Muscle memory is a funny thing. We don't even think about it really, but when we do the same thing over and over again, it just becomes second nature to us. This is how we've come to use WHOIS over the past two decades to get contact information for registered domain names. If you wanted to see who owned a domain, you'd simply do a WHOIS search. I've probably done hundreds of thousands of them during my time in the industry. Well as of this week, a major step in the retirement of WHOIS officially took place. more
Undersea cables between the U. S. and Cuba have long been intertwined with politics. In 1887, The New York Times reported on the inauguration of a cable in support of the Cuban insurgents fighting for independence from Spain -- a precursor to the Spanish-American war. Phone service between the U.S. and Cuba began in 1921 with AT&T's installation of an undersea cable and AT&T dominated international telephony to Cuba until the 1990s. more
I can hardly believe it's that time of year again -- time for our annual top 10 year in review. Having been at this for more than 20 years, you'd think I'd seen it all? But with the domain name industry, things are always in flux, and I could never have predicted some of these items. So without further ado -- here are the top 10 biggest stories from 2022. more
The Microsoft action against 3322.org, a Chinese company, started with the news that computers were infected during the production phase. Stepping away from the controversy surrounding the approach, there are important lessons that cyber security officials and upper management, deciding on the level of and budget for cyber security in organisations should learn and take into account. I'm writing this contribution from a premise: China uses the fact that most IT devices are built in China to its advantage. Allow me to start with an account from personal memory to set the stage. more
The widely publicized auction of the domain name KerryEdwards.com ended Saturday night, but the search for a new owner continues. According to Matt Bentley, CEO of Sedo.com, the domain name brokerage managing the sale, a key bidder withdrew at a late stage in the auction, leaving the domain up for grabs among the dozen or so parties who had expressed a serious interest in purchasing the domain. more
Over the past decade Simplified Chinese has grown to become one of the most popular languages on global websites, second only to English. According to the Web Globalization Report Card, which has long monitored languages supported by the world's leading brands, Chinese was seen on only about six out of ten websites in 2006. Today, it is seen on virtually every global website. more
The Internet is in for interesting times. Previously, on Renysys' blog I wrote about the engineering issues and the policy issues facing us over the next five years. But there is at least one large issue still lurking. Most of you will not be surprised to learn that almost all of these issues are outgrowths of a single factor: money. The core of the Internet still doesn't have a sustainable business model. more
Audacity by federal policy makers can be admirable, at least in some cases, but it can a bit more problematic in others. A case in point is the Food and Drug Administration's "deeming" of the internet to be a tobacco product. The FDA explained that it was exercising its authority under the Family Smoking Prevention and Tobacco Control Act which gave the agency an extensive set of duties, responsibilities and authorities over "tobacco products." more
When I read government arguments in defense of the NSA, an oft-repeated line was: We're not targeting Americans. We're targeting foreigners. Foreigners. I really dislike that word. And I'm sure companies like Apple, Google and Facebook do as well. Why? more
n 2004 Jaynes became the country's first convicted spam felon under the Virginia anti-spam law. He's been appealing his conviction ever since, most recently losing an appeal to the Virginia Supreme Court by a 4-3 decision in February. As I discussed in more detail at the time the key questions were a) whether the Virginia law had First Amendment problems and b) whether Jaynes had standing to challenge it. The court answered No to b), thereby avoiding the need to answer a), the dissent answered Yes to both. more
There have been a number of occasions when the Internet Engineering Task Force (IETF) has made a principled decision upholding users' expectations of privacy in their use of IETF-standardised technologies. (Either that, or they were applying their own somewhat liberal collective bias to the technologies they were working on!) The first major such incident that I can recall is the IETF's response to the US CALEA measures. more
Network neutrality is important in the context of assuring the opportunity to innovate in how we communicate and connect. We can't define it in terms of specific outcomes but rather in terms of what we enable. The Internet is just one example of what we can do when given the opportunity to use software to fashion our own solutions... I thought about this more when I found myself in my hospital room (after knee surgery) unable to open and close the shades by myself. But yet I could control the lights in my house! more
Domain name owners have traditionally complained that ICANN does not listen to us, and there is indeed plenty of evidence demonstrating the group’s obliviousness to community input. Nevertheless, as domain owners, we need to begin giving ourselves a share of blame too. It’s time to reflect on our failures so we can come up with an actionable solution... more
I have written about the problems with the "little green lock" shown by browsers to indicate a web page (or site) is secure. In that article, I consider the problem of freely available certificates, and a hole in the way browsers load pages. In March of 2017, another paper was published documenting another problem with the "green lock" paradigm - the impact of HTTPS interception. more
The Trademark Act of 1946 defines trademarks and service marks to include "any word, name, symbol, or device, or any combination thereof." Marks composed of lexical and numeric elements (as opposed to images) also can be described as strings of characters. Before the Internet there was no commercial use of such strings other than as marks, but the functionality of the Internet depends on strings of lexical and numeric characters in the form of domain names that serve as electronic addresses. more
Sponsored byVerisign
Sponsored byCSC
Sponsored byDNIB.com
Sponsored byRadix
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byWhoisXML API