News reports say that the Israeli government is close to passing a law that requires portable e-mail addresses, similar to portable phone numbers. Number portability has been a success, making it much easier to switch from one provider to another, and address portability might ease switching among ISPs. But e-mail is not phone calls. Is it even possible? more
The gains announced Monday include an additional 570,000 U.S. subscribers, slightly more than Netflix's management predicted. The quarter is typically the company's slowest of the year, as people spend more time outdoors instead of watching video. Netflix ended June with 36.2 million subscribers in the U.S. and another 13.8 million customers in roughly 40 other countries. The Los Gatos, California, company picked up 1.1 million subscribers outside the U.S. in the second quarter, a figure that also topped management's projections. more
For the purpose of this article it is not necessary to concentrate too much on defining what a Premium domain name is and what it is useful for: all that we need to know is simple, a premium domain name is often a memorable generic name, short or medium in length and highly valuable due to its relevance in search. However, when it comes to finding out how to register a premium domain name then it becomes much more difficult because you won't necessarily know where to go. more
For complainant, the second leg in determining cybersquatting under the Uniform Domain Name Dispute Resolution Policy (UDRP) is evidence respondent lacks both rights and legitimate interests in the challenged domain name (Paragraph 4(a)(ii)). I underscore "both" because proving one but not the other is not good enough. This seems obvious, so why suggest there is something to explore about "rights" and "legitimate interests" if their meanings hardly need explication? more
A look into the past reveals that continuous developments in weaponry technology have been the reason for arms control conventions and bans. The banning of the crossbow by Pope Urban II in 1096, because it threatened to change warfare in favour of poorer peasants, the banning of poisoned bullets in 1675 by the Strasbourg Agreement, and the Geneva protocol banning the use of biological and chemical weapons in 1925 after world war 1, all prove that significant technological developments have caused the world to agree not to use certain weapons. more
A couple of recent articles have caught my attention because they offer scathing criticism of ICANN. The first is a long and convoluted article by Kieren McCarthy on the .JOBS debacle. Kieren has basically written a feature that only a seasoned ICANN insider can hope to understand and that's a pity, because the points he makes appear very valid. Namely that ICANN is incapable of looking at itself in the mirror and admitting when it's wrong. more
Pretty much as long as there've been computers, one of the biggest challenges has been user education. How do you create software smart enough to inform a user when they're about to do something potentially disastrous - or, worse, when something disastrous has been done to them? As one of the world's largest access providers, Comcast has put a ton of thought into developing a notification system for their users. The solution Comcast developed involves, in effect, hijacking HTTP requests... more
In politics, as in Internet policy, the most effective weapons are also the oldest. So when it came time for hard-line intellectual property advocates to make a desperate last stand against the new gTLD program, it came as no surprise they turned to the atomic bomb of rhetorical devices: FUD. FUD stands for "fear, uncertainty and doubt" and it is the tool of last resort when change is coming and you want to stop it. The theory is simple: the human response to fear is to cling to what's familiar and oppose what's new. So if you can scare enough people about the potential effects of a new policy or law, you stand a pretty good chance of preventing it from ever going into effect. more
The April NETmundial meeting was a seminal event in the history of Internet Governance. Fears that the meeting might fail to reach consensus were not realized. Instead, the participants achieved a high degree of harmony -- the "Spirit of NETmundial" -- that resulted in issuance of a consensus Statement that, while lacking in precise detail, was effused with positive energy. Since that meeting there has been considerable discussion within the Internet Governance (IG) community as to what lessons have been learned from NETmundial, and how its work might best be carried into the future. more
On Monday, the Trump administration announced plans to auction off 100 megahertz of mid-band spectrum dedicated initially to military purposes for commercial use starting in mid-2022 to fuel 5G network deployment in the United States. more
Cybercriminals are leveraging the growing popularity of artificial intelligence to perpetrate attacks, capitalizing on the surge in interest following the release of chatbot technologies like ChatGPT. New research by Netcraft reports on the increasing use of .ai domain names where criminals use malicious websites around AI to draw in victims. more
As an applicant in this new gTLD round with quite a few overlapping strings, I've had a keen interest in the various proposed auction platforms. In the past six months the ideas behind private auction have matured significantly and I now see it as a strong mechanism for resolving contention. Following are my observations. more
This is the first in a series of releases that tie extensive code injection campaigns directly to policy failures within the Internet architecture. In this report we detail a PHP injection found on dozens of university and non-profit websites which redirected visitor's browsers to illicit pharmacies controlled by the VIPMEDS/Rx-Partners affiliate network. This is not a unique problem, however the pharmacy shop sites in question: HEALTHCUBE[DOT]US and GETPILLS[DOT]US should not even exist under the .US Nexus Policy. more
The DNS Abuse Institute recently published our sixth monthly report for our project to measure DNS Abuse: DNSAI Compass ('Compass'). Compass is an initiative of the DNS Abuse Institute to measure the use of the DNS for phishing and malware. The intention is to establish a credible source of metrics for addressing DNS Abuse. We hope this will enable focused conversations, and identify opportunities for improvement. more
Akamai Technologies today released its Third Quarter, 2015 State of the Internet Report with updates on IPv4 exhaustion and IPv6 adoption. more