Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

How to Prepare for the DNSSEC Root KSK Rollover on October 11, 2018

Are you ready? Are your systems prepared so that DNS will keep functioning for your networks? One week from today, on Thursday, October 11, 2018, at 16:00 UTC ICANN will change the cryptographic key that is at the center of the DNS security system - what we call DNSSEC. The current key has been in place since July 15, 2010. This is a long-planned replacement. more

New gTLD Applicants Must Reduce Cognitive Biases

To improve the viability of your application for the recently approved launch of new generic top-level domains (gTLDs), you must reduce decision biases in estimating a new gTLD's expected revenues. To do so, you must either delegate the responsibility to an independent multi-disciplinary team within your company, or seek input from a consultant. more

Strong Support for IDNs, GEOs and/or Communities to Go First

ICANN's public comment period on how to resolve the contention scenario for probably 1,409 new gTLDs entering the root has closed on 19 August 2012. Alltogether 98 comments from parties around the globe have been received, representing language communities, cities, corporations, entrepreneurs and Internet users. In contrast to many comment periods we have participated in during the 7-year long policy development process for new gTLDs it seems that a clear opinion emerges from the applicants' community and other parties. more

Remembering the Cybersecurity Treaty That Never Happened

The cybercrime legal community from around the globe is meeting under the aegis of the Council of Europe (COE) to hold the annual Cooperation against Cybercrime conference dubbed Octopus 2021. It is also celebrating the 20th anniversary of the Cybercrime Convention treaty signed in November 2001 in Budapest. Not celebrated and little known, however, is the Stanford Draft -- A Proposal for an International Convention on Cyber Crime and Terrorism -- and the initiative begun in 1997 which brought about that draft treaty instrument. more

Missing in Action - ICANN’s 2010 Annual Report

In preparation for some upcoming long-haul international flights, I was looking for some "light" ICANN reading material. One document that came to mind was ICANN's 2010 Annual Report. Over the last four years ICANN has produced a year end report. While this document was probably originally conceived as a means to demonstrate ICANN's progress... more

Silly Bing

Bing is Microsoft's newish search engine, whose name I am reliably informed stands for Bing Is Not Google. A couple of months ago, as an experiment, I put up a one page link farm at wild.web.sp.am. As should be apparent after about three seconds of clicking on the links there, each page has links to 12 other pages, with the page's host name made of three names, like http://aaron.louise.celia.web.sp.am. The pages are generated by a small perl script and a database of a thousand first names. more

Dictionary Words Alone or Combined Functioning as Trademarks Are No Less Dictionary Words

By definition "any word" or "any combination of words" can function as trademarks, but whether alone or combined for that purpose no use can overrule their ordinary meanings, support their removal from the public domain, or prevent speculation or use of identical or confusingly similar words by businesses other than rights holders. The fact is, all words that are not coined found in dictionaries, word lists, and circulating in world cultures are generic. more

The Meeting That Changed the DARPA Datagram Internet

The National Science Foundation awarded a small contract to the IEEE to host a small two-day meeting on 30 Sept 1994 of selected invitees at the IEEE's Washington DC 18th Street offices on "Name Registration For The '.COM' Domain." Being part of the InterNIC contract oversight committee, I was one of the eight invitees. It turned out in many ways to be the single most important meeting in the long, checkered history of what is today referred to as "the internet," that made an extraordinarily bad decision. more

A Voting System for Internet by Domain Name Owners - Part II

This is the second part of a 2-part series article describing a method for voting among owners of domain names. To read the first part of this article click here.

After a ballot closes, each registrar will send the summary results to at least two vote counting entities. These organizations will tally summary results obtained from each registrar. The totals of the summary results will be cross-checked against totals from the other vote counting entities. more

Phishing in the New gTLDs

The new Anti-Phishing Working Group (APWG) Global Phishing Survey has just been released. Written by myself and Rod Rasmussen of IID, the report is the "who, what, where, when, and why" look at phishing, examining the second half of 2014. The report has many findings, but here I'll concentrate on the new gTLDs. The second half of 2014 was when an appreciable number of new gTLDs entered general availability and started to gain market share. more

At the Crossroads: The State of Domain Registration Data Services

The Internet's users rely on domain name registration information for vital purposes, including providing security, problem-solving, and legal and social accountability. The data is so important that users perform more than two billion WHOIS queries every day. ICANN has instituted new data policies over the last two years, and is also directing a migration to a new technical protocol, RDAP, that will replace WHOIS access in the near future. So at this critical juncture, how is it all going? more

Warranties and Representations on Purchasing Domain Names: What are they Worth?

The WIPO Final Report published in April 1999, from which sprung the UDRP the following October, is useful in shedding light on what the assembled constituencies had in mind in agreeing to particularly contentious issues. One of those issues was whether registrants had to actively search trademark records before purchasing domain names. Other than paragraph 2 of the Policy which codifies registrants' representations, there is no guidance as to what registrants must do... more

Thoughts on the Toys “R” Us Acquisition of Toys.com

Using the purchase by Toys "R" Us of Toys.com as an example, I outline the problems that come with using the popular ascending auction design and point out some of the potential strategic uses and signals of the domain name acquisition. Toys “R” Us paid $5.1 million in February 2009 for Toys.com. It outbid five others, including National A-1 Advertising and Frank Schilling... more

The FCC Stumbles Into Internet Filtering

What could be bad about free wireless Internet access? How about censorship by federally mandated filters that make it no longer "Internet." That's the effect of the FCC's proposed service rules for Advanced Wireless Service spectrum in the 2155-2180 MHz band, as set out in a July 20 Notice of Proposed Rulemaking. Acting on a request of M2Z Networks, which wants to provide "free, family-friendly wireless broadband," the FCC proposes to require licensees of this spectrum band to offer free two-way wireless broadband Internet service to the public, with least 25% of their network capacity. So far so good, but on the next page, the agency guts the meaning of "broadband Internet" with a content filtering requirement. more

VoIP/IP Telephony in Estonia: Disrupted by Botnets?

With my post earlier this month about the possibility of SIP botnets [also featured here on CircleID], I've had a number of people asking about more information and wondering about the possible impacts. And while I will write more on botnets in general, as far as the potential impact of "botnets" in general, one need only look over at the current situation in Estonia... Now, perhaps Russia is behind the attack... perhaps not. There are obviously much larger political issues going on between the two states. more

Topics

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

DNS Security

Sponsored byWhoisXML API

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days