/ Featured Blogs

The Multistakeholder Moment of Truth: Will Stakeholders Hold ICANN Accountable?

During the two-year period preceding the IANA transition in 2016, there was a near-superhuman effort put forth by the community of stakeholders to design, debate, and deploy an accountability framework for ICANN that would serve to check and balance the coordinator of the global DNS. One of the overriding concerns that stakeholders sought to address was the possibility of ICANN being captured, and it was argued that the global community of stakeholders would serve as a "backstop" that would hold ICANN accountable. more

The 6G Hype is Already Starting

Even though 5G hasn't yet made it onto any cellphone, the wireless vendor industry is already off and running looking at the next generation of wireless technology that has been dubbed as 6G. This recent article describes the European Union Hexa-X project that started in January to look at developing specifications for next-generation wireless technology using terahertz spectrum. more

Could Bulk-Registered Typosquatting Domains Be Connected to .ORG DNS Abuse?

Public Interest Registry (PIR) announced the creation of the DNS Abuse Institute about two months ago as it believes that "every .ORG makes the world a better place" and "anything that gets in the way of that is a threat," notably in the form of Domain Name System (DNS) abuse. To show support for the initiative, WhoisXML API analyzed monthly typosquatting data feeds for December 2020, January 2021, and February 2021 to identify .ORG domain trends... more

Cybersecurity, an Essential Weapon in the Cyberwarfare to Protect Our Democracy

We see the problems that we are facing within an increasingly digital society and economy. We cannot go backward; the only way forward is to ensure that this new digital environment is made as safe as possible from a personal, social, political and economic perspective. We are currently struggling on these fronts. Unfortunately, we have now clearly entered a situation of cyber warfare. States now use digital technologies to impose and undermine ideologies. more

What Are the Connections to Identified Hafnium Malicious IP Addresses?

Cyber attackers are very skilled at infiltration. They'd find ways into a house through cracks and holes that the homeowner doesn't know about. Analogically speaking, that's what the new cyber attack group dubbed "Hafnium" did when they identified several zero-day Microsoft Exchange vulnerabilities to get into target networks. With thousands of users for every Microsoft Exchange server, the attack has far-reaching implications. First, it establishes the presence of a new threat actor group in town. What else could they be up to? more

Telling the Truth About 5G

I still run across articles that extol the supposed wonders of 5G. The most recent, published in Gizmodo asks "How 5G Could Replace Your Home Broadband Connection". I was surprised to see an article like this in a tech-oriented site because the article gets most of the facts wrong about 5G - facts that are not hard to verify. This article talks about 5G having "faster download speeds, faster upload speeds, more bandwidth, and lower latency" than landline broadband. more

The Domain Industry Keeps on Growing and Changing

It has become very clear once again: the domain industry won't stop. The scenario we know today is constantly changing, and our industry adapts to the changes taking place in society and the economy. Thanks to its versatility, the domain industry continues to amaze with some big changes year after year. This sector has its own peculiarities, rules, and opportunities for all stakeholders involved. more

The Insult and Injury of the U.S. Government’s Failure to Enforce ICANN’s Contractual Obligation

Someone recently observed that many stakeholders have fallen victim to a "chilling effect" resulting from fear of retaliation by the rich and powerful bullies currently infecting the multistakeholder community, ICANN, and Internet governance. I related to what I was hearing because I've been personally targeted and libelously attacked and it is deeply dismaying enough having to worry about threats to revenue and reputation along with other harmful effects of such thuggery. more

Loose Lips

When I was in the military, we were constantly drilled about the problem of Essential Elements of Friendly Information, or EEFIs. What are EEFis? If an adversary can cast a wide net of surveillance, they can often find multiple clues about what you are planning to do or who is making which decisions. For instance, if several people married to military members all make plans to be without their spouses for a long period of time, the adversary can be certain that a unit is about to be deployed. more

Why ICANN Rejected ISOC’s Billion-Dollar Attempt At Feathering Its Own Nest With .org Sale?

As I've pointed out in recent articles, the promises and obligations of the Memorandum of Understanding (MOU) are merged by direct reference into the InterNIC licensing agreement between the U.S. Department of Commerce and ICANN. This licensing agreement has been extended twice by mutual consent, most recently until January 2025. Therefore, the MOU's promises and obligations remain in effect through the InterNIC licensing agreement despite the fact that the MOU itself terminated in 2009. more