Today is Holocaust Remembrance Day. Today we remember that the Nazis rounded up Jews, Roma, political dissidents, and other "undesirables" using the best data and technology of the day and sent them off to concentration camps. We don't normally deal with this type of political reality in ICANN, but now is the time to do so. In 1995, the recently formed European Union passed the EU Data Protection Directive. more
In CSC's recent insight paper, we address the trend that many business leaders today don't realize the extent to which their modern enterprise -- and its millions of digital assets -- rely on. It's a vast domain ecosystem that needs to be protected from online threats. Often, to better understand this need for domain security, we need to understand how critical and interconnected domains are within a business. more
For those who don't know, there are typically 3 methods of resolving contention sets in the new gTLD world... Given that Google is a portfolio applicant of over 100 gTLDs why did it elect to go for an ICANN Auction and make all details of the auction public? Disclosure of the winning bid by Google certainly makes a statement, it's very newsworthy, but does it serve Google's purposes, since it is in other contention sets for some popular strings and a bar has been set? more
Having eBay has worked out pretty well for the world at large; now it's time for the world of domain names to start using it. We need to throw away the jumble of different auctions and dealer sites. Speculators may not like having their haunts cleaned out, but corporate (end-user) buyers and investors will welcome the chance to deal with one centralized auction mechanism with one set of rules. more
Chinese hackers have breached U.S. Navy contractors to steal a wide range of data from ship-maintenance data to missile plans through what is reported as the most debilitating cyber campaigns linked to Beijing. more
Even as we increasingly discover that every facet of our modern lives now revolve around, and are dependent on the Internet, for which reason its availability, functionality, safety, stability and security are now of great and continuing concern to all of us. These issues have a profound impact on its overall governance. To most of us, during the past three decades, the Internet has always been available, stable, affordable and open; and it should continue this way even as it is controlled and administered in a secure manner... more
I've been following the recent news on the World Summit on the Information Society, and it's getting really bizarre. The Wired article is one example of out of the out-of-this-world coverage on the World Summit; I heard a similar spin yesterday on a radio show that often shares material with the BBC. What king or dictator or bureaucrat has signed the document giving power over the Internet to one organization or another? Did I miss the ceremony? One laughable aspect of news reportage is that the founders and leaders of ICANN always avowed, with the utmost unction, that they were not trying to make policy decisions and were simply tinkering with technical functions on the Internet. more
Okay, so spending my Monday morning printing out and reviewing 348 pages of the "New gTLD Discussion Draft" is not exactly what I had mind when I woke up today, but kudos to ICANN for keeping to the timeline that they had released last month. Since, most of you do not have the time or the patience (and probably have real work to do), I've taken it upon myself to highlight the most important changes in this version. more
A recent story today about discussions for an official defense Botnet in the USA prompted me to post a question I've been asking for the last year. Are some of the world's botnets secretly run by intelligence agencies, and if not, why not? Some estimates suggest that up to 1/3 of PCs are secretly part of a botnet. The main use of botnets is sending spam, but they are also used for DDOS extortion attacks and presumably other nasty things like identity theft. But consider this... more
There is an intrinsic value proposition to new gTLDs. They mean to give users fresh naming possibilities and provide more meaningful Internet addresses. And to do so at much reduced prices. Reduced prices? Really? This is where eyebrows start being raised. How so? Well before the advent of new gTLDs, few suffixes offered any real ability to differentiate. Users thus looked to the second level, not the top level, for a way to get their web addresses to stand out from the crowd. So began a vicious circle of value going to the limited number of meaningful second level names since at TLD level, the only string with any real equity was .COM. more
New research indicates Thailand as being the world's number one hotspot for cryptocurrency mining malware. more
The Internet Architecture Board (IAB) has issued a statement recommending that encryption be the default traffic option for protocols: "The IAB urges protocol designers to design for confidential operation by default. We strongly encourage developers to include encryption in their implementations, and to make them encrypted by default. We similarly encourage network and service operators to deploy encryption where it is not yet deployed, and we urge firewall policy administrators to permit encrypted traffic." more
A month ago, ICANN announced that it had a large set of proposed changes to its "Guidelines for the Implementation of Internationalized Domain Names". The original guidelines are fairly confusing and not widely deployed by the ccTLDs, so one would think that the proposed revisions would be clearer and more useful. No such luck. Instead of describing what the problems with the old guidelines were, the committee that put together the new proposal simply added a whole bunch more rules. more
Report from a new study by Analysys Mason, commissioned by the Universal Acceptance Steering Group (UASG), says there is a potential USD $9.8 billion growth opportunity in online revenue through a routine update to Internet systems, including those for speakers of languages that do not use the English script. more
Ten years ago, I wrote an article that looked back on the developments within the Internet over the period from 1998 to 2008. Well, another ten years have gone by, and it's a good opportunity to take a little time once more to muse over what's new, what's old and what's been forgotten in another decade of the Internet's evolution... The evolutionary path of any technology can often take strange and unanticipated turns and twists. more