/ Most Viewed

A Lesson from the Environmental Protection Agency (EPA) in Domain Name Disputes

While the U.S. Environmental Protection Agency (EPA) has been making news as the result of controversial changes brought about under the new Trump administration -- including the planned removal of "several agency websites containing detailed climate data and scientific information" -- the EPA also has generated some (lesser-known) domain name news: The agency won a decision under the Uniform Domain Name Dispute Resolution Policy (UDRP) for the domain name noattacks.org. more

Advantages of gTLD Portfolio Ownership

The essay outlines the advantages to owners of managing a portfolio of gTLDs. The advantages can lead to concentrations of ownership in a few hands, which is unavoidable but not necessarily harmful to consumers. Moreover, some of the advantages can lead to profitable complementary business models. Beyond the obvious advantage of economies of scale that lead to reductions in operating costs, there are a number of other sources of advantage. more

Amazon’s Satellite Ambitions Finally Lift Off: Project Kuiper Enters the Low-Earth Orbit Race

After several delays due to bad weather, Amazon's Project Kuiper finally launched its first batch of low-orbit broadband satellites on April 28. The company says it is in communication with all 27 new satellites. Amazon used a United Launch Alliance (ULA) Atlas V rocket launched from Cape Canaveral. Amazon is under pressure to get the launches going and has a commitment to the FCC to launch 1,618 satellites by July 2026. more

Telecom Heroics in Somalia

Internet service in and around Mogadishu, Somalia suffered a crippling blow recently as the East African Submarine System (EASSy) cable, which provides service to the area, was cut by the anchor of a passing ship. The government of Somalia estimated that the impact of the submarine cable cut was US$10 million per day and detained the MSC Alice, the cargo vessel that reportedly caused the damage. more

Caring About Cybersecurity or Preparing the Ground for an I-Patriot Act?

Few months ago in a talk given at the Institution of Engineering and Technology organised here in London by the Society for Computers and Law, Professor Lessig recounted a conversation he had with former US Counter Terrorism Czar Richard Clarke, where Larry asked the question that many had in mind... how the US Government managed to conceptualize, design and draft a piece of legislation as vast and complex as the USA PATRIOT Act in such a short period of time (a month and 15 days after 9/11), and the answer was what many people had imagined... more

Encryption, Our Last Line of Defense

Encryption is fundamental to our daily life. Practically everything we do online makes use of encryption is some form. Access to our financial transactions, health records, government services, and exchanged private messages are all protected by strong encryption. Encryption is the process of changing the information in such a way as to make it unreadable by anyone except for those possessing special knowledge (usually referred to as a "key"), which allows them to change the information back to its original, readable form. more

Internet Governance Survey: What You Told Us

What do people perceive to be the top issues facing the Internet today? How can stakeholders work more effectively together to strengthen the governance mechanisms meant to address these issues? And when it comes to the Internet Society, what should our role be and where should we focus our attention? To help inform our work in Internet governance, we posed these and other questions to our community in February. We had an overwhelming response with over 800 people taking a few minutes of their time to answer our survey. more

Russia Targeted British Telecom, Media, Energy Sectors, Reveals UK National Cyber Security Centre

Speaking at The Times Tech Summit in London, Ciaran Martin, chief of the National Cyber Security Centre (NCSC), warned Russia is seeking to undermine the international system. more

TMCH Review Recommends Status Quo

On July 25th ICANN announced the publication of the Draft Report of the Independent Review of the Trademark Clearinghouse (TMCH). This study was coordinated for ICANN by the Analysis Group, in conjunction with researchers from the Center for Internet and Society at Stanford as well the University of Pennsylvania's Wharton School... while public comments on the draft report will be accepted through September 3rd, this Report was triggered by GAC concerns expressed before the Applicant Guidebook for the new gTLD program was even completed, and is not the work product of a GNSO-created working group and therefore will not directly result in the establishment of any new ICANN policy. more

Embracing On-Chain Domains for a Safer Internet

From the humble beginnings of ARPANET to the birth of the internet as we know it today, domain registrars have been the silent architects of our online activity. Now, as we stand on the cusp of the Web3 revolution, domains are set to undergo yet another profound transformation. Internet innovations have given us a remarkable ability to connect, but now we are bouncing against the limits of this paradigm. more

ICANN New gTLD Auctions - Apparently No Antitrust Concerns?

There has been much discussion in ICANN circles concerning auctions to resolve new gTLD contention sets. This article summarizes the discussion and events to date, and suggests there should be little worry for applicants seeking to resolve their contention sets via private auction, rather than ICANN's "last resort" auction. more

DDoS Awareness Day - Oct 23, Register Today for Live Virtual Event

In support of National Cyber Security Awareness Month, DDoS Awareness Day is a virtual, global event focused on raising awareness and education around the threat of DDoS attacks. Hosted by Neustar with and exclusive media partner CSO, DDoS Awareness Day brings together top experts in global security to share their views, technical tips and from-the-trenches experience. Attendees will also be given access to a wealth of DDoS materials: white papers, surveys, presentations, best practices and more. more

Essential Cyber Security Steps for Your Business

Layered security is a concept that's important for anyone who wants to create a strong, successful defense strategy to understand. This is a strategy that relies on the use of multiple lines of defense in an attempt to repel any potential attacks. For this reason, it's based on the principle that says "no single form of protection is enough to stop a determined cybercriminal. more

Chinese Scientists Have Built First Quantum Network With No Danger of Being Decrypted

A paper published by researchers from the Chinese Academy of Sciences, reports a successful demonstration of satellite-based entanglement distribution to receiver stations separated by more than 1200 km -- the results illustrate the possibility of a future global quantum communication network. more

The ICANN Board by the ICANN Board

A self-appraisal of the ICANN Board has just been posted on the organization's website. In it, Board members rate 89 different measures of their own performance according to a seven-measure rating from "strongly agree" to "strongly disagree". Unfortunately, despite plenty of figures in the documents, there is zero analysis of what this all means, so I have gone through them and prepared one. more