/ Most Viewed

So, You Claim to Have an Unregistered Mark! Is there Cybersquatting?

Complainants have standing to proceed with a claim of cybersquatting under the Uniform Domain Name Dispute Resolution Policy (UDRP) if the accused "domain name is identical or confusingly similar to a trademark or service mark in which the complainant has rights" (4(a)(i) of the Policy). Quickly within the first full year of the Policy's implementation (2000) Panels construed "rights" to include unregistered as well as registered marks, a construction swiftly adopted by consensus. more

Verisign Expands MANRS Relationship to Strengthen Global Routing Security

Verisign has been involved with an initiative known as Mutually Agreed Norms for Routing Security, or MANRS, since its inception. MANRS, which is coordinated by the Internet Society, focuses on strengthening the security and resiliency of IP networks throughout the world by identifying and providing best practices for mitigating common routing security threats. MANRS began as a collaboration among network operators and internet exchange providers, with Verisign formally becoming a participant in its Network Operator Program in 2017. more

Holomaxx v. Yahoo and MS: The Hearing

I visited Judge Fogel's courtroom this morning to listen to the oral motions in the Holomaxx cases. This is a general impression, based on my notes. Nothing here is to be taken as direct quotes from any participant. Any errors are solely my own. With that disclaimer in mind, let's go. more

Protecting Brands from Phishers No Easy Task

Just in case you've been out of the country for the last 12 months, a new scourge is hitting the Internet and the world of email and it's called phishing. The Anti-Phishing Working Group defines phishing as identity theft "attacks using 'spoofed' e-mails and fraudulent Websites designed to fool recipients into divulging personal financial data such as credit card numbers, account usernames and passwords..." According to various experts, the incidents of phishing are rising at an alarming rate: there were 13,000 unique phishing attacks in January alone - that's a 42 percent surge over the previous month. The real problem is that phishing works. more

Comcast Sneaks in Another Billing Line Item and “Earns” an Additional $1 Billion

My Comcast bill arrived today with a sneaky new $2.68 charge, $2.50 for leasing one (and only one) set-top box and $0.18 for the remote. This new billing line item, like the many others Comcast has introduced, adds to its bottom line with no additional capital expenditure. It shows how resisting the obligation to return to accepting set-top box free, "cable ready" sets was a smart strategy. more

International Internet Governance: A Field Guide to 2011

If an important debate of our age is going on right now but you don't know where, no one can blame you. Part of the intrigue surrounding discussion of how the Internet will be governed is deliberate; the current process and forums were conceived by parties who want to make sure that if their agenda fails in one place that they can claw back ground in another. Part of that plan is the byzantine "commitology" of the UN system, which is now frighteningly relevant to the broadband industry and civil society. What follows is an effort to make this clear what, where, when, and how it all will happen in 2011. more

ACPA Dilemma: Federal Court Denies Injunction in Landmark Case - Cybersquatting Loophole or Legal Oversight?

This case had a bit of a weird result -- even though the brand owner had a mark that was 20 years old, and the alleged cybersquatter, in the meantime, acquired a domain name on the open market identical to that mark, because the domain name was first registered (by an unrelated party) before the brand owner's trademark rights arose, there was no relief under federal trademark law. more

ICANN’s Governance Conundrum

After reading Steve Delbianco's recent CircleID article entitled The Tale of Two Governance Models I was torn. On one hand I agreed and supported Steve's comments about the strength of the bottom-up consensus driven model upon which ICANN was originally founded. As I am about to begin my thirty fifth ICANN regional meeting over the last eleven years, it is a model which I still believe in and fiercely fight to defend. However, on the other hand I look back over the last eleven years... more

China Shuts Down Thousands of Websites for ‘Harmful’, Obscene Content

China has shut down or 'dealt with' thousands of websites for sharing 'harmful' erotic or obscene content since April, the state's office for combating pornography and illegal publications announced on Thursday. more

Fighting for Smaller New gTLD Applicants

Will new gTLDs just be more of the same, or will they bring real diversity and innovation to the Internet's namespace? For Hong Kong based Stable Tone, applicant for two Chinese character IDN TLDs (?? or "Dot WORLD" and ?? or "Dot HEALTHY"), it's the smaller applicants that give the new gTLD program its soul. more

Watch Live - What Does “Success” For IPv6 Look Like? (Briefing Panel on Nov 5)

Now that IPv6 deployment is happening in major networks around the world, the question becomes -- what does "success" look like for IPv6? How much IPv6 traffic is "enough"? What are major milestones we should be tracking in IPv6 deployment? What is next for IPv6? more

Israeli Officials Dispute Claims of Stuxnet’s Joint US/Israel Effort

A few weeks ago, the New York Times published an article saying that the Stuxnet worm, which infected a large number of Iran's nuclear power plants, was a joint effort between the United States and Israel. The program began under former president George W. Bush and continued under President Obama. Last month, the Washington Post ran an article saying that the US and Israel collaborated in a joint effort to develop Flame and that work included Stuxnet. more

The ISP Industry and the Financial Sector - Amazing Similarities

In the last RIPE Labs article on this subject How Does the Internet Industry Compare?, we looked at ways to compare our industry with other industrial sectors, and identified a number of characteristics that an industry must have in order to be comparable to the Internet industry. It seems the financial sector or monetary credit industry shares many of these characteristics and in fact behaves much like the Internet industry. more

EI, EI - NO!

For those closely following the ICANN Meeting in Nairobi this week, the EOI (Expression of Interest) model seemed like a foregone conclusion. In fact, ICANN had scheduled a webinar on March 18th to explain the process despite the complaints of the community and large-scale disagreement amongst proponents of the EOI. more

Censorship: A Threat to the Stability and Security of the DNS?

Censorship practices by governments and other private actors are becoming more increasingly more sophisticated, and their effects are increasingly being felt globally. A case in point, the YouTube incident in Pakistan was a recent example affecting both users and the DNS at a national and global level. Likely other incidents will occur in the near future. As such, I believe censorship should be considered as a threat to the stability and security of the DNS. In the context of Internet governance discussions, I believe the issue should be raised both at ICANN and the Internet Governance forum. Do others agree? more