/ Most Viewed

Should We Make the Possession of Malware a Crime?

In the U.S., it is a federal crime to use malware to intentionally cause "damage without authorization" to a computer that is used in a manner that affects interstate or foreign commerce. Most, if not all, U.S. states outlaw the use of malware to cause damage, as do many countries. The Council of Europe's Convention on Cybercrime, which the United States ratified a few years ago, has a provision concerning the possession of malware. Article 6(1)(b) of the Convention requires parties to the treaty to criminalize the possession of malware "with intent that it be used for the purpose of committing" a crime involving damage to a computer or data... more

A 5G Community Network Strategy for Cuba (and Other Developing Nations)

In a previous post, I suggested that Cuba might be able to leap over 4G to 5G wireless infrastructure using satellite and terrestrial networks for backhaul. While that would require political and policy change, it would be a good fit with Cuban culture and skills. Before talking about Cuba, let me say a bit about wireless generations. Each mobile technology generation used new technology and enabled new applications. more

How Much Money Is There in Complaining?

Although I don't have a lot of sympathy for the trademark lawyers' argument that trademark holders need to register .sucks domains cheaply before anyone else can, there is one point at the end of their letter that's worth a look. The registry contract for .sucks, between Vox Populi and ICANN, has this sentence that appears (as far as I know) in no other registry contract, in the section on Registry-Level fees. more

2012: The Year of the New gTLD Program and the Year to Support ICANN - Part II

As we go into 2012, I am encouraged that there are many, including top officials and leaders in Washington DC, who believe in ICANN's leadership of the multi-stakeholder model, and that the organization should be allowed to successfully midwife the new gTLD program. The Honorable Senator John 'Jay' Rockefeller for example was reported in the ICANN Blog as giving his full support: "I think we have to get used to dot-hotels. I think we have to get used to dot-auto." more

Fight Phishing With Branding

Phishing, stealing personal information by impersonating a trusted organization, is a big problem that's not going away. Most antiphishing techniques to date have attempted to recognize fake e-mail and fake web sites, but this hasn't been particularly effective. A more promising approach is to brand the real mail and real web sites. more

Senator Cotton: Extraordinary Expansion of Huawei Cloud

Huawei's Cloud is growing faster than Amazon, Microsoft, or Google, Iain Morris writes. He cites U.S. Senator Tom Cotton on growth in "Egypt, Indonesia, Malaysia, Mexico, Saudi Arabia, Turkey, and the United Arab Emirates." Cotton further says: "In addition, Huawei's cloud services revenues reportedly rose by almost 170 percent in 2020. This accelerating revenue stream threatens to undermine U.S. efforts to curtail Huawei's power, influence, and financial strength." I think Cotton is a little high on Huawei Cloud growth... more

Minimum Disclosure: What Information Does a Name Server Need to Do Its Job?

Two principles in computer security that help bound the impact of a security compromise are the principle of least privilege and the principle of minimum disclosure or need-to-know. As described by Jerome Saltzer in a July 1974 Communications of the ACM article, Protection and the Control of Information Sharing in Multics, the principle of least privilege states, "Every program and every privileged user should operate using the least amount of privilege necessary to complete the job." more

How Tiered Internet Pricing Could Actually Facilitate P2P

Time Warner Cable's planned experiment with tiered charging for Internet access has generated a flurry of coverage in the blogsphere, but no new insights (at least that I've seen). The primary problem ISP's complain about is that 5% of their customers use 90% of the available bandwidth and when they examine this traffic, it's mostly peer-to-peer file sharing... more

Smells like Cybersquatting? How the UDRP “Smell Test” Can Go Awry

The UDRP has the form of a substantive Policy, but it operates as a "smell test".1 If the evidence smells bad, the panel will likely order a transfer. If it doesn't, the panel won't. An aim of this article is to help improve UDRP panels' sense of smell when it comes to differentiating between domain name investors and cybersquatters. I will provide some insight into the business of domain name investing that I hope will be helpful to UDRP panelists in making more accurate inferences in disputes involving investors. more

Domain Names as Property Subject to Creditor Claims - Bosh v. Zavala

Most people take it for granted that domain names are property. As such, there shouldn't be much dispute that domain names are subject to the claims of judgment creditors. But I've seen enough resistance to this position that I thought a recent case was worth a quick mention. more

The Harsh Reality of Spam and Online Security… Should I Stay or Should I Go?

Working in the anti-spam and online malware fight can be depressing or at best invoke multiple personality disorder. We all know things are bad on the net, but if you want a dose of stark reality, check out Brian Kreb's fantastic 'Security Fix' blog on the Washington Post site... Speaking to an old friend who asked me what I was doing these days, I recently likened the fight against this relentless onslaught to having one's pinky in a dyke, and there are days when I don't even think we have a dyke! more

EU Should Not Be Setting US WHOIS and Privacy Policy, Says MPAA

The Motion Picture Association of America (MPAA) in its recent submission to the National Telecommunications and Information Administration (NTIA) has raised a stern objection regarding ICANN's attempt to adhere to the EU's General Data Protection Regulation (GDPR), stating that the temporary specification had gone "well beyond what the GDPR mandates." more

IPv6 Answers to Common Questions from Policy Makers, Executives and Other Non-Technical Readers

A factual paper prepared in October 2009 for and endorsed by the Chief Executive Officers of ICANN and all the Regional Internet Registries that provides answers to commonly asked questions about IPv6 such as: How are allocations made, and to whom? How are IPv6 addresses actually being allocated? And why did such large IPv4 address allocations go to US organizations, including the US Government, and its Department of Defense? more

Why I’m No Longer So Worried About ICANN

"No, the new gTLD program isn't ready!" ... "Yes, I was wrong on the Trademark Clearinghouse!" Fadi Chehadé showed some strong leadership qualities during last week's ICANN regional registry and registrar meeting in Amsterdam. Honesty and courage... What started out as a speech soon turned into a heart to heart. As he responded to questions, Chehadé made some surprisingly honest comments. more

IPv6: Bring on Your Content!

Late last year a colleague quipped: you spent one third of your time on IPv6 this year, yet it still only generates 1% or so of the traffic. What are the chances of him uttering the same sentence coming December with IPv6 traffic still hovering barely over the one percent mark? more