/ Most Viewed

Wrap-up: ICANN 46 in Beijing

Earlier this April, the largest ICANN meeting ever -- more than 2,500 attendees -- kicked off in Beijing. Given the imminent addition of hundreds of "dot Brands" to the Internet, the topic of new gTLDs was at the top of the discussion list for all attendees. So far, well over 100 new gTLD applications have passed the Initial Evaluation stage, meaning they're on their way to becoming live domains. more

Ending Cyber-Hubris

Hurricane Katrina will lead the endless finger pointing about what should have been done to strengthen the levees before the storm. However, as a former senior FEMA official under the Clinton Administration explained, "There's only two kinds of levees. Ones that have failed and those that will fail." The same is true for cyber-levees.  more

NETmundial Initiative Taking Positive Steps Forward

The Net Mundial conference in Sao Paulo in April 2014 added a new element to the global Internet Governance Ecosystem. It demonstrated that the multistakeholder model for the governance of the Internet is able, not only to discuss issues of global importance, as we do it now for nearly ten years within the Internet Governance Forum (IGF), but it can also produce a concrete outcome. The Universal Declaration of Internet Governance Principle and the Sao Paulo Roadmap have enhanced the existing mechanisms. more

Why Do We Accept $10 Security on $1,000,000 Data?

Last week we heard of yet another egregious security breach at an online provider, as crooks made off with the names, address, and birth dates of eBay users, along with encrypted passwords. They suggest you change your password, which is likely a good idea, and you better also change every other place you used the same password. But that's not much help since you can't change your name, address, and birth date, which are ever so handy for phishing and identity theft. more

Panels Rule No Confusion Exists Between Singular and Plural New gTLD Strings

If early International Centre for Dispute Resolution decisions are anything to go by, as far as dispute resolution panellists are concerned, singular and plural versions of the same string do not risk causing user confusion. Tasked with handling string confusion objections under the new gTLD program, the ICDR has just rejected an objection by Google against Donuts' application for .CARS. Google has applied for .CAR. more

Fiber to the Home: ‘Awesome’ - But What Is Its Purpose?

Two approaches can be taken towards the development of Fiber to the Home (FttH). One is all about its commercial potential - the sale of the most awesome commercial applications in relation to video entertainment, gaming and TV. The other is a perhaps more sophisticated approach - from the perspective of social and economic development. Of course the two are not mutually exclusive. more

Washington State Passes Country’s Toughest Net Neutrality Legislation

Washington may be the first state to approve a net neutrality law that applies to all wired and wireless Internet providers in the state. more

Do “brandsucks.com” Names Really Have a “Destructive Potential”?

"'Sucks.com is the rightmost anchor of nearly 20,000 domains registered today. Two thousand domains have 'stinks.com' on the right and about the same number of domains begin with the term 'boycott'," write the authors of the recently released paper The Power of Internet Gripe Sites. According to their (interesting) study, 35% of the "brandsucks" domains are owned by the brand while 45% are available for registration. They thus advise brand owners "to take a serious look at the traffic that these names garner and the kind of unique marketing opportunity they can afford." ...I do not fully agree with their conclusions... more

Microsoft Warns Extortion Drives Majority of Attacks Amid AI Escalation, Identity Collapse, and Global Fragmentation

Microsoft's latest Digital Defense Report reveals how cybercriminals and nation-states are rapidly adopting AI to enhance attacks. With identity-based threats soaring, the company urges urgent modernization of security systems and global cooperation. more

Lawyer-Impersonator Pleads Guilty over False C&Ds

As if there weren't enough problems with lawyers sending out improper cease-and-desists, Wired News reports that a Nevada man has pleaded guilty to impersonating a lawyer to extort domain registrants to turn over their domain names. "A Nevada man pleaded guilty Thursday to his plotting to steal domain names from their legitimate owners by impersonating a California intellectual property lawyer and send threatening letters to domain name owners in hopes of convincing them to turn over the domains to him..." more

Regional Internet Registries Conducting Internet Community Consultation on ITU IPv6 CIR Proposal

The Regional Internet Registries are conducting a Internet community consultation process regarding the recent ITU IPv6 Country Internet Registry (CIR) proposal. In collaboration with the other Regional Internet Registries, APNIC hosted a special session at APNIC 29 / APRICOT 2010 to give the global Internet Community an opportunity to discuss the issues and ramifications of the alternative model proposed by the ITU. For those interested in the outcome of the recent face-to-face session, a raw transcript and session summary statement are available... more

IANA: The World Loses if the Technical Industry Checks Out

On Friday, 14 March 2014, the U.S. Department of Commerce National Telecommunications and Information Administration (NTIA) announced its intention to transition the IANA functions to the global multistakeholder community. As expected, the announcement has sent adrenaline coursing through the veins of Internet governance experts and government policy people the world over. I'd argue, however, that it is an important point for the Internet's technical experts to sit up and take notice, as well: the fact that you are probably saying "what problem does this solve?" is a testimony to how much works well today, and we want to make sure it continues to work well in any future arrangements. more

Cryptographic Tools for Non-Existence in the Domain Name System: NSEC and NSEC3

In my previous post, I described the first broad scale deployment of cryptography in the DNS, known as the Domain Name System Security Extensions (DNSSEC). I described how a name server can enable a requester to validate the correctness of a "positive" response to a query -- when a queried domain name exists -- by adding a digital signature to the DNS response returned. more

The Impressive Growth in Global Internet Stats (2011)

The ITU launched its latest statistics report, the World in 2011: ICT Facts and figures, which revealed impressive growth in a number of areas such as global internet use, particularly in developing countries. The report included further key details such as: "One third of the world's population are forecast to be online by the end of 2011..." more

On Why and How the Internet Needs to Be Governed

The World is not inventing Internet Governance. Internet is already being governed. There is governance, but without a formal structure -- the structure is undefined like a round table... The opponents of the concept of Internet Governance perhaps believe that the essential character of the Internet is preserved best by challenging the very concept of Governance. The words "Governance", "Control", "Regulation" or even "Coordination" are mistaken to be invasive to the essential character of a free, open and user-centric internet. more