Today's Senate hearing with Facebook's Mark Zuckerberg will start a long discussion on data collection and privacy from Internet companies. Although the spotlight is currently on Facebook, we shouldn't forget that the picture is broader: companies from device manufacturers to ISPs collect network traffic and use it for a variety of purposes. more
The Registration Operations Workshop (ROW) was conceived as an informal industry conference that would provide a forum for discussion of the technical aspects of registration operations in the domain name system. The 6th ROW will be held in Madrid, on Friday May 12th 2017 in the afternoon, immediately after the GDD Industry Summit and prior to ICANN DNS Symposium and OARC 26, using the same venue as all above-mentioned events. more
In the first part of this series on ICANN's impending Clarifying Questions period, I outlined what you can expect in terms of question structure. Here I would like to outline how the points work and provide some advice on how to answer questions for best success. more
The deployment of Fiber to the Home (FttH) around the world is beginning to lead to exciting developments for the next generation of telecommunications. In particular, infrastructure based on FttH is providing the foundation for smart communities and cities where a number of technologies and services are combined to create an enhanced value proposition for residents. Smart homes connected to these networks can utilise services such as tele-health, e-education and e-government as well as access digital media and high speed Internet. more
The wide availability of dangerous and addictive drugs is ravaging society. Such devastation is bringing ever-increasing attention from legislators, regulators and from families who have lost loved ones. The Canadian International Pharmacy Association (CIPA) believes that the online marketing and sales of such products should be banned immediately. We call on governments, technology platforms, and the ICANN community to act quickly and bring an end to opioid sales online. more
Net Neutrality has become a hot topic in India, following a brief but high-profile national debate instigated by a consultation paper from the Telecom Regulatory Authority of India (TRAI) that solicited views on what net neutrality is, and whether regulations protecting it are needed in India. The paper also hinted at possible regulation of all kinds of online services (like Skype, Uber, or Google) in the future. But no-one could have predicted what happened next... more
One of the consequences of the war between Russia and Ukraine is that Russia has largely stopped participating in many large worldwide web applications. Russia has blocked Facebook and Twitter. Other applications like Apple, Microsoft, TikTok, Netflix, and others have withdrawn from Russia. The European Union is in the process of trying to block Russian-generated content, such as the state-owned news outlets of RT (formerly Russia Today) and Sputnik. more
Launching a social network based on a single domain name extension is seriously innovative, but such a concept also implies to give Trademarks a chance to protect themselves. I recently interviewed Cyril Fremont, the new operator of the .BEST Registry and also CEO of "THE.BEST Social Network" on his plan to allow Trademarks to protect their assets prior to the launching of the review network. more
Pew Research Center recently surveyed 4,272 adults and tested their knowledge of basic computer topics. The results showed that there was a lack of general knowledge about a few of the terms that are important for how people use the Internet. For example, the survey showed that only 30% of survey takers knew that website starting with https:// means that the information provided over that site is encrypted. Only 28% of respondents understood the concept of two-factor authentication... more
As the institutions of Wall Street continue to crumble one after another, there's a lesson to be learned for those of us who want to make sure the Internet remains as free and open in the future as it has been in the past. The collapse of Fannie Mae, Freddie Mac, Bear Stearns, Merrill Lynch, Lehman Brothers, AIG and the rest didn't happen overnight. The situation has been brewing for years. The subprime mortgage crisis may have precipitated the immediate tragedy, but underpinning the whole mess is a philosophy about business and government. more
Today's Internet is a critical infrastructural element whose continued development influences industries, cultures, and the private space of most individuals. However, the world-encompassing network sometimes needs to be adapted to new requirements to keep pace with current innovations. We have recently seen accelerating development of Internet usage on the user side. Whether it is online shopping's expansion or the greater distribution of mobile devices or streaming services... more
The preparations of the Brazil Internet Governance Forum (IGF) meeting are well under way. After consulting the wider Internet community and discussing the overarching theme of the 2015 IGF meeting, the Multistakeholder Advisory Group (MAG) decided to retain the title "Evolution of Internet Governance: Empowering Sustainable Development". This theme will be supported by eight sub-themes that will frame the discussions at the Joao Pessoa meeting... more
The Uniform Domain Name Dispute Resolution Policy (UDRP) limits parties' submissions to complaints and responses; accepting "further statements or documents" is discretionary with the Panel (Rule 12, Procedural Orders), although the Forum (in Supplemental Rule 7) but not WIPO provides for supplementing the record with the proviso that "[a]dditional submissions must not amend the Complaint or Response." For some panelists, Rule 7 contradicts the Policy. more
A couple of days ago there was a lot of interest in how terrorists may have been using chat features of popular video console platforms (e.g. PS4, XBox One) to secretly communicate and plan their attacks. Several journalists on tight deadlines reached out to me for insight in to threat. Here are some technical snippets on the topic that may be useful for future reference. more
In my last post, I looked at what happens when a DNS query renders a "negative" response -- i.e., when a domain name doesn't exist. I then examined two cryptographic approaches to handling negative responses: NSEC and NSEC3. In this post, I will examine a third approach, NSEC5, and a related concept that protects client information, tokenized queries. The concepts I discuss below are topics we've studied in our long-term research program as we evaluate new technologies. more
Sponsored byWhoisXML API
Sponsored byRadix
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byCSC
Sponsored byVerisign