Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

History is Written and Revised by the Winners - Can the Internet Archive Change That?

I was naively optimistic in the early days of the Internet, assuming that it would enhance democracy while providing "big data" for historians. My first taste of that came during the Soviet coup attempt of 1991 when I worked with colleagues to create an archive of the network traffic in, out and within the Soviet Union. That traffic flowed through a computer called "Kremvax," operated by RELCOM, a Russian software company. The content of that archive was not generated by the government or the establishment media -- it was citizen journalism... more

Registration Operations Workshop (ROW) at IETF-93: RDAP as a Successor of Whois

The next Registration Operations Workshop will take place at the start of IETF 93 on Sunday, July 19th, 2015. The focus of this workshop is on the Registration Data Access Protocol, the successor of Whois. RDAP is a combined protocol for IP addresses and names registration data. Therefore, we are expecting both domain names and RIR communities to attend the workshop. more

Worldwide Broadband Trends as the World Wide Web Turns 30

Hootsuite is the premier tracker of social media usage around the world. They publish numerous reports annually that track broadband statistics and social media statistic from around the world. They report the following statistics for the end of 2018. The world has been seeing one million new users online every day since January 2018. That means there are 11 new users on the web every second. There are now 5.11 billion mobile subscribers in the world, 67% of the world's population. more

Are Domain Names Contract of Services or Property Rights?

There are several perspectives from which one can give various answers to the question of 'what are domain names?'. Originally the domain name system started and continues to be a human-friendly way of addressing to a set of machines or specific machine connected to the Internet. Hence, from the technical perspective, a domain name is simply an address consisting of a combination of alphanumeric and symbols to communicate with a machine which also happens to be hosting certain services in form of data and information on it. more

The Digital Decade – A Look Back

With 2019 coming to a close, we're not just saying goodbye to the past 365 days, we're also saying goodbye to an entire decade. As we bid farewell to the 2010s, we're taking this opportunity to look back and reflect on the digital decade as well as consider what the future might have in store for us all. The past ten years were a whirlwind of change, with new advances in technology exploding onto the market at a faster pace than ever before. more

The Challenge of DNS Security

When the domain name system (DNS) was first designed, security was an afterthought. Threats simply weren't a consideration at a time when merely carrying out a function - routing Internet users to websites - was the core objective. As the weaknesses of the protocol became evident, engineers began to apply a patchwork of fixes. After several decades, it is now apparent that this reactive approach to DNS security has caused some unintended consequences and challenges. more

Breaking the Internet’s Consensus Rule

The Internet, ultimately, is a fragile thing, as an entity. It depends upon the consensus of those responsible for its infrastructure to operate on a daily basis. Because of the inherent robustness as a technical architecture, there is no entity that can "break the Internet" in the sense of stopping the flow of traffic, but there are several entities that can create a variety of inconveniences, some minor and some serious, for the millions who use the Internet. more

Responding to “The Case for Regulatory Capture of ICANN”

This past Monday, as ICANN65 was beginning in Marrakesh, the technical review blog Review Signal published a detailed expose, "The Case for Regulatory Capture of ICANN" authored by site founder and "geek-in-charge" Kevin Ohashi. The post was clearly the product of extensive investigative reporting – and what it reveals is deeply disturbing. more

Nothing to See Here

Three parallel events in US communications policy today, all reported on widely - but with a common thread. ... Law enforcement and national security officials want to make sure that they have the same ability to execute warrants and surveillance orders online that they had in the switched-telephone-circuit age -- which will mean substantial government design mandates for new software, hardware, and communications facilities. more

ESP Compromises and Their Lack of Security

Over at Word to the Wise, Laura Atkins has a post up where she talks about the real problem with ESPs and their lack of internal security procedures which resulted in the breach of many thousands of email addresses (especially Epsilon). However, Atkins isn't only criticizing ESP's lack of security but also the industry's response wherein they have suggested countermeasures that are irrelevant to the problem.  more

10/2 & Innovations for Internationalized Domain Names

According to the 10/10 rule, it takes about a decade to take a product from initial idea to having a standard developed, and then another decade to reach mass market adoption. How can that second decade be reduced in the case of Internationalized Domain Names and their adoption by Internet users? The most effective way to speed up IDN mainstream adoption is learning from history. more

The UDRP and Judicial Review

The courts of the United Kingdom have set themselves outside the mainstream of Internet consensus policies on trademark/domain name disputes. A U.K. court decision regarding the UDRP reflects an unfortunate tendency to overlook one of the fundamental principles of the UDRP, namely the opportunity to seek independent resolution of a trademark/domain name dispute by court proceedings. more

On Search Neutrality

In recent months there's been a robust and apparently well-funded debate about the legal status of search engine results, in particular Google's search results. On Tuesday, Tim Wu, a well-known law professor at Columbia weighed in with an op-ed in the New York Times, arguing that it's silly to claim that computer software has free speech rights. Back in April, equally famous UCLA professor Eugene Volokh published a paper, funded by Google, that came to the opposite conclusion... more

ICANN Hires Black Hat Founder as New CSO

ICANN has apparently hired Jeff Moss (aka Dark Tangent) as CSO. Moss is a well known figure in the internet security community and was founder of Black Hat and the Def Con conferences. However isn't Moss a bit conflicted? Isn't he on one of the review teams? more

Inquiring About the “Unthinkable”

There has been no shortage of speculation within the ICANN community regarding the continued show down between the ICANN Board and its Governmental Advisory Committee (GAC) over new generic Top-Level Domains (gTLDs) and the pending expiration of the IANA contract this September. Now one of the more interesting topics of discussion that I have had with multiple independent parties was the potential of ICANN making changes to the L root zone file... more

Topics

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

DNS Security

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days