Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Top Five Recommendations for IoT Policymakers from ITAC Industry Participants

As the Department of Commerce considers a policy role for the U.S. government in the Internet of Things (IoT), the Department of State is studying a dynamic and evolving international environment around IoT, including technical, commercial, and economic issues. Governments and intergovernmental organizations across the world are waking up to the potential of IoT, and some are looking to move quickly in a nascent landscape to establish themselves as leaders for IoT globally. In the process, few are reaching out to industry. more

Comments on Economics Study of ICANN’s New TLDs

ICANN has taken another crack at the question of the economics of launching new top-level domains (TLDs). The first report that the group commissioned on the subject was greeted by a loud and unhappy uproar. Now we have the preliminary draft of a new report, this one by professors Katz, Rosston, and Sullivan. It is insightful and analytic, but the final version needs to consider the theoretical and empirical issues... more

The Internet And Its Governance: Where Should We Look For Models?

The US Department of Commerce (DOC) has recently signed a new contract with the Internet Corporation for Assigned Names and Numbers (ICANN) for one more year. ICANN and the DOC are to continue to work together to design an organizational form that is suitable to administer and control the infrastructure of the Internet. That infrastructure includes the IP numbers, which are critical to the functioning of the Internet protocol TCP/IP. These numbers must be unique for the Internet to continue to function. The infrastructure also includes the protocols that make the Internet possible. Protocols involve the conventions or agreements that each network that is part of the Internet accepts in order to make communication possible across the boundaries of the different technical and political and administrative entities that comprise the networks of the Internet. Another component of the Internet's infrastructure is the domain name system (DNS). This system includes the names that identify various sites on the Internet and the translation of those names into IP numbers via the system of computers that make the one to one mapping between names and numbers. more

CallService.biz Shut Down by the FBI

Gary Warner over at Cyber Crime and Doing Time has a good post up this week about the CallService.biz website being shut down. I have posted a few good excerpts and added my comments to the end. ... Warner's take on the world of spam, malware, hacking and phishing is that unless people actually go to jail because they are spamming, the problem of spamming will never get better. That's because when the security industry fixes the latest hole or comes up with a new technology to stop the newest threat, spammers simply move onto another. more

When Proxy Services Enable Abuse

People are growing increasingly alarmed by recent examples of bad actors abusing proxy services offered by registrars. While proxy services are designed to protect the privacy of legitimate domain name users - they do the opposite when abused by cybercriminals. Responsible Proxy providers play a key role in mitigating abuse. When they don't act responsibly - it's clear they contribute to the problem. more

Could SNET Become Cuba’s Guifi.net?

In an earlier post, I described Havana's community network, SNET, and wondered what it could become if the government and ETECSA were willing to legitimatize and support it. Spain's Guifi.net provides a possible answer to that question. Guifi.net is said to be the largest community network in the world. It began in 2004 and has grown to have 34,165 nodes online with 16,758 planned, 407 building, 612 testing and 4,043 inactive. more

Internet Governance in 2026: Sovereignty, Security, and the Limits of Multistakeholderism

As Internet governance fragments in 2026, authority shifts from open, multistakeholder forums to state-led security regimes, legal instruments, and alliance-based cooperation, challenging longstanding institutions and reshaping global norms through enforcement rather than consensus. more

Spam Kings: Book Review (Part 1)

A few months ago, I purchased the book Spam Kings, but only recently managed to get around to reading and finishing it. In case you've never read it, it chronicles the stories of some spammers and the anti-spammers who fought them. These anti-spammers are not people like myself in industry; rather, they are users who have received spam who hunt down the source of the spam and work to bring them down. more

Broadband Technology Improving - Faster, Smarter, and More Versatile Connectivity

Broadband infrastructure is advancing rapidly, from multi-gigabit cable and fiber networks to next-generation fixed wireless and satellite systems. With speeds reaching up to 25 Gbps for consumers and 1 Tbps in orbit, these developments mark a pivotal shift in connectivity, setting the stage for more scalable, flexible, and high-capacity networks. more

Typosquatting as Per Se Cybersquatting Unless Proved Otherwise

The quintessence of typosquatting is syntactical variation: adding, omitting, replacing, substituting, and transposing words and letters. Since these minor variations are mostly indefensible, respondents rarely respond to complaints, although as I will explain in a moment there can also be innocent and good faith syntactical variations which are not typosquatting. It follows that if there are defenses, respondents should prudently respond and explain their choices because default generally favors complainants. more

Human Network, Human Challenges

It has now been about eight months since I joined the Internet Society as the Director of Deployment & Operationalization and I still get asked on a fairly regular basis "what do you do?" Well, with ISOC's Chief Internet Technology Officer Leslie Daigle's recent departure, and with my time here having exceeded both my first 120 days and my first 6 months, this seems like the right moment to reflect on my brief tenure here so far and perhaps pontificate a bit on where we're going - and why. more

ICANN: Keep the Core Neutral, Stupid

ICANN's travelling circus is meeting in San Juan, Puerto Rico this week. One of the main subjects of discussion has been the introduction of new generic Top-Level Domains (gTLDs), after a GNSO Report [PDF] proposed 19 "Recommendations" for criteria these new domain strings should meet -- including morality tests and "infringement" oppositions. ...It's important to keep ICANN from being a censor, or from straying beyond its narrow technical mandate. The thick process described in the GNSO report would be expensive, open to "hecklers' vetos," and deeply political... ICANN should aim for a "stupid core"... more

Failure of the Broadband Plan?

Craig Moffett sees this as I do: "If LTE networks are going to be usage-capped, then the last pretense that LTE can be positioned as a substitute for terrestrial broadband would seem to be gone." The heart of the U.S. broadband plan is to release more spectrum - enough for 10-20 networks like Verizon's LTE now building - and pray that will be enough competition in five to seven years to check price increases. more

ICANN’s Positive Affirmation: Good News for Africa and Emerging Markets

Sometimes you get what you are asking for. And this seems to be one of those occasions... and the US government can give itself a pat on the back for having listened to other stakeholder opinions. For years the world of Internet governance has been seen as its own special corner of the technosphere, full of arcane acronyms and quiet power deals. Despite efforts to make ICANN and the broader Internet community more transparent and user-friendly, many observers, including many African governments, still saw the stage as too much of an insider's game -- with the ultimate insider being the US Department of Commerce. more

One-Click Unsubscription

Unsubscribing from mailing lists is hard. How many times have you seen a message "please remove me from this list," followed by two or three more pointing out that the instructions are in the footer of every message, followed by three or four more asking people to not send their replies to the whole list (all sent to the whole list, of course,) perhaps with a final message by the list manager saying she's dealt with it? more

Topics

DNS Security

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days