Afternic holds a unique position on this subject; we're neutral. This is partly because we have partners on both sides of the issue and want to be diplomatic. But it is also because we don't think that it matters much in a mature domain name market. The backorder service market is an apparition. It depends on the owner of a valuable property thinking the property is worthless. How long can that situation exist to fuel the backorder market? As domain name owners gain knowledge and experience regarding domain name values, we expect few valuable names to drop.
A positive consequence of this debate is that domain name owners will gain knowledge about the value of their domains. more
ICANN has been sent a letter by the European Data Protection Supervisor calling them out with respect to both data collection, retention and privacy within the context of the 2013 Registrar contract (RAA). The letter is the first instance of one, to my knowledge, which makes reference to the ECJ's recent ruling that rendered the data retention directive null and void. more
Many companies have the occasional "oops" where they send email they probably shouldn't have. This can often cause a decrease in reputation and subsequent delivery problems. Some companies rush to fix things by changing domains. Brand new domains, those registered less than 30 days, have really bad reputations. Blame the spammers and scammers who exploited a loophole and sent tons of untraceable spam from newly registered domains that they then abandoned without paying for them. more
I have often remarked that any fool can run a DNS-Based Blacklist (DNSBL) and many fools do so. Since approximately nobody uses the incompetently run black lists, they don't matter. Unfortunately, using a DNSBL requires equally little expertise, which becomes a problem when an operator wants to shut down a list. When someone sets up a mail server (which we'll call an MTA for Mail Transfer Agent), one of the tasks is to configure the anti-spam features, which invariably involves using DNSBLs. more
A US District Judge in Maine largely granted a motion to dismiss brought by Hannaford in a big data breach case... According to the court, around March 2008, third parties stole up to 4.2 million debit and credit card numbers, expiration dates, security codes, PIN numbers, and other information relating to cardholders "who had used debit cards and credit cards to transact purchases at supermarkets owned or operated by Hannaford." more
Many of my friends in the civil-liberties and Internet-law communities have been criticizing the Internet Society's agreement to sell the Public Interest Registry, which administers the .ORG top-level domain. I'm a free-speech guy, so I support their right to raise all these criticisms. But they often ask me directly – knowing that my track record as an Internet civil-libertarian is longer than most – why as a member of the Internet Society (a.k.a. ISOC) board I decided to join the board's unanimous approval of the deal. more
Ask anyone involved in Internet policy what "Internet Governance" means and you're likely to get a different answer, despite the fact that a decade ago, after torturous negotiations, the international community agreed on a working definition for the term (if a vague one). The lack of clarity has resulted in a policy space that appears to cover more and more subjects, with less and less agreement the more it spreads. In discussions recently on the /1net email list, I've seen proposals for an 'Internet Governance Roadmap' that includes delivering e-health initiatives, solving mass surveillance, and adopting new measures for taxation of Internet commerce - to name just a few. more
This post isn't about -- or isn't only about -- the use of computer technology to commit crimes. It's more about the use of computer technology to commit war. A few weeks ago, I was part of a conversation about the legal issues cyberwarfare raises. We were talking about various scenarios -- e.g., a hostile nation-state uses cyberspace to attack the U.S. infrastructure by crippling or shutting down a power grid, air traffic control systems, financial system, etc. Mostly, we were focusing on issues that went to the laws of war, such as how and when a nation-state that is the target of a cyberattack can determine the attack is war, rather than cybercrime or cyberterrorism. more
The Congressional Research Service (CRS) recently released a major new study examining cybersecurity. The report, "Creating a National Framework for Cybersecurity: An Analysis of Issues and Options" discusses a variety of significant public and private cybersecurity concerns. The CRS analysis lists several broad options for addressing cybersecurity weaknesses ranging from adopting standards and certification to promulgating best practices and guidelines and use of audits among other measures. more
ToDus, a messaging application described as a "Cuban WhatsApp" and Apklis, a distribution site for Android mobile apps, were featured at the First Computerization Workshop held recently at the Universidad de Ciencias Informáticas (UCI). One might ask, why do we need a Cuban WhatsApp and Apklis when we already have WhatsApp itself and the Google Play Store? more
Come join the discussion on Wednesday 17:15 UTC. Quis custodiet ipsos custodes? As ICANN approaches its 18th birthday, it marks its ascension to adulthood and independence with a new framework of accountability. As we attempt to modernize and empower the organization with oversight of the DNS, the question of "who watches the watchmen?" is on the tip of everyone's tongue. more
In what can best be described as a historic decision, today the ICANN Board overwhelmingly approved the new gTLD Program with a vote of 13 to 1 with 2 abstentions. Applications for new gTLDs will be accepted from January 12, 2012 to April 12, 2012. Experts believe that there will likely be hundreds of new applications submitted during this first round. more
I outline some general critical comments on the recent commissioned reports for ICANN's proposed introduction of new top-level domain names (TLDs)... The reports cite seminal papers in economics, but the papers' applicability here is dubious. For example, for economists a "good" is a product intended for consumption, which is a different sort of animal than a financial investment. more
The bottom line is that success is not guaranteed, but neither is failure -- there is a non-zero probability of success. On May 26th, SpaceX applied for permission to launch 30,000 "second-generation" Starlink broadband Internet satellites. (Note that the software on Starlink satellites is updated about once a week). The application narrative states that the second-generation satellites will be configured... more
The tremendous demand for, and profitability of mobile telephony supports legislative and regulatory efforts to refarm spectrum with an eye toward reallocating as much as possible for wireless telephony and data services. But there is a downside that no one seems to acknowledge. In light of past FCC practice and the behavior of incumbent wireless carriers I expect two anticompetitive outcomes to occur with the onset of any more spectrum. more
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byCSC
Sponsored byVerisign
Sponsored byWhoisXML API
Sponsored byDNIB.com
Sponsored byRadix