/ Most Viewed

Wal-Mart on the Domain Name War Path

Wal-Mart seems to have been particularly vigilant lately about protecting itself from third parties setting up websites critiquing Wal-Mart and its practices. ...Wal-Mart recently scored a victory in an arbitration proceeding under the Uniform Domain Name Dispute Resolution Policy ("UDRP") before the World Intellectual Property Organization ("WIPO") against Jeff Milchen, a self-proclaimed critic of Wal-Mart from Bozeman, Montana who registered the domain name "walmartfacts.biz". more

Chinese LEO Satellite Internet Update: Guowang, Qianfan, and Honghu-3

China has pursued a strategy of competition among government-owned organizations, and it initiated two government-owned constellation projects, Hongyun and Hongyan, in 2018. In April 2020, China's National Development and Reform Commission included "satellite internet" on its "new infrastructures" list, and China applied to the ITU for a new constellation, called GW. more

Are Blockchains the Most Expensive Database Ever Invented?

One of the oft-made claims about Bitcoin and its blockchain transaction ledger is that they make transactions really cheap, so you can pay someone anywhere in the world for free, or close to it. But when you look closer, is that really true? Not by a long shot. Bitcoin transactions are stored in a large shared database called the blockchain. more

Monetizing the Internet

What would duopoly providers of internet access really like to have? They'd really like to be paid for providing non-commodity services. They'd really like to be rewarded for running the network, top to bottom. "But that's not possible," you say. No provider can tell one packet from another. Providers can only block the ports used by applications they don't like, and that's a clumsy, unwinnable arms race. The applications can always switch to common and useful ports, and no provider wants to alienate its subscriber base. But what if providers could inspect the contents of packets, without using too much computational power, and discriminate among applications? "Naah," you say. "They can't possibly do that."... more

Why Satellite Cellular Won’t Replace Traditional Cell Networks Anytime Soon

There was a burst of recent press about cellular service provided from satellites. This was probably prompted by the two recent hurricanes that have disabled terrestrial cellular and broadband networks in the southeast. I've seen speculation and discussion on Reddit and other forums where people have been wondering if satellite is the future of cell service and if the ubiquitous giant cell towers will eventually become obsolete. more

“No Legal Basis for IANA Transition”: A Post-Mortem Analysis of Senate Committee Hearing

The recent hearing conducted by the US Senate Committee on Commerce, Science & Transportation on 'Preserving the Multi-stakeholder Model of Internet Governance' again showed that the Republican-controlled US Congress needs to act decisively to protect the status quo. The Senator Thune-led Committee convened the hearing on 25th February to look into the 'IANA Transition' and assess the level of preparedness of the non-governmental agencies that are handling the Internet Technical Management functions... more

Challenges in Measuring DNS Abuse

From the creation of DNSAI Compass ("Compass"), we knew that measuring DNS Abuse1 would be difficult and that it would be beneficial to anticipate the challenges we would encounter. With more than a year of published reports, we are sharing insights into one of the obstacles we have faced. One of our core principles is transparency and we've worked hard to provide this with our methodology. more

A Look at the Facebook Privacy Class Action (Beacon) Settlement

Facebook announced on Friday that it settled the class action challenging its "Beacon" advertising program. Net result? Facebook establishes a privacy foundation funded with $9.5 million (or what's left of this amount after attorneys' fees, costs, and class claims are deducted)... Beacon was an advertising program launched in November 2007 which (roughly speaking) allowed the transmission of purchase and consumer-related information between partner retailers, Facebook, and of course, your Facebook friends. I don't think many people have a sense of all of the contours of the program... more

Do You Need a License to Look for Spam?

Jay Fink had an interesting little business. If you lived in California, you could give him access to your email account; he'd look through the spam folder for spam that appeared to violate the state anti-spam law and give you a spreadsheet and a file of PDFs. You could then sue the spammers, and if you won, you'd give Fink part of the money as his fee. more

Iran’s Top-Level Domain Approved by ICANN, That is .IRAN in Non-Latin

Internet Corporation for Assigned Names and Numbers (ICANN) announced today its approval of non-Latin string evaluation of Iran. This approval will allow the availability of Iran's top-level domain in its own native language, Persian, also known as Farsi (that is, the domain name .IRAN, in non-Latin characters). According to ICANN, there are currently 33 requests for Internationalized Domain Names (IDN) country code Top-Level Domains (ccTLDs) representing 22 languages out of which 18 countries/territories have so far been approved. Other countries that have also successfully passed this string evaluation by ICANN include: India, Republic of Korea, Syrian Arab Republic and Singapore. more

A Closer Look at the Katie.com Domain Name Controversy

Every time an individual logs on to the Internet a pornographer is able to copy the stream of digital bits created by the computer user's Internet connection. The data bits are used to compile a database of information about Internet user buying habits and sexual tastes. These pornographers use the information secretly collected from logged in computers to alter the category or type of pornographic images uploaded onto various websites. Pornographers, for example, know that as a result the pornography in Cyberspace is of an extremely disturbing sort when compared to porn found in "real-space." Internet users are primarily known fans of sexual images of incest, bestiality, and torture. Cyber porn -- as it is often called -- is bigger, badder, and more extreme.  more

SiteFinder Is Leaking Data

I just discovered that VeriSign's SiteFinder Web site is leaking data submitted in Web forms to its marketing analysis partner, Omniture. Forms can easily contain personal information such as an email address. For the problem to occur, a Web form must use the GET method. This data spill problem occurs if a Web page anywhere on the Internet submits a Web form to an action URL with a misspelled or expired domain name. Because of VeriSign's recent controversial changes to the DNS system, this form data is submitted to the SiteFinder Web site.  more

Security by Obscurity?

Ah yes, 'Security by obscurity': "Many people believe that 'security through obscurity' is flawed because... secrets are hard to keep." I'm glad the guys guarding the A Root Servers are up on the latest security trends. Of course, you could hide the A Root Servers at the heart of the Minotaur's maze, but they're still going to be "right over there" in cyberspace, at 198.41.0.29 more

The US Department of Commerce, the DNS Root, and ICANN

The recent announcement in eWeek titled "Feds Won't Let Go of Internet DNS" (slashdotted here) has some major internet policy implications. The short, careful wording appears to be more of a threat to ICANN than a power grab. In short, the US Department of Commerce's (DOC) National Telecommunications and Information Administration (NTIA) announced that it was not going to stop overseeing ICANN's changes to the DNS root. ...Of course, they have done next to nothing to support DNSSEC or other proposal for securing the DNS, but it sounds reassuring. The last sentence shows that the Bush administration shares the Clinton administration's lack of understanding of how the internet should evolve... more

NTIA Nixes Privacy Protection in Whois

Many registrars have gotten complacent about reforming the Whois-Privacy relationship. After all, they can sell additional privacy protection to their subscribers for an extra $5-10. Seems like a perfect "market oriented" interim solution, as the so-called "bottom up" policy development process of ICANN figures out how to provide tiered access. Not so fast. more