/ Most Viewed

Will a Global TAR Make DNSSEC Stick?

Two US Government contractors and the National Institute of Science and Technology have released a white paper, "Statement of Needed Internet Capability," detailing possible alternatives and considerations for a Trust Anchor Repository (TAR) to support DNSSEC deployment. The document was released through the DNSSEC-Deployment Group this week with a request that it be circulated as widely as possible to gather feedback. A Trust Anchor Repository (TAR) refers to the concept of a DNS resource record store that contains secure entry point keys... more

A Cool Simulation of SpaceX’s Revised Satellite Broadband Plan

On November 15, the FCC approved a revision to the plan for Starlink, SpaceX's forthcoming broadband satellite service. The new plan reduces the number of satellites from 4,525 to 4,409 and lowers the altitude of the phase-1 satellites from 1,100 to 550 km. Mark Handley, a professor at University College London, has created videos based on simulations he ran of both the original and revised phase 1 plans. more

Will the Trademark Clearinghouse Fulfill its Potential?

ICANN created the Trademark Clearinghouse (TMCH) as a way to streamline the repetitive process forced on trademark owners during the launch of new top-level-domains. With the expected tsunami of hundreds of new TLD's starting later this year, the TMCH should generate a clear benefit for trademark owners who elect to participate in Sunrise and Claims Periods. The side effect of introducing new TLDs is that the legacy TLDs will be making changes to make sure they are competitive against the new TLDs. more

IGF 2024 in Riyadh: AI, WSIS+20 and the Global South

"Building our Multistakeholder Digital Future" was the theme of the 19th edition of the UN-based Internet Governance Forum (IGF). It attracted more than 11.000 participants (Offline and Online) from all over the world in Riyadh/Saudi Arabia, December 15-19, 2024. In the 307 plenaries, workshops, open fora, lightening talks and other conversations in the meeting rooms and the lobby halls of the King Abdulaziz International Conference Center (KAICC), nearly everything... more

Another Free Registry Software Option

Google has recently announced the release of Nomulus, its free, open source registry software, triggering discussion of its impact on the industry. Afilias has over 15 years of experience in registry operations, and offers the following initial thoughts... First, free registry software is not new.CoCCA has offered this option for years, and TLDs such as .CX (Christmas Island) and .KI (Kiribati) use it. It is supported on a "best efforts" basis and appears to meet the limited needs of a few small operators. more

How Tiered Internet Pricing Could Actually Facilitate P2P

Time Warner Cable's planned experiment with tiered charging for Internet access has generated a flurry of coverage in the blogsphere, but no new insights (at least that I've seen). The primary problem ISP's complain about is that 5% of their customers use 90% of the available bandwidth and when they examine this traffic, it's mostly peer-to-peer file sharing... more

Comcast 1, E360 0

The judge in E360 vs. Comcast filed his order yesterday (read previous postings here and here), and to put it mildly, he agreed with Comcast. It starts: "Plaintiff e360Insight, LLC is a marketer. It refers to itself as an Internet marketing company. Some, perhaps even a majority of people in this country, would call it a spammer." ...and from E360's viewpoint, goes downhill from there. more

Minimum Disclosure: What Information Does a Name Server Need to Do Its Job?

Two principles in computer security that help bound the impact of a security compromise are the principle of least privilege and the principle of minimum disclosure or need-to-know. As described by Jerome Saltzer in a July 1974 Communications of the ACM article, Protection and the Control of Information Sharing in Multics, the principle of least privilege states, "Every program and every privileged user should operate using the least amount of privilege necessary to complete the job." more

The Trademark Clearinghouse: Secure, Reliable, Usable - Pick Any Two

Earlier this week, technical and legal experts from ICANN, Deloitte and IBM met in Brussels with their counterparts from registrars and registry service providers representing as much as 90% of prospective gTLD registries, to discuss the technical implementation of the Trademark Clearinghouse, the database of rights holder information that will support the mandatory rights holder protection mechanisms for new gTLDs. more

Is America Getting More Like China?

Since Obama became President -- and yes, I voted for him -- there has been a great deal of optimism and energy around the idea that the Internet can be used to improve or "reboot" our democracy. The Administration has hired some great people to work on making government more open and transparent. This is all great. But how much good will all of this nifty e-government do for American democracy if citizens' rights to privacy and free expression are not also fiercely defended? more

ICANN New gTLD Program SWOT Analysis: WEAKNESSES (Part 2)

The SWOT analysis (alternatively SWOT Matrix) is a structured planning method used to evaluate the Strengths, Weaknesses, Opportunities, and Threats involved in a project or in a business venture. The following is an attempt to apply the SWOT Analysis to ICANN's new gTLD program. more

What Could the RIAA’s Switch in Strategy Mean?

The Wall Street Journal and others are reporting that the Recording Industry Association of America is adjusting its strategy for combating the massive infringement occasioned by the sharing of music files over the internet. Since 2003, that strategy has been to pursue copyright infringement cases against individual file sharers. The RIAA now says it will focus less on pursuing infringement litigation and more on working with internet service providers to shut down the accounts of individuals suspected of illegally trading files. more

The Myth of Population Density and the High Cost of Broadband

One of the enduring myths that is used by apologists for incumbent broadband operators as to the high cost of broadband in Canada and the US is our low population density.
Since Canada and the US have low population density compared to The Netherlands or South Korea, they argue that therefore the cost of delivering broadband will be significantly higher because of the much greater distances that need to be covered. more

Registration Patterns of Deceptive Domains

A key requirement for a bad actor wanting to launch a brand attack is the registration of a carefully chosen domain name. The most convincing infringements frequently use a domain name that's deceptively similar to that of the official site of the target brand. This allows a variety of attacks to be executed, including phishing attacks... more

FCC Grants ISPs Temporary Access to Wireless Spectrum to Help Handle Demand During Pandemic

The FCC's Wireless Telecommunications Bureau today granted temporary spectrum access to 33 wireless Internet service providers serving 330 counties in the U.S. to help them serve rural communities facing an increase in broadband needs during the COVID-19 pandemic. more