/ Featured Blogs

Confessions of an Ex-Opponent of Whois Privacy

The following is the easyDNS response to ICANN's public comment period on GNSO Privacy & Proxy Services Accreditation Issues Working Group Initial Report. The public comment period is open until July 7, 2015. We strongly urge you to make your voice known by signing the petition over at Save Domain Privacy. I submit these comments as a CEO of an ICANN accredited registrar, a former director to CIRA and a lifelong anti spam contributor with an unblemished record of running a managed DNS provider that maintains zero tolerance for net abuse or cybercrime... more

.WTF Domain Being Used In Privacy Campaign

ICANN comment periods on policy proposals don't normally garner much attention. In the case of the current comment period on proxy/privacy services, however, things are very different. To date several thousand comments have been filed, while the topic of the policy proposals has received media attention across hundreds of outlets. more

Computer Transactions, Not People, Are Driving the Need for All-Fibre Networks

Ever since we first became involved in developing policies and strategies for countries relating to what are now known as national broadband networks, we have argued that those taking part in the strategic decision-making processes of designing these networks should look, not at what broadband can do now, but at what high-speed broadband can do to assist countries to create the best opportunities for future developments. more

Is .SUCKS Pricing Model Gaining Traction With Other Registries?

Until the launch of the New gTLD Program, TLD launches were relatively straightforward. They generally consisted of a Sunrise Period, a Landrush Phase, and then General Availability. We would see the occasional Grandfather Phase or "Founders" program, but all in all, launches were pretty standard and straightforward. Things started to change with the launch of the new gTLD program. more

Understanding the Threat Landscape: Indicators of Compromise (IOCs)

I previously provided a brief overview of how Verisign iDefense characterizes threat actors and their motivations through adversarial analysis. Not only do security professionals need to be aware of the kinds of actors they are up against, but they should also be aware of the tactical data fundamentals associated with cyber-attacks most commonly referred to as indicators of compromise (IOCs). Understanding the different types of tactical IOCs can allow for quick detection of a breach... more

Registration Operations Workshop (ROW) at IETF-93: RDAP as a Successor of Whois

The next Registration Operations Workshop will take place at the start of IETF 93 on Sunday, July 19th, 2015. The focus of this workshop is on the Registration Data Access Protocol, the successor of Whois. RDAP is a combined protocol for IP addresses and names registration data. Therefore, we are expecting both domain names and RIR communities to attend the workshop. more

I Spoke to a Club Manager

We, domain name and Trademark professionals, think end-users know about domain names. The truth is that few of them have ever heard of what a domain name is and worth; very few have heard about new descriptive domain names so I asked a Club manager my questions... Representatives of a famous French sports club were there and I bumped into them to ask my question: "any plan to change to a .club domain name?" more

DNSSEC Successes, Statistics and Innovation Streaming Live from ICANN 53 on 24 June 2015

Where has DNSSEC been successful? What are some current statistics about DNSSEC deployment? What are examples of innovations that are happening with DNSSEC and DANE? All of these questions will be discussed at the DNSSEC Workshop at ICANN 53 in Buenos Aires happening on Wednesday, June 24, 2015, from 09:00 – 15:15 Argentina time (UTC-3). You can watch and listen to the session live. more

DNSSEC - Failure to Launch

DNSSEC is a mechanism where clients can verify the authenticity of the answers they receive from servers. There are two sides here. The server must supply signed answers, and the client must verify the signatures on those answers. The validation/verification side is widely implemented, but there are very few signed zones... However, if no one signs their zones, those validating resolvers don't have many signatures to check. more

Can Your Brand Afford to Not Have a dotBrand?

More than six hundred brands have applied for their own dotBrand (a new top level domain associated with a trademarked brand). These represent every segment of our economy: banks, tech companies, media, food, luxury goods, etc. Quite a few dotbrands have already gone live. The current application period is closed, but the next round will likely begin in 24 months or so. more