/ Featured Blogs

Increasing DNSSEC Adoption - What if We Put DNSSEC Provision in the Hands of Registries?

There has been a lot of criticism about the worthiness of DNSSEC. Low adoption rates and resistance and reluctance by Registrars to take on the perceived burden of signing domains and passing-on cryptographic material are at the crux of the criticism. I'm a believer in DNSSEC as a unique and worthwhile security protocol and as a new platform for innovation. It's the reason I've long advocated for and continue to work toward a new model of DNSSEC provisioning. more

ICANN 53 - Guaranteeing Accountability in Internet Governance

I recently attended the Internet Corporation for Assigned Names and Numbers' (ICANN) 53rd meeting in Buenos Aires to further discuss the Internet Assigned Numbers Authority (IANA) transition process. During the meeting, public and private Internet stakeholders made important strides on a transition timeline, accountability planning and future management of the Internet that supports global creativity and innovation. more

Revisiting Apple and IPv6

A few weeks ago I wrote about Apple's IPv6 announcements at the Apple Developers Conference. While I thought that in IPv6 terms Apple gets it, the story was not complete and there were a number of aspects of Apple's systems that were not quite there with IPv6. So I gave them a 7/10 for their IPv6 efforts. Time to reassess that score in the light of a few recent posts from Apple. more

IPv4 Exhaustion, 5 Implications for Africa Running out Last

I spend most of my time teaching engineers in different countries how to plan and deploy IPv6 networks. Over the last two years, I have been speaking more and more to non-engineers. These are either technology executives who sense that they need to do something about this "IPv6" thing, or government IT leaders who want to understand what the problem is and more importantly, what they could do. The most impactful part of these these exchanges is when I get these managers to understand the implications of IPv4 address exhaustion to their organisations. more

DCA’s Submission to Congressional Hearing on “Stakeholder Perspectives on the IANA Transition”

This is the advance submission that DotConnectAfrica Trust sent to the Chairman of the House Sub-Committee hearing on Communications and Technology, Energy and Commerce Committee, United States House of Representatives, 114th United States Congress in advance of the Congressional Hearing on "Stakeholder Perspectives on the IANA Transition", on May 13, 2015. more

Quintett Leads Net Mundial Initiative (NMI): New Steam for an Enabling Multistakeholder Platform

At June 30, 2015 the Inaugural Meeting of the Coordination Council of the NetMundial Initiative (NMI.CC) elected a "Quintett" to guide its activities through the global Internet Governance Ecosystem. Alibaba's CEO Jack Ma from China, ICANN's President Fadi Chehade, Brazilian's Minister Virgilio Almeida and two woman: Eileen Donahou from Human Rights Watch (HRW)) and Marilia Maciel from the Center of Technology and Society (CTS) in Rio de Janeiro are sharing now the helm to bring more steam to this new innovative multistakeholder platform. more

Toward a Balanced ICANN Accreditation Program for Privacy and Proxy Service Providers

For the past two years a diverse group of stakeholders from the ICANN community, including myself, has been working hard to come to a consensus on a set of recommendations related to development and implementation of an ICANN accreditation program for privacy & proxy service providers. The result of this effort will replace the interim specification defined in the 2013 Registrar Accreditation Agreement (RAA) that is due to expire at the end of 2016. more

Never Invited, but Always Present

Listening today to the U.S. Congress' House of Representatives Subcommittee on Communications and Technology hearing on ICANN governance reminded me just how often Vox Populi Registry, the company bringing dotSucks names to the Internet, is a guest at parties to which it has never been invited. Sometimes, like today, we are able to view it all from a distance and mostly we have refrained from trying to correct every misstatement or argue each odd point. more

Keys Under the Doormat

To those of us who have worked on crypto policy, the 1990s have become known as the Crypto Wars. The US government tried hard to control civilian use of cryptography. They tried to discourage academic research, restricted exports of cryptographic software, and -- most memorably -- pushed something called "escrowed encryption", a scheme wherein the government would have access to the short-term keys used to encrypt communications or stored files. more

Join InterCommunity 2015 on July 7/8 to Talk Future of Internet Governance, Security, Access

What are the most pressing Internet governance issues in the next 2-5 years? What are the biggest priorities in terms of making the Internet more secure and trusted? What are the best ways to bring the next 3 billion people online? Those will all be topics of discussion at the "InterCommunity 2015" meeting taking place this week on July 7 and 8. The meeting will not take place at any one physical location... more