/ Most Viewed

New Anti-phishing Initiative Introduced by Yahoo!

Neil Schwartzman writes to report: "The company announced the Yahoo! Mail Anti-Phishing Platform (YMAP) yesterday. The technology is predicated upon the use of both DKIM and Sender Policy Framework (SPF) to identify authentic messages. As part of the initiative, Yahoo! has partnered with email authenticators Authentication Metrics, eCert, Return Path, and Truedomain to provide broad-band coverage of well-known brands." more

Demystifying Statistical Approach to Domain Name Appraisals

Professional domain name appraisals have acquired a dubious reputation, and I understand the rational skepticism regarding their usefulness. In my recent paper, "Statistical Domain Name Appraisal: Same as What You're Doing, +/-," I try to demystify the statistical approach by pointing out its commonality with methods intuitively adopted by active domainers. It will also underscore some of the sources of skepticism toward various appraisal methodologies, and point out the advantages and limitations of statistical models. The paper concludes with a list of the conditions that can make a professional appraisal value adding, and with a plea for transparency. more

I Am Not an IP Address, I Am a Free Man… and a Potential Customer

When I heard that full episodes of The Prisoner TV series were available online I immediately headed over to the AMC website to wallow in nostalgic enjoyment and remind myself just how cool Patrick McGoohan was as he stumbled around Portmeirion trying to avoid a big plastic ball... I would happily have watched online and let AMC advertise to me in return, but sadly it was not to be. When I got to The Prisoner page on its site I saw only an unfriendly message, shouting at me... more

SpaceX Starlink in Ukraine – a Week Later

Last week I wrote about the arrival of a truckload of SpaceX Starlink terminals in Ukraine and their potential value to government and resistance leaders. A lot has happened in the ensuing week - this is an update. Last week, using Mike Puchol's Starlink tracking service, I found that users in Kyiv would have 100 percent uptime with connections through as many as nine satellites to ground stations in Turkey, Poland, and Lithuania. more

Massachusetts School District Pays Hackers $10K in Bitcoin, Police Calls Case “Impossible” to Solve

A Massachusetts school district was forced to pay a $10,000 Bitcoin ransom to hackers following a cyberattack that blocked access to its system. more

Revisiting Reverse Domain Name Hijacking

The conduct that reverse domain name hijacking (RDNH) was crafted to punish is "using the [Uniform Domain Name Dispute Resolution Policy] in bad faith to attempt to deprive a registered domain-name holder of a domain name." There are several variations ranging from the plain vanilla, claims that should never have been brought – mark owners whose rights postdate the registration of the challenged domain name as in Vudu, Inc. v. WhoisGuard, Inc. / K Blacklock, D2019-2247... more

The Evolution of the ITU’s Views on Internet Governance (2006-2012)

Someone was talking the other day about the ITU and what they think about the issue of Internet Governance. I know what the ITU Secretariat wrote in a paper some years ago (Bulgaria was one of the governments heavily criticizing the errors and flaws in the ITU paper), but also decided it might be interesting to show how this question has evolved in the words of the ITU Secretary-General Hamadoun Toure, by finding out how his positions on that issue, and on the role of the ITU have changed through the years. more

The Federal Cybersecurity Regulation Already in Place

While Congress and the White House deliberate possible actions on FISMA reform and increased oversight of critical infrastructure, relatively little attention is being given to the government-wide cybersecurity regulation already in place, the Data Quality Act (DQA). Unlike FISMA, which primarily governs the government's internal cybersecurity processes, and contemplated legislation and/or Executive Order(s), which would likely also include a focus on critical infrastructure protection, the DQA contains a unique mandate. more

AI in Academia: Tool or Trap? Balancing Innovation and Intellectual Honesty in the Digital Age

AI has revolutionized how we process information, optimize tasks, and conduct research. However, its integration into academia sparks ethical and practical debates. Should we limit its use? How can we assess a student's true knowledge if they employ these tools? This text explores these questions from the perspective of a technology expert who argues that banning AI is as absurd as rejecting calculators or spreadsheets in the past. more

Where are the Gigabit Applications?

I remember that soon after the City of Chattanooga launched its citywide fiber network, the company held a competition seeking web applications that would benefit from gigabit speeds. I don't recall if anything useful came out of that effort, but I know that there are still today almost no big bandwidth applications on the web online aimed at the average household. more

Verisign iDefense Analysis of XcodeGhost

At Verisign we take our Internet stewardship mission very seriously, so when details emerged over the past week concerning the XcodeGhost infection, researchers at Verisign iDefense wanted to help advance community research efforts related to the XcodeGhost issue, and leveraging our unique capabilities, offer a level of public service to help readers determine their current and historical level of exposure to the infection. more

A Framework for Selecting New TLDs

Your corporate domain names send implicit messages (signals) through their Top-Level Domains (TLDs) and their second-level words. Shape your domain names so to send the right messages and to avoid sending unintentionally confusing messages. The post focuses on a framework to help bidders determine which TLDs send messages that are potentially profit generating... Soon TLDs such as ".car," ".cars," ".green," and ".eco" will be available to any qualified body whose request is favored by the allocation system. The system being discussed is a combination of beauty contests and auctions. more

ICA Questions ICANN on RegisterFly

The Internet Commerce Association sent this letter to ICANN yesterday in regard to the RegisterFly situation: "I am writing to you in my capacity as Counsel to the Internet Commerce Association (ICA), a non-profit trade association dedicated to promoting and protecting the rights of domain name (DN) owners... It has come to our attention that an ICANN-accredited registrar is in the midst of what appears to be a near-complete operational breakdown, and that its ongoing failure to carry out its responsibilities is causing substantial economic loss to tens of thousands of DN registrants in both the United States and multiple foreign jurisdictions." more

Do You Know Who Your Domain Name Registrar Is?

A guy I know passed along this e-mail sent to one of his customers. They assumed it was a phish, since they didn't recognize the domain name in the link, but couldn't figure out what the goal of the phish was. They even checked the list of ICANN registrars, and nope, registrar.eu wasn't on the list. Nonetheless, this mail was real, and if the recipient had ignored it, his domain would have been suspended. What's going on? more

DoH Creates More Problems Than It Solves

Unlike most new IETF standards, DNS over HTTPS has been a magnet for controversy since the DoH working group was chartered on 2017. The proposed standard was intended to improve the performance of address resolutions while also improving their privacy and integrity, but it's unclear that it accomplishes these goals. On the performance front, testing indicates DoH is faster than one of the alternatives, DNS over TLS (DoT). more