/ Most Viewed

WIPO Updates GDPR Guidance for UDRP

Three months after implementation of the European Union's (EU) General Data Protection Regulation (GDPR), the World Intellectual Property Organization's (WIPO) Arbitration and Mediation Center has expanded and updated its already helpful web page with important questions and answers about how the GDPR is impacting the Uniform Domain Name Dispute Resolution Policy (UDRP). more

EURid Report Reveals Europe’s .EU TLD Shrank by Over 130K Domains in 2018

EURid, the registry manager of Europe's .EU top-level domain, released its Annual Report today, revealing that in 2018 the total net registrations decreased by 130,305 (from 3,815,055 to 3,684,750). more

Decentralizing Cybersecurity Via DNS

Decentralization is a big trend in IT, and everyone has their own definition of what "decentralization" really means. With more organizations fully embracing a work-from-anywhere culture, decentralization has moved past being a fad and turned into a necessity. Decentralized cybersecurity is nothing new. Many of us have been doing it since before the pandemic. more

French Presidential Candidate Confirms Massive Hack, Emails Dumped Online Two Days Before Election

Leading French presidential candidate Emmanuel Macron's campaign confirmed on Friday a "massive" computer hack that dumped its campaign emails online less than two days before the election. more

Trump, Tides, and the US Tech Sector

When a tax is too high people avoid it, and when the political cost of supporting the US government becomes too high, foreign governments will avoid it too. Add to that cost America's new inclination to withdrawal, and consider the muddy tidal flat on which could soon list the hull of what used to be American technological primacy... When countries try to develop technology policies to compete with the United States, they often begin with rules over immigration. more

The .BEST Brand Protection (Interview)

Launching a social network based on a single domain name extension is seriously innovative, but such a concept also implies to give Trademarks a chance to protect themselves. I recently interviewed Cyril Fremont, the new operator of the .BEST Registry and also CEO of "THE.BEST Social Network" on his plan to allow Trademarks to protect their assets prior to the launching of the review network. more

OPTA revokes Diginotar License as TTP

Wout de Natris: "In this decision OPTA revokes the registration of Diginotar as a so called Trusted Third Party. Diginotar issued certified certificates for digital signatures. The security breach by Iranian hackers over the summer, which Diginotar did not report to the authorities, lead to severe credibility issues for all Diginotar certificates issued before. This included Dutch government websites, but also led to severe breaches of privacy for Iranian end users, in multiple countries. As a result of OPTA's decision all certificates issued by Diginotar have to be revoked, while at the same she is forbidden to issue new ones. more

Internet Governance in 2026: Sovereignty, Security, and the Limits of Multistakeholderism

As Internet governance fragments in 2026, authority shifts from open, multistakeholder forums to state-led security regimes, legal instruments, and alliance-based cooperation, challenging longstanding institutions and reshaping global norms through enforcement rather than consensus. more

Mobile Prices Unlikely to Be Affected by AT&T Decision

Contrary to what some financial analysts would have us believe, it is highly unlikely that the price increases for mobile broadband services which were recently announced by AT&T will be replicated by other mobile operators around the world. The mobile market in the US is one of the least regulated and therefore one the most monopolised markets in the western world. more

For ccTLD Registries: 4 Steps to Guaranteed Success

The introduction of New gTLDs has increased the rate at which individuals and businesses are getting online today and we're already seeing mainstream adoption of New gTLDs. By going the extra mile to spread awareness about their extensions among the masses, New gTLD Registries are bringing attention to their value propositions and, more importantly, are sharing the idea of 'getting online' to audiences. more

Google Flags Entire Web Unsafe, Glitch Due to Human Error According to Company

A glitch in Google's security update on Saturday morning caused links to every search result -- including Google's own pages -- to get flagged with the warning: "This site may harm your computer." The errors caused panic among users around the world who at first feared the popular search engine had suffered a major security failure. The problem which lasted for approximately 40 minutes has now been acknowledged and fixed by Google. The reason for the hiccup, as explained by Google, was due to a human error in the list of URLs Google uses to identify and flag websites known to install malicious software. more

FBI Takes Down China-Backed Botnet, Facilitates Ransomware Negotiations

The FBI and international partners dismantled a China-backed botnet run by the Integrity Technology Group, a company linked to Chinese government espionage. more

Newer Cryptographic Advances for the Domain Name System: NSEC5 and Tokenized Queries

In my last post, I looked at what happens when a DNS query renders a "negative" response -- i.e., when a domain name doesn't exist. I then examined two cryptographic approaches to handling negative responses: NSEC and NSEC3. In this post, I will examine a third approach, NSEC5, and a related concept that protects client information, tokenized queries. The concepts I discuss below are topics we've studied in our long-term research program as we evaluate new technologies. more

The Crypto Wars Resume

For decades, the US government has fought against widespread, strong encryption. For about as long, privacy advocates and technologists have fought for widespread, strong encryption, to protect not just privacy but also as a tool to secure our computers and our data. The government has proposed a variety of access mechanisms and mandates to permit them to decrypt (lawfully) obtained content; technologists have asserted that "back doors" are inherently insecure. more

Those Who Don’t Remember 2014 Are Doomed to Repeat It

J. Gordon Crovitz is making his case against the IANA transition again today, in the pages of the Wall Street Journal. I think it's useful to once again go on record opposing his flawed logic against the transition. i2Coalition was among those that publicly praised the IANA transition report when it arrived this week. When the Washington Post covered our announcement, I was frustrated by a commenter who has a different take on the transition than I. more