/ Most Commented

The FBI and the iPhone: Important Unanswered Questions

As you probably know, the FBI has gotten into Syed Farook's iPhone. Many people have asked the obvious questions: how did the FBI do it, will they tell Apple, did they find anything useful, etc.? I think there are deeper questions that really get to the full import of the break. How expensive is the attack? Security - and by extension, insecurity - are not absolutes. Rather, they're only meaningful concepts if they include some notion of the cost of an attack. more

The Path Toward Increasing the Security of DNSSEC with Elliptic Curve Cryptography

How do we make DNSSEC even more secure through the use of elliptic curve cryptography? What are the advantages of algorithms based on elliptic curves? And what steps need to happen to make this a reality? What challenges lie in the way? Over the past few months we've been discussing these questions within the community of people implementing DNSSEC, with an aim of increasing both the security and performance of DNSSEC. more

The Growing Threat of Cybersquatting in the Banking and Finance Sector

The apparent cyber heist of of $81 million from the Bangladesh central bank's U.S. account may cause some people to question the security of online banking. While the online theft prompted SWIFT - a cooperative owned by 3,000 financial institutions around the world -- to make sure banks are following recommended security practices, the incident also could have ramifications for banking customers worldwide. more

Google in Early Stages of Expanding Internet Access in Cuba

Google has announced that it is working to bring high-speed internet to Cuba, one of the world's least-connected countries. In a blog post published Monday, the company said it is bringing Chromebooks, Cardboard virtual reality kits, and other Google products to the Museo Orgánico Romerillo in Havana, where they will be connected to an internet network operated by the government-owned carrier ETECSA. more

ICANN 55, Marrakech: Witnessing a Historic Event, Community Empowered Work Continues

Earlier this month, MarkMonitor representatives were privileged to witness, at the first ICANN meeting of 2016 in Marrakech, Morroco, the historic presentation of the plan to transfer the stewardship of key internet functions (IANA) from the United States Government to a community and consensus-based model of governance through ICANN (Internet Corporation for Assigned Names and Numbers). more

Reflections on Joe Cannataci’s First Report

Joseph Cannataci recently submitted his first report as UN Special Rapporteur on the right to privacy - a brand new position, created in July 2015 in the wake of the German-Brazilian initiative for a UN resolution on privacy in the digital age. The report includes a description of Cannataci's working methods, a general overview of privacy-relevant topics, and a 'Ten point action plan' - described as a to-do list for the post holder, rather than a mere wish list. more

FBI, Apple Hearing Over iPhone Encryption Halted

FBI says it may have found a way to unlock Syed Rizwan's iPhone without Apple's help and while exploring this option, a federal judge has postponed tomorrow's hearing. more

Registering and Monetizing Personal Names

At the top of WIPO's list of the most cybersquatted trademarks for 2015 (issued on March 18, 2016) is "Hugo Boss" with 62 complaints. The report also reveals that the fashion industry led other commercial sectors with 10% of complainant activity. Not surprisingly, in this sector companies (couturiers extending their services to the general public) are branded with the personal names of their founders. Why any registrant would intentionally target well-known personal names in the fashion industry is a mystery because there's no future in it. In fact, complaints are never answered and always successful. more

Welcome to Notflix! Your Streaming-Free ISP with the Best Quality of Experience!

It has been widely taken as "obvious" that a "no blocking" rule for ISPs is a good regulatory policy. Is this really the case? Does it save consumers from harm... or cause harm? Netflix has reached the point of being well over 30% of Internet traffic at peak time for some ISPs. This places three costs on the ISP and its users... So for someone who isn't a streaming video user, they are paying a share of the direct costs. more

What Will the Internet Look Like in the next 5 - 7 Years?

We all know that the Internet is one of the most important tools of our time, but we can't afford to take the Internet -- or its future -- for granted. There are uncertainties facing the Internet's future and how they evolve will have a profound impact on society and our ability to solve some of the world's biggest challenges... To help answer these and other questions, the Internet Society is embarking on a collaborative initiative to envision scenarios for the evolution of the Internet. more

What is the Intellectual Property Constituency (IPC)?

As a longtime member of ICANN's Intellectual Property Constituency (IPC), I'm impressed by the important work that this group does on behalf of trademark owners worldwide (as I've written before). While some die-hard IPC members spend countless (and, often, thankless) hours working virtually and in-person (at ICANN's global meetings) for the constituency, I find it very educational and worthwhile to participate on an ad-hoc basis. more

Internet Infrastructure Coalition (i2Coalition) Joins M3AAWG to Reduce Hosting Industry Abuse

The Internet Infrastructure Coalition (i2Coalition) has joined the Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) to continue efforts on developing best practices for hosting and cloud service companies as well as sharing other information that will protect end-users. more

US Congress Hearing on “Privatizing IANA” - Thursday, March 17 (Live Video Feed Available)

On Thursday, March 17, 2016, a U.S. Congressional committee will hold a hearing on the topic of "Privatizing the Internet Assigned Numbers Authority" (IANA) starting at 10:15am US EDT (UTC-4). You can learn about the hearing and view the written testimony at and watch live on the included pages. The hearing is before the Communications and Technology Subcommittee of the U.S. House of Representatives Energy and Commerce Committee. more

SIP Trunking: Common Pitfalls and Quick Fixes

With companies shifting away from on-premises and "traditional" telecom networks to Internet-based protocols - such as Voice Over IP (oIP) - the market for critical communications infrastructure - most notably SIP trunking - is on the rise; not only multiple failover sites but cloud-based SIP-as-a-service solutions are now popular options. However, there's a caveat: problems unique to SIP systems that can cause IT headaches if you're not prepared. Here are three of the most common. more

Charter Approved to Review All Rights Protections Mechanisms in All Generic TLDs

On March 9th, 2016, during its final open meeting at ICANN 55 in Marrakech, Morocco, the Generic Names Supporting Organization (GNSO) Council approved a motion that I proposed to adopt the Charter of the Policy Development Process (PDP) to Review all Rights Protections Mechanisms (RPMs) in all Generic Top-Level Domains. I serve on the Council as one of the two representatives of ICANN's Business Constituency, and my fellow Councilors have designated me to serve as the GNSO's Liaison to the Working Group (WG), and as its Interim Chair. more