On the face of it, Kieren McCarthy's Sex.com was a book that could have written itself: a notorious, well-publicised feud over the most valuable domain name in existence, between two charismatic men -- one a serial entrepreneur with a weakness for hard drugs (Gary Kremen), the other a gifted con-man with delusions of grandeur (Stephen Cohen). It's a story replete with vicious acrimony, multi-million dollar lawsuits, and rumours of gunfights between bounty hunters in the streets of Tijuana. Thankfully, McCarthy wasn't content to just bundle together all the articles he's written about Sex.com over the years and slap a cover on the front... more
Brooks is famous for many things. Many people know him best as the author of The Mythical Man-Month, his musings on software engineering and why it's so very hard. Some of his prescriptions seem quaint today -- no one these days would print out documentation on microfiche every night to distribute to developers -- but his observations about the problems of development remain spot-on. But he did so much more. more
After five years of bickering, the FCC passed an Open Internet Report & Order on a partisan 3-2 vote this week. The order is meant to guarantee that the Internet of the future will be just as free and open as the Internet of the past. Its success depends on how fast the Commission can transform itself from an old school telecom regulator wired to resist change into an innovation stimulator embracing opportunity. One thing we can be sure about is that the order hasn't tamped down the hyperbole that's fueled the fight to control the Internet's constituent parts for all these years. more
SpaceX began public beta testing of the Starlink Internet service in the northern US late last October. Since then, they have made many software updates based on the beta experience and have expanded the uninterrupted-coverage area by launching new satellites. By the end of the year, they had begun beta service in southern Canada and sent beta test invitations to a few UK users. The beta-eligibility area is expected to expand from the current 45-53 degree latitude this month or next. more
This is a hotly debated topic. Some Search Engine Optimizers (SEOs) claim that sites with a static IP address rank higher while other SEOs claim that shared hosting is just fine... that it would be stupid for search engines to penalize shared hosting since we are running out of IP addresses and so many sites are currently using name based hosting. ...I decided to run it through our statistical analysis engine to get the facts. Here is the methodology I used to answer this question. more
Anyone who knows Kenya knows it is famous for tea. And while I can now get Kenyan tea online from US companies like Starbucks, Caribou Coffee or any number of other re-sellers, like most consumers I would vastly prefer to cut out the middle man and buy my tea direct from Kenyan companies. Why not? But here's the rub... more
As the steward of .ORG, Public Interest Registry is committed to serving as an "exemplary registry" for the DNS. As part of that mission, PIR published our Anti-Abuse Principles last year that serve as our north star to address questions of abuse. As PIR has stated on many occasions, generally speaking, the DNS is not the appropriate place to address questions of website content abuse because of the blunt tool we as a registry have and the collateral damage that can be caused by suspending a domain name for a piece of content. more
The Canadian Internet Registration Authority (CIRA) is inviting experienced professionals to join its board and help guide the organization. more
Android users can choose from 3.718 million applications in the Google Play Store. When installing applications, the majority of consumers trust Google to keep their devices safe from hackers. However, the reality is different. Just back in May 2023, researchers discovered over 101 infected applications in the Android store. Many of these apps counted over 400 million downloads. more
What says the "Crystal Ball" for the Internet Governance Ecosystem in 2019? In a best case scenario, we will take three steps to Cyber-Heaven. In the worst case scenario we will take three steps to Cyber-Hell. The middle way is no "digital big bang", but some small "digital goodies" and some small "digital disasters". Stumbling further forward into the digital cyberworld. However, 2019 could also go into the history books as the year of "digital wisdom". more
Network operators rely on guidance from IP address experts because not all IP addresses used on the Internet are the same. The "reputation" of email senders is especially important because some are malicious users of the system. But identifying "senders" based on their email addresses or the individual IP address of a user presents issues that are unnecessarily complex. more
Less than nine months after the DNS root was signed, the rollout of DNSSEC across the Internet's top-level domains is approaching the tipping point. Thanks to the combined efforts of registries around the world, the new security protocol will soon be available to the majority of domain name registrants in almost a quarter of all TLDs. more
As every year, at the end of ICANN's Annual General Meeting (AGM), the new Nominating Committee (NomCom) comes together to start its work. Due to the Corona pandemic, the circumstances were slightly different; however, the 2021 NomCom kicked-off end of 2020. ICANN's Nominating Committee is charged with identifying, recruiting, and selecting nominees of the highest possible quality for key leadership positions at ICANN. more
There's a pernicious meme floating around that DomainKeys Identified Mail (DKIM) doesn't work with discussion lists, particularly those hosted on common open source software packages like MailMan. It's particularly odd to see this claim after I set it up successfully on a stock Debian server in less than half an hour, just a few weeks ago. Here's how it can, should, and does work. more
In a significant global operation, law enforcement agencies from 10 countries have severely disrupted the LockBit ransomware group, recognized as the most prolific and harmful cyber threat worldwide. more