Last night there was apparently a big event in Paris at the Eiffel Tower (Champs de Mars) and there were plenty of photos shared by the brands, companies and people in attendance.
But what's really impressive is that they were able to get the message up on the side of one of Paris' best known monuments -- the Eiffel Tower. How? The City of Paris is behind the domain extension - so that's "how". more
In two recent debate events I participated in, on iFreedom and privacy in the online world, mistrust of government and government's intentions and motivations on and towards the Internet were abundantly present with more than just a few people in the audiences. The emotions were not new to me, no, it was the rationality that surprised and sometimes almost shocked me. Why? Well, should these sentiments get the support of the majority of people, it would undermine all legitimacy of a government to govern. Let's try and take a closer look. more
Think of trademarks situated on a continuum with famous and well-known at one end and less well-known or unrecognized by average consumers at the other. On one end there is certainty of infringement... at the other end, certainty of having the complaint denied either for lack of proof or overreaching... At some point along the continuum, it becomes uncertain whether respondents registered accused domain names in bad faith, and the question has to be answered by examining the facts. more
The Domain Name System has always been intended to be extensible. The original spec in the 1980s had about a dozen resource record types (RRTYPEs), and since then people have invented many more so now there are about 65 different RRTYPEs. But if you look at most DNS zones, you'll only see a handful of types, NS, A, AAAA, MX, TXT, and maybe SRV. Why? A lot of the other types are arcane or obsolete, but there are plenty that are useful. more
The year 2017 turned out to be a record-setting year for domain name disputes, in two ways: The number of complaints filed as well as the total number of domain names in those complaints. Specifically: The number of cases at WIPO crept up to 3,073 from 3,036 in 2016 (the previous record), a modest gain of just over 1 percent. Those cases included 6,370 domain names, up from 5,354 in 2016 (also a record-setting year), a spike of nearly 19 percent. more
As reported last July, there is a proposal from some Flemish politicians to create a .vla top level domain under the new gTLD process launched by ICANN. The proposal further elaborated that the Flemish government would have to cover the costs. Not so fast, says the Flemish government... more
This is a follow-up to my previous post on Cybersecurity and the White House. It illustrates an actual cyberwarfare attack against Estonia in 2007 and how it can be a legitimate national security issue. Estonia is one of the most wired countries in eastern Europe. In spite of its status of being a former Soviet republic, it relies on the internet for a substantial portion of everyday life -- communications, financial transactions, news, shopping and restaurant reservations all use the Internet. Indeed, in 2000, the Estonian government declared Internet access a basic human right... more
ICANN is the only institution with responsibility for the functioning of DNS. And so it is natural that when there is a DNS problem for people to expect ICANN to come up with the solution. But having the responsibility to act is not the same as having the ability. Like the IETF, ICANN appears to have been designed with the objective of achieving institutional paralysis. And this is not surprising since the first law of the Internet is 'You are so not in charge (for all values of you). more
Here at the Anti-Phishing Working Group meeting in Hong Kong, we've just released the latest APWG Global Phishing Survey. Produced by myself and my research partner Rod Rasmussen of Internet Identity, it's an in-depth look at the global phishing problem in the second half of 2013. Overall, the picture isn't pretty. There were at least 115,565 unique phishing attacks worldwide during the period. This is one of the highest semi-annual totals we've observed since we began our studies in 2007. more
Arthur C. Clarke said any sufficiently advanced technology is indistinguishable from magic. Milton Friedman said there's no such thing as a free lunch. The validity of the former statement does not invalidate the later. From this we can see that even magic has a price. Hence, its application is subject to cost-benefit analysis. There are many developing technologies that may eventually qualify as magic. more
Mail software consists of a large number of cooperating pieces, described in RFC 5598. A user composes a message with a Mail User Agent (MUA), which passes it to a Mail Submission Agent (MSA), which in turn usually passes it to a sequence of Mail Transfer Agents (MTAs), which eventually hand it to a Mail Delivery Agent (MDA) to place it in the user's mail store. If the recipient user doesn't read mail on the same computer with the mail store (as is usually the case these days) POP or IMAP transfers the mail to the recipient's MUA. more
Congratulations on your appointment as the next CEO of ICANN, and welcome to our little rogues' gallery. Some denizens of this domain (your humble author included) may strike you as a little odd at first, but we're mostly harmless. We usually steer first-timers onto the Newcomers track, but in your case, that may be... inadequate. And while we would never presume to tell you how to do your job -- which may be one of the world's hardest - we thought we might offer a few pieces of friendly advice, based on our time here. more
The Internet Society today announced the launch of a survey to gain greater insights into multistakeholder governance perceptions and processes at all levels - national, regional, and international. The questionnaire is open to all interested participants and is available until 30 September 2013. The survey is one component of the Internet Society's broader initiative focused on the open and sustainable Internet. more
I read this to the ICANN Board Thursday morning, in Sydney, after more prep work than I care to recall. If you don't know that the DAGv3 is delayed, or what the IRT is, this is a good time to bush up on current ICANN state. "Good morning. My name is Eric Brunner-Williams, and I am speaking to you on behalf of the initial signatories of the Step-by-Step proposal. I represent one of the signatories as the principal of the native, aboriginal, and indigenous cultural and linguistic Top-Level Domain (TLD) project, one of many similar efforts to preserve living languages and cultures..." more
Australians may lose their right to privacy online if the attorney-general has her way. Nicola Roxon's discussion paper is before a parliamentary inquiry. Proposals include storing the social media and other online and telecommunications data of Australians for two years, under a major overhaul of Australia's surveillance laws. The government passed a toned down version of these proposals last week, giving police the power to force telcos to store data on customers for a specific period while a warrant is sought. more
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byCSC
Sponsored byIPv4.Global
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byRadix