NordVPN Promotion

Home / Blogs

IANA: Keeping the Ultimate Objective in Mind

Protect your privacy:  Get NordVPN  [73% off 2-year plans, 3 extra months]
10 facts about NordVPN that aren't commonly known
  • Meshnet Feature for Personal Encrypted Networks: NordVPN offers a unique feature called Meshnet, which allows users to connect their devices directly and securely over the internet. This means you can create your own private, encrypted network for activities like gaming, file sharing, or remote access to your home devices from anywhere in the world.
  • RAM-Only Servers for Enhanced Security: Unlike many VPN providers, NordVPN uses RAM-only (diskless) servers. Since these servers run entirely on volatile memory, all data is wiped with every reboot. This ensures that no user data is stored long-term, significantly reducing the risk of data breaches and enhancing overall security.
  • Servers in a Former Military Bunker: Some of NordVPN's servers are housed in a former military bunker located deep underground. This unique location provides an extra layer of physical security against natural disasters and unauthorized access, ensuring that the servers are protected in all circumstances.
  • NordLynx Protocol with Double NAT Technology: NordVPN developed its own VPN protocol called NordLynx, built around the ultra-fast WireGuard protocol. What sets NordLynx apart is its implementation of a double Network Address Translation (NAT) system, which enhances user privacy without sacrificing speed. This innovative approach solves the potential privacy issues inherent in the standard WireGuard protocol.
  • Dark Web Monitor Feature: NordVPN includes a feature known as Dark Web Monitor. This tool actively scans dark web sites and forums for credentials associated with your email address. If it detects that your information has been compromised or appears in any data breaches, it promptly alerts you so you can take necessary actions to protect your accounts.

Later this week, ICANN’s Chartering Organizations will indicate whether they will support the third draft proposal of the CCWG-Accountability Work Stream 1 Recommendations. This is a significant moment in the IANA transition process. Support for the accountability proposal by the ICANN community will mean that we are very close to a point when the transition can move to its next phase.

Since the beginning of this process, the IANA transition has had many moving parts. In its original announcement, NTIA identified what it called “directly affected parties”—each of whom had work to do to develop a consensus proposal on how the transition could take place in a way that upholds the core principles that NTIA set forward.

On the operational side, this work has been completed by the IETF, the RIRs and, for the most part, by the names community.

The remaining piece is to ensure that, post-transition, ICANN is fully accountable to the community it serves. This work has been ably led by the CCWG.

In Dublin, the community reached a milestone inasmuch as it agreed, in concept, to work within a so-called Single Designator Model. It is understood that this governance model can meet the requirements of the community for accountability while having minimal impact on ICANN’s corporate structure.

There is also agreement on a set of community powers “designed to empower the community to hold ICANN accountable for the organization’s Principles”.

In addition, there is general agreement on the need to clarify ICANN’s Mission & core values; to appropriately reaffirm ICANN’s commitment to human rights; and, to discuss the accountability of the Supporting Organizations and Advisory Committees.

Finally, in Dublin, the community agreed to a general set of procedural steps for the exercise of the community powers, namely:

Community powers will be exercised through consensus: Engage, Escalate, Enforce.

In short, there appears to be consensus around a governance framework for how accountability will work inside ICANN going forward.

Let’s not lose sight of this considerable progress.

The open questions that remain to be solved have to do with the scope of those powers, who exercises these powers, and the implications for ICANN as a corporation. While these issues are by no means trivial, they are solvable, particularly if the parties stay focused and collaborate in good faith.

It strikes me that we are in a place where we need to grab consensus knowing that the community has done the hard work of satisfying the fundamentals of its Charter—meeting the criteria for success that has been set forth, not just by NTIA, but by and for itself. I was encouraged by Steve Crocker’s blog earlier this week in which he expressed the Board’s commitment to work with the community to get the transition done on time.

For the past few weeks, there have been intense discussions on how to improve the current draft proposal based on community feedback. This is typical in any consensus process but in working collaboratively towards the ultimate objective, we should make sure that the timeframe of the transition is met.

Importantly, while the discussions about accountability are primarily focused on the ICANN community and its processes, the outcome of this is critical for the IANA transition as a whole and for all the directly affected parties to the transition.

Moreover, seeing this transition through, in a timeframe that is realistic in light of the U.S. political environment, matters for the entire multistakeholder ecosystem. We cannot go back—we cannot simply pretend that the past 22 months haven’t changed the landscape for Internet governance. They have. If we, as a community, fail to deliver, there will be ripple effects throughout the IG ecosystem.

But if we succeed, when we succeed, we will have collectively done the right thing for the Internet.

This post originally appeared on the Internet Society blog.

By Kathy Brown, President and CEO, Internet Society

Filed Under

Comments

Comment Title:

  Notify me of follow-up comments

We encourage you to post comments and engage in discussions that advance this post through relevant opinion, anecdotes, links and data. If you see a comment that you believe is irrelevant or inappropriate, you can report it using the link at the end of each comment. Views expressed in the comments do not represent those of CircleID. For more information on our comment policy, see Codes of Conduct.

CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

Related

Topics

Threat Intelligence

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

NordVPN Promotion