/ Recently Commented

Africa’s Data Sovereignty Challenge: Who Really Controls the Continent’s Digital Future?

As Africa digitises rapidly, control over data is emerging as a strategic contest. Foreign infrastructure dominance exposes economic and cybersecurity vulnerabilities, pushing governments to prioritise digital capability, regional cooperation, and stronger sovereignty over the systems powering the continent's future. more

DNS Abuse Is Stealing India’s Youth: Fake Domains and the Job-Seeking Trap

Fake recruitment websites exploiting India's young job seekers are proliferating, exposing millions to identity theft, financial fraud and malware while regulators, registrars and digital literacy programs struggle to keep pace with a growing labor market. more

Domain Security Report: Unicorns Show Strong Adoption in Key Domain Security Measures

Unicorn firms lead in DNS-based security adoption, signaling technical maturity, while Global 2000 rely on enterprise registrars. Gaps in redundancy and brand protection expose supply chain risks as cyberattacks intensify across industries globally today. more

Fake Domains, Real Damage: What the Latest Data Reveals

Third-party domains exploiting brand names are proliferating, with 88% of homoglyphs externally owned. Many remain dormant yet email-enabled, creating scalable phishing risks as attackers increasingly target trust rather than infrastructure. more

The New Space Race for Connectivity: Satellite Internet and Critical Infrastructure

Satellite internet is from backup to core infrastructure, as LEO constellations, non-terrestrial networks and direct-to-device services reshape connectivity, forcing governments and operators to rethink resilience, sovereignty and the architecture of the internet. more

Fixing Geofeed: From Self-Reported Data to Verified Trust

Geofeed data, long reliant on unverifiable self-assertions, faces mounting security risks. Integrating RPKI could transform it into a trusted, cryptographically validated infrastructure, strengthening routing integrity, regulatory compliance, and digital sovereignty across an increasingly contested internet. more

The Historical Mandate of the RIR System

The history of the Regional Internet Registry system shows it was designed as a community-governed framework, not a passive ledger, with legitimacy rooted in delegated authority, open policy development, and multistakeholder coordination from its inception. more

Iran-Linked Cyberattacks Expose Fragility of America’s Industrial Nerve System

Iran-linked hackers infiltrated US industrial control systems, disrupting energy and water infrastructure. The attacks highlight systemic vulnerabilities in internet-connected devices and signal an enduring cyber threat despite easing geopolitical tensions. more

Running-Code Betrayal: How the RIR System Turned Consensus Against the Technical Community

A dispute over African IP governance exposes a flaw in the RIR system, where thin policy, weak accountability and institutional self preservation risk overriding running networks and undermining the technical legitimacy that sustained global coordination. more

The Logic, Fallacy and Flaws Associated With IPv4 Network Resource Transfers

Fifteen years after IPv4 exhaustion, a transfer market has reallocated scarce address space, enabling internet growth, despite uneven registry policies, opaque fees, and lingering resistance to a system that proved more pragmatic than planned reclamation. more

Reflecting on WSIS+20 and Youth’s Role in Redefining Stakeholder Classification

At ICANN85, reflection on WSIS+20 highlights a quieter milestone: youth successfully secured recognition as a distinct stakeholder group, reshaping how Internet governance defines participation and offering a blueprint for other overlooked communities seeking voice today. more

Filling the Sky with Satellites

Low Earth orbit is crowding as Starlink, Amazon, China and others race to deploy thousands of satellites, promising faster broadband while intensifying global competition, orbital congestion concerns and a push for direct-to-device connectivity. more

Securing Digital Brand Borders in a Fragmented World

GlobalBlock's expansion into China and Germany signals a shift from reactive brand protection to centralized prevention, as firms seek scalable, cost efficient defences against proliferating AI driven domain abuse worldwide amid a fragmented digital landscape. more

Moving Beyond Associated Domain Checks: The Urgent Need to Ban Short-Term Domain Leasing

ICANN's new DNS abuse rules mark progress, yet short-term domain leasing enables fleeting, hard-to-detect attacks. A proposed 30-day minimum lease could curb cybercrime by undermining the economics of weaponised parked domains. more

When Registry Power Detaches From Liability, It Detaches From Reality

IPv4 scarcity turned regional internet registries from clerks into gatekeepers of a valuable resource. Yet liability caps remain trivial, leaving powerful institutions with little accountability and incentives for conflict and structural breakdown ahead. more