/ Most Viewed

Call for Nominations: M3AAWG J. D. Falk Award Seeks Stewards of a Better Online World

Anyone seeking to honor a groundbreaking contribution toward a better online world should submit a nomination for the 2014 M3AAWG J. D. Falk Award. Presented to people whose work on specific projects made the Internet a safer, more collaborative, more inclusive place, the J. D. Falk Award has recognized leaders and pioneers who saw elements of the online experience that needed improvement and took action to fix them.  more

The Suitable Defendant Rule: In Rem Jurisdiction under the ACPA

The Anticybersquatting Consumer Protection Act (ACPA) creates two distinct avenues by which mark owners may seek a remedy for cybersquatting. A person who is a suitable defendant under 15 U.S.C. ยง1125(d)(1)(A) is one over whom the court has in personam jurisdiction. However, if the mark owner is "not able to obtain in personam jurisdiction over a person who would have been a defendant" in the ACPA action, then "[t]he owner may file an in rem civil action against a domain name in... more

The Pay-To-Play Reality of ICANN’s Inclusion Illusion

ICANN's chairman says meetings offer special "circumstantial opportunity"; recent estimates peg average annual expense for attending at $30,000 per person. Oops - he's done it again. The latest blog update from ICANN's current board chair needs - no, it demands - a spotlight on what is revealed in plain and unashamed language. Indeed, this communique - along with another recent blog post that I've previously commented on - captures in exquisite relief what has gone terribly, horribly wrong at ICANN. more

The Trademark Clearinghouse: Secure, Reliable, Usable - Pick Any Two

Earlier this week, technical and legal experts from ICANN, Deloitte and IBM met in Brussels with their counterparts from registrars and registry service providers representing as much as 90% of prospective gTLD registries, to discuss the technical implementation of the Trademark Clearinghouse, the database of rights holder information that will support the mandatory rights holder protection mechanisms for new gTLDs. more

DNSSEC is But One Link in the Security Chain

As the implementation of DNSSEC continues to gather momentum and with a number of ccTLDs, and the '.org' gTLD having deployed it into their production systems, I think it is worth pausing to take a look at the entire DNSSEC situation. Whilst it is absolutely clear that DNSSEC is a significant step forward in terms of securing the DNS, it is but one link in the security chain and is therefore not, in itself, a comprehensive solution to fully securing the DNS system. more

Chuck Norris Botnet and Broadband Routers

Last week Czech researchers released information on a new worm which exploits CPE devices (broadband routers) by means such as default passwords, constructing a large DDoS botnet. Today this story hit international news... The spread of insecure broadband modems (DSL and Cable) is extremely wide-spread, with numerous ISPs, large and small, whose entire (read significant portions of) broadband population is vulnerable. more

Software Defined Data Centre Needs DNS

During 2012, Software Defined Networking (SDN) seemed to be all the rage. The VMware acquisition of Nicira during the summer doldrums for US $1.26 billion validated the fact that the SDN paradigm is expected to have some serious legs over the coming years. I guess the same applies to virtualized network services in general, although the acquisitions in that space were not quite as high-profile as the ones in SDN. more

Top Ten Internet Law Developments of 2012

I'm pleased to share my list of top 10 developments of 2012... I'm surprised whenever I read about a new European ruling that's adverse to a Silicon Valley company, because at this point I assume that everything Silicon Valley companies do in Europe is already illegal. Google, Facebook and other Silicon Valley players are under constant legal attack in Europe on countless fronts. Everyone might be happier if the Silicon Valley players just got out of Europe altogether. more

Is America Getting More Like China?

Since Obama became President -- and yes, I voted for him -- there has been a great deal of optimism and energy around the idea that the Internet can be used to improve or "reboot" our democracy. The Administration has hired some great people to work on making government more open and transparent. This is all great. But how much good will all of this nifty e-government do for American democracy if citizens' rights to privacy and free expression are not also fiercely defended? more

Spam Volumes In 2010

I started hearing various people comment about lower spam volumes sometime in mid December. This isn't that unusual, spam volumes are highly variable and someone is always noticing that their spam load is going up or going down. The problem is extrapolating larger trends from a small selection of email addresses. more

Cord-Cutting on Continued Rise - New Findings Suggest Quarter of US Households Now Without Cable

One-Quarter of US Households Live Without Cable, Satellite TV Reception, according to new GfK Study: "New findings from GfK show that US TV households are embracing alternatives to cable and satellite reception. Levels of broadcast-only reception and Internet-only video subscriptions have both risen over the past year, with fully one-quarter (25%) of all US TV households now going without cable and satellite reception. more

Court OKs Private Seizure of Domain Names That Allegedly Sold Counterfeit Goods

Luxury brand Chanel has engaged in a fierce campaign against counterfeit websites in federal court in Nevada. It has seized approximately six hundred domain names in the last few months, reports Venkat Balasubramani. "I'm sympathetic to the "whack-a-mole" problem rights owners face, but this relief is just extraordinarily broad and is on shaky procedural grounds." more

Why You Should Demand ‘Net Morality’ Instead of ‘Net Neutrality’

I have come to the conclusion that "net neutrality" is an ethical issue at heart, one about the appropriate constraint of unfair ISP power. Some people are (I pray unintentionally) on the wrong side of a now-clear moral divide. They are claiming to prevent harmful abuse of power, when in reality their actions create fresh harm. A central issue is one of technical competence to comment. If your beliefs are disconnected from how the world works, you cannot evaluate whether you are espousing something sensible or silly. more

Google Explains What They Mean by “Net Neutrality”

Google has launched a new Public Policy Blog focused on U.S. government legislation and regulation -- reported in the media as part of Google's efforts in setting up focus on the U.S. government since early 2005. In an entry posted over the weekend on the blog by Richard Whitt, Washington Telecom and Media Counsel, key argument within the net neutrality debate is explained... more

New Type of DDoS Attack Targets Vulnerability in Universal Plug and Play Networking Protocol

A new type of DDoS attack takes advantage of an old vulnerability with the potential to put any company with an online presence at risk of attack warn researchers. more