Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Government Advisory Committee (GAC) Beijing Communiqué Inconsistent With ICANN’s gTLD Policy

The GAC Communiqué recommends that ICANN implement a range of regulations (which the GAC calls "safeguards") for all new generic top-level domains (gTLDs) covering areas ranging from malware to piracy to trademark and copyright infringement. The GAC proposes specific safeguards for regulated and professional sectors covering areas as diverse as privacy and security, consumer protection, fair lending and organic farming. Finally, the GAC proposes a "public interest" requirement for approval of new "exclusive registry access" gTLDs. more

In Praise of ICANN

ICANN comes in for a lot of criticism. That's because people care very deeply about it. The multi-stakeholder model, of which ICANN is the exemplar, is such a radical and revolutionary departure from how global affairs have been managed in the past that many of us are constantly on guard lest ICANN degrade into the command-and-control structure that characterizes other global regulatory bodies. At ICANN, it's the volunteers, those who care (as well as, yes, those who are paid to pretend to care) who set policy more

Home Broadband and the Cloud

I'm not sure that most people understand the extent to which our online experience has moved to the cloud -- and this movement to the cloud means we're using a lot more bandwidth than in the recent past. A huge number of online functions now reside in the cloud, when only a few years ago, a lot of processing was done on our computers. Take the example of Twitter, where I keep an account to upload a copy of my blog every day. more

Cuba Reaches Five Million Mobile Accounts

Cubans now have 5 million mobile accounts. The five-millionth account was recently opened Guanabacoa, in the eastern part of Havana and we see here that growth slowed last year, but has resumed -- perhaps due to increased 3G availability. Most Cubans have 2G phones, which are used primarily for making calls and sending text messages that may have attached images. more

DNS, My God It’s Full of Stars…

Since my last post about DNS subversion we have had some good feedback. We had 29 responses, I agree a small sample, but what we found is very interesting. Let's remind ourselves of what we are looking at? Does your ISP redirect DNS queries? Specifically, if you try to make a port 53 UDP or TCP connection to a server outside of your ISP's network does it get there? more

The Danger of Weaponising the DNS in the Ukraine Russia Conflict and Good News

As we watch the Ukraine and Russia conflict over boundaries and territories, I chanced upon a YouTube video showing the region of Europe and how, for the last 1000 years, national boundaries and names of nations have changed where in 1142, you had nations like Muslim Spain, Kievan Rus. In 1143 the Kievan Rus included modern-day Ukraine and Crimea, and in 1163 bulk of Central and Southern Europe was the Holy Roman Empire... more

How Do You Turn a Typesetting Language Into an Identifier System? (Not Easily)

Unicode's goal, which it meets quite well, is that whatever text you want to represent in whatever language, dead or alive, Unicode can represent the characters or symbols it uses. Any computer with a set of Unicode typefaces and suitable layout software can display that text. In effect, Unicode is primarily a typesetting language. Over in the domain name system, we also use Unicode to represent non-ASCII identifiers. That turns out to be a problem because an identifier needs a unique form, something that doesn't matter for typesetting. more

Why Over Compliance With Sanctions at Internet Infrastructure Level Can Have Devastating Effects on Ordinary People

On Friday, Mykhailo Fedorov, Ukraine's digital transformation minister, asked Cloudflare and Amazon to stop serving Russian web resources and protecting Russian services. He said in a tweet that Ukraine was "calling on Amazon to stop providing cloud services in Russia." He also said that "Cloudflare should not protect Russian web resources while their tanks and missiles attack our kindergartens." more

5 Myths About DMCA ‘Take-Down’ Notices

The so-called notice-and-take-down provisions of the Digital Millennium Copyright Act (DMCA) provide both a very effective tool for copyright owners to get infringing content removed from the Internet as well as an important protection for service providers (such as website hosting companies) that may inadvertently publish infringing material, either directly or via user-generated content. more

How Open Cloud Could Have Saved Sidekick Users’ Skins

The cloud computing scandal of the week is looking like being the catastrophic loss of millions of Sidekick users' data. This is an unfortunate and completely avoidable event that Microsoft's Danger subsidiary and T-Mobile (along with the rest of the cloud computing community) will surely very soon come to regret. There's plenty of theories as to what went wrong -- the most credible being that a SAN upgrade was botched, possibly by a large outsourcing contractor, and that no backups were taken... more

Draft 0.5 of the New gTLD Applicant Guidebook

We all remember the nightmare of following the multiple versions of the "AGB" from the ICANN new gTLD program, and the time it took to get to the final version, which then took to allowing applicants to submit their new gTLD application, and which then took them to wait for their application to proceed... Welcome to version 0.5 of the next Applicant Guidebook. more

The Importance of IPRC in Asia Pacific

I believe and strongly support Internet Principle and Right Coalition (IPRC) Charter is an important edition of document supplementing the principles and rights of individual internet users in any developing and least developed country. Especially in Asia Pacific region where the need and use of such document is immense, as there is a gap in recognition and awareness of rights of internet users. more

Closing in on the Google Hackers

Joseph Menn has an article on CNN.com wherein the crux of the story is that US experts are closing in on the hackers that broke into Google last month. It is believed by some that the Chinese government sponsored these hackers. China, naturally, denied involvement. My own take is that tools today are sophisticated enough such that you don't necessarily need state sponsorship in order to launch a cyber attack. more

What to Expect at ICANN 59, Johannesburg

I'm excited! Not because of the 30 hours that it will take me to get to Johannesburg, but because this ICANN meeting will be the second time we've put the Meeting B Policy Forum to the test. If the second time is a charm then hopefully we'll have cemented the Policy Forum into the ICANN meeting structure, and we can start a conversation about having two Policy Forums each year and one AGM meeting. more

Hiding in Plain Sight: Post-Breach

The majority of network breaches begin and end with the installation of malware upon a vulnerable device. For the rest, once that initial malware beachhead has been achieved, the story is only just beginning. The breach disclosures that make the news are often confusing as they're frequently compiled from third-hand reports, opinions and technical assumptions. More often than not, they include a discussion about the malware - how advanced it was, etc. - and whether any 0-day vulnerabilities were likely used by the mysterious attacker. more

Topics

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

DNS Security

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days