Michael Froomkin, a Professor of Law at the University of Miami School of Law and one of the founding members of ICANNWatch has recently written an article for the Harvard Law Review called, "[email protected]: Toward a Critical Theory of Cyberspace". One of the areas covered in this article is a comparison made between the ICANN model and that of the Internet Engineering Task Force (IETF).
Michael Froomkin has underlined several lessons that can be learned from this contrast, including a suggestion "that claiming kinship with the IETF model is a way of claiming legitimacy, but that not every one who makes this claim is entitled to do so".
What follows is a two-part interview with Michael Froomkin and a closer look at his recent article in the Harvard Law Review. more
I've been looking into IP address filtering by content providers. I understand that IP addresses can be attached with confidence to geographical locations (at the country level, at least) about 80% of the time. You have to make up the rest with heuristics. So there are companies that are in the business of packaging those geolocation heuristics for sites. ...How widely are these services used? ...does it now make sense to put content sites to the burden of complying with the laws applicable to the people/machines they know are visiting them? more
Cisco's security arm, Talos, today revealed a several-month-old research on a sophisticated modular malware system dubbed "VPNFilter. more
Internet Archive contains a vast library of screenshots of websites that its Wayback Machine captures sporadically over the course of domain names' histories. While it doesn't compile daily images it opens a sufficient window to past use which is unique, invaluable, and free. (There are also subscription services, but they come at a hefty cost!). How it's used (and why the Wayback Machine should be in a party's toolkit) for supporting and opposing claims of cybersquatting is illuminated in a number of recent UDRP cases. more
The UK government is proposing new regulations to strengthen cyber resilience in the private sector. Their intention is to expand cybersecurity rules for critical infrastructure (CI) operators to include managed service providers (MSPs), more stringent breach notification requirements, and legislation to establish the UK Cyber Security Council as the standards development organization for the cybersecurity profession. This is a welcomed development, but more details about implementation and enforcement are needed. more
In January Jörg Schweiger, DENIC's CTO from 2007 to 2014 and CEO since 2014, announced he was stepping down from his position in December. It's been quite a ride, and the domain name industry has evolved quite a lot. So we asked Jörg a few questions about his time with DENIC and the changes he's seen... he came up with some insightful views on why he thought new TLDs missed a great opportunity to do something with "innovative new business models," the importance of security to DENIC... more
Researchers at security service provider, Zscaler, are reporting that in the past six months they have blocked over 2.5 billion web-based cryptomining attempts within their cloud service. more
The DNS is normally a relatively open protocol that smears its data (which is your data and mine too!) far and wide. Little wonder that the DNS is used in many ways, not just as a mundane name resolution protocol, but as a data channel for surveillance and as a common means of implementing various forms of content access control. But all this is poised to change. more
The phenomenal growth of the Internet has resulted in a proliferation of domain names. The explosion of '.com' registrations coincided with an increase in domain name disputes, and with it the legal branch of intellectual property devolved into virtual mayhem. ICANN's Uniform Domain-Name Dispute-Resolution Policy (UDRP) was created... The UDRP was brought into force in October 1999, and it can be said that it has contributed handily to the resolution of domain name disputes. However, deeper investigation into the UDRP paints a different picture. more
The DNSSEC Industry Coalition conducted its first face to face meeting on Friday, March 13, 2009 at Google's Washington, DC office. Google's fun filled meeting room was packed with organizations that share a keen interest in DNS Security through the implementation of DNSSEC. more
According to a report from the World Intellectual Property Organization (WIPO), trademark owners filed a record 3,447 cases under the Uniform Domain Name Dispute Resolution Policy (UDRP) with WIPO's Arbitration and Mediation Center in 2018. more
I'm not even sure how to begin this post, but let me tell you -- my head explodes when I try to contact WHOIS "contacts" about criminal activity - FAIL. I think ICANN wants to do the right thing here, and has stated on multiple occasions that inaccurate WHOIS data is reason for registrar termination. That's a Good Thing... more
regarding the new gTLD applications and, unfortunately, I have been largely disappointed with the substance of most of them. Too many of the earliest comments express concern over the possibility of having more adult-related extensions. Okay, we hear you... Also, with all due respect to the supporters of Dadotart's application, I appreciate the display of loyalty to this particular applicant but if I have to read another comment from an "impassioned supporter" of the .ART application, I will bang my head on my desk. more
An anonymous writer posted an article titled Time for Reformation of the Internet on Susan Crawford's blog. The article calls for a liberal approach towards ICANN, making a number of references to IETF and its process. "It's time for netizens to come to a similar realization about their direct relationship with the empowerment offered by the internet. None of the core principles that produced the net give any set of clerics -- even the original engineers, or ISOC, much less ICANN -- the right to prevent innovation at the edge..." more
This past week we have been seeing some heavy CNN spam -- that is, spam in the form of breaking news stories from CNN.com... These all look like legitimate news stories, and indeed, they probably are taken straight from an actual CNN news bulletin (I don't subscribe so I wouldn't know). Indeed, the unsubscribe information and Terms of Use actually link to actual CNN unsubscribe pages. However, if you mouse-over all of the news links, they go to a spam web page wherein the payload is either a spam advertisement or you click on another link to download a file and flip your computer into a botnet. more