for 2021, ICANN Org decided to retaliate against DHH for filing the Reconsideration Request in the first place ... more

ICANN’s Strong Rebuke to Verisign’s Chuck Gomes

Word to the wise: Fadi Chehadé's ICANN isn't going to take criticism lying down! In the past, the organisation has tended to react to criticism with a silence that was probably considered a way to avoid aggravating critics any further, but instead tended to infuriate people that were expecting answers. No longer. Since Chehadé came in as CEO, they get answers! more

Spam Fighting: Lessons from Jack Bauer?

As I blogged about several months ago, as did numerous other anti-spam bloggers, David Ritz was sued by Jeffrey Reynolds and a judge in North Dakota agreed with Reynolds. At the heart of the case was that Ritz engaged in anti-spam activities using techniques known only to a small subset of advanced computer users, and used these techniques maliciously against Reynolds... Back in the olden days of spam fighting, some anti-spammers used to use malicious techniques against spammers in order to shut them down... more

ICANN and the Data Quality Act: Part II

This is the second part of a multi-part series reported by ICANNfocus. This part discusses the congressional concerns regarding ICANN's governance of the Internet. "Since 1999 Congress has repeatedly expressed serious concerns regarding ICANN's governance of the internet. Congress has substantial responsibility for overseeing the key aspects of internet governance. Among its specific responsibilities, Congress has the duty to oversee implementation of the Department of Commerce's Memorandum of Understanding (MOU) and contract with ICANN." more

WHOIS Users Facing Serious Challenges Caused by Post-GDPR Fragmentation

On May 25, 2018, the European General Data Protection Regulation (GDPR) came into effect, meaning that European data protection authorities (DPAs) can begin enforcing the regulation against non-compliant parties. In preparation, the ICANN Board passed a Temporary Specification for gTLD Registration Data - essentially a temporary policy amendment to its registrar and registry contracts to facilitate GDPR compliance while also preserving certain aspects of the WHOIS system of domain name registration data. more

If ICANN Won’t Stand Up to EU in WHOIS Dispute, Then the U.S. Congress Should

The early designers of the Internet quickly realized that as the number of domain names flourished, there was a need for tracking domain name owners to resolve questions and conflicts that might arise. To that end, they created WHOIS, a public database with the names, phone numbers, email addresses, and mailing addresses of registered domain owners and operators. more

Topics

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

Threat Intelligence

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days