Tech pundit John Gruber threw in the towel on his domain ?df.ws. He writes: "What I didn't foresee was the tremendous amount of software out there that does not properly parse non-ASCII characters in URLs, particularly IDN domain names." more
In previous posts in this series, I've discussed a number of applications of cryptography to the DNS, many of them related to the Domain Name System Security Extensions (DNSSEC). In this final blog post, I'll turn attention to another application that may appear at first to be the most natural, though as it turns out, may not always be the most necessary: DNS encryption. (I've also written about DNS encryption as well as minimization in a separate post on DNS information protection.) more
It is both amusing and dismaying. Last year, Congress passed Ray Baum's Act telling the FCC to do something about those pesky incoming foreign SPAM calls and texts with the fake callerIDs. The FCC a couple of weeks ago responded with a chest thumping Report and Order claiming it has "extraterritorial jurisdiction" that is does not have, and promising it will do something. Don't hold your breath on that one. more
I work at APNIC, the Regional Internet Registry that serves the Asia Pacific Region. APNIC provides common infrastructure services for the region that support the unique assignment of IP address blocks to Internet network operators within our region through the operation of an address registry. In short, IP addresses are what we do. So, when there are discussions in technology circles about evolving the Internet's address model in varying ways,... more
The defining of rights in the UDRP process is precisely what WIPO and ICANN contemplated, but it is unlikely they foresaw the destination of the jurisprudence. Since its inception, UDRP Panels have adjudicated over 75,000 disputes, some involving multiple domain names. (These numbers, incidentally, are a tiny fraction of the number of registered domain names in legacy and new top-level domains, which exceeded 320 million in the first quarter 2017). more
Over two years of war, Israel has decimated Gaza's ICT infrastructure, crippling connectivity, impeding emergency response, and isolating civilians from the digital world, while cementing long-standing control over telecommunications under the guise of national security. more
How can the open standards organizations of the IETF and W3C "strengthen the Internet" against large-scale pervasive monitoring? That is the topic up for discussion at the "Strengthening the Internet Against Pervasive Monitoring (STRINT)" workshop planned for February 28 and March 1, 2014, and jointly sponsored by the Internet Architecture Board (IAB) and the W3C. The workshop is by invitation-only and has a deadline of Monday, January 20, 2014 (by 11:59 UTC) for submission of either position papers or Internet drafts. more
One of the ongoing recommendations to improve deliverability is to send email that is timely and relevant to the recipient. The idea being that if you send mail a recipient wants, they're more likely to interact with it in a way that signals to the mailbox provider that the message is wanted. The baseline for that, at least whenever I've talked about timely and relevant, is that the recipient asked for mail from you in the first place. more
Doc Searls has written a brilliant piece framing the battle for the 'Net at Linux Journal. The piece is long, but if you take the time to read just one essay on the 'Net and the politics surround it this year, read this one. If you're involved in public policy, it's especially important that you take the time to understand what's at stake here. One of Doc's main points: we haven't framed the conversation correctly and our poor choice of words makes the argument seem overly technical and arcane when it's really about freedom, markets, and innovation. more
The National Telecommunications and Information Administration surprised the broadband industry by issuing a new broadband map for the whole U.S. The map differs in dramatic ways from the FCC's broadband map, which is derived from broadband speeds that are reported by the ISPs in the country. It's commonly understood that the FCC broadband map overstates broadband coverage significantly. The NTIA map draws upon varied sources in an attempt to create a more accurate picture of the availability of broadband. more
Just got this email reporting the speech made by former FCC Chairman @ F2C organized by David Isenberg. "Former FCC chairman Michael Powell is up on the stage at the Freedom to Connect conference right now, and he warns the tech elite crowd here not to be naive about the dangers of asking Congress for legislation on Net Neutrality. As he explains..." more
I'm pleased to announce the publication of The 2015 Web Globalization Report Card. Here are the top-scoring websites from the report... You'll notice that Google is once again ranked number one. The fact is, no other company on this list invests in web and software globalization like Google. While many software companies are happy to support 40 or even 50 languages on their websites, Google is looking at 60 or more languages across its many products. more
I recently caught up with a former colleague Antony Van Couvering. Many here on CircleID probably know him, he's been active in the domain name business since the late 1990's. With the new Top-Level Domain (TLD) issue so white hot and with Antony's firm right in the mix, I thought it was time to get his take via an interview. If anyone has questions (or challenges perhaps?) to anything below, I'm happy to forward to Antony for a response. more
People hate receiving spam, but most people stopped obsessing about spam a decade ago or more. In the interim, anti-spam filters have improved dramatically. Still, some anti-spammers hate spam so passionately -- or, perhaps, hope to put a little coin in their pockets -- that we still see a steady stream of lawsuits against email marketers. For the most part, those lawsuits don't win; in the past half-decade, repeat anti-spam plaintiffs have rarely won in court. more
Say you're walking down the sidewalk having a talk with your best friend about all kinds of things. What if you found out later that the sidewalk you were using wasn't really a sidewalk -- but instead a kind of false-front giant copying machine, unobstrusively vacuuming up what you were saying and adding to its database of information about you? Or, say you send a letter to a client of yours (to the extent you still do this), and it turns out later that your letter was intercepted, steamed open, and the contents were read... more
Sponsored byRadix
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byCSC
Sponsored byIPv4.Global
Sponsored byWhoisXML API