/ Recently Commented

ICANN’s Two Decades of Evolution

In the fall of 1998, I was present at the first meeting of the ICANN Board which was then made up of very senior, prominent parties from a broad spectrum of sources. Much to her credit, Esther Dyson accepted the position as the first Chair of the ICANN Board for the newly birthed organization. I was in attendance in support of the nomination of Michael Roberts as the first ICANN CEO. It was a time of uncertainty. more

Traceability

At a recent workshop on cybersecurity at Ditchley House sponsored by the Ditchley Foundation in the U.K., a primary topic of consideration was how to preserve the freedom and openness of the Internet while protecting against the harmful behaviors that have emerged in this global medium. That this is a significant challenge cannot be overstated... That these harmful behaviors can and do cross international boundaries only makes it more difficult to fashion effective responses. more

Undone! Failure of Persuasion in UDRP Proceedings

A split Panel in an early decision under the Uniform Domain Name Dispute Resolution Policy (UDRP) held that parties deserve more than "[i]t depends [on] what panelist you draw." Time Inc. v. Chip Cooper, D2000-1342 (WIPO February 13, 2001). That's one side of the paradigm; the other side makes demands on the parties to prove their contentions, either of cybersquatting (one element of which is proving that respondent lacks rights or legitimate interests) or rebutting the claim (one element of which is respondent demonstrating it has rights or legitimate interests). more

The .BEST New gTLD: Second Interview

This is a one hour podcast giving all details about what the .BEST social network is going to be and how users will be able to generate an income from it... Cyril Fremont gives lots of details on how his social network, focusing on reviews, is going to be different from Google Reviews, Facebook, Yelp and TripAdvisors. If one would be tempted to think that ... well, "that's just going to be another social network", then, I strongly suggest to listen carefully the part of the interview on the decentralization of this network. more

Alphabet’s Loon Balloons Can Now Cover 1000km of Internet Connectivity via 1 Access Point

Loon, formerly a Google X project and now an independent Alphabet company, reveals that it successfully transmitted data over a 1000 kilometers (621 miles) via a network of 7 balloons. more

Making Sense of the Domain Name Market - and Its Future

With ever more TLDs, where does it make sense to focus resources? After four years and a quadrupling of internet extensions, what metrics continue to make sense in the domain name industry? Which should we discard? And how do you gain understanding of this expanded market? For registries, future success is dependent on grasping the changes that have already come. For registrars, it is increasingly important to identify winners and allocate resources accordingly. The question is: how? more

Spare a Thought for Venezuela

Please spare a thought for Venezuela. This, the 33rd largest country in the world and with about 34 million people, the largest proven reserves of oil, the cheapest price of gasoline in the world, and was in 1950 richer than Germany, has fallen on times so hard in this once Latin America's richest country that 75% of the population lost an average of 11 Kg (24 pounds) in weight in one year because of food scarcity. And you might ask: "Why should I care?" more

New Zealand’s Domain Name Commission Wins Injunction in a Lawsuit Against DomainTools

New Zealand's Domain Name Commission today won a motion for preliminary injunction in a US lawsuit against the company DomainTools. more

(DNS) Security Protocols Do What They Say on the Tin

DNS-over-TLS has recently become a welcome addition to the range of security protocols supported by DNS. It joins TSIG, SIG(0) and DNSSEC to add privacy, and, in the absence of validating stub resolvers, necessary data integrity on the link between a full-service resolver and the users' stub resolver. (The authenticated source feature of TLS may also offer some additional benefits for those of a nervous disposition.) Good stuff. What is not good stuff is... more

GDPR Didn’t Affect Spam? Not So Fast

I have recently become aware of a blog post from Recorded Future that attempts to analyze the effects of the GDPR on online security. Unfortunately, it starts by asking an irrelevant question and then goes on to use irrelevant metrics to come to a meaningless answer. The premise of Recorded Future's article - that spammers would send more spam and register more domains because GDPR came into effect - tells us nothing useful about how GDPR affects anything. It's the wrong question... more

Why Foldering Adds Very Little Security

I keep hearing stories of people using "foldering" for covert communications. Foldering is the process of composing a message for another party, but instead of sending it as an email, you leave it in the Drafts folder. The other party then logs in to the same email account and reads the message; they can then reply via the same technique. Foldering has been used for a long time, most famously by then-CIA director David Petraeus and his biographer/lover Paula Broadwell. Why is foldering used? more

Trump’s Outrageous ITU Elections Gambit

Every four years, the 168-year-old, Geneva-based treaty organization that provides the legal basis for worldwide network communications, radio spectrum management, and satellite placements holds a "plenipotentiary" conference among its 193 sovereign nation members. The next plenipotentiary begins on 29 October for three weeks. In addition to potentially altering treaty provisions and resolutions, and constituting its Council as an interim governing body, it elects 17 individuals to its five permanent bodies... more

Special Interests Circulating Draft Legislation to Cut Short ICANN’s Whois Policy Process

Special interests who oppose privacy are circulating draft legislation to cut short ICANN's Whois policy process, warns Milton Mueller in a post published today in Internet Governance Project. more

Taking a Multi-Stakeholder Look at Cyber Norms

Recently we've seen several examples of likely state sponsored security incidents of which the appropriateness was later strongly debated. Incidents such as states impacting commercial enterprises during cyber attacks; purported sabotage of critical infrastructure, and attacks on civilian activists have all, to a greater or lesser degree, led to concerns being raised by both civilian watchdog groups, academics, technologists and governments. more

ICANN Turning 20 - Your Thoughts?

As most you might know, this year marks the 20th anniversary of the formation of the Internet Corporation for Assigned Names and Numbers (ICANN). The organization was officially incorporated as a California non-profit corporation on September 30, 1998. ICANN plans to mark its 20th anniversary during ICANN63 in Barcelona, 20-25 October 2018. In response to a request from the organization, leading up to ICANN63, CircleID will host a series of blogs written by community members... more