Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

DotAsia Auctions Aim to Address Problems of the Past

The announcement this week that DotAsia will work with Pool.com on an auction system to introduce its new domain names is a good reaction to problems of the past. Previous launches worked (sometimes not well) on a first-come, first-served basis. For example, sex.eu had over 280 potential applications but only the first was even considered. Yet, today, nearly 2 years later, the domain application is still being reviewed... more

Third-Level Domain Name Hijacking

A new type of domain-name hijacking is being carried out unnoticed. It involves third-level domain-names associated with affiliate programs. If you had been an online affiliate of, say, company xyz.com, your affiliate Internet address could have looked like YourCompanyName.xyz.com. more

dotMP Goes Mobile, Limits Access to WHOIS Data

The fact that the market for mobile phones that provide Internet access (aka "smart phones") is predicted to increase during the next several years, with global shipments growing to an impressive nearly 125 million units in 2009, means the competition for bridging mobile content and mobile phone use is likely to be keen. Indeed, dotMP already must face competition for registry services that will target mobile phone users. A few of the biggest names in information technology and mobile communications -- led by Nokia and including Microsoft, Vodafone, HP, Orange, Samsung and Sun Microsystems are planning to wedge into the Top-level Domain name space (TLD) by supporting a new TLD registry for mobile web content focused on web pages built specifically for access by mobile devices like smart phones and handheld computers or Personal Digital Assistants (PDAs)... what may set dotMP apart from the technology giants led by Nokia, is a significant value added benefit to its domain name registration services...it will protect the privacy of its registrants.  more

Al’s Story: Another Small Domain Holder Falls Victim to Flawed ICANN Policy

Al Bode is typical of the many small, individual domain name holders throughout the United States and the world. He is a high school teacher of the Spanish language, not a techie, and he registered the domain IOWAWLA.ORG to provide an online presence for the Iowa World Language Association, a professional association for foreign-language educators in the US State of Iowa, of which he is a member. This domain could in no way be considered a commercial venture. In his own words, "I am a school teacher from Iowa whose websites are personally funded for the express purpose of education. There is no profit motive or even profit other than the knowledge that others may gain from my website." more

Some Thoughts on DNS4EU – the European Commission’s Intention to Support the Development of a New European DNS Resolver

The last few decades have not been a story of unqualified success for European technology enterprises. The European industrial giants of the old telephone world, such as the former stalwarts Alcatel, Siemens, Philips, Ericsson and Nokia, have found it extraordinarily difficult to translate their former dominant positions in the telco world into the Internet world. To be brutally frank, none of the current generations of major players in the digital environment are European. more

ICANN’s First Official Report on Whois Data Problems

ICANN has submitted the first report of what will be a series of annual reports summarizing its "expierince" with the Whois Data problems and inaccuracies. While emphasizing that "ICANN-accredited registrars are obligated by the terms of their accreditation agreements to investigate and correct any reported inaccuracies," the report provides the following conclusions: more

Legal Controls on Extreme End-to-End Encryption (ee2ee)

One of the most profoundly disruptive developments occurring in the cyber security arena today is the headlong rush by a set of parties to ubiquitously implement extreme End-to-End (e2e) encryption for communication networks using essentially unbreakable encryption technology. A notable example is a new version of Transport Layer Security (TLS) known as version 1.3. The activity ensues largely in a single venue... more

Post Delegation Dispute: A Once Supportable Concept Proposed by the IRT is Now Unsupportable

This comment is being presented in my personal capacity and does not represent the views of my employer (Neustar, Inc.) and its subsidiaries or affiliates, or the Implementation Recommendations Team. Ok. I admit it. I supported the concept of a post delegation dispute resolution process for generic Top-Level Domains (gTLD) Registries. I served as the only gTLD registry member of the Implementation Recommendation Team (IRT) appointed by the Intellectual Property Constituency of the Generic Names Supporting Organization of ICANN. I was one of the authors of the IRT Recommendation in favor of a Post Delegation Dispute Resolution Procedure. more

In Pursuit of IDN Perfection?

Many of the problems of IDNs come from trying to do multiple languages at the same time or languages one can't read. The biggest difficulty is implementing them in gTLDs like .com or .org. I think that if we focus on helping the country level TLDs (ccTLDs) get going with IDNs in their own native languages, we would be solving the problem for 80% or so of the people. My concern is holding up the ability for these people to use IDNs because we can find the perfect solution for the edge cases. more

A Brief Primer on Anti-Satellite Warfare Tactics

Satellites make it possible for governments to provide essential services, such as national defense, navigation, and weather forecasting. Private ventures use satellites to offer highly desired services that include video program distribution, telecommunications, and Internet access. The Russian launch of a satellite, with nuclear power and the likely ability to disable satellites, underscores how satellites are quite vulnerable to both natural and manmade ruin. more

WIPO Crowing Again About “Cybersquatting”

Most of us would be put off if a court issued a press release cheering the number of prisoners its judges had put behind bars or the number of tenants it had helped landlords to evict. That seems antithetical to the neutral adjudication of disputes, and ethical rules regularly decry such "appearance of bias." Yet WIPO seems to think it perfectly natural to crow about its arbitrators' favoritism for complainants against "cybersquatters" in UDRP proceedings. It issued a release that reads like a solicitation for trademark claimants' business, not a promotion of neutral arbitration services... more

Abusive and Malicious Registrations of Domain Names

When ICANN implemented the Uniform Domain Name Dispute Resolution Policy (UDRP) in 1999, it explained its purpose as combating "abusive registrations" of domain names which it defined as registrations "made with bad-faith intent to profit commercially from others' trademarks... Bad actors employ a palette of stratagems, such as combining marks with generic qualifiers, truncating or varying marks or by removing, reversing, and rearranging letters within the second level domain (typosquatting). more

Active and Passive Internet of Things

"The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it." -Mark Weiser ...The Internet of Things is a step in this very direction. And like all things new and mysterious, it has its fair share of utopian and dystopian soothsayers; with an almost certain probability that neither of their deterministic predictions will completely come to fruition in the future. more

How You Can Be Hijacked Without Actually Being Hacked

Unsuspecting website visitors are often unaware when they have landed on a spoofed page or are re-directed to malware-hosting web servers designed to steal their sensitive data and information. This attack is known as subdomain hijacking, or subdomain takeover. A web user's private information is then traded on the dark web, and cybercriminals profit, further fueling the expansion of identity theft in the online world. more

Google Voice Dispute Highlights an Opportunity for Mobile Network Operators

The recent row between Google, Apple and AT&T concerning the removal of Google Voice from the Apple iPhone store highlights the friction existing between network operators and so-called over the top (OTT) application providers. Most observers believe that AT&T initiated the blockade because Google Voice (which offers free or highly discounted calling rates) is a direct threat to AT&Ts call revenue (Google Voice users need only pay AT&T for access to the Internet). more

Topics

New TLDs

Sponsored byRadix

DNS Security

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days