Recently, I entered my domain name in a "WHOIS" database query to test the results of the database by using WHOIS on a number of domain name registrar websites. WHOIS is a database service that allows Internet users to look up a number of matters associated with domain names, including the full name of the owner of a domain name, the name of the domain name hosting service, the Internet Protocol or I.P. number(s) corresponding to the domain name, as well as personally identifying information on those who have registered domain names. I was astonished to find... more
For about 3 years I had been studying graphic design and finally after much searching decided to use bmw-design.com for my domain name. I chose bmw for my initials Bernadette Maria Walker. I searched for availability on Network Solutions and was happy to see that it had not been taken, so I registered my new domain name. This all seemed very innocent to me and I even designed my logo around this name. Then 5 days later I got this letter via FedEx from BMW Motor Company in Germany... more
AI-powered "vibe-coding" is transforming domain registration from manual search into automated, conversational infrastructure, embedding domains directly into software workflows while elevating them into machine-verified trust anchors in an increasingly AI-mediated internet. more
America has barred imports of new foreign-made routers, citing cybersecurity risks tied to espionage and infrastructure disruption, signalling a broader push to reduce reliance on Chinese technology in critical network systems. more
Self-propagating malware hidden in open-source software is targeting Iranian systems, wiping data on infected machines while sparing others, signalling a shift towards precise, politically motivated cyber sabotage through widely trusted digital supply chains. more
India's digital welfare systems, built without universal acceptance, have excluded millions from vaccines, wages and food, revealing how technical design choices can entrench inequality and reshape access to basic rights across rural regions today in India. more
Regional Internet registries, built for coordination, now sit atop scarce IPv4 assets while bearing little liability, suppressing capitalization and imposing "double extraction" that weakens operators, distorts markets and threatens the stability of global internet uniqueness. more
A surge in AI startups has exposed a domain-name shortage as premium .ai addresses vanish. With ICANN's next round years away, legacy TLDs and repurposed namespaces are racing to capture unmet demand. more
A dispute over 6.2m IPv4 addresses at AFRINIC exposes how litigation and market incentives could erode regional stewardship, setting a precedent that risks turning the Internet's allocation system into a vehicle for global arbitrage. more
As ICANN opens its 2026 round, firms sharing trademarks must weigh applying for a .BRAND domain against legal risks and competitive loss, with evidence suggesting first movers gain advantage while objections rarely prevail. more
A once-trusted internet protocol is showing its age. DNSXplore, a global DNSSEC archive, exposes weaknesses, improves diagnostics and nudges adoption, helping secure the cryptographic chain underpinning online trust. more
Internet number resources, once clerical entries, now underpin real economic value, exposing a mismatch between registry power and accountability, while misplaced political narratives obscure the case for decentralised, operator-led control. more
Africa's internet registry crisis reflects not abstract design flaws but sustained legal and market pressure, as scarce address resources are drawn into global arbitrage, challenging stewardship and exposing the fragility of regional digital governance. more
AWS has quietly acquired nine million more IPv4 addresses, turning internet scarcity into strategic leverage. As hyperscalers consolidate dwindling supply worldwide, IPv4 is evolving from legacy protocol into a profitable infrastructure moat for cloud giants. more
The FCC warns telecom companies of rising ransomware threats after attacks quadrupled since 2022. The agency urges stronger defenses including patching, multifactor authentication, network segmentation, and closer oversight of vendors and incident response planning. more