A key requirement for a bad actor wanting to launch a brand attack is the registration of a carefully chosen domain name. The most convincing infringements frequently use a domain name that's deceptively similar to that of the official site of the target brand. This allows a variety of attacks to be executed, including phishing attacks... more
Phishing, stealing personal information by impersonating a trusted organization, is a big problem that's not going away. Most antiphishing techniques to date have attempted to recognize fake e-mail and fake web sites, but this hasn't been particularly effective. A more promising approach is to brand the real mail and real web sites. more
This article is the first in an occasional series on DKIM/ADSP edge cases that may not be generally recognized or understood. Many people advocate DKIM/ADSP adoption without fully recognizing potential implementation and operational issues. The fact is that the email messaging environment is fraught with opportunities for poor outcomes because of common practices that need to be considered or poorly understood implementations that are not considered... more
The UDRP has the form of a substantive Policy, but it operates as a "smell test".1 If the evidence smells bad, the panel will likely order a transfer. If it doesn't, the panel won't. An aim of this article is to help improve UDRP panels' sense of smell when it comes to differentiating between domain name investors and cybersquatters. I will provide some insight into the business of domain name investing that I hope will be helpful to UDRP panelists in making more accurate inferences in disputes involving investors. more
Given the post-Prism political climate, it should come as no surprise that the 8th edition of the UN-initiated Internet Governance Forum (IGF), currently happening in Bali (Indonesia), is showing record-braking attendance with more than 2,000 delegates. With a byline of "building bridges: enhancing multistakeholder cooperation for growth and sustainable development", the meeting's main theme is clearly the need to evolve the current model for Internet Governance. But not quite everyone has the same view on exactly how that should happen. more
Last month, I announced our Open Data Hub to the CircleID community, inviting anyone interested in making the digital sector more transparent to join our efforts. Today, I am excited to share summaries of our three-part series describing our vision for a sustainable European cloud. It’s a key part of our Roadmap to Sustainable Digital Infrastructure by 2030, and one that is meant to not merely challenge the dominance of the big, non-European cloud providers, but offer an entirely different paradigm that is open-source, fair, sustainable, and creates economic opportunities for all. more
The great problem with ignorance is that it leads to disaster when one acts in the belief that he (and not infrequently a corporate "it") is invulnerable to error. The Uniform Domain Name Dispute Resolution Policy (UDRP) is fundamentally a straightforward rights protection mechanism, but as in all clearly written laws, ignorance of its application and of its evidentiary demands can (and generally does) lead to disaster. more
One of the enduring myths that is used by apologists for incumbent broadband operators as to the high cost of broadband in Canada and the US is our low population density.
Since Canada and the US have low population density compared to The Netherlands or South Korea, they argue that therefore the cost of delivering broadband will be significantly higher because of the much greater distances that need to be covered. more
Some offhand comments by Google's Vint Cerf at a recent event seem to have a triggered a panicky "Vint Cerf proposes nationalizing the Internet" buzz that's been ramping up fairly rapidly. Holy BitTorrent, Batman! Army paratroopers seen dropping into parking lots at AT&T and Comcast, while the Transportation Security Agency orders us all to remove our shoes before surfing the Web! Settle down, everyone. As usual with these kinds of stories, the truth is significantly different from the breathless buzzing. Here's how Vint described his thinking on this issue to me... more
I've already shared my thoughts following a session of the IPv4 Sunset Working Group at IETF 95 that considered whether to declare IPv4 an "Historic" specification. Of course, as one would expect for a meeting of a Standards Development Organization (SDO), that wasn't the only standards process discussion through the week. Another session, this time in the IPv6 Maintenance Working Group, considered the related topic of whether to make the IPv6 specification a full Internet Standard. Let's look at that proposal. more
This week, 17 individuals from about a dozen organizations in the DNS space met up in Manchester, NH at the Dyn Inc. headquarters for a first of its kind Summit for DNS industry insiders. Called "Inside Baseball," we wanted to bring people together from every spectrum of the DNS industry to inspire collaboration and innovation. more
Starting Dot ("SD") is a French new gTLD applicant which applied for five strings: .ARCHI, .BIO, .DESIGN, (which has been withdrawn) .IMMO and .SKI. It is the only French applicant to have applied for several open new gTLDs. Some French brands have applied too but as closed Top-Level Domains... While Starting Dot may be one of the smaller portfolio applicants, there is a considerable difference here in the way their projects are handled when compared to some of the larger applicants. more
Last week Czech researchers released information on a new worm which exploits CPE devices (broadband routers) by means such as default passwords, constructing a large DDoS botnet. Today this story hit international news... The spread of insecure broadband modems (DSL and Cable) is extremely wide-spread, with numerous ISPs, large and small, whose entire (read significant portions of) broadband population is vulnerable. more
Verisign posted preliminary public comments on the "Mitigating the Risk of DNS Namespace Collisions" Phase One Report released by ICANN earlier this month. JAS Global Advisors, authors of the report contracted by ICANN, have done solid work putting together a set of recommendations to address the name collisions problem, which is not an easy one, given the uncertainty for how installed systems actually interact with the global DNS. However, there is still much work to be done. I have outlined the four main observations... more
The worldwide public discussion about surveillance produced by the Snowden revelations has so far largely missed a major strategic fault with national security arguments for continued mass surveillance: that economic damage to the technology sector but more fundamentally to the wider economy is a likely result. This damage is also likely to undermine security far more than any potential gains from continuing as we are - or continuing but with some transparency or narrowing that leaves the existing industrial scale surveillance system largely unchecked. more
Sponsored byRadix
Sponsored byVerisign
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byCSC
Sponsored byDNIB.com
Sponsored byWhoisXML API