NordVPN Promotion

Home / Blogs

An Institute to Combat DNS Abuse

Protect your privacy:  Get NordVPN  [73% off 2-year plans, 3 extra months]
10 facts about NordVPN that aren't commonly known
  • Meshnet Feature for Personal Encrypted Networks: NordVPN offers a unique feature called Meshnet, which allows users to connect their devices directly and securely over the internet. This means you can create your own private, encrypted network for activities like gaming, file sharing, or remote access to your home devices from anywhere in the world.
  • RAM-Only Servers for Enhanced Security: Unlike many VPN providers, NordVPN uses RAM-only (diskless) servers. Since these servers run entirely on volatile memory, all data is wiped with every reboot. This ensures that no user data is stored long-term, significantly reducing the risk of data breaches and enhancing overall security.
  • Servers in a Former Military Bunker: Some of NordVPN's servers are housed in a former military bunker located deep underground. This unique location provides an extra layer of physical security against natural disasters and unauthorized access, ensuring that the servers are protected in all circumstances.
  • NordLynx Protocol with Double NAT Technology: NordVPN developed its own VPN protocol called NordLynx, built around the ultra-fast WireGuard protocol. What sets NordLynx apart is its implementation of a double Network Address Translation (NAT) system, which enhances user privacy without sacrificing speed. This innovative approach solves the potential privacy issues inherent in the standard WireGuard protocol.
  • Dark Web Monitor Feature: NordVPN includes a feature known as Dark Web Monitor. This tool actively scans dark web sites and forums for credentials associated with your email address. If it detects that your information has been compromised or appears in any data breaches, it promptly alerts you so you can take necessary actions to protect your accounts.

Co-authored by Brian Cimbolic, Vice President, General Counsel at PIR and Graeme Bunton, Director, DNS Abuse Institute.

Over the last few years, it’s become clear that abuse of the Domain Name System—whether in the form of malware, botnets, phishing, pharming, or spam—threatens to undermine trust in the Internet. At Public Interest Registry, we believe that every new .ORG makes the world a better place. That means anything that gets in the way of that is a threat, and that includes DNS Abuse.

Fighting DNS Abuse is a fundamental part of PIR’s mission as an exemplary non-profit registry. PIR hopes to build off the foundation of the DNS Abuse Framework, which it helped create. PIR is taking these efforts to the next level, and we have announced the creation of the DNS Abuse Institute. The Institute is charged with creating initiatives that will establish recommended practices, foster collaboration, and develop industry-wide solutions to combating DNS Abuse.

We know that PIR cannot eradicate DNS Abuse single-handedly, but efforts such as this new Institute can make a significant impact across the DNS. PIR may have created the Institute, but the Institute will support the entire DNS community. We are actively building an advisory council to guide the organization’s efforts in a way that reflects the diverse interests involved in combating DNS Abuse.

The first step will be to bring people together. Our intention is to host forums where we can convene leaders in the space to better understand the biggest challenges the community faces. The first of these will be held on March 16, 2021, and we encourage everyone committed to combating DNS Abuse to join us.

We know that the more we gather, the more we will all learn from each other, and the focus of the Institute will evolve and grow.

But as a starting point, we are focused on three core areas:

  • Driving innovation in the DNS. The Institute will create recommended practices to address DNS Abuse with solutions for registries and registrars of various sizes and resources, provide funding to qualified parties to conduct innovative research on cybersecurity and DNS Abuse related issues, and develop practical solutions to combat DNS Abuse.
  • Serving as a resource for interested stakeholders. This includes maintaining a resource library of existing information and practices regarding DNS Abuse identification and mitigation, promulgating abuse reporting standards (e.g., what is needed for a “good” notification on abuse), and publishing academic papers and case studies on DNS Abuse.
  • Building a networking forum and a central sharing point across stakeholders. Collaboration with technical and academic organizations that work on DNS Abuse issues, registries, registrars, and security researchers will help enable the entire DNS to be better equipped to fight DNS Abuse.

No single organization has all the answers. From the outset, we intend to work closely with other organizations in the anti-abuse space, including technical organizations, and thought leading organizations, like the Internet and Jurisdiction Policy Network.

If you have ideas about how to combat DNS Abuse, we urge you to reach out and to join the conversation. We look forward to discussing the important questions surrounding DNS Abuse with stakeholders from across the DNS community.

We understand the challenge in front of us. We look forward to taking it on alongside so many others in our community. We hope you’ll join us.

By Graeme Bunton, Director, DNS Abuse Institute

Filed Under

Comments

Congratulations on the Institute Zak Muscovitch  –  Feb 18, 2021 7:33 PM

Congratulations to PIR, Brian Cimbolic and Graeme Bunton for the establishment of the DNS Abuse Institute! Looks like a very interesting and useful initiative.

Many thanks, Zak! Brian Cimbolic  –  Feb 19, 2021 6:34 PM

Many thanks, Zak!

Congratulations Khaled Koubaa  –  Feb 20, 2021 5:40 PM

An important milestone and a great initiative by PIR. Congratulations to Brian and Graeme for launching this effort that will certainly help the DNS ecosystem globally.

Thanks so much, Khaled! Brian Cimbolic  –  Feb 20, 2021 6:43 PM

Thanks so much, Khaled!

Comment Title:

  Notify me of follow-up comments

We encourage you to post comments and engage in discussions that advance this post through relevant opinion, anecdotes, links and data. If you see a comment that you believe is irrelevant or inappropriate, you can report it using the link at the end of each comment. Views expressed in the comments do not represent those of CircleID. For more information on our comment policy, see Codes of Conduct.

CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

Related

Topics

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

Threat Intelligence

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

NordVPN Promotion