Many of you will have seen news stories that explained what was going on: a huge DDoS attack on the infrastructure of Dyn had taken down access to many large websites like Twitter. A great deal of digital ink has since been spilled in the mainstream press on the insecurity of the Internet of Things, as a botnet of webcams was being used. Here are some additional issues that might get missed in the resulting discussion. more
Question: why has air travel become so painful? Because the threat posed by bad actors requires making everyone jump through hoops before letting them board a plane. To the point that, despite obvious requirements to ensure air safety, some are now openly questioning if the cure is not worse than the disease. Registering a domain name could be about to go the same way. more
With cybercrime on the rise, companies in 2021 have experienced increased ransomware attacks, business email compromise (BEC), phishing attacks, supply chain attacks, and online brand and trademark abuse. While domain cyber risk is rising, the level of action being taken by Forbes Global 2000 companies to improve their domain security posture has remained unchanged, leaving these companies exposed to even more risk. The risk of not addressing your domain security can be catastrophic. more
There was one obvious take-away from this week's ICANN meetings in Toronto, and for once it was less about policy and more about geography. Simply put, Africa is really - finally - coming together at ICANN, with a new energy, new unity and lots of new participation from African participants. And from top to bottom, the ICANN community seems to be taking notice. more
Expect a charm offensive as Comcast and scores of sponsored researchers explain how acquiring Time Warner Cable will promote competition and enhance consumer welfare. You might not hear too much about two traditional concerns remedied by actual facilities-based competition: incentives to innovate and reduce prices. Comcast will frame its acquisition as necessary to achieve even greater scale to compete with other sources of video content and maybe to compete with the limited other sources of broadband access. more
How are domain names dealt with in Russia? This article discusses current issues related to the registration and assignment of domain names in ".ru" zone (Russian top level country code domain) and trademark protection on Internet. more
The WIPO Arbitration and Mediation Center on Monday announced it had registered its 50,000th "cybersquatting" case. The 50,000th case just received by WIPO coincides with the organization's 20th anniversary on November 20, 2020. more
The great promise of the new gTLD programme is not that it will spawn dozens of .COM clones, but rather that it will lead to the creation of a global constellation of unique names embraced by specific interest groups. As an ICANN community, our challenge now is to ensure that the policy framework we've created to manage new gTLDs advances that vision by not penalising the very sorts of domains that the programme was designed to encourage. more
Around 2014, as Stephen (Steve) J. Lukasik proceeded well into his 80s, he began to consider ways to capture the enormous sweep of activities and history in which he was a key figure. Indeed, that sweep was so broad and often compartmentalized, and his output so prolific, that even his closest associates only knew of slices of his accomplishments. So he began sorting through his career and produced this autobiographical essay on his accomplishments at ARPA that is being made posthumously available now. more
Well, I have remained silent on this issue for now -- mainly because of conflicts. I was one of a few members of the technical advisory group asked by VeriSign to look at Site Finder and ask the questions -- what does it add, what does it break, and how can we fix anything it breaks? The scope of the group was unlimited by any VeriSign edict and the members were of impeccable individual credentials. This group has now completed its work so I feel able to comment. more
As far back as 2011 we predicted that Apple would eventually enter the voice market. We indicated at that time that it was just a matter of time -- in the end it took another three years... While it didn't happen at Christmas that year the company is now ready and will use the VoLTE service to enter this market, which will make it possible to replace Telstra with any other mobile operator around the world... he telcos are not ready for this. While they should be seen as the leaders in the voice call market they are too preoccupied with protecting their traditional business and it is companies like Apple and Samsung who are now leading the charge. more
Responding to the .xxx intervention by the US Commerce Department, the Internet Governance Project has produced a "STATEMENT OPPOSING POLITICAL INTERVENTION IN THE INTERNET'S CORE TECHNICAL ADMINISTRATIVE FUNCTIONS." You can view the statement here and add your name as a signatory at the bottom. Over 60 people have endorsed it. The Statement claims that "The NTIA's recent intervention in the .xxx proceeding undermines assurances" that the U.S. government's special unilateral authority over ICANN "would never be used to shape policy but was only a means of protecting the stability of the organization and its processes." The NTIA's open acknowledgment of the influence of religious groups made the intervention particularly dangerous. more
It may not be widely-known but the big 3 search engines -- Google, Yahoo! and Bing -- have established procedures for removing natural search results on the basis of the Digital Millennium Copyright Act (DMCA). That's good news for brand owners: if consumers can't find infringing websites via the search engines, they're less likely to come across them at all... more
Rather than blathering on to the blogosphere about the superficial features of Google's new Chrome browser I've spent some time studying the available material and [re]writing a comprehensive Wikipedia article on the subject which I intend for anyone to be free to reuse under a Creative Commons Attribution 3.0 license rather than Wikipedia's usual strong copyleft GNU Free Documentation License (GFDL). This unusual freedom is extended in order to foster learning and critical analysis, particularly in terms of security. more
I can't help but think that the situation in this rather old joke applies very precisely to the current Australian efforts to compel network operators, through some contemplated regulatory instrument, to record and retain network-collected data about their customers' online activities. What I'd like to examine here the emerging picture that while networks, and network operators, make convenient targets for such surveillance efforts, the reality of today's IP network's are far more complex, and Internet networks are increasingly ignorant about what their customers do. more