Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

The Christmas Goat and IPv6 (Year 3)

As Christmas were getting closer, the third time of load balancing the streaming pictures of the famous Christmas goat in the city of Gävle, Sweden, was on the agenda. My goal with this activity is the same as before, to track the use of IPv6 and DNSSEC validation. The results from the last two years are published on CircleID. more

The 6G Hype is Already Starting

Even though 5G hasn't yet made it onto any cellphone, the wireless vendor industry is already off and running looking at the next generation of wireless technology that has been dubbed as 6G. This recent article describes the European Union Hexa-X project that started in January to look at developing specifications for next-generation wireless technology using terahertz spectrum. more

Picking Domain Names by Search Results

There is a definite advantage to knowing what users look for when typing in domain names that they think should work. This article from Government Computer News shows an excellent example in .gov. "600,000 visitors a year to FirstGov try to find the federal government's Web site by typing USA.gov into their browser", so they switched from firstgov.gov to usa.gov. It wasn't mentioned in the article, but firstgov.gov redirects automatically; this is more intelligence than I normally expect from US government web sites. more

The EFF and Hanlon’s Razor

The EFF has just posted a shallower than usual deeplink alleging an "email encryption downgrade attack" by ISPs intent on eavesdropping on their customers. They, along with VPN provider Golden Frog, have additionally complained to the FCC reporting this. Here, they've just noticed something that's common across several hotel / airport wifi networks... more

ICANN Finds Its Voice

I think we are finally getting somewhere: ICANN is no longer fluttering flusteredly whenever a lobbying group sends a nastygram over the transom. Case in point: a Association of National Advertisers (ANA) that arrived a few days ago, full of bombast and muscle-flexing, demanding that ICANN immediately stop the new gTLD program until a long list of demands from the ANA were met, or else the ANA would be forced to take some Very Scary Actions... more

Call for ICANN to Educate and Not Mislead GAC

I read with interest the recent blog written by Theresa Swinehart a Sr. Advisor to the President on Strategy. She wrote: "The most critical element of this [ICANN Transition] process is trust and alignment. To ensure success on this accountability track, we must as a community work closely together to make sure that the final process is meaningful. There is plenty of work to be done in an ambitious period of time." more

ICANN: Do Not Allow Closed New gTLDs With Generic Strings

Within the next year, the ICANN Board may well face a decision that will help determine whether ICANN is capable of serving the global public interest or whether it is degenerating into an industry-controlled self-regulatory association. The issue can be framed quite simply: will ICANN approve a process for the creation of a new wave of new generic top level domains that will include "closed generic" gTLDs? more

5G Security Transparency

There is considerable rhetoric propagated today about 5G security. Some of the more blatant assertions border on xenophobia with vague assertions that the 5G vendors from some countries cannot be trusted and wholesale government banning is required. Existing treaty obligations are being summarily abrogated in favour of bilateral trade bullying. These are practices that the late President George H.W. Bush sought to eliminate a quarter century ago through intergovernmental organization initiatives... more

The Path Toward Increasing the Security of DNSSEC with Elliptic Curve Cryptography

How do we make DNSSEC even more secure through the use of elliptic curve cryptography? What are the advantages of algorithms based on elliptic curves? And what steps need to happen to make this a reality? What challenges lie in the way? Over the past few months we've been discussing these questions within the community of people implementing DNSSEC, with an aim of increasing both the security and performance of DNSSEC. more

Not Quite Two Factor, or Is Your Phone Number Really Something You Have?

A recent article in the New York Times Dealbook column reported on phone number hijacking, in which a bad guy fraudulently takes over someone's mobile phone number and used it to reset credentials and drain the victim's account. It happens a lot, even to the chief technologist of the FTC. This reminds us that security is hard, and understanding two-factor authentication is harder than it seems. more

Limitations of .Brand Search Engines

The essay outlines the necessary success factors for a niche search engine and raises doubt regarding the role of .Branding in niche engines' success. Some search engines want to target a niche market, not Google. Unlike Google, they're targeted and they are profitable that way. Consider Kayak (travel), Zillow (real estate), Yelp (reviews), and .xxx (adult websites). more

What Should PGP Look Like?

Those who care about security and usability - that is, those who care about security in the real world - have long known that PGP isn't usable by most people. It's not just a lack of user-friendliness, it's downright user hostile. Nor is modern professional crypto any better. What should be done? How should crypto in general, and PGP in particular, appear to the user? I don't claim to know, but let me pose a few questions. more

Even if Do-Not-Track Were a Good Idea, Could It Ever Work?

In a recent article, I read about increasingly intrusive tracking of online users, which has lead to a proposal at the FTC, "FTC Chairman Jon Leibowitz said the system would be similar to the Do-Not-Call registry that enables consumers to shield their phone numbers from telemarketers." Maybe I'm dense, but even if this weren't a fundamentally bad idea for policy reasons, I don't see how it could work. more

Preserving ICANN’s Independence Through Bold Action – Not Inaction

This week, the ICANN Board will vote on whether to approve the transfer of control of the .ORG domain to a private equity firm called Ethos Capital. This is a weighty decision for ICANN, since in order to approve the sale, it will have to convince itself that this is the right choice in the face of tremendous and widespread opposition, including from those who will be most affected by the sale. more

Network Neutrality Becoming a Major Concern for Europe’s Governments

There is no single definition of network neutrality, though generally it is recognised as the principal that there should be no restrictions by fixed and mobile ISPs, or governments and the like, in providing consumers with access to internet networks. Nor should there be restrictions or discrimination against associated content and platforms. A number of European regulators and governments are now making forthright statements defending the principal. more

Topics

New TLDs

Sponsored byRadix

Threat Intelligence

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days