/ Most Viewed

At the ARIN Meeting

I have been attending the American Registry for Internet Numbers (ARIN) meeting in Toronto. ARIN is one of the RIRs, i.e., the Internet address registry and policy making authority for North America. Although I have observed and participated on RIR lists for some time and interacted with RIR representatives at ICANN, WSIS and IGF, this is the first time I have been able to attend a meeting. I'm glad I did. more

ICANN.WTF? FTC & OCA Asked Whether .SUCKS is a Law Breaker (Part I)

On April 9, 2015 ICANN took the unprecedented step of asking two national consumer protection agencies whether the .Sucks registry, one of the new gTLDs it has approved and which is currently in its sunrise registration period, has a business plan which violates any laws or regulations those agencies enforce. This is the equivalent of sending a message stating, "Dear Regulator: We have lit a fuse. Can you please tell us whether it is connected to a bomb?" more

‘Spam King’ Sanford Wallace Sentenced to 2.5 Years In Prison

The 47 year old Las Vegas man known as the "Spam King" has been sentenced to 2.5 years in federal prison for sending over half-million spam messages to Facebook users resulting in over 27 million spam messages sent through social networking company's servers. He pleaded guilty last year to one count of fraud. more

Assessing Current Generic New gTLDs

If we are already familiar with new generic Top-Level Domains from the ICANN new gTLD program, also called "new gTLDs", are we just as familiar with these new domain name extensions, which are called "generic" and which could be an alternative to the existing ".com" domain name extension? Not so many... As the list of new gTLDs is very long, we can easily say that there is a Top-Level Domain for any kind of business: a ".club" for Clubs, a ".news" for News, a ".dentist" for Dentists, a ".actor" for Actors, etc... more

Cloud Computing and Digital Divide 2.0

Internet connectivity is the great enabler of the 21st century global economy. Studies worldwide unequivocally link increases in Internet penetration rates and expansion of Internet infrastructure to improved education, employment rates, and overall GDP development. Over the next decade, the Internet will reinvent itself yet again in ways we can only imagine today, and cloud computing will be the primary operating platform of this revolution. more

Quintessential and Other Acts of Bad Faith in Acquiring Domain Names

There are two essential differences between the Uniform Dispute Resolution Policy (UDRP) and the Anti-Cybersquatting Consumer Protection Act (ACPA), one procedural and one substantive. The procedural difference is quite minor, a mere quirk that Panels adopted by consensus in the early days of the UDRP and deserves no more than a footnote. Under the UDRP, complainants have standing on proof that they have trademark rights when they file their complaints... more

Kudos to ccTLD Registries for Taking Measures to Improve Security

When I first wrote about Domain Registry Locking over a year and a half ago, Verisign was the only Registry offering a true Registry Lock Service. Of course, not long after, Neustar announced their Registry Lock Service too. Recently however, a number of ccTLD Registries have also adopted Registry Locking programs... more

Researchers Use Social Graphs to Detect Spammers, Attackers

A project named S-GPS or Spammer Global Positioning System, by Microsoft researchers uses spammer identification rather than spam identification to identify zombie-based spammers. more

Does gTLD Registration Volume Measure Success?

For some time, the measure of success of a TLD was volume of registrations, or strictly speaking, Domains Under Management (DUMs). Who better than .com to validate the truth of that metric? More recently, this same metric has been applied to new gTLDs, especially those who achieve volume quickly, by whatever means necessary. These gTLDs are fawned over, written about, and effectively set up as the standard for other gTLDs to aspire to. But I'd like to challenge that notion. more

Why the Cloud Is the Solution for Telecom Upgrades

With so much "cloud-talk" across every industry -- many presume that every company with serious telecom operations has already moved there -- but they haven't. In fact, 20 to 25% of global companies are still using legacy PBX systems and MPLS networks and waiting to replace them and move over to SD-Wan/mesh solutions. These advancements can be done successfully after an infrastructure audit has been conducted to identify operational weaknesses and threat vulnerabilities and measuring efficiencies of each feature for usage optimization and increased productivity. more

Dot-XXX and Tiered/Differential Pricing: Permitted?

As folks will recall, there was a big debate about tiered/differential pricing in the .biz/info/org contracts. Eventually those contracts were amended to prevent that. However, if folks read the .XXX proposed contractv [PDF], Appendix S, Part 2, under "delegated authority" (page 66 of the PDF), appears to give the Registry Operator total control to make policy regarding pricing. Thus, it would appear they are in a position to re-price domains that later become successful... more

U.S. Congressional Trademark Caucus Haggles Over Price

It was standing-room-only at the Congressional Trademark Caucus session in the Rayburn House Office Building in Washington, D.C. on Wednesday, April 6. The topic, brand protection in the new top level internet domain names, is still, it seems, a draw. With nearly two years' experience and statistical evidence of far fewer problems at far lower costs to brand owners than opponents of the program said would occur, it might be expected that the tone would cool. But the price of peace, I guess, remains eternal vigilance. more

P2P as a New Spam Medium, Moving From PoC to Full Operations

Spam on P2P networks used to be mainly with advertising inside downloaded movies and pictures (mainly pornographic in nature), as well as by hiding viruses and other malware in downloaded warez and most any other file type (from zip archives to movie files). Further, P2P networks were in the past used for harvesting by spammers. Today, P2P has become a direct to customer spamvertizing medium. This has been an ongoing change for a while. As we speak, it is moving from a proof of concept trial to a full spread of spam, day in, day out... more

IPv6… the Year NAT-Enforced IPv4 Dam Showed Seepage

We don't give enough credit to people who will sacrifice themselves trying to plug the IPv4 dam with some NAT-putty. They even dream of a NAT66 filled afterlife. The growing IPv6 traffic trickle was given evidence at the recent RIPE 57 meeting in Dubai in a number of presentations, including a most edifying Google presentation. Noteworthy to see France with a 0.65% IPv6 penetration... more

Law Enforcement Agencies Will Have Authority on Registries and Registrars

Accessing Whois information and acting on a litigious domain name is becoming a nightmare for law enforcement agencies. Law enforcement agencies must have an access to the information provided by registrants in the Whois database and, in specific cases, have authority to act FAST on a domain name. The EU has a solution for this and it's coming in 2020. more