As we passed five years since the Internet Assigned Numbers Authority transition took place, my co-authors and I paused to look back on this pivotal moment; to take stock of what we've learned and to re-examine some of the key events leading up to the transition and how careful planning ensured a successful transfer of IANA responsibilities from the United States Government to the Internet Corporation for Assigned Names and Numbers. more
Public blacklists are used on a daily basis by many enterprises in order to curb spam. Frederic Aoun and Bruno Rasle, co-authors of the book "Halte au Spam", unveiled today their latest study on the subject. This contribution is divided in two parts... more
All indications from the ICANN meetings in Seoul are that significant delays for the release of new gTLDs (Generic Top Level Domains) are expected. According to Rod Beckstrom, ICANN's CEO, new gTLDs will be made available when, "we've adequately addressed the important issues that are on the table." These important issues include efforts to address malicious conduct, root scaling, economic analysis, trademark protections, and vertical separation as related to the new gTLDs. more
When ICANN implemented the Uniform Domain Name Dispute Resolution Policy (UDRP) in 1999, the number of registered domain names were in the low eight digits. Registered domain names passed the first million in 1997. Today, they are in the first third of nine digits, and continuing to grow. In its newly released publication gTLD Marketplace Health Index (Beta) (July 21, 2016) ICANN offers through a couple dozen metrics a picture of the multiple parts that corporately go into making a healthy marketplace. It's "Beta" because the Health Index is a work in progress. more
For those people tracking the evolution and deployment of DNSSEC or who are just interested in "DNS security" in general there is a great amount of activity happening next week at IETF 90 in Toronto. I dove into this activity in great detail in a recent post, "Rough Guide to IETF 90: DNSSEC, DANE and DNS Security", and summarized the activity in a Deploy360 post... more
The IETF's DMARC working group is thinking about a maintenance update to the DMARC spec, fixing bits that are unclear and perhaps changing it where what mail servers do doesn't exactly agree with what it says. Someone noted that a lot of mailers claim to have "deployed DMARC," and it's not at all clear what that really means. ... I've suggested that we could write a DMARC deployment guide that describes the parts of DMARC, the ways they interact and in what sequence it's useful to deploy them. If you'd find that useful, leave a comment. more
We knew that Usenet needed some sort of management system, and we knew that that would require some sort of authentication, for users, sites, and perhaps posts. We didn't add any, though -- and why we didn't is an interesting story. The obvious solution was something involving public key cryptography, which we (the original developers of the protocol: Tom Truscott, the late Jim Ellis, and myself) knew about: all good geeks at the time had seen Martin Gardner's "Mathematical Games" column... more
As you've probably read, WikiLeaks has released a trove of purported CIA documents describing their hacking tools. There's a lot more that will be learned, as people work their way through the documents. For now, though, I want to focus on something that's being misreported, possibly because of deliberately misleading text by WikiLeaks itself. Here's the text from WikiLeaks... more
Recently, the Internet Corporation for Assigned Names and Numbers (ICANN) unveiled its Trademark Clearinghouse (TMCH), a tool it proposes will help fight trademark infringement relating to another of its new programs - generic top level domain (gTLD). As Lafeber describes, criticism of ICANN's gTLD program and subsequent TMCH database is mounting. Skeptics have noted that given the significant cost of registering a gTLD - the application fee is $185,000 and subsequent annual fees are $25,000 - the program appears to be solely a cash cow, without adding much value to Internet users. more
A couple of weeks ago during the 40th ICANN meeting in San Francisco I got up to talk at the microphone. I spoke about the needs of developing markets on the web, about the importance of focusing on the 56% of the world that doesn't use Latin character scripts and about the struggles they still face as they go about their everyday lives - chatting, shopping or when pushed, promoting regime change - all using the internet... more
On the final day of a four-day meeting, most government representatives expressed support for renewing the Internet Governance Forum's five-year mandate which ends next year. China did not. Chen Yin, the head of the Chinese delegation to the Internet Governance Forum, said yesterday that the IGF's mandate should not be continued without reforms. more
There's a lot of chatter about a recent study purporting to show that 29.1% of internet users has bought something from spam. As ITWire reported, "Marshal were not only interested in how many people were purchasing from a spam source, but also what goods and services they were buying. Perhaps less surprisingly this revealed that sex and drugs sell well online." But at downloadsquad, Lee Mathews discovered the shocking truth: "the survey only involved 600 people." more
The mobile phone market is growing exponentially and will continue to evolve for years to come. Why has the Cable Industry not moved into the lucrative mobile phone market? It could definitely be a revenue bonanza, as it currently is for telecom companies. ... Verizon and AT&T's revenues, as a percentage of stock price by division, attributes mobile phone service up to 40-42% of total revenues. more
The telecoms industry is facing a systemic problem of high operational complexity and excessive cost. We take a look at the root causes, and how to tackle them. Every telco in the world wants to both increase the quality of their customer experience, and also save money by lowering opex and deferring capex. A pervasive industry barrier to achieving this is one of complexity, which exists at many levels. more
In the first section of this piece, I argued that the anti-Huawei litany only makes sense when one realizes that it is the Chinese state, not a global telecommunication equipment manufacturer based in China, is the target of this attack. China, in this view, is an integrated monolith, and any Chinese firm can be ordered to do the government's will without any legal, political, or economic checks and balances. more
Sponsored byVerisign
Sponsored byWhoisXML API
Sponsored byCSC
Sponsored byRadix
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byIPv4.Global