What is the current state of DNSSEC deployment around the world and also in Africa? How can you deploy DNSSEC at a massive scale? What is the state of using elliptic curve crypto algorithms in DNSSEC? What more can be done to accelerate DNSSEC deployment? Discussion of all those questions and much more can be found in the DNSSEC Workshop streaming live out of the ICANN 55 meeting in Marrakech, Morocco, on Wednesday, March 9, from 9:00 to 15:15 WET. more
I've got enormous respect and admiration for the passionate individuals who are still championing .brands for their organisations in the new Top-Level Domain (TLD) program. I have the pleasure of assisting quite a few of these on a daily basis and I'm sure their experiences aren't isolated with other applicants across the globe. Put yourself in their shoes. Delays, some stupid process called Digital Archery, GAC Advice, names collisions and negative media... more
Are you doing something interesting with DNS, DNSSEC, or routing security that you would like to share with the larger DNS community at the ICANN 76 meeting in March 2023? If so, please send a brief (1 -- 3 sentence) description of your proposed presentation to [email protected] by the close of business on Friday, 20 January 2023. Are you doing something interesting with DNS, DNSSEC, or routing security that you would like to share with the larger DNS community at the ICANN 76 meeting in March 2023? more
Evolution isn't just about biology. Our focus on biology is part of the world-wide challenge in getting people to understand how systems evolve. Think of the resistance Galileo faced when he said that the universe didn't, literally, revolve round us. One reason people have difficulty accepting undirected evolution is that educators don't give people a good sense of why things "work". It's a difficult problem because we tend to look for a "reason" for why things are the way they are... more
I recently caused a stir in a small but passionate community. I was speaking about a topic I've discussed many times before: the need for more effective public input into the Internet Corporation for Assigned Names and Numbers, the nonprofit corporation that controls the Internet's protocols, addresses and domain name system. "We want public input into ICANN," I had said at a conference at Oxford University. Then, I referred to ICANN's new At-Large Advisory Committee, set up to foster public input and on which I sit: "We've got a mechanism where (the public) can have a seat on the task forces, liaisons to working groups, be part of the policy making process -- I see that in many ways as more important than having a seat on the board." more
In a recent talk at Black Hat, Apple's head of security engineering (Ivan Krsti?) described many security mechanisms in iOS. One in particular stood out: Apple's Cloud Key Vault, the way that Apple protects cryptographic keys stored in iCloud. A number of people have criticized Apple for this design, saying that they have effectively conceded the "Going Dark" encryption debate to the FBI. They didn't, and what they did was done for very valid business reasons -- but they're taking a serious risk... more
ICANN critics often focus on ICANN's expenditure. The organisation's overall budget had been growing for years prior to the new TLD program launch. However with the new TLD launch it mushroomed very quickly, with the organisation collecting $185k per application. With 1930 applications that gave them $357,050,000 ... ICANN's overall budget is big and how it decides to spend that money will always be subject to quite a bit of scrutiny. more
Danny Sullivan has been the go-to guy for understanding the world of search for over 15 years. This week he published a really good story on Google Plus Your World. A group of engineers have launched a site called Focus on the User that shows exactly how the new Google service could be including other social media content listings besides only Google Plus, but is not. more
The members of the ICANN community engaged in the work of the Cross Community Working Group on Enhancing ICANN Accountability (CCWG-ACCT, or just plain "CCWG" for this article) has been engaged since late 2014 in designing an enhanced ICANN accountability plan to accompany the transition of oversight of the IANA root zone functions from the National Telecommunications and Information Administration (NTIA) to the global multistakeholder community. On August 3rd the CCWG released its 2nd Draft Report (Work Stream 1) for a public comment period that closed on September 12th. more
As few as seven years ago, cyber-threat intelligence was the purview of a small handful of practitioners, limited mostly to only the best-resourced organizations - primarily financial institutions that faced large financial losses due to cyber crime - and defense and intelligence agencies involved in computer network operations. Fast forward to today, and just about every business, large and small, is dependent on the Internet in some way for day-to-day operations, making cyber intelligence a critical component of a successful business plan. more
Are you interested in helping guide the future of the Public Interest Registry (PIR), the non-profit operator of the .ORG, .NGO and .ONG domains? Or do you know of someone who would be a good candidate? If so, the Internet Society is seeking nominations for three positions on the PIR Board of Directors. Read more for details if you are interested in being considered as a candidate or know of someone who should be considered. more
Last week there was a flurry of stories about China's 3G plans after Jonathan Dharmapalan of Ernest & Young was quoted as saying he expected it to take 12 to 24 months from the start of China's commercial TD-SCDMA trials, i.e. from now, until 3G licenses were issued. But there was little analysis or comment on what's really happening. 3G licenses are a formality. They delay the deployment of 3GSM & CDMA 2000 which could otherwise happen rapidly -- just plug new cards into existing radios and offer established handsets (already being manufactured, in China, for the world market). more
2014 will be remembered as the year of the "multistakeholder model" on the Internet. NTIA demonstrated its commitment to bottom-up, multistakeholder Internet governance by committing to complete the transfer of responsibility for various technical functions -- known as the IANA Functions -- to the multistakeholder community. NTIA called on ICANN to convene the community to develop a transition plan to accomplish this goal. more
The debate over so-called "closed generic" top-level domains has revealed that rarest of semi-mythical beasts, a creature often emblazoned in ICANN heraldry but as elusive as the unicorn on the UK royal coat of arms: an argument on principle. Occasionally an issue arises out of the muck of self-interested manoeuvring to reveal the deep idealism that moves most ICANN participants. You can see it by how it divides camps that usually march along in lock-step, and by how the predictable murmur of shopworn cliches is replaced by arguments of clarity and resonance. more
It, perhaps, does not have to be said that cybersquatting is an intentional tort. No one would expect the respondent to admit unlawful intention, but complainant's proof must nevertheless support that contention. The Panel in Hästens Sängar AB v. Jeff Bader / Organic Mattresses, Inc. FA2005001895951 (Forum July 31, 2020) reminds us that it takes more than bad faith use of a domain name to find cybersquatting. more
Sponsored byRadix
Sponsored byCSC
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byIPv4.Global
Sponsored byWhoisXML API
Sponsored byVerisign