/ Most Viewed

DNSChanger Trojan Still Running on Half of Fortune 500s, US Govt

More than two months after authorities shut down a massive Internet traffic hijacking scheme, the malicious software that powered the criminal network is still running on computers at half of the Fortune 500 companies, and on PCs at nearly 50 percent of all federal government agencies, new research shows," reports Brian Krebs. more

Fixed Wireless in Cities

I am often asked by cities about the option of building a municipal fixed wireless broadband network. As a reminder, fixed wireless, in this case, is not a cellular system but is the point-to-multipoint technology used by wireless Internet service providers (WISPs). My response has been that it's possible but that the resulting network is probably not going to satisfy the performance goals most cities have in mind. more

Hilyard Has a Historic Chance to Activate ICANN At-Large

The .ORG sale has placed Maureen Hilyard – ICANN's At-large Chair – squarely between the largest outpouring of individual user sentiment that the Internet community has ever seen, and the people who can do something about it. For At-large, the stakes are high. ICANN has spent years building up a user organization to balance corporate and government interests. At-large could be a key bulwark against the capture of Internet resources by those with capital and political power. more

The Ghosts of Deletions Future – December 2018 Versus December 2019

In the absence of data on renewals and deletions which are yet to happen, it can be enlightening to compare the domain names from the zone files of a year ago to the domain names in the current zones. The first group is the legacy gTLDs. The "Retained" domain names are those still in the December 2019 zone files. The "Deleted" domain names are those which are no longer in the current zones. Some of the retained domain names may have been reregistered, but these are not renewals charts. more

Community New gTLD Applications: The Wrong Choice

Community new gTLD applications were one of the three options offered by version one of ICANN new gTLD applicant guidebook. It was also possible to submit a "generic" or a "geographic application." I dug the ICANN website and found out that, in the end - and according to me only - it was a bad choice to submit such application...
I went through the 52 delegated applications to investigate which ones have lots of domain name registrations and which ones don't. more

.COM Contract Amendment Coming Soon for Public Comment

Last Thursday, during VeriSign's Q3 2019 quarterly earnings call, CEO Jim Bidzos offered statements that seemed to be carefully calibrated to satisfy Wall Street's curiosity about protracted negotiations with ICANN on a Third Amendment to the .com Registry Agreement while also appearing to distance the company from the soon-to-be forthcoming product of that year-long effort. more

A Better PIR Deal – Maintaining Trust Is Good Business

I run a business. For years I've been in the ICANN Business Constituency, holding a series of different positions including Chair. Suffice it to say, I'm absolutely ok with making money and generally speaking, letting markets work. I also care about NGOs. For years our firm worked with PIR on the .NGO project. We got to see up close the role PIR has played as a supporter of NGOs online -- encouraging best practice, helping push out DNSSEC to a global audience, working on DNS abuse issues, supporting the sector. more

International Fibre Bandwidth Hubbing, a Lucrative Business

The small West African country of Benin has been working quietly over the past few years to become a regional hub for international fibre bandwidth. The national telco, Benin Telecoms (BT) has been building terrestrial fibre routes to landlocked neighbouring countries such as Burkina Faso and Niger, allowing them to connect to its landing station for the SAT-3/WASC cable, the only one serving the region. more

Creating, Protecting and Defending Brand Equity - Part 3

In the final of my three-part post series about how to protect your trademark against misuse, I will focus on proactive searching and policing and the benefits these can provide to brand owners. ... Proactive searching and policing of your brand is a prudent step in making sure your name is protectable. This is an advisable first step in naming a product or service. more

The Critical Role of the RIR Governance Document for the Internet Numbering System

A revised governance document for Regional Internet Registries aims to replace outdated policy, enhancing transparency, continuity, and oversight in managing IP resources while preparing for future disruptions across the global Internet infrastructure. more

Those Who Remember History…

Tom Wheeler, the new Chairman of the Federal Communications Commission, gave a speech today at Ohio State University. It was a good speech on his regulatory philosophy. But that's not so interesting. There's nothing out of the ordinary about a government official giving a speech. The unusual development was that the Chairman also released an ebook, called Net Effects. Even more unusual, it's not a bland ghostwritten policy whitepaper; it's a deeply researched work of history. more

China’s New Cybersecurity Law Will Be in Effect Starting Thursday

According to the official news agency, Xinhua, implementation of China's controversial Cybersecurity Law will begin on June 1, requiring strict data surveillance and storage for companies operating in the county. more

Speaking up for the Internet

For most of this year governments from outside the G8 have not wavered from their essential themes on the Internet: they regard it as a shared resource that works in part as a result of their own investment in infrastructure, they want to be included in its governance through a decision-making process that is transparent, accessible and, in broad character, multilateral, and they want to be able to trust it and know that as much as it is a tool of growth for others, it can also be for them. more

What is a Security Mechanism?

Orin Kerr recently blogged about a 9th Circuit decision that held that scraping a public web site (probably) doesn't violate the Computer Fraud and Abuse Act (CFAA)... On its surface, it makes sense – you can't steal something that's public – but I think the simplicity of the rule is hiding some profound questions. One, I believe, can most easily be expressed as "what is the cost of the 'attack'"? That is, how much effort must someone expend to get the data? Does that matter? Should it? more

Google Credits USB-Based Security Keys for Successfully Protecting Its 85000 Employees from Phishing

According to multiple sources, Google this week reported that since early 2017, it has not had any of its 85,000 plus employees phished on their work accounts. more