Here's the question: is it meaningful or important for a federal agency to have regulatory authority over high-speed Internet access connectivity? Right now, the FCC (which is supposed to oversee "communication over wire and radio") has no clear authority to make policy about high-speed Internet connectivity. (Transport is different than content - this post is not about applications or uses of this connectivity. Be careful when you talk about the Internet "ecosystem," because transport has been historically and remains different from everything else. I'm talking about the capacity to send packets from Point A to Point B, whether provided by wired or wireless providers.) more
Once you've determined that you can trust the signer of a message, as we discussed in part 3, it's easy to extrapolate that various portions of the message are equally trustworthy. For example, when there's a valid DKIM signature, we might assume that the From: header isn't spoofed. But in reality, DKIM only tells us two basic things... more
The first sealed bid auction for a new gTLD contention set was completed last week for the string .One. To our knowledge this is 1st auction to be conducted by a third party other than Applicant Auction to settle a contention set and marks the first time a new gTLD contention set was settled through a "Single Sealed Bid Second Price" auction... The winning bidder for the new TLD extension was One.com of Dubai, AE, which will act as the worldwide registry for .One domains. more
The Sunday Herald reported on Sunday that Best Western was struck by a trojan attack that lead to the possible compromise of about 8 million victims. There is some debate as to the extent of the breach and not a small amount of rumor going around. I'm not entirely disposed to trust corporate press releases for the facts, nor am I going to blindly accept claims of security researchers whose first call is to the PR team when discovering a problem. That said, here is what seems to be the agreed upon facts... more
In early March 2020, a well-known European fashion brand found themselves on the receiving end of a protest campaign on social media. The background to the case was the fact that, in 2019, the brand had launched a cease and desist (C&D) action against a small, U.K.-based company in response to their use of similar product names and sale of associated clothing merchandise. more
What do you think must be done to ensure the development of an open, trusted, accessible, and global Internet in the future? As part of the Internet Society's "Internet Futures" project, we'd like your input on recommendations for Internet leaders and policy makers. For more background, please read "Help Shape the Future of the Internet" by my colleague Constance Bommelaer, or browse through the Internet Futures pages. more
The second installment in my four-part series on New gTLD objections will focus on the limited public interest ("LPI") variety. The overarching theme however is essentially the same: new gTLD objections are generally more complicated (and costly) than UDRP actions and need to be approached with care. In fact, LPI represents one of the best examples of the tough climb that would-be objectors are likely to face. Understanding exactly what is required beforehand - and whether or not you can deliver - is absolutely critical. more
A company that registers a domain name containing someone else's trademark may be engaging in the acceptable practice of "defensive registration" if (among other things) the domain name is a typographical variation of the registrant's own trademark. That's the outcome of a recent decision under the Uniform Domain Name Dispute Resolution Policy (UDRP), a case in which the domain name in dispute, idocler.com, contained the complainant's DOCLER trademark -- but also contained a typo of the respondent's DOLCER trademark. more
WHOIS is about to become even harder to find. ICANN has recently concluded long-delayed contract negotiations with industry meant to accommodate the technical migration from the WHOIS protocol to the Registration Data Access Protocol (RDAP). Instead of limiting the changes to what's necessary to implement the new technical protocol, the proposals effectively gut WHOIS, making it virtually impossible to find by eliminating web-based WHOIS access... more
The ICANN Security and Stability Advisory Committee (SSAC) and the Internet Society Deploy360 Programme are planning a DNSSEC and Security Workshop on Wednesday, 06 November 2019, during the ICANN66 meeting held from 02-07 November 2019 in Montreal, Canada. The original DNSSEC Workshop has been a part of ICANN meetings for many years and has provided a forum for both experienced and new people to meet, present and discuss current and future DNSSEC deployments. more
eco, which is the largest internet industry association in Europe, is holding a virtual meeting later this month to discuss Brexit. The meeting, which is scheduled for July 27th at 1200 UTC, will be the first of several dialogues among industry to discuss the potential impact of the UK's exit from the EU on the domain name industry. As I mentioned in a recent post, the exit of the UK from the EU has an "unknown" impact on how domain name registries and registrars will interact with UK based registrants. more
I recently shared at a conference how a seasoned brand and fraud expert from one of the world's largest global financial institutions lamented a major attack where multiple fraudulent websites would pop up every single day. All attacks were launched from the same registrar and web hosting company, and no matter how much they reached out to these providers, they received the same reply: "we will pass on your request to the registrant or site owner," and then nothing happened. more
The current battles being fought over net-neutrality were over before they began. Whether you regard it as a good thing or a bad thing the world already has a multi-tiered internet and it's likely to become even more stratified in the coming years. Most markets, or perhaps countries is a better grouping, depend on commercial organisations to deploy broadband access and to serve the consumers that sign-up. The internet service providers that governments and customers depend on to reach more and more consumers and in increasingly difficult locations (read 'less likely to generate revenue') are there to make money. more
The United Kingdom's National Crime Agency (NCA) has been running a series of campaigns focused on reducing the use of DDoS-for-hire websites. These websites offer people the opportunity to purchase powerful tools to launch cyber-attacks, which can be used to knock websites or users offline. more
One of the oddest aspects of FCC monitoring of broadband is that the agency has accepted the premise that any broadband product faster than 25/3 Mbps is adequate broadband. This means that the FCC has completely accepted that broadband provided by cable companies is adequate and is something the agency doesn't have to be concerned with. The FCC makes the automatic assumption that broadband from cable companies is good broadband... more