/ Most Commented

Latest Cybersquatting Stats from WIPO

According to latest reports from the World Intellectual Property Organisation (WIPO), allegations of cybersquatting by trademark holders continued to rise in 2008, with a record 2,329 complaints filed under the Uniform Domain Name Dispute Resolution Policy (UDRP). This represented an 8% increase over 2007 in the number of generic and country code Top-Level Domain (gTLDs and ccTLDs) disputes handled and brings the total number of WIPO cases filed under the UDRP since it was launched ten years ago to over 14,000. To improve efficiency and respond to growing demand, WIPO has proposed an "eUDRP Initiative" to render the UDRP paperless... more

Cybersquatter Hit With Maximum Penalty

Defendant Shui registered the domain name citybank.org and established a site there promoting financial services, sometimes using the mark CITIBANK. The real Citibank, armed with its trademark registrations in over 200 countries and over 50 years of use of its CITIBANK mark, filed suit against Shui under the Anticybersquatting and Consumer Protection Act, 15 USC 1125(d) ("ACPA")... Citibank sought $100,000 -- the maximum amount of statutory damages available under the ACPA, plus payment of Citibank's attorneys' fees... more

Searching for Truth in DKIM: Part 1 of 5

DomainKeys Identified Mail (DKIM) is the leading email authentication technology, supported by major ISPs including Google, AOL, and Yahoo! (who invented its predecessor), popular mail server software like Sendmail, and many of the best minds in email technology. But if you peruse the archives of the IETF DKIM mailing list, or start up a conversation at MAAWG, it might appear that there's still a lot of disagreement about what a DKIM signature actually means. more

ICANN Con Rocas (or ‘ICANN On the Rocks’)

ICANN Meetings can be an intimidating place for first-timers or even those who have only attended for the few years. The acronyms fly fast and furious. The participants, or at least most of them, have been working on the issues for years (even decades). The technical and policy issues are complex. Luckily, however, an attendee can overcome these barriers to entry with a few drinks at the hotel bar. .. more

Domain Name Registration: Not a Technology Service Any More?

It didn't seem to make any headlines, but it is an interesting sign of the Internet times that, effective January 1, 2009 , the United State Patent and Trademark Office ("USPTO") changed the International Classification of "domain name registration services" to Class 45 (defined below). The reason that the move is interesting is that it is just one more indication that the world of the Internet is becoming less and less about technology and more and more about law and policy. more

Domaining Registrar Defeats Cybersquatting Lawsuit: Philbrick v. eNom

Philbrick's Sports is a New Hampshire retailer of sporting goods. eNom's customer registered two domain name variants of Philbrick Sport's website. When the customer didn't pay eNom, eNom took the names back for itself... Each of these domain names were parked with Yahoo, who displayed sponsored ads on the domains. Philbrick's then sued eNom, claiming cybersquatting and trademark infringement. more

Proposed Law Seeks to Expose Internet Addressing for Child Safety

U.S. Republican politicians on Thursday introduced a bill that would require Internet service providers and network operators to track the use of and maintain records for their publicly accessible wired and wireless networks. Two bills have been introduced... Each of the bills carries the title "Internet Stopping Adults Facilitating the Exploitation of Today’s Youth Act," and is referred to as the "Internet SAFETY Act." more

HTTPS Web Hijacking Goes From Theory to Practice

I've been privately talking about the theoretical dangers of HTTPS hacking with the developers of a major web browser since 2006 and earlier last month, I published my warnings about HTTPS web hacking along with a proposed solution. A week later, Google partially implemented some of my recommendations in an early Alpha version of their Chrome 2.0 browser... This week at the Black Hat security conference in Washington DC, Moxie Marlinspike released a tool called SSL Strip... more

Threat of Tiered Pricing Continues in New gTLD Guidebook Version 2

The draft New gTLD Applicant Guidebook (version 2) has been released along with an analysis of the comments to the prior version. The documents are voluminous. I glanced at the revised draft Base Agreement, and it's clearly unacceptable as there continue to be no price caps in place to protect domain name registrants... more

Resolving the ICANN-Proposed TLDs Debate

The Internet Corporation for Assigned Names and Numbers (ICANN) has recently decided to allow any entity to register a top-level domain name (TLD). The best mechanism for valuing this decision, a mechanism that outperforms crowdsourcing, blogs, and committee decisions, is the legal and easy-to-implement solution known as prediction markets.
In handing down its TLD decision, ICANN never identified the problem it was trying to solve... more

Should We Make the Possession of Malware a Crime?

In the U.S., it is a federal crime to use malware to intentionally cause "damage without authorization" to a computer that is used in a manner that affects interstate or foreign commerce. Most, if not all, U.S. states outlaw the use of malware to cause damage, as do many countries. The Council of Europe's Convention on Cybercrime, which the United States ratified a few years ago, has a provision concerning the possession of malware. Article 6(1)(b) of the Convention requires parties to the treaty to criminalize the possession of malware "with intent that it be used for the purpose of committing" a crime involving damage to a computer or data... more

A Seismic Shift: IPv4 Numbers Becoming Transferable and Consequently Property

A Tipping Point for the Internet? Catching the precise moment of a tectonic shift in a global system as large and important as the Internet may be viewed as an exercise in the improbable. However, I point out in this summary that I think we are precisely in the midst of such a shift... more

Monster.com Response to Security Breach Unacceptable

As some of us are continuing to learn this week the Monster.com service has again been successfully hacked. According to a security bulletin posted on Monster.com on January 23rd, 2009, the intruder gained access to the user database, while no resumes were apparently compromised... As a user of Monster.com what I find incredibly upsetting about this situation is that I had to find out about this through a security blog. more

Native Web Applications (NWA) vs. Rich Internet Applications (RIA)

A rewrite of the Rich Internet Application (RIA) article is my latest contribution to Wikipedia following last year's full rewrite of the Cloud Computing article (which is now finally fairly stable and one of the main authoritative sources on the topic; according to the article statistics I've just done my 500th edit, or one every eight hours on average so it's about as up-to-date as you'll find). Needless to say I agree wholeheartedly with Mozilla's Mark Finkle in saying RIA is Dead! Long Live Web Applications... more

Reply-All Creates a DDoS Attack?

One can read in an Associated Press article that the US State Department have their email system bogged down due to too many people use the Reply-All function in their email client. IT Departments have asked people to not use Reply-All and also threaten with disciplinary action. To me, that is the wrong path forward. more