Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Jurisdiction over Domain Names: Too Much Law Or Too Little?

In the prior issue of CircleID, I described registrations by John Zuccarini. Many of Zuccarini's registrations are typographic variations on well-known domain names, and Zuccarini typically redirects users to sexually-explicit content and pop-up advertisements. Despite scores of UDRP claims and ACPA suits, plus a major case brought by the Federal Trade Commission, Zuccarini's registrations remain in effect -- more than 5,000 strong, in my researchmore

Purpose vs Discovery and the Internet as a Dynamic

I'm writing this in response to the myriad discussions about how to make sure that the Internet continues to "work" despite P2P or whatever the current threat seems to be. Behind much of the discussion is the presumption that the Internet has a purpose in the sense of making some applications like video games and VoIP work. Yesterday we feared modems, today we fear P2P. more

Removing Need at RIPE

I recently attended RIPE 66 where Tore Anderson presented his suggested policy change 2013-03, "No Need -- Post-Depletion Reality Adjustment and Cleanup." In his presentation, Tore suggested that this policy proposal was primarily aimed at removing the requirement to complete the form(s) used to document need. There was a significant amount of discussion around bureaucracy, convenience, and "liking" (or not) the process of demonstrating need. Laziness has never been a compelling argument for me and this is no exception. more

Starlink Has Begun Delivering Promised Latency Cuts

In his January 12 SpaceX update, Elon Musk said the biggest goal for Starlink from a technical standpoint is to get the mean latency below 20 ms. He expanded by saying that given the speed of light, 8 ms is the absolute minimum latency for a satellite at 550 km. He believes they can optimize terrestrial and inter-satellite links, and minimize queueing delays and dropped packets, to recude the the rest of the time to below 10 ms. more

Europe is to the US Controlled GPS as Europe is to the US Controlled DNS Root?

An Analogy: Europe is to the US controlled GPS as Europe is to the US controlled DNS root? That's not a very good title is it? But it does express the point I want to make. This week the European Union launched the first satellite of its own global positioning system, Galileo. One has to wonder why the Europeans feel they need to do this. Isn't the GPS system run by the United States a perfectly good system? more

8 Reasons Why Cybersecurity Strategy and Business Operations are Inseparable

In modern society, there is one fact that is unquestionable: The hyper-connectivity of the digital economy is inescapable. A financial institution without an online presence or omni-channel strategy will cease to be competitive. Universities (for-profit or non-profit) must develop and continuously evolve their online learning capabilities if they are to stay relevant. Online retailers are quickly outpacing and rendering their 'brick-and-mortar' counterparts irrelevant. more

Social Networking and Web 2.0 Creating DNS Performance Issues for Carriers

A revolution is taking place on the Internet, with new sites redefining how we interact online. The next-generation Internet is emerging in collaborative and interactive applications and sites with rich, varied media (images, video, music). As with many revolutions, this one is driven by the younger generation, which is adopting social networking sites like MySpace and video sharing sites like Google's YouTube. But the general shift is not restricted to the young, as more mature consumers and businesses alike are exploring the possibilities of collaborative, media-rich applications. This major shift in Internet applications has its unintended victims. One of them turns out to be the Domain Name System (DNS). more

She Gave Me a Fake Phone Number!

The Intellectual Property Constituency, meeting at the ICANN conference in Vancouver, was interested in increasing ICANN's budget not because they thought they deserved it, but because they wanted ICANN to actually enforce the rules on the books about fake registrations. Now there's some evidence about how prevalent that is. If there's any surprise here, it's that the numbers are so low. more

Internet Governance Outlook 2020: The Next Generation of Players and Problems Is Coming

The beginning of a new decade is always an invitation to have a broader look into the future. What, in the next ten years, will happen in the Internet Governance Ecosystem? Will the 2020s see the usual swinging pendulum between more liberal and more restrictive Internet policies in an interconnected world? Or will we move towards a watershed? more

Technical Community Calls for Stronger, Smarter Internet Governance in New Global Report

As industry watchers know, the UN's World Summit on the Information Society (WSIS+20) review marks a pivotal moment that will shape internet governance well into the 2030s and beyond. In response, the team at CIRA has published a new report, emphasizing why the multistakeholder model should not only be protected, but refreshed and reinvigorated for the challenges that lie ahead. more

JET Guidelines for Internationalized Domain Names

It is difficult to explain RFC 3743 or commonly known as the Joint Engineering Team (JET) Guidelines without some lesson on Chinese, Japanese and Korean (CJK), particularly how it relates to Internationalized Domain Names (IDN). Luckily, an Internet-Draft we wrote back in 2001 discusses the issues quite neatly in this context. In brief, Chinese characters (Hanzi) or Han ideographs are evolved from pictographs (writing made up of pictures) across thousands of years. Unlike other writing systems, Han Ideographs are constantly evolving.  more

SQL Injection in the Wild

As attack vectors go, very few are as significant as obtaining the ability to insert bespoke code in to an application and have it automatically execute upon "inaccessible" backend systems. In the Web application arena, SQL Injection vulnerabilities are often the scariest threat that developers and system administrators come face to face with (albeit way too regularly). more

Phishers Now Targeting Domain Registrars

This is an issue of some concern and should be watched carefully: phishers are now trying to get passwords of domain registrants (domain owners). Currently, correspondents inform me that GoDaddy is the target, but there's no reason to think the phishers won't expand to other registrars. Normally, phishers go after bank accounts or other financial information, or sometimes the online accounts of users so that they may send spam. It's not known precisely why phishers are after domain registration information, but the possibilities are chilling... more

Measuring IPv6 - Country by Country

Some years ago a report was published that ranked countries by the level of penetration of broadband data services. You can find the current version of that report at the OECD web site. This ranking of national economies had an electrifying impact on this industry and upon public policies for broadband infrastructure in many countries. Perhaps this happened because there were some real surprises lurking in the numbers at the time. more

Should WSIS End? A Call for Discussion

The future of the World Summit on the Information Society (WSIS) process will be one of the main topics of the 2025 Internet Governance Forum. Many in the IG community are heavily invested in the renewal of WSIS. They imply that if it is not renewed, there will be major, negative effects on the way we govern the Internet. IGP believes that it is healthy and productive for the community to consider the possibility of ending WSIS. more

Topics

DNS Security

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days