NordVPN Promotion

Home / Blogs

It’s Time for Privacy Progress in ICANN

Protect your privacy:  Get NordVPN  [ Deal: 73% off 2-year plans + 3 extra months ]
10 facts about NordVPN that aren't commonly known
  • Meshnet Feature for Personal Encrypted Networks: NordVPN offers a unique feature called Meshnet, which allows users to connect their devices directly and securely over the internet. This means you can create your own private, encrypted network for activities like gaming, file sharing, or remote access to your home devices from anywhere in the world.
  • RAM-Only Servers for Enhanced Security: Unlike many VPN providers, NordVPN uses RAM-only (diskless) servers. Since these servers run entirely on volatile memory, all data is wiped with every reboot. This ensures that no user data is stored long-term, significantly reducing the risk of data breaches and enhancing overall security.
  • Servers in a Former Military Bunker: Some of NordVPN's servers are housed in a former military bunker located deep underground. This unique location provides an extra layer of physical security against natural disasters and unauthorized access, ensuring that the servers are protected in all circumstances.
  • NordLynx Protocol with Double NAT Technology: NordVPN developed its own VPN protocol called NordLynx, built around the ultra-fast WireGuard protocol. What sets NordLynx apart is its implementation of a double Network Address Translation (NAT) system, which enhances user privacy without sacrificing speed. This innovative approach solves the potential privacy issues inherent in the standard WireGuard protocol.
  • Dark Web Monitor Feature: NordVPN includes a feature known as Dark Web Monitor. This tool actively scans dark web sites and forums for credentials associated with your email address. If it detects that your information has been compromised or appears in any data breaches, it promptly alerts you so you can take necessary actions to protect your accounts.

Privacy issues have been important to parts of the ICANN community for many years. I can attest to that fact as a long time veteran of Whois debates as far back as 1998 when I was with the U.S. Federal Trade Commission. However, they have started to receive the general ICANN community visibility only relatively recently. These efforts must continue in order to protect rights, to avoid increasing potential conflicts between ICANN rules and applicable laws, and to generally maintain trust in the Internet as a place to be.

Previously, privacy questions were discussed within groups or at forums. They arose in discussions about possible legitimate reasons for falsifying domain registration information and in conversations regarding whether privacy and proxy services should be allowed and for what kinds of registrations. Unfortunately, we who worked on the Thick Whois PDP Working Group, for which I served as Chair of the Data Protection and Privacy Subteam, found little evidence of any systematic analysis within the ICANN community of the intersection between ICANN practices and privacy protections.

ICANN has been active in privacy issues on the surface, such as through promulgations of the ICANN Procedure for Handling Whois Conflicts with Privacy Laws. In addition, questions have arisen in Registry Service Evaluation Process proceedings concerning .cat and .tel. However, these activities have happened on one-off bases.

Relatively recently though, suggestions and opportunities for thorough examination of privacy questions have stepped up significantly. The report of the ICANN Whois Policy Review Team noted data protections concerns and public comments that had been submitted about them. The Expert Working Group on gTLD Directory Services has spent much time on questions related to data protection, and continues to examine them.

The Thick Whois PDP group conducted as thorough a look at the questions as its resources and expertise allowed, both with respect to maintaining data registration data and transferring it across borders. The 2013 Registrar Accreditation Agreement expanded the ability of registrars to seek exemptions from Whois contract requirements in the event of conflicts. Some level of data protection and privacy review also will be part of the work of the Privacy and Proxy Services Accreditation Issues PDP Working Group, which I chair.

This increased formal ICANN attention to privacy questions is essential and long overdue. However, there must be follow through and it must be done systematically. A comprehensive catalogue of data protection and privacy laws and how they might affect all parts of the ICANN community and all contracts or rules is impossible, but some level of consideration and guideline development must be done. These guidelines must be developed with due consideration for the laws of all nations and full examinations of their strengths and weaknesses. A growing number of countries around the world have data protection regimes or are part of international compacts that govern relevant issues. In addition, sometimes entities that are cited as weak on privacy protection in fact have stronger safeguards with respect to certain topics than others that are held out as examples of model practices.

I am discussing privacy related to ICANN, its practices, and its community here. The topic is not about surveillance practices of any government, the United States or elsewhere. No amount of work within ICANN or changes to its structure will obviate those kinds of privacy risks. ICANN arguably is very late to the game in giving data protection and privacy their due regard, but confluence of activities that have occurred over the last year or so, and are continuing now, make this period a perfect time to address legitimate concerns.

Filed Under

Comments

Commenting is not available in this channel entry.
CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

Related

Topics

Threat Intelligence

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

DNS

Sponsored byDNIB.com

NordVPN Promotion