Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

A Short History of DNS Over HTTP (So Far)

The IETF is in the midst of a vigorous debate about DNS over HTTP or DNS over HTTPS, abbreviated as DoH. How did we get there, and where do we go from here? (This is somewhat simplified, but I think the essential chronology is right.) Javascript code running in a web browser can't do DNS lookups, other than with browser.dns.resolv() to fetch an A record, or implicitly by fetching a URL which looks up a DNS A or AAAA record for the domain in the URL. more

A 5G Community Network Strategy for Cuba (and Other Developing Nations)

In a previous post, I suggested that Cuba might be able to leap over 4G to 5G wireless infrastructure using satellite and terrestrial networks for backhaul. While that would require political and policy change, it would be a good fit with Cuban culture and skills. Before talking about Cuba, let me say a bit about wireless generations. Each mobile technology generation used new technology and enabled new applications. more

Monster.com Response to Security Breach Unacceptable

As some of us are continuing to learn this week the Monster.com service has again been successfully hacked. According to a security bulletin posted on Monster.com on January 23rd, 2009, the intruder gained access to the user database, while no resumes were apparently compromised... As a user of Monster.com what I find incredibly upsetting about this situation is that I had to find out about this through a security blog. more

Private Cyber Investigators

This post was prompted by questions I was asked to address when I participated in a panel discussion of cybersecurity. Here are the relevant questions: "Should we reconsider the notion that companies under attack are prohibited from investigating the attackers and trying to locate them? We allow private investigators to conduct some activities that usually only the police are allowed to do; should we accredit private cyber investigators?" ...The one I found more interesting is the second question: whether we should accredit private cyber investigators. more

On the Need to Separate the Telecom Business Agenda from Government Policy

At Guadalajara, Mexico this week, in the policy debate kicked off by the ITU, Russian Federation's Minister of Communications proposed that the ITU should give itself veto power over ICANN decisions. This proposal by the Regional Commonwealth in the field of Communications (RCC) calls for the ICANN Governmental Advisory Committee (GAC) to be scrapped and replaced by an ITU group. more

MIT Spam Conference: 2010 Call for Papers and Participation

I am proud (or disappointed) to announce the 8th annual MIT Spam Conference, March 25th and 26th at MIT in Cambridge, Massachusetts. A regular research competition that brings out the best minds in the fight against unsolicited email. At this point it would be helpful to provide a little background on the conference and remind everyone that the Call For Papers is still open. more

FCC Approves White Space Devices: The Dawn of the Age of Opportunistic Spectrum Reuse

Yesterday will go down in history as a bellwether moment. Few among us will soon forget the excitement of Obama's election. But there was an equally historic vote yesterday that for geeks, policy analysts, and technologists represents an entirely new trajectory in telecommunications. In essence, the FCC has begun the transition from command-and-control, single-user spectrum licensure to a more distributed system that holds the potential to eliminate the artificial scarcity that prevented widespread access to the public airwaves since 1927. more

ICANN New gTLD Program SWOT Analysis: OPPORTUNITIES (Part 3)

The SWOT analysis (alternatively SWOT Matrix) is a structured planning method used to evaluate the Strengths, Weaknesses, Opportunities, and Threats involved in a project or in a business venture. The following is an attempt to apply the SWOT Analysis to ICANN's new gTLD program. more

.Brand Applications Account for One Third of All New gTLD Applications

ICANN announced today that they received a total of 1930 New gTLD applications from 60 countries for 1408 unique strings. Of the 1930 applications received, .Brands accounted for 664 of them. There are an additional 80 .Brand TLDs which we have classified as "Other", as they do not fall into any of the categories listed above. more

Political New gTLDs: One Year in Review

Once a month, at the end of the month, a snapshot of domain name registration volumes is taken according to categories of new gTLDs. Twenty categories are covered and this article covers Political new gTLDs. These snapshots allow having a global overview of which extensions increase their volume of domain names registered from a month to the other, in a period of 12 months. Below is what I noticed from January 2018 to December 2018 for domain name extensions related to politics. more

Domain Name Lessons From iTunes

What do iTunes and a cooperative domain-name Intellectual Property (IP) regime have in common? They are market solutions to illegal activity: free downloading of music and free use of brands in domain names, respectively. The music industry tried to fight the free downloading of copyright-protected music by taking legal action against free downloaders under the pretext that their activity siphons industry revenue... more

Fight Phishing With Branding

Phishing, stealing personal information by impersonating a trusted organization, is a big problem that's not going away. Most antiphishing techniques to date have attempted to recognize fake e-mail and fake web sites, but this hasn't been particularly effective. A more promising approach is to brand the real mail and real web sites. more

The Untold History of the First Cyber Moonshot

A dialogue between Michael Warner (Historian, United States Cyber Command) and Tony Rutkowski (Cybersecurity engineer, lawyer and historian). Michael is chairing a cyber history panel at the October biennial Symposium on Cryptologic History hosted by the National Security Agency; his panel will include discussion of the almost unknown key role of cryptologist Ruth Nelson leading a team in the 1980s in a major initiative to secure public internet infrastructure. more

Whither Passwords

The primary means of authentication on the Internet is the password -- a half-century old, shared secret mechanism that is difficult to use (especially on mobile devices) and has acknowledged security flaws including attacks at scale. Even so, passwords remain the most prevalent form of authentication with efforts to enhance security typically relying on "bolt on" solutions that increase user friction. more

The Pros and Cons of Introducing New gTLDs

Every time new concepts are introduced, much debate ensues as to the advantages and disadvantages such a change would bring forth. We've seen that happen with the launch of IPv6. Detractors and supporters rallied to make their respective arguments heard. One thing is sure though. The need for a much larger IP address space is something both parties are in agreement with. more

Topics

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Domain Names

Sponsored byVerisign

DNS Security

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days