/ Most Commented

Unexpected Behaviour Observed With DNS Root Servers After Cryptographic Change

The DNS root servers were reported by Verisign to be under unexpected attack from name servers across the Internet following ICANN's recent changes to their cryptographic master keys. more

Electronically Steerable, Flat-Panel Antennas for Satellite and Terrestrial Connectivity

What will the cost and capability of these antennas be in ten or twenty years? What would be the applications and implications of ubiquitous wireless networks? You might have some short-term guesses, like smart cities, but farther out it's science fiction -- Gaia, the Noosphere, 1984? ... Three companies, OneWeb, SpaceX and Telesat, plan to provide global, low-latency broadband Internet service using constellations of low-Earth orbit (LEO) satellites. more

A Look Back at the World of IP Addressing in 2018: What Changed and What to Expect

Time for another annual roundup from the world of IP addresses. Let's see what has changed in the past 12 months in addressing the Internet and look at how IP address allocation information can inform us of the changing nature of the network itself. Back in around 1992 the IETF gazed into the crystal ball and tried to understand how the internet was going to evolve and what demands that would place on the addressing system as part of the "IP Next Generation" study. more

Creating TLS: The Pioneering Role of Ruth Nelson

As often occurs in networking and cryptographic history, anecdotes and insularity conspire to mask how developments actually occurred, and seminal roles undertaken by women are forgotten or ignored. One of the notable examples of this proclivity occurred in the cybersecurity cryptology arena as it involves a critical platform known as the Transport Layer Security Protocol (TLS) and the pioneering role of Ruth Nelson. more

Can Trademarks and Brands Help Save the Internet From Itself?

Trademarks and brands are often among a company's most valued assets. Customers associate trademarks and brands with producer integrity. They engender consumer trust. Without TMs and Brands, companies struggle for attention and find it more difficult to link the company's integrity and trustworthiness in the marketing of its goods and services. Representing company promise and customer expectations, they are uniquely positioned to symbolize common values and aspirations. more

The Hidden Perils of Filing a Baseless UDRP Complaint

When properly used, the UDRP enables trademark owners to take control of abusive domain names. Yet sometimes the UDRP itself is misused by trademark owners to try to seize desirable domain names to which they have no legal entitlement. Is there a downside to misusing the UDRP to attempt a domain name hijacking? Unscrupulous companies at times misuse the UDRP by improperly invoking its power to compel a transfer of ownership in order to seize inherently valuable, non-infringing domain names that the companies desire for their own use. more

5G Security Transparency

There is considerable rhetoric propagated today about 5G security. Some of the more blatant assertions border on xenophobia with vague assertions that the 5G vendors from some countries cannot be trusted and wholesale government banning is required. Existing treaty obligations are being summarily abrogated in favour of bilateral trade bullying. These are practices that the late President George H.W. Bush sought to eliminate a quarter century ago through intergovernmental organization initiatives... more

M3AAWG and APWG Do the Best Survey Yet on WHOIS Redaction

M3AAWG, the Messaging, Malware, and Mobile, Anti-Abuse Working Group and APWG, the Anti-Phishing Working Group, surveyed their members about recent WHOIS changes. With over 300 results from security researchers, it's the broadest report yet on WHOIS use. The survey results confirm our concerns that WHOIS was a vital resource for security research, and its loss is a serious and ongoing problem. more

Enough With Blacklisting Online Pharmacies, Isn’t It Time to Consider White Lists?

Before I go back to the beginning, let me make clear that what follows are my personal observations vis-a-vis how National Association of Boards of Pharmacy (NABP) is managing the .Pharmacy Registry relative to personal experience as founder, President and CEO of Tralliance Corporation, the original manager of the .Travel Registry. My analysis may be a little long, but I promise that if you stay with me, you will be enlightened. more

ICANN’s Two Decades of Evolution

In the fall of 1998, I was present at the first meeting of the ICANN Board which was then made up of very senior, prominent parties from a broad spectrum of sources. Much to her credit, Esther Dyson accepted the position as the first Chair of the ICANN Board for the newly birthed organization. I was in attendance in support of the nomination of Michael Roberts as the first ICANN CEO. It was a time of uncertainty. more

(DNS) Security Protocols Do What They Say on the Tin

DNS-over-TLS has recently become a welcome addition to the range of security protocols supported by DNS. It joins TSIG, SIG(0) and DNSSEC to add privacy, and, in the absence of validating stub resolvers, necessary data integrity on the link between a full-service resolver and the users' stub resolver. (The authenticated source feature of TLS may also offer some additional benefits for those of a nervous disposition.) Good stuff. What is not good stuff is... more

New Zealand’s Domain Name Commission Wins Injunction in a Lawsuit Against DomainTools

New Zealand's Domain Name Commission today won a motion for preliminary injunction in a US lawsuit against the company DomainTools. more

Special Interests Circulating Draft Legislation to Cut Short ICANN’s Whois Policy Process

Special interests who oppose privacy are circulating draft legislation to cut short ICANN's Whois policy process, warns Milton Mueller in a post published today in Internet Governance Project. more

Taking a Multi-Stakeholder Look at Cyber Norms

Recently we've seen several examples of likely state sponsored security incidents of which the appropriateness was later strongly debated. Incidents such as states impacting commercial enterprises during cyber attacks; purported sabotage of critical infrastructure, and attacks on civilian activists have all, to a greater or lesser degree, led to concerns being raised by both civilian watchdog groups, academics, technologists and governments. more

Trump’s Outrageous ITU Elections Gambit

Every four years, the 168-year-old, Geneva-based treaty organization that provides the legal basis for worldwide network communications, radio spectrum management, and satellite placements holds a "plenipotentiary" conference among its 193 sovereign nation members. The next plenipotentiary begins on 29 October for three weeks. In addition to potentially altering treaty provisions and resolutions, and constituting its Council as an interim governing body, it elects 17 individuals to its five permanent bodies... more