Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Canadian Marketing Association Attacks Anti-Spam Bill

With the final Industry Committee review of C-27, Canada's anti-spam legislation, set for Monday afternoon, lobby groups have been increasing the pressure all week in an effort to water down many of the bill's key protections. Yesterday, the Canadian Marketing Association chimed in with an emergency bulletin to its members calling on them to lobby for changes to the bill. While the CMA was very supportive of the bill when it appeared before the committee in June, it now wants to kill the core protection in C-27 - a requirement for express opt-in consent. more

Avaya’s web.alive - Another Approach for Unified Communications?

Earlier this month, Avaya held a new type of customer event in Toronto, called Evolutions. They have been looking for better ways to bring customers together, so aside from their global event, they've put together Evolutions, which has a regional focus. The first one was recently held in Mexico to great success, and my understanding is that Canada was the next trial event, and that's what I attended in downtown Toronto... I'm almost certain I was the only Canadian analyst invited, so this may well be the only place you'll hear about Evolutions. more

Whom Do We Regulate when the Phone Monopolies Are Gone? - Universal Access

After a more than 100 year run, the end is nigh for plain old telephone service (POTS). Through most of recent history POTS was provided by monopolies, which were regulated at both the federal and state level. The new world is much more competitive; we can talk via cell phones, computers, traditional phones hooked to a variety of devices instead of the old phone line, and a plethora of new gadgets like tablets. Voice service no longer has to be vertically integrated. more

HTTPS Interceptions Are Much More Frequent Than Previously Thought

I have written about the problems with the "little green lock" shown by browsers to indicate a web page (or site) is secure. In that article, I consider the problem of freely available certificates, and a hole in the way browsers load pages. In March of 2017, another paper was published documenting another problem with the "green lock" paradigm - the impact of HTTPS interception. more

Never Invited, but Always Present

Listening today to the U.S. Congress' House of Representatives Subcommittee on Communications and Technology hearing on ICANN governance reminded me just how often Vox Populi Registry, the company bringing dotSucks names to the Internet, is a guest at parties to which it has never been invited. Sometimes, like today, we are able to view it all from a distance and mostly we have refrained from trying to correct every misstatement or argue each odd point. more

5G Real Security Threats Lost in Trump’s Twitter Diplomacy

A new report on 5G and geopolitics by Oxford Information Labs details the complex landscape of 5G security. Importantly, it draws out how a variety of proven technical concerns around the quality of Huawei security practices and equipment are drowned out by the US' Twitter diplomacy. Critical international dialogue on genuine cybersecurity concerns relating to 5G and Huawei are being lost in the noise of the US-China trade war. more

Berkman Broadband Study: Mixing Passion and Scholarship

Last week, comments were filed with the FCC in response to the Berkman study of international broadband comparisons... Many of the comments were not supportive of the Harvard Berkman study. In an earlier blog posting, we had observed that there appeared to be statistical problems in the Berkman study that would not hold up to peer review. Our comments may have understated the extent of the problems. more

Phishing: the Worst of Times in the DNS

The Anti-Phishing Working Group has released its latest Global Phishing Survey, written by myself and Rod Rasmussen. This report comprehensively examines a large data set of more than 250,000 confirmed phishing attacks detected in 2015 and 2016. By analyzing this cybercrime activity, we have learned more about what phishers have been doing, and how they have done it. Unfortunately, there's more phishing than ever, and phishers are registering more domain names than ever. more

Five Countries are Considering Anti-Spam Laws

The international press is alight with reports of various countries considering privacy and anti-spam legislation. It appears that many countries have arrived at the logical conclusion that after years of supposed 'self regulation'; some marketers must be brought to heel by way of regulation and law, to stop abusive practices. more

Understanding ‘Reverse Domain Name Hijacking’ Under the UDRP

"Reverse Domain Name Hijacking" (RDNH) is a finding that a panel can make against a trademark owner in a case under the Uniform Domain Name Dispute Resolution Policy (UDRP)... While neither the UDRP nor the Rules provide any further details or guidance, the WIPO Overview of WIPO Panel Views on Selected UDRP Questions, Second Edition, provides some insight into the circumstances in which panels have found RDNH. more

45th Anniversary of the First Message Between ARPAnet Computers

Given that CircleID is about "Internet Infrastructure" it would be remiss if there wasn't a mention here that October 29, 2014, was the 45th anniversary of the moment when the first message was sent between two ARPAnet computers located at UCLA and the Stanford Research Institute (SRI). That moment was chronicled well this year by Matt Novak writing on Gizmodo's Paleofuture, complete with photos of the original logs and more. more

The Internet Archive Hops Out of the Copyright Frying Pan Into a New and Different Fire

In 2020 a group of book publishers sued the Internet Archive over their Controlled Digital Lending program, which made PDF scans of books and lent them out from the Archive's website. For books still in copyright, the Archive usually limited the number of copies of a book lent to the number of physical copies of the book they had in storage. Several publishers sued with an argument that can be summarized as "that's not how it works." more

Kentucky vs. 141 Domain Names

Yes, that is a title of a real, current legal case and controversy. And, no, the links in this post are not spam... mostly gambling news sites seem to be reporting on this. The Governor of Kentucky, through his Justice and Public Safety Cabinet, has moved in court to have 141 gambling-related domain names transferred to the Kentucky state government, partially because other legal gambling operations in Kentucky, like horseracing, lose revenue to online gaming. Yes, you read that right: by allegedly violating KY law, the state can move to have property used in these unlawful acts transferred to the state. In this case, the "property" in question is the domain names themselves. This case is definitely novel in the realm of cyberlaw, but also is a bit controversial for how it originally proceeded... more

Ties That Bind

One of the throwaway remarks I sometimes make at conferences is that "Google knows you're pregnant before you do". I can say this because the things you search for will change as your life changes, and search engine providers may well be able to spot the significance of these changes because they aggregate data from millions of people. Now Google's philanthropic arm, google.org, has shown just what it can do with the data it gathers from us all by offering to predict where 'flu outbreaks will take place in the USA. more

Challenges for .brands - Launching Your .brand

One of the consistent themes of this blog series is that despite similarities across .brand TLDs, no two brands will settle on the exact same strategy and process for moving their TLD to launch. As I discussed last week, an implementation plan ensures that each required action is documented, responsibility for it is assigned and a more detailed project plan can be developed to take this process further. more

Topics

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

Threat Intelligence

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days