The argument for end-to-end encryption is apparently heating up with the work moving forward on TLSv1.3 currently in progress in the IETF. The naysayers, however, are also out in force, arguing that end-to-end encryption is a net negative... The idea of end-to-end encryption is recast as a form of extremism, a radical idea that should not be supported by the network engineering community. Is end-to-end encryption really extremist? Is it really a threat to the social order? more
In 2010, ICANN's Security and Stability Advisory Committee (SSAC) published SAC045 [PDF], a report calling attention to particular problems that may arise should a new gTLD applicant use a string that has been seen with measureable (and meaningful) frequency in queries for resolution by the root system. The queries to which they referred involved invalid Top-Level Domain (TLD) queries (i.e., non-delegated strings) at the root level of DNS, queries which elicit responses commonly referred to as Name Error, or NXDomain, responses from root name servers. more
We are all accustomed to purchasing and/or using copyrighted material in one fashion or another. From music, movies-(BluRay), e-books-(Kindle), computers-(software), mobile phones-(iPhone) and games; the umbrella of companies wanting to restrict access to its products continues to grow and become increasingly restrictive. more
Abusive conduct or cybersquatting is the essence of disputes under the Uniform Domain Name Dispute Resolution Policy (UDRP), usually by domain name registrants violating their warranties of registration but also (in appreciable numbers) by trademark holders overreaching their statutory rights. The UDRP remedies are asynchronous: there is forfeiture of offending domain names; for abusive use of the process there is reverse domain name hijacking (RDNH), essentially a shaming remedy that substitutes for a monetary penalty. more
The regulatory environment for brands and retailers that do business online is getting stricter thanks to regulatory changes in Europe with the General Data Protection Regulation (GDPR), as well as existing regulations in the U.S. Companies that adapt quickly can turn these changes into a competitive advantage. As we grapple worldwide with the implications of the incredible amount of personal data generated every day, consumers are pressuring brands and legislators alike for more control over their information. more
On the one hand, the big telcos are chanting the mantram, "We shall not block, impair or degrade any content, service or application." On the other hand, they're saying, "There's no problem. We don't need a law until there's a problem." Well, now. Mitch Shapiro over at IP & Democracy, points to Russell Shaw's post that says: "I have been noticing a growing number of posts in which many Vonage users and Vonage Forum Members have been complaining about the quality of Vonage calls over Comcast broadband connections..." more
If you haven't noticed lately, spam levels around the world have started dropping especially in October after a couple of events occurred. The first is a Russian crackdown on alleged spam king Igor Gusev, thought to be involved in the operations of SpamIt.com. SpamIt mysteriously shut down in late September, perhaps because Gusev caught wind of law enforcement starting to take notice of him. more
Recently Bitcurrent conducted a cloud performance test commissioned by my client Webmetrics, a business unit of Neustar. Bitcurrent describes itself as part blog, part analyst firm and part resource site for the web community. The research project was led by Alistair Croll, a well-known name in the space and program chair for the Cloud Connect conference. more
In spite of having a slow, expensive, government-controlled Internet infrastructure, Cuba is undergoing what Ted Henken and Sara Garcia Santamaria refer to as a digital revolution. The digital revolution might be said to have begun in 2007 when Yoani Sánchez launched her blog "Generation Y." Internet access was difficult -- she would get illegal connectivity at tourist hotels, and the blog was initially hosted in Germany. Soon, the Huffington Post began publishing her posts, and she has subsequently received many international awards, including the Ortega y Gasset Award for Digital Journalism in 2008. more
In mid-August China launched "QUESS" (Quantum Experiments at Space Scale), a new type of satellite that it hopes will be capable of "quantum communications" which is supposed to be hack-proof, through the use of "quantum entanglement". This allows the operator to ensure that no one else is listening to your communications by reliably distributing keys that are then used for encryption in order to be absolutely sure that there is no one in the middle intercepting that information. more
In the past week, Comcast filed an answer, denying all of E360's charges, and attached to it a motion to file a most impressive counterclaim. The court granted the motion on Monday so the counterclaim has been filed. At about the same time, E360 filed its response to Comcast's previous motion to dismiss the suit due to its utter lack of legal merit. more
As many in the ICANN community prepare to depart for the sunny beaches of Cancun, Mexico, it appears the ICANN 76 meeting could be significant when it comes to the long-awaited next application window for gTLDs. It's been over 11 years since applicants were last able to apply for a gTLD (and some of those strings are still launching into the marketplace all these years later), and the community work to review that initial process has never really stopped. more
Domain blocking mechanisms are an important element of an organization's defensive domain strategy. With the introduction of the New Generic Top-Level Domain (gTLD) Program by the Internet Corporation for Assigned Names and Numbers (ICANN) in 2013, brand owners were faced with a new challenge -- protecting their marks without overburdening their budgets. Defensive domain registrations were and still are an effective way in which a brand can protect itself in domain namespaces. more
When visiting a friend in the UK in my student days some decades ago, he asked me at one point in time if I had some coins to keep the electricity meter going. This was the first and last time I saw a coin activated electricity meter. In my mind, prepaid electricity now essentially belonged to a distant past when Scrooge like landlords would make sure renters did not disappear without paying their electricity bills. more
The Anti-Phishing Working Group has released its latest Global Phishing Survey, written by myself and Rod Rasmussen. This report comprehensively examines a large data set of more than 250,000 confirmed phishing attacks detected in 2015 and 2016. By analyzing this cybercrime activity, we have learned more about what phishers have been doing, and how they have done it. Unfortunately, there's more phishing than ever, and phishers are registering more domain names than ever. more
Sponsored byCSC
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byIPv4.Global
Sponsored byRadix
Sponsored byVerisign
Sponsored byWhoisXML API