The IETF WEIRDS working group is defining a follow-on to WHOIS. Since this is the IETF, it's working on the technical issues about which it can deal with, not policy which is up to ICANN and the country registries. Somewhat to my surprise, the group is making steady progress. We've agreed that the basic model is RESTful, with queries via http, and responses as JSON data structures. The protocol is named RDAP for Registration Data Access Protocol, or maybe RESTful Data Access protocol. more
A reader sent me a link last week to a piece that doesn't speak highly of net neutrality. Clyde Wayne Crews wrote an article called "Dumb Pipes, a Dumb Idea: Net Neutrality as 21st Century Socialism" that calls for legislators to reject "nut" neutrality. "Elevating the principle of mandatory net neutrality above the principle of investor ownership and wealth creation in pipes and spectrum deflects market forces away from the infrastructure development that we need..." Did anyone else see a touch of irony in a letter to the editor... more
The timeline of the Net Neutrality issue has been detailed here. And quoting from Vox: 'Wheeler said that peering is "an issue that we are investigating, it's an issue we are very interested in, but it's not the issue here today."' more
This past May 19th, 5 years after its sunrise, puntCAT arrived at the 50,000 domain names landmark. We know that, nowadays, 50,000 domain names may hardly be described as shocking news, and, certainly, this is not our limit, and we believe there's still plenty of room for .cat to grow. Then, who and why should care about this number? more
Approximately 3.1 million domain names were registered in the third quarter of 2015, bringing the total number of registered domain names close to 299 million worldwide across all top-level domains (TLDs) as of Sept. 30, 2015, according to the latest Domain Name Industry Brief by Verisign. more
Phishing is when bad guys try to impersonate a trusted organization, so they can steal your credentials. Typically they'll send you a fake e-mail that appears to be from a bank, with a link to a fake website that also looks like the bank. Malware offers another more insidious way to steal your credentials, by running unwanted code on your computer... I like VeriSign's characterization of this kind of malware as an insecure endpoint, the PC which is the endpoint of the conversation with the bank isn't actually under the control of the person who's using it. more
The NATO Consultation, Command and Control Agency (NC3A) has announced the award of a contract for upgrading the NATO cyber defence capabilities. The award to private industrial companies will enable the already operating NATO Computer Incident Response Capability (NCIRC) to achieve full operational capability by the end of 2012. At approximately 58 million Euro, it represents NATO's largest investment to date in cyber defence. more
The really important part of the World Conference on IT (WCIT) is not the internet battles that have caught the interest of the press - it is what will happen after the conference has ended. Membership of WCIT is on a per-country basis... Each country is free to make up its own delegation and these delegations can therefore represent a large variety of social, economic, business, legal, technical and other interests - as large and as wide as each country decides its delegation will be. more
Broadband and telephone service providers of all sizes in the US have signed on to a "Keep Americans Connected Pledge" aimed at maintaining connectivity for citizens amid disruptions caused by the coronavirus pandemic. more
According to a letter sent from ICANN's chair to the Registries Stakeholder Group (RySG) this week, the agency will not be setting a date for the next round of new gTLD applications anytime soon despite keen interest from registry operators. more
The global deployment of Domain Name System Security Extensions (DNSSEC) is charging ahead. With ICANN 38 Brussels just around the corner, DNSSEC deployment will inevitably be the hot topic of discussion over the next few days. Case in point, today, ICANN hosted the first production key ceremony at a secure facility in Culpepper, Va. where the first cryptographic digital key was used to secure the Internet root zone. The ceremony's goal was simple: for the global Internet community to trust that the procedures involved with DNSSEC are executed correctly and that the private key materials are stored securely. more
As a result of Internet service interruption during the recent anti-government protests in Cuba, Florida Senator Rubio and Governor DeSantis and President Biden have called for measures to strengthen and guarantee Cuban Internet connectivity, but that won't happen until the Cuban government recognizes that doing so is in its long-run interest. I have seen several suggestions that we smuggle end-user satellite terminals from services like SpaceX Starlink into Cuba but attempts to... more
I am glad to announce that the European Commission has officially launched the process to select the next Registry for the .eu Top-Level Domain (TLD). This is done through a competitive procedure that will be concluded, by October 2021, with the signature of a service concession contract between the European Commission and the entity that will be entrusted with the organisation, administration and management of the .eu TLD. more
This week bank costumers of The Netherlands were shocked when they realised that online banking may not be as safe as they thought. Perhaps some were surprised to hear that what they think is money, is nothing but digits, something that does not exist. Their money only exist because we all act as if it exists and accept transactions between each other aided by software run by banks, if they haven't outsourced that function. more
Historically there has been nothing which gets Microsoft's attention as fast as a platform for applications which threatens Windows dominance. Google's Chrome is obviously such a platform; Google can afford to challenge Microsoft; it's healthy for innovation that it does. Can Microsoft still rise to the challenge? Way back when I was at Microsoft -- 1991 to 1994, Lotus Notes was the threat du jour... Since I was responsible for the development of what was to become Microsoft Exchange, I was in charge of that war for a while... more