/ Most Viewed

China to Require Face Scan for Internet Access and New Phone Numbers Starting December

Chinese citizens will be required to let telecommunications carriers to scan their faces in order to sign up for internet access or to get a new phone number. more

Call for ICANN to Educate and Not Mislead GAC

I read with interest the recent blog written by Theresa Swinehart a Sr. Advisor to the President on Strategy. She wrote: "The most critical element of this [ICANN Transition] process is trust and alignment. To ensure success on this accountability track, we must as a community work closely together to make sure that the final process is meaningful. There is plenty of work to be done in an ambitious period of time." more

Microsoft Announces $5 Billion Investment in IoT Over the Next Four Years

Microsoft will invest $5 billion in the Internet of Things over the next four years, said Julia White, Corporate Vice President, via a blog post today. more

UDRP and Article 92(b) of EUROPEAN COUNCIL REGULATION (EC) No 40/94

It has been over a year since I posted "The Non-Parity of the UDRP", how little did I know then compared to now! Since that posting, the corporations and their lawyers have given me a crash course in the law and I have learned much. There are many tricks that corporations will play on a domain name registrant in order to silence criticism of the corporation and to violate the registrants right of freedom of expression without frontiers. The UDRP Administrative Proceedings is one such trick... more

Dog Eats Opt-Out Requests, FTC Is Not Impressed

Last week the Federal Trade Commission settled a lawsuit against Yesmail, a large ESP (Email Service Provider). The facts of the case are not in dispute, but their meaning is. Yesmail, like most large ESPs, has absorbed a number of its smaller competitors over the years including a company called @Once. Back in 2004, they screwed up their incoming mail so that a whole lot of bounces and opt-out requests were erroneously filtered out as spam. As a result, thousands of people who'd told @Once to stop sending them mail kept getting mail anyway... more

Dot-Com is Still King - of Domain Name Disputes

Despite the launch of more than 1,200 new gTLDs, .com remains far and away the most popular top-level domain involved in domain name disputes. In 2016, .com domain names represented 66.82 percent of all gTLD disputes at the World Intellectual Property Organization (WIPO), the only domain name dispute provider that publishes real-time statistics. And, as of this writing, the rate is even higher so far in 2017, with .com domain names accounting for 69.78 percent of all disputes. more

Happy Birthday BGP

The first RFC describing Border Gateway Protocol (BGP), RFC 1105, was published in June 1989, thirty years ago. By any metric that makes BGP a venerable protocol in the Internet context and considering that it holds the Internet together, it's still a central piece of the Internet's infrastructure. How has this critically important routing protocol fared over these thirty years, and what are its prospects? Is BGP approaching its dotage or will it be a feature of the Internet for decades to come? more

SPIT is in Everyone’s Mouth, Though Not Yet in Everyone’s Ears

Spam over Internet Telephony (SPIT) is viewed by many as a daunting threat. SPIT is much more fatal than email spam, for the annoyance and disturbance factor is much higher. Various academic groups and the industry have made some efforts to find ways to mitigate SPIT. Most ideas in that field are leaning on classical IT security concepts such as intrusion detection systems, black-/white-/greylists, Turing tests/computational puzzles, reputation systems, gatekeeper solutions, etc... We identified the lack of a benchmark testbed for SPIT as a serious gap in the current research on the matter, and this motivated us at the to start working on a first tool for that. more

Why Has ICANN Cut Subsequent TLD Round Preparations From Its Budget?

As we approach another ICANN meeting and another opportunity for our community to come together to discuss, collaborate and work, there is naturally a flurry of activity as stakeholders push for a spot on the agenda for their key areas of interest. And in the midst of current discussions, particularly around important topics like GDPR, it's easy for other vital conversations to be missed. more

The Why and How of DNS Data Analysis

A network traffic analyzer can tell you what's happening in your network, while a Domain Name System (DNS) analyzer can provide context on the "why" and "how." This was the theme of the recent Verisign Labs Distinguished Speaker Series discussion led by Paul Vixie and Robert Edmonds, titled Passive DNS Collection and Analysis -- The "dnstap" Approach. more

What’s Next for Dot-Org

When I began writing about the dot-org sale, it was out of concern for the loss of what I felt strongly was long understood to be a unique place in the Internet's landscape. Like a national park, dot-org deserved special protection. It turns out lots of people and organizations agreed. On April 30th, 2020, The ICANN Board upheld these values. They unanimously withheld consent for a change of control of the Public Interest Registry to a private equity firm. more

Still Think .brands Might Be a Waste of Time? Google Doesn’t!

The new Top-Level Domain (TLD) program was designed from the outset to enhance competition and foster innovation. It was a great result for the wider industry to see approximately one-third of the applications received by ICANN submitted by some of the world's largest companies seeking to own and operate their own .brand TLD. Even with organisations such as Apple, Citibank and IBM applying for their respective TLDs, scepticism remained on the potential for .brands to succeed. more

Cost-Effectiveness: The Prerequisite for Cybersecurity Regulation

Cybersecurity regulation is coming. Whether regulations intended to enhance critical infrastructure protection will be based on existing statutory authority, new legislation, an Executive Order or a combination of legal authorities, however, is still unknown. Other aspects of the coming federal oversight of critical infrastructure cybersecurity that remain undetermined include the extent to which governance system will include voluntary characteristics and the time frame for initiation of new cybersecurity regulation. more

Commodifying Words and Letters in the .Com Space

Words (and by extension their constituent letters) are as free to utter and use as is the air sustaining life. No one owns them. There is no toll fee to be paid to dictionary makers who curate them. There are, however, two carve-outs from this public domain, namely words and letters businesses use as designations of origin for their marketplace presence, protected by trademark law; and words and letters arranged expressively by authors, protected by copyright law. more

CAN-SPAM Plaintiff Slammed With $800K Attorney Fee Award - Asis Internet v. Optin Global

A federal court granted a request for attorney's fees (in the amount of $806,978.84) against prolific CAN-SPAM plaintiff Asis Internet. I thought things were looking good for Asis - whose lawsuits have generated substantial blog fodder - when it recently obtained a 2.5 million dollar default judgment in a spam case. more