Internet Society has released a paper today highlighting the importance of understanding what is important and unchanging about the Internet. more
There are updates in the domain name business that I have never been able to understand: one of them is called "vanity domain names". A vanity domain name is a domain that keeps on using the first and the second level domain, to form a keyword; the third level domain is sometimes used too. Good examples of these would be: webc.am or marmala.de, aud.it or del.icio.us. more
I just got back this morning from attending the OASIS XRI TC face-to-face meeting with Bill Barnhill, Drummond Reed, Laurie Rae, Les Chasen, Markus Sabadello, Marty Schleiff. A number of good things came out of the meeting, which I'll leave for another blog because this post is about Internationalized Domain Names, not XRI. So we just opened the flood gates for Chinese and Japanese IDNs for .BIZ. This has been my brainchild for the past half a year or so, and represents a significant step forward for our registry in terms of internationalization. more
"Breaking the Internet" is really hard to do. The network of networks is decentralized, resilient and has no Single Point Of Failure. That was the paradigm of the first few decades of Internet history, and most people involved in Internet Governance still carry that model around in their heads. Unfortunately, that is changing and changing rapidly due to misguided government intervention. more
The first Africa DNS Forum will take place on Friday, July 12, and Saturday, July 13, 2013, in Durban, South Africa, in advance of next week's ICANN 47 meeting. Jointly organized by AfTLD, ICANN and the Internet Society, the Africa DNS Forum "aims to establish a platform for the DNS community across Africa and to advance the domain name industry and domain name registrations on the continent." more
The early designers of the Internet quickly realized that as the number of domain names flourished, there was a need for tracking domain name owners to resolve questions and conflicts that might arise. To that end, they created WHOIS, a public database with the names, phone numbers, email addresses, and mailing addresses of registered domain owners and operators. more
There are discussions starting within the Regional Internet Registries (RIRs) about the creation of trading market in IPv4 addresses as we approach the inevitable exhaustion of unallocated addresses. The view being put forward is basically "this is likely to happen anyway and by discussing it now, we can ensure it happens in an orderly way". When I first heard this idea I was a bit surprised. The RIRs are policy based bodies and so a shift to a trading market appears to be an abandonment of that policy base. However I have been partly corrected on that. more
What happens when you open an email and allow it to display embedded images and pixels? You may expect the sender to learn that you've read the email, and which device you used to read it. But in a new paper we find that privacy risks of email tracking extend far beyond senders knowing when emails are viewed. Opening an email can trigger requests to tens of third parties, and many of these requests contain your email address. more
The bulk of corporate domain portfolios largely consist of defensive registrations which often include common misspellings, product names, and abbreviations in countries where they may not even be doing business. More than ever, with the launch of new generic Top-Level Domains (gTLDs) expected to occur next year, companies are now taking a hard look at their defensive holdings and asking themselves whether or not they really need all of these registrations. more
Sun, surf, and ... service operators? It's a match made in heaven! The Caribbean cable and telecommunications industry may not be large, but it is an important and fast-growing region. The recent Caribbean Cable & Telecommunications Association (CCTA) Annual Meeting in Puerto Rico threw the spotlight on this slice of paradise and I was there to catch up on some of the trends emerging for the year ahead. more
I am a student of life, learning one hard lesson at a time. In fact, I actually dropped out of my last year of college to start a tech company in a new space called the internet. I was an entrepreneur running an online service prior to the advent of the world wide web in 1992, back when Pine, Usenet, and Gopher ruled the information superhighway. Over the last 25 years, I have learned a great deal about technology adoption cycles by launching six internet companies, each at the forefront of a new technology wave. more
Declan McCullagh recently opined that the "FBI [and the] DEA warn [that] IPv6 could shield criminals from police." His post was picked-up relatively widely in the past few days, with the headlines adding more hyperbole along the way. So just how real is this threat? Let's take a look. more
ICM Registry applauds the decision yesterday of Judge Lowell Reed of the United States District Court for the Eastern District of Pennsylvania in ACLU v. Gonzales to permanently enjoin enforcement of the Child Online Protection Act ("COPA"). Praising Judge Reed's meticulously documented opinion, ICM Registry President Stuart Lawley said, "This continues the unbroken chain of court decisions in the U.S. upholding free expression on the Internet, and it underscores the superiority of voluntary measures that empower users to select content compared with government regulations." Lawley concluded, "Now, more than ever, it underscores the need for ICANN to approve the proposal for a voluntary .xxx domain as another alternative to government regulation." more
Engineers in the Internet Engineering Task Force, in the Messaging Anti-Abuse Working Group, and elsewhere have been debating how to handle e-mail-server blocklists in an IPv6 network. Let's take a look at the problem here. We basically have three ways to address spam, in our goal of reducing the amount of spam in our inboxes... more
I consult on communication issues for Neustar, an Internet infrastructure company. As most CircleIDers know, Neustar works behind the scenes to ensure the smooth operation of many critical systems like DNS, .us and .biz, local number portability and digital rights management. One of the cool things about working for them is the chance to attend the events they sponsor. Last week Neustar held a security briefing for senior federal IT personnel focused on Cybersecurity and Domain Name System Security Extensions (DNSSEC)... more