There is an old saying that "bad news comes in threes." Domain name service providers have witnessed two unsettling developments in the past few weeks. The third, still winding its way through the U.S. Congress, could have enormous ramifications. Registries and registrars, in particular, need to speak up or resign themselves to the consequences. more
Businesses may rely on domain names to conduct their day to day work, but that does not mean that they really understand what they are using or how important they are. Of course those of us in industry may feel tempted to either scoff at people's naivety or feel terribly frustrated with their ignorance, however neither action is particularly productive. Loic Damilaville, however, has tried to take a more practical and positive approach by publishing a white paper on domain name management. The document was published a few months ago in French and has since been made available in English. more
According to a report from the World Intellectual Property Organization (WIPO), trademark owners filed a record 3,447 cases under the Uniform Domain Name Dispute Resolution Policy (UDRP) with WIPO's Arbitration and Mediation Center in 2018. more
The recent announcement at the ICANN 50 London, by all stakeholder groups and constituencies comprising of ICANN's Generic Names Supporting Organization (GNSO) to endorse a joint statement in support of the creation of an independent accountability mechanism "that provides meaningful review and adequate redress for those harmed by ICANN action or inaction in contravention of an agreed upon compact with the community" is a very welcome development to the Multistakeholder framework. more
Black Frog -- a new effort to continue the SO-CALLED Blue Security fight against spammers. A botnet, a crime, a stupid idea that I wish would have worked -- News items on Black Frog. Blue Frog by Blue Security was a good effort. Why? Because they wanted to "get spammers back". They withstood tremendous DDoS attacks and abuse reports, getting kicked from ISP after ISP. ...The road to hell is filled with good intentions. Theirs was golden, but they got to hell, quite literally, non-the-less. ...When Blue Security went down, some of us made a bet as to when two bored guys sitting and planning their millions in some café would show up, with Blue Security's business plan minus the DDoS factor. Well -- they just did. more
As part of its efforts to speed up the delivery of web content, Google has proposed changes to Transmission Control Protocol (TCP), "the workhorse of the Internet." Yuchung Cheng who works on the transport layer at Google wrties: "To deliver content effectively, Web browsers typically open several dozen parallel TCP connections ahead of making actual requests. This strategy overcomes inherent TCP limitations but results in high latency in many situations and is not scalable. Our research shows that the key to reducing latency is saving round trips. We’re experimenting with several improvements to TCP." more
ICANN held its first international meeting of 2012 last week in San Jose, Costa Rica, and kicked off the week on a high note with an inspired speech by Costa Rican President Laura Chinchilla. While Chinchilla's point was made in reference to recent U.S. legislative initiatives and other proposals to increase Internet regulations at the international level, the tug-of-war over online rights and the governance framework to develop and assure them was a common thread throughout much of the ICANN meeting. more
The essay analyzes some of the strengths and weaknesses of closed and open new gTLDs. The success of the gTLD to a large degree rests on the successful design and implementation of an effective digital business model. A closed gTLD is one whose owner uses it for exclusive content - for example, the use of .book exclusively for Amazon books. Conversely, if Amazon opens up .book, other book sellers and libraries would be able to set up sub-domains, sites where they controlled content. more
At the start of the TAS outage, I said ICANN had a great opportunity to get its crisis management right by communicating properly. Now, nearly two weeks after the application window was supposed to close, ICANN has clearly done just that... But clearly, communication isn't the only parameter in crisis management. At some point, you also need to act. more
A new malware designed to manipulate industrial safety systems was deployed against a critical infrastructure organization that provides emergency shutdown capability for industrial processes, according to a report released today. more
The Office of the Privacy Commissioner of Canada has released its long-awaited finding in the complaint against Facebook on a variety of privacy grounds. The complaint was launched by CIPPIC in May 2008 (note that I am an advisor to CIPPIC but had no involvement in this complaint). The case marks an important step in assessing how Canadian privacy law addresses social media with the Commissioner identifying some significant concerns. Moreover, as the case potentially heads to court, it will be closely watched to see whether the findings can be enforced against a global social media power like Facebook. more
Unprecedented new Political and Cyber Security Threats are happening at a scale that has never been witnessed before. These threats are large and malicious enough to take down nuclear programs, render oil refineries inoperable, and take billion-dollar websites offline (not to mention smaller ones). Recent events confirm that NO ONE IS IMMUNE. Despite the obvious warning signs, Internet business stakeholders the world over continue to act as if nothing has changed, and seem unaware that global paradigms have undergone a seismic shift almost overnight. more
The Collaboration for International ICT Policy for East and Southern Africa (CIPESA) recently published "ICANN, Internet governance and Africa", a public briefing on the current status and key points of the debate that provides essential background for the second phase of the World Summit on Information Society (WSIS). During the last few years the relationship of African stakeholders with ICANN has received greater attention, largely driven by a few key individuals within African governments, the technical community, and civil society organizations. Meanwhile, the broader topic of Internet governance has been put on the public agenda in the context of the WSIS. ...Decisions taken at the upcoming second phase of the WSIS (to occur in Tunis in November 2005) are likely to have a profound impact on ICANN and the field of Internet governance more generally. more
The UK today is one of the main attack targets by phishing organized crime groups, globally. Phishing damages will amount to about two billions USD in 2006 worldwide -- not counting risk management measures such as preventative measures, counter-measures, incident response and PR damages. In most cases, phishing is caused by the fault of the users, either by entering the wrong web page, not keeping their computers secure or falling for cheap scams. Often this is due to lack of awareness or ability in the realm of Internet use rather than incompetence by the users... more
Months ago, while watching a Saturday Night Live skit about non-fungible tokens (NFT) featuring a parody of Janet Yellen speaking to a high school economics class, I realized what an NFT is and how they work. What they represent, how they are minted, and how their value is exchanged became clear while watching Pete Davidson in a boy wonder unitard rap about the latest crypto-phenomena. It was only later that I realized that NFTs have plenty of practical applications. more