Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

The Internet Archive Hops Out of the Copyright Frying Pan Into a New and Different Fire

In 2020 a group of book publishers sued the Internet Archive over their Controlled Digital Lending program, which made PDF scans of books and lent them out from the Archive's website. For books still in copyright, the Archive usually limited the number of copies of a book lent to the number of physical copies of the book they had in storage. Several publishers sued with an argument that can be summarized as "that's not how it works." more

Thinking Carefully About New gTLD Objections: Community (3 of 4)

My third installment regarding gTLD objections - and understanding exactly what's required for an objector to prevail - moves to the more complex community-based objections. For those getting their first exposure to this unwieldy beast, pull up a chair and get comfortable. The community objection involves multifaceted elements, each having its own set of defining factors and often using similar terminology in different contexts. As such, it can be very confusing and one can easily lose track of the bigger picture. more

Never Invited, but Always Present

Listening today to the U.S. Congress' House of Representatives Subcommittee on Communications and Technology hearing on ICANN governance reminded me just how often Vox Populi Registry, the company bringing dotSucks names to the Internet, is a guest at parties to which it has never been invited. Sometimes, like today, we are able to view it all from a distance and mostly we have refrained from trying to correct every misstatement or argue each odd point. more

What if France Had Applied for a .WINE New gTLD?

Would the French Government or any other French Private company -- such as a French Vineyard -- had applied to the .WINE Top-Level Domain, one could wonder what would the situation be today. Well... the situation would be the exact same -- the applicant would be in front of three other .WINE applicants with this exact same question: how do I win the auction? more

The Rise of a Secondary Market for Domain Names (Part 1/4): A Tale of Competing Interests

The Trademark Act of 1946 defines trademarks and service marks to include "any word, name, symbol, or device, or any combination thereof." Marks composed of lexical and numeric elements (as opposed to images) also can be described as strings of characters. Before the Internet there was no commercial use of such strings other than as marks, but the functionality of the Internet depends on strings of lexical and numeric characters in the form of domain names that serve as electronic addresses. more

Whom Do We Regulate when the Phone Monopolies Are Gone? - Universal Access

After a more than 100 year run, the end is nigh for plain old telephone service (POTS). Through most of recent history POTS was provided by monopolies, which were regulated at both the federal and state level. The new world is much more competitive; we can talk via cell phones, computers, traditional phones hooked to a variety of devices instead of the old phone line, and a plethora of new gadgets like tablets. Voice service no longer has to be vertically integrated. more

Avaya’s web.alive - Another Approach for Unified Communications?

Earlier this month, Avaya held a new type of customer event in Toronto, called Evolutions. They have been looking for better ways to bring customers together, so aside from their global event, they've put together Evolutions, which has a regional focus. The first one was recently held in Mexico to great success, and my understanding is that Canada was the next trial event, and that's what I attended in downtown Toronto... I'm almost certain I was the only Canadian analyst invited, so this may well be the only place you'll hear about Evolutions. more

Understanding ‘Reverse Domain Name Hijacking’ Under the UDRP

"Reverse Domain Name Hijacking" (RDNH) is a finding that a panel can make against a trademark owner in a case under the Uniform Domain Name Dispute Resolution Policy (UDRP)... While neither the UDRP nor the Rules provide any further details or guidance, the WIPO Overview of WIPO Panel Views on Selected UDRP Questions, Second Edition, provides some insight into the circumstances in which panels have found RDNH. more

HTTPS Interceptions Are Much More Frequent Than Previously Thought

I have written about the problems with the "little green lock" shown by browsers to indicate a web page (or site) is secure. In that article, I consider the problem of freely available certificates, and a hole in the way browsers load pages. In March of 2017, another paper was published documenting another problem with the "green lock" paradigm - the impact of HTTPS interception. more

Universal Acceptance Issues with .TUBE, ASCII and IDN Domains

This open letter, penned by Rami Schwartz, the CEO of Latin American Telecom LLC, addresses Universal Acceptance issues related to the .TUBE top-level domain (TLD). Published to the ICANN Board, it highlights challenges faced in making .TUBE domains function correctly in popular messaging apps like WhatsApp. more

5G Real Security Threats Lost in Trump’s Twitter Diplomacy

A new report on 5G and geopolitics by Oxford Information Labs details the complex landscape of 5G security. Importantly, it draws out how a variety of proven technical concerns around the quality of Huawei security practices and equipment are drowned out by the US' Twitter diplomacy. Critical international dialogue on genuine cybersecurity concerns relating to 5G and Huawei are being lost in the noise of the US-China trade war. more

Berkman Broadband Study: Mixing Passion and Scholarship

Last week, comments were filed with the FCC in response to the Berkman study of international broadband comparisons... Many of the comments were not supportive of the Harvard Berkman study. In an earlier blog posting, we had observed that there appeared to be statistical problems in the Berkman study that would not hold up to peer review. Our comments may have understated the extent of the problems. more

Phishing: the Worst of Times in the DNS

The Anti-Phishing Working Group has released its latest Global Phishing Survey, written by myself and Rod Rasmussen. This report comprehensively examines a large data set of more than 250,000 confirmed phishing attacks detected in 2015 and 2016. By analyzing this cybercrime activity, we have learned more about what phishers have been doing, and how they have done it. Unfortunately, there's more phishing than ever, and phishers are registering more domain names than ever. more

Five Countries are Considering Anti-Spam Laws

The international press is alight with reports of various countries considering privacy and anti-spam legislation. It appears that many countries have arrived at the logical conclusion that after years of supposed 'self regulation'; some marketers must be brought to heel by way of regulation and law, to stop abusive practices. more

45th Anniversary of the First Message Between ARPAnet Computers

Given that CircleID is about "Internet Infrastructure" it would be remiss if there wasn't a mention here that October 29, 2014, was the 45th anniversary of the moment when the first message was sent between two ARPAnet computers located at UCLA and the Stanford Research Institute (SRI). That moment was chronicled well this year by Matt Novak writing on Gizmodo's Paleofuture, complete with photos of the original logs and more. more

Topics

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days