BusinessWeek is running a column called 'Brandjacking' on the Web. In summary, nobody likes deliberate cybersquatting or typosquatting. But if Typo domain-names did not exist, the traffic would continue to flow to Microsoft or Google via the browser's error search where those very large companies would make money in the same manner as the 'evil cybersquatters'... more
At the time we posted 'Whatever Happened To Due Process,' we were unaware that we were just one of many registrars receiving these notices from the London (UK) Police. We have since been made aware that this was part of a larger initiative against the BitTorrent space as a whole, and that most if not all of the other registrars in receipt of the same email as us folded rather quickly and acquiesced to the shakedown orders. more
ICANN's Governmental Advisory Committee (GAC) has reacted to the ICANN Board's November 2016 decision to authorize the release of two-character domains at new gTLDs with advice to the Board that does not have true consensus backing from GAC members and that relates to procedure, not policy. The Board's proper response should be to just say no, stick to its decision and advise the GAC that it will not consider such advice. more
Internet connectivity is a good thing. Many of us depend on it for everything from our livelihoods to our entertainment. However, the Internet is very fragile and even the The New York Times is worried about it. But they're primarily concerned with overloads that can occur when everyone on the planet does the same thing at roughly the same time, such as surfing for news about Michael Jackson. Unfortunately, we will never avoid all such scenarios. Physical systems are designed around average and typical peak loads, not around extremely high loads associated with very unlikely events. Who would pay for that? more
Data privacy and security experts tell us that applying the "need to know" principle enhances privacy and security, because it reduces the amount of information potentially disclosed to a service provider -- or to other parties -- to the minimum the service provider requires to perform a service. This principle is at the heart of qname minimization, a technique described in RFC 7816 that has now achieved significant adoption in the DNS. more
This post demonstrates that success factors differ across generic Top-Level Domains (gTLDs) depending on their implied signal/message. Success drivers can be grouped into four: community, location, generic keywords, and competitors to .com. I discuss their marketing implications... For community gTLDs, their success, as measured by profits, depends on whether the registrants are nonprofit or for-profit organizations. more
I have groused at length about the damage that anti-phishing technique DMARC does to e-mail discussion lists. For at least two years list managers and list software developers have been trying to figure out what to do about it. The group that brought us DMARC is working on an un-DMARC-ing scheme called ARC, which will likely help somewhat, but ARC isn't ready yet, and due to ARC's complexity, it's likely that there will be many medium or small mail systems that enforce DMARC and can't or won't use ARC. more
Are you ready to help me make the Internet more secure? Here's your chance to join me in a project to create an open-source hardware device to protect email, files and other data from hackers and government spies. The CrypTech Project was founded in late 2013 after NSA whistleblower Edward Snowden revealed that the US and other governments were exploiting weak cryptography and loose standards to gain access to citizens' email, documents, and other files. more
The Kenya Network Information Center (KeNIC) announced a price increase for .KE domains, effective February 3, 2025. This comes at a time when the total number of .KE domain registrations has remained stagnant at around 100,000 for several years, despite previous efforts to spur growth through price reductions. This blog explores the implications of the price adjustment, analyzes the competition faced by .KE domains, and evaluates the challenges and opportunities for KeNIC in a competitive domain market. more
Eolas, a technology company that was awarded $565 million in a patent infringement settlement against Microsoft in 2007 is embarking on another campaign against others under the same grounds of patent violation. The latest lawsuit alleges that Apple and 22 companies are in violation of U.S. Patent Nos. 5,838,906 and 7,599,985, which involve embedded Web applications within a browser. The list of infringers also include Google/Youtube, Yahoo, Adobe, Amazon, Blockbuster, Citigroup, eBay, Frito-Lay, Go Daddy, J.C. Penney, JPMorgan Chase, Office Depot, Perot Systems, Staples, Sun Microsystems, Texas Instruments even adult-oriented Playboy. more
One summer sport in Internet governance is speculating on what direction ICANN's new CEO will take it in. Making the media rounds yesterday on Fox and Lehrer News Hour to talk about the recent DDoS attacks on US and S. Korea government and commercial websites, new CEO Rod Beckstrom pushed how the response to cyber attacks is a coordinated effort, he also alluded to ICANN's role in similar attacks. Responding to a question on the News Hour about the USG policy response to dealing with cyber attacks, Beckstrom highlighted the critical role of ISP filtering, and identified the "organic" as well as "somewhat structured" coordination which occurs during a typical response. More interestingly, he plugged ICANN's facilitating role. more
The proposals by the European and Arab telcos that are being considered at the World Conference on International Telecommunications (WCIT) conference in Dubai later this year are most certainly facing defeat. This is not because the USA believes that the international telecommunications regulations (ITR) cannot be discussed by the ITU. America has a rather strange set of national regulations in which they have combined internet infrastructure and content -- and as such they claim that this no longer has anything to do with telecommunications. more
Google's announcement of its 'Fiberhoods' throughout Kansas City is yet another example of the thought leadership and innovation being brought forward by the popular advertising company. But what does this move say about the state of Internet access in America? more
The breadth of cyber threats that an organization must engage with and combat seemingly change on a daily basis. Each new technology, vulnerability or exploit vector results in a new threat that must be protected against. Meanwhile some forms of attack never appear to age -- they remain a threat to business continuity despite years of advances in defensive strategy. One particularly insidious and never-ending threat is that of the Distributed Denial of Service (DDoS) attack. more
In the past few weeks doom and gloom stories about the future were printed, discussed and opined in the press. The down and out of the message of futurists is that the middle class is going to be swept away in the coming years because of software and robotic solutions (from here on: automated processes), making humans redundant... Do Luddites of the 21st century need to rise? I want to look at the topic from a few angles. more