Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

NIST Releases a Profile for IPv6 in the U.S. Government for Comment - Comments Due Feb. 29

The National Institute for Standards and Technology (NIST) has released a second draft of a proposed standards profile to support the implementation of IPv6 by government agencies. "NIST developed the 'profile' to help ensure that IPv6-enabled federal information systems are interoperable, secure and able to co-exist with the current IPv4 systems." ...The White House's Office of Management and Budget declared in 2005 that all federal agencies shall migrated to IPv6 by June 30, 2008... more

ITU’s Landmark Decisions

The ITU, through its Council acting as the executive body of the Member States, made a "landmark decision" to make available to the public "the main [WCIT] conference preparatory document" and to establish a publicly accessible page "where all stakeholders can express their opinions" on the preparatory document or other WCIT-related matters. more

A Navigation Aid or a Brand TLD? (Part 2 of 2)

So what are the characteristics of a "Brand TLD"? Please note that by "Brand TLD", I do not mean gTLDs applied for by brands. I mean TLDs whose registrants tend to use them as their primary site and identity. They have either created themselves as, or have become a brand in the eyes of their registrants. These TLDs tend to be in the minority. more

Too Little, Too Late? Why ICANN’s Proposed WHOIS Access System Isn’t Worth It

After two years of grueling, complex and contentious debate, the ICANN EPDP team delivered its Phase 2 Final Report on July 31st, 2020. Unfortunately, and disappointingly, the policy recommended for the so-called "System for Standardized Access/Disclosure" (SSAD) fails to meet the needs of the users it supposedly is designed to benefit. more

Reply-All Creates a DDoS Attack?

One can read in an Associated Press article that the US State Department have their email system bogged down due to too many people use the Reply-All function in their email client. IT Departments have asked people to not use Reply-All and also threaten with disciplinary action. To me, that is the wrong path forward. more

Losing and Reclaiming Domain Names

For registrants who are not trademark owners losing their domain names can be an irretrievable loss; and for trademark owners, perhaps not irretrievable but fraught with uncertainties of recovery. ICANN attempted to solve the problem of inadvertent lapses of registration in the Expired Registration Recovery Policy (ERRP) and its companion the Expired Domain Name Deletion Policy (EDNDP), implemented in 2013. more

The Great Forking Bitcoins of China

Let's say I'm with the Chinese government and decide that I am tired of people evading currency controls and money laundering using Bitcoin. So we adjust the Great Firewall of China to block port 8333. We also add some proxies that allow some uncleared transactions from outside to flow into Chinese networks but not the other way and keep track of which ones we let through. Since a large fraction of the miners are inside China, and all of the hard currency exchanges are outside, this will cause a pretty serious fork. more

Should You Whitelist Your Vulnerability Scanning Service Provider?

Unlike consultant-led penetration testing, periodic or continual vulnerability scanning programs have to operate harmoniously with a corporation's perimeter defenses. Firewalls, intrusion prevention systems, web proxies, dynamic malware analysis systems, and even content delivery networks, are deployed to protect against the continuous probes and exploit attempts of remote adversaries -- yet they need to ignore (or at least not escalate) similar probes and tests being launched by the managed security service providers an organization has employed to identify and alert upon any new vulnerabilities within the infrastructure or applications that are to be protected. more

Verizon and Skype: Who’s the Winner?

Until only recently, has it been remotely plausible to consider such different companies joining forces. I've written about Skype often, and for the most part, they've been a threat for incumbents of all stripes. To hear about this from Verizon during such a public event makes it very clear that the sands are shifting once more, and yet again, VoIP is the culprit. more

No Virginia, You Have No Duty to Secure Your WiFi Access Point

Every now and again a report flies across the network about the police breaking down someone's door and attempting to arrest the home owner for bad things online - assuming that whatever happened from that person's Internet connection is their fault. Now there are lots of problems with this - lots of problems. But one of the big ones is that anyone can access an open access point... more

ICANN Sends Termination Notice to Registrar

ICANN has sent EstDomains a termination notice: "BBe advised that the Internet Corporation for Assigned Names and Numbers (ICANN) Registrar Accreditation Agreement (RAA) for EstDomains, Inc. (customer No. 919, IANA No. 943) is terminated..." more

Come to the First Ever Dedicated New gTLD Conference: .nxt

Sometimes the heavens align. With the release of a number of resolutions from the ICANN Board on Sunday, we learnt two things: One, that there is a determined drive to get the rules for new Internet extensions, gTLDs, finalized in December at a meeting in Cartagena. And two, that the meeting immediately after that - in March 2011 - will be held in San Francisco. more

Google Playing to Win in the 700 MHz Auctions

Many say Google will bid to lose in the upcoming 700 MHz auctions and many more are equivocating. The idea is Google's entry alone will induce enough openness, and besides they couldn't afford to become an operator. This shows a total lack of understanding! more

IS3C Report: Socio-Political and Technical Impacts of Post Quantum Cryptography Policies

At the 20th Internet Governance Forum in Lillestrøm, Norway, the UN Internet Governance Forum's dynamic coalition Internet Standards, Security and Safety (IS3C) released its new report on post-quantum policies. This report presents the findings of a collaborative study undertaken by IS3C and the French domain name registry Afnic and examines the critical need for Post-Quantum Cryptography (PQC) to achieve greater security in the ever-expanding global IoT landscape. more

Will Googlerola Be Able to Fight Data Caps?

"Is Google Turning Into a Mobile Phone Company?" asks the headline in Andrew Ross Sorkin's New York Times story. Wrong question, IMHO. But is Google doing the deal at least partly to give it leverage over wireless providers? I think so. The biggest threat to the growth of Smart Phones and tablets and other Google businesses like YouTube is the imposition of data caps and metered pricing by wireless providers like at&t and Verizon Wireless. more

Topics

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

DNS Security

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days