The IETF DKIM working group has been making considerable progress, and now has a close-to-final draft. DKIM will let domains sign their mail so if you get a message from [email protected], the furble.net mail system can sign it so you can be sure it really truly is from furble.net. But unless you already happen to be familiar with furble.net, this doesn't give you any help deciding whether you want the message. This is where the new Domain Assurance Council (DAC) comes in... more
China's Belt and Road Initiative (BRI) is an ambitious, long-term, global investment and development program. It was launched in 2013 with a focus on infrastructure -- roads, railroads, pipelines, undersea cables and ports. Since then China has invested $80 billion and signed 173 BRI agreements with 125 countries and 29 international organizations. more
People are increasingly becoming aware of the emerging 'internet monopoly'. Companies such as Google, Facebook, Twitter and many the other (local) social network and media sites are becoming so large and powerful that they can dictate the use of their services in such a way that people lose control over their own information and their participation in these networks. ... These digital media developments certainly did happen, but they are not founded on the 'permission-based' principles that we advocated during all those years. more
What happens if ICANN fails? Who will run the DNS then?
Of course to many, ICANN already has failed -- spectacularly so. Critics have long complained that ICANN not only lacks accountability and legitimacy, but also that it is inefficient (at best) and downright destructive (at worst). According to these critics, ICANN's many sins include threatening the stability of the Internet, limiting access by imposing an artificial domain name scarcity, and generally behaving like a petulant dictator. more
The essay examines the breadth of new generic Top-Level Domain (gTLD) registrations needed for best enhancing a .Brand. And if you don't own .Brand, what should the scope of your new gTLD strategy be? With the introduction of hundreds of new gTLDs, a lot of businesses still don't have reliable information for figuring out which of the newcomers to register under. more
The essay analyzes some of the strengths and weaknesses of closed and open new gTLDs. The success of the gTLD to a large degree rests on the successful design and implementation of an effective digital business model. A closed gTLD is one whose owner uses it for exclusive content - for example, the use of .book exclusively for Amazon books. Conversely, if Amazon opens up .book, other book sellers and libraries would be able to set up sub-domains, sites where they controlled content. more
There is growing concern about how ICANN will comply with the EU General Data Protection Regulation (GDPR), whose enforcement sanctions come into force in May of 2018. How will ICANN comply with GDPR without unduly restricting global Internet users' access to the public WHOIS database? For nearly the past 20 years, Internet users, businesses, law enforcement and consumer protection agencies have relied on WHOIS as a necessary resource. more
ICANN held its first international meeting of 2012 last week in San Jose, Costa Rica, and kicked off the week on a high note with an inspired speech by Costa Rican President Laura Chinchilla. While Chinchilla's point was made in reference to recent U.S. legislative initiatives and other proposals to increase Internet regulations at the international level, the tug-of-war over online rights and the governance framework to develop and assure them was a common thread throughout much of the ICANN meeting. more
We touched on this subject in the past, but recently Rich Kulawiek wrote a very interesting email to NANOG to which I replied, and decided to share my answer here as well: I stopped really counting bots a while back. I insisted, along with many friends, that counting botnets was what matters. When we reached thousands we gave that up. We often quoted anti-nuclear weapons proliferation sentiments from the Cold War, such as: "why be able to destroy the world a thousand times over if once is more than enough?" we often also changed it to say "3 times" as redundancy could be important... more
Network Information Centre Sweden AB (NIC-SE), which is the organization that administers .se domain names, will be introducing a new regime for registration of .se domain names.
Under the new regime, applicants from all over the world will be able to apply for registration of a .se domain name without needing to prove that the desired domain name reflects a company or organization name. There will no longer be preliminary examination of applications for registration of .se domain names nor any restriction on the number of .se domain names per applicant. It will also be possible to register geographical names as .se domain names. However, non-Swedish applicants (those without a permanent business place or address in Sweden) must provide a local contact (i.e. person or entity who is permanently resident in Sweden). more
UDRP Paragraph 4(c) states as a preamble that "[a]ny of the following circumstances, in particular, but without limitation, if found by the Panel to be proved based on its evaluation of all evidence presented, shall demonstrate your rights or legitimate interest to the domain name for purposes of Paragraph 4(a)(ii)." Three nonexclusive circumstances are listed. more
The Collaboration for International ICT Policy for East and Southern Africa (CIPESA) recently published "ICANN, Internet governance and Africa", a public briefing on the current status and key points of the debate that provides essential background for the second phase of the World Summit on Information Society (WSIS). During the last few years the relationship of African stakeholders with ICANN has received greater attention, largely driven by a few key individuals within African governments, the technical community, and civil society organizations. Meanwhile, the broader topic of Internet governance has been put on the public agenda in the context of the WSIS. ...Decisions taken at the upcoming second phase of the WSIS (to occur in Tunis in November 2005) are likely to have a profound impact on ICANN and the field of Internet governance more generally. more
Popular Enterprises LLC, the parent company of Netster.com, has filed a $100 million dollar lawsuit against VeriSign, Inc. The Complaint alleges antitrust violations, unfair competition and violations of the Deceptive and Unfair Trade Practices Act based upon VeriSign's release of the Site Finder product. The suit requests injunctive relief to prevent VeriSign from operating Sitefinder, and to otherwise cease what Popular Enterprises believes to be its monopolistic practices. more
Black Frog -- a new effort to continue the SO-CALLED Blue Security fight against spammers. A botnet, a crime, a stupid idea that I wish would have worked -- News items on Black Frog. Blue Frog by Blue Security was a good effort. Why? Because they wanted to "get spammers back". They withstood tremendous DDoS attacks and abuse reports, getting kicked from ISP after ISP. ...The road to hell is filled with good intentions. Theirs was golden, but they got to hell, quite literally, non-the-less. ...When Blue Security went down, some of us made a bet as to when two bored guys sitting and planning their millions in some café would show up, with Blue Security's business plan minus the DDoS factor. Well -- they just did. more
Unprecedented new Political and Cyber Security Threats are happening at a scale that has never been witnessed before. These threats are large and malicious enough to take down nuclear programs, render oil refineries inoperable, and take billion-dollar websites offline (not to mention smaller ones). Recent events confirm that NO ONE IS IMMUNE. Despite the obvious warning signs, Internet business stakeholders the world over continue to act as if nothing has changed, and seem unaware that global paradigms have undergone a seismic shift almost overnight. more
Sponsored byCSC
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byRadix
Sponsored byDNIB.com