Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Good Study by UCSD on Economic Realities of Spam and Profit Motives

I recently had a chance to read a report titled, "Show Me the Money: Characterizing Spam-advertised Revenue" produced as a joint effort from the University of California, San Diego (UCSD), International Computer Science Institute, and UC Berkeley by Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorson, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey M. Voelker and Stefan Savage. I also had a chance to hear Chris Kanich speak about the topic - Show Me The Money! This post contains my notes with some photos taken from that report. more

Good is Better than Perfect in ICANN Accountability

In the next few months, ICANN will have a concrete opportunity to improve its accountability and transparency by enacting the recommendations of the Accountability and Transparency Review Team (ATRT). Those recommendations may not be perfect, but if the history of the ICANN process is any indication, we can't afford to let the perfect be the enemy of the very good. more

We’re Almost There… IANA Stewardship Transition

Since Friday, I have been listening to and, yes, talking to many in Dublin who are engaged in the multistakeholder effort to transition the IANA functions. Our goal is an orderly transition that both reaffirms the strength of the global multistakeholder model while protecting and preserving the coordinated, well-functioning administration of the unique identifiers that are the core of the technical genius of the Internet. more

IP Addresses and Privacy Sensitive Data - A Level Playing Field Needed

Reading Peter Olthoorn's book on Google (a link is found here), I ran into a passage on IP addresses. Where Google states that it does not see an IP address as privacy sensitive. An IP address could be used by more than one person, it claims. The Article 29 Working Party, the EU privacy commissioners, states that it is privacy sensitive as a unique identifier of a private person. It got me wondering whether it is this simple. Here is a blog post meant to give some food for thought and debate. I invite you to think about the question 'how private is an IP address'? more

Censorship, Email and Politics

Spamfiltering blocks email. This is something we all know and understand. For most people, that is everyone who doesn't manage an email server or work in the delivery field or create spamfilters, filtering is a totally unseen process. The only time the average person notices filters is when they break. The breakage could be blocking mail they shouldn't, or not blocking mail they should. more

Domain Name Resale Market a Haven for Phishers?

In a recent article at TechWeb, the following observations were made: "Internet addresses that appeal to identity thieves eager to rip off consumers are being posted by major domain resellers... Finnish-based F-Secure has identified more than 30 registered domain names for resale that would be of interest only to the legitimate holder of the trademark or to phishers..." more

Minding the Gap at the ITU-T

In 1992, Theo Irmer who had served as the organization's director for the previous eight years during its glory days, wrote that if there was any hope of saving what was left of the body, it must be privatised. That never occurred. Everyone pretty much left and migrated to dozens of other venues where all the world's information and communication technology standards have long been created and evolved. Essentially every major nation moved to competitive, private, marketplace-driven provisioning of communication products and services. more

Making Network Neutrality Sustainable, Revisited

Today FCC Chairman Genichowski announced that the FCC's Network Neutrality Proceeding is entering the rule-making stage. This is a historic milestone, worth celebrating, but the milestone is on a road with hairpin turns. If you look directly above us, you can see we're in almost exactly the same place we used to be when the pro-competition provisions of the 1996 Telecom Act were intact and the distinction between telecommunications service and information service was meaningful, but now we are a lot lower. more

Studying .BRAND New gTLDs

Many participants in the latest ICANN meeting in Copenhagen asked that same question: "when is the next round of the ICANN new gTLD program?". If the question came from new gTLD service providers, I also noticed that it was different from "the first round": now the question focuses more on .BRANDs rather than Generic TLDs dedicated to selling domain names. The question also comes more from representatives of certain Trademarks who want to acquire a .BRAND domain name extension. more

New ICANN Requirements for New gTLDs Are Irrelevant

ICANN is barking up a number of wrong trees with the latest version of its Evaluation and Questions Criteria for generic top-level domains (gTLDs). The document asks for financial projections, the applicant's goals for its TLD, and the benefits the applicant expects to derive. All that information is meaningless. more

Nominations Open for 2024 Public Interest Registry (PIR) Board of Directors

Are you interested in helping guide the future of the Public Interest Registry (PIR), the non-profit operator of the .ORG, .NGO and .ONG domains? (and more) Or do you know of someone who would be a good candidate? If so, the Internet Society is seeking nominations for two positions on the PIR Board of Directors. The nomination deadline is 31 January 2024. more

Putin’s Iron Firewall Is Porous

In 1946 Winston Churchill declared that Russia had lowered an iron curtain across Europe, and in 2022 Vladimir Putin created an iron firewall between the Russian Internet and media and the rest of the world, but, like its precursor, it is porous. Information wants to be free. more

A Look at Mail Patterns from Legitimate Webmail Sources

For many years, I have tracked spam from botnets and reported on it. I have analyzed those botnets' distribution patterns by number of IPs, number of messages per email envelope and geographical distribution. While spam from botnets is interesting, and the main source of spam, it is not the only source of spam. What about spam that originates from the MAGY sources? more

How Frequently Do Botnets Reuse IP Addresses?

I wonder how much botnets reuse IP addresses. Do they infect a system and spam, get blocked, discard the IP and move onto the next (new) one? This means that they have a nearly unlimited supply of IP addresses. Or do they infect a system and spam, get blocked, and then let it go dormant only to awaken it some time later? I decided to take a look. more

Green Dam is Breached… Now What?

As a number of China hands predicted, the Chinese government has postponed its mandate requiring that all computers sold in China must include the Green Dam -Youth Escort censorware by today. Yesterday after the news broke I told the Financial Times: "There's been this impression in the internet industry that when the Chinese government makes a demand, they have to roll over and play dead. The lesson here is that's not necessarily the case." more

Topics

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

DNS Security

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days