/ Most Viewed

Other Countries Beginning to Adopt China’s Unique Approach to an Isolated Internet Structure

While in most developed nations, foreign telecoms are interconnected with local and other international Internet exchanges, in China, there are no foreign carriers detected within china's borders. more

Bill C-27: Historic Canadian Anti-spam Legislation Battered, But Still Unbeaten

As readers of CircleID have seen, there has been a lot of activity (for example, Michael Geist's "Canadian Marketing Association Attacks Anti-Spam Bill"), as the final votes of C-27 grow nearer. The history towards getting a spam law passed in Canada has been a long one. For years, CAUCE encouraged legislators to undertake this important work... Fast forward a few years, and a few governments, and suddenly we have a law tabled in the House of Commons... more

Considering a Vulnerability Disclosure Program? Recent Push Raises Questions for General Counsel

Several years ago, vulnerability disclosure programs, also called "bug bounty" programs, were novel and eyed with suspicion. Given sensitivities and potential liabilities, companies are wary of public disclosure and hackers seeking to exploit research. When a hacker presented a flaw to a company, the company was more likely to be concerned about taking legal action than making a public announcement or offering a reward. That is changing. more

Domain Names as Second-Class Citizens

A new book by Dr. Konstantinos Komaitis (Lecturer in Law at the University of Strathclyde) provides a passionate yet legalistic and well-researched overview of the legal, institutional and ethical problems caused by the clash between domain names and trademarks. This is really the first decent book-length treatment of what is now a decade and a half of legal and political conflict between domain name registrants and trademark holders. more

A New Boom to Come? Re-Evaluating the Success of the New TLD Program

I think it's fair to say that quite a few people -- both within the domain name industry and beyond -- have an opinion on whether the new TLD program is succeeding or struggling. But are things really all that bad? Are we forecasting doom before it has really had a chance to run? Crunching the numbers... Let's consider the (relatively short) history to this point and take a look at some statistics. more

Three Reasons Why CISOs Need to Understand Domain Security

Domain name abuse is one of the most dangerous and under-regulated issues in digital business security today. An attack on a web domain can lead to the redirection of a company's website, domain spoofing, phishing attacks, network breaches, and business email compromise (BEC). Domains used as a company's online world are part of an organization's external attack surface and need to be continuously monitored for cybercrime attacks and fraud. more

Who Pays for Email?

An acquaintance wondered why the people who run the systems that receive mail get to make all the rules about what gets delivered. After all, he noted: "The sender pays for bandwidth and agrees to abide by the bandwidth provider's rules." It is useful to think of the Internet as a collection of tubes, all leading from the periphery to the middle, where the middle is approximately "the peering point." The sender has paid for the tubes leading from himself to the middle... more

Dear Industry Canada, Is Now a Good Time to Replace CIRA?

Today we have sent following to the Minister of Industry Canada, James Moore, as well as the Canadian Internet Registration Authority (CIRA) Board of Directors. This is in response to the revelation that CIRA is positioning to enter the managed DNS space. As we outline in the letter, we are fine with more competition (in fact Google just entered the domain and DNS space too... No, competition is a fact of life, what we want is more of it, not less. Here's what we wrote to The Honourable James Moore. more

China Won’t Repeat Protectionist Past in Digital Realm

Google may have unnecessarily provoked a fight with China, but the Middle Kingdom better keep its wits, lest it repeat a sad protectionist history. Early last millennium China was the world's richest civilization and technology leader. It famously invented gunpowder, iron casting, paper, porcelain, printing, and gigantic nine-masted sailing vessels. Between 1405 and 1433, the great Muslim Chinese explorer Zheng He led seven expeditions in the South Pacific and Indian Oceans, reaching the coast of East Africa. China's naval fleet grew to 3,500 ships... more

League of Nations, United Nations, Next: United Cyber Nations

Though the "Techies" have been heavily involved in many initiatives like Internet Governance, Internationalized (Multi-lingual) Domain Names, Identity Management, Information Security, Access Rights Management etc., they still have to correctly apply the technologies at hand to be able to replicate many accepted norms that have matured in the physical world such as federated identities, non-repudiation, notarizing, witnessing, co-signing etc. more

Phishing Moving to the Web Channel

Today we received one of the first phish attempts to be made as a web spam (comment spam/blog spam) attempt. I wasn't convinced, and thought that perhaps it was a way to gather and verify RELEVANT online identities. Someone put me straight. It's phishing. I've often in the past had run-ins with the good folks in the anti virus realm back between 1996 and 2005 who thought Trojan horses and then spyware were not part of their business. Years later the AV business people ruled it is part of their business and ran to catch up. Same with botnets. more

ICM Announces General Availability of .XXX Domain Names

ICM Registry, the official registry of the new adult top-level domain (TLD) launched today for General Availability of .XXX domain names on a first come, first served basis. While the debate over the new domain has been fierce, the company reports today: "The introduction of .XXX has quickly become the most successful launch of any new sponsored top level domain. The positive public response has fueled global media interest normally not afforded to a new domain launch. In addition, the global advertising campaign, a first for any adult-related company, includes hundreds of nationally broadcast TV commercials, radio, newspapers and online ads. The www.buy.xxx website is already receiving nearly one million visitors per day." more

Domain Pulse 2008: Day 2 Focuses on DNS Security

Day two of Domain Pulse 2008 last Friday (see review of day one) focused on online security issues giving the techies amongst us details of security issues, and the more policy-orientated amongst us something to chew on in a few other presentations. Kieren McCarthy, these days of ICANN, also gave some insights into the drawn out sex.com drama with more twists and turns than the average soap opera has in a year! And Randy Bush outlined the problems with IPv6. Among other presentations... more

Monster.com Response to Security Breach Unacceptable

As some of us are continuing to learn this week the Monster.com service has again been successfully hacked. According to a security bulletin posted on Monster.com on January 23rd, 2009, the intruder gained access to the user database, while no resumes were apparently compromised... As a user of Monster.com what I find incredibly upsetting about this situation is that I had to find out about this through a security blog. more

What the ICANN Brussels Meeting Means for New gTLDs

ICANN's 38th get-together, in Brussels, may become known as the meeting where the dust finally began to settle. Long-standing issues were settled, compromises were reached, no-one complained too much about the latest version of the Applicant Guidebook, and the Board stood by its project plan dates, even scheduling a Board retreat to solve remaining issues. Finally, there were no surprise "gotcha!" delays that generic Top-Level Domain (gTLD) applicants have been used to seeing at ICANN meeting. With one possible exception... more