It's fascinating to watch the Internet technical community grapple with policy economics as they face the problems creating by the growing scarcity of IPv4 addresses. The Internet Governance Project (IGP) is analyzing the innovative policies that ARIN, RIPE and APNIC are considering as a response to the depletion of IPv4 addresses. more
The U.S. "Scorecard" for Brussels Proposes Draconian Trademark Rules - And May Mean the End of Unlimited New gTLDs and/or the ICANN Experiment in Private Sector-Led Internet Governance... On Friday, January 28th the U.S. Department of Commerce (DOC) circulated its submission to ICANN's Governmental Advisory Committee (GAC) containing suggestions for what positions the GAC should push for at its February 28 - March 1 meeting with ICANN's Board to air disagreements over provisions of the Proposed Final Applicant Guidebook (AG) for new gTLDs. more
I have not submitted any comments on ICANN's new gTLD process, mostly because many other people have said more diplomatically what I think, but I thought I could blog about it. My main concern from the beginning was that the process should allow any serious candidate to run with a reasonable chance to be able to actually start running a gTLD. This includes small and medium sized communities and startup companies with little seed money. This also includes registry models that may not favour mass registrations. For all these, the current model is flawed. more
ICANN's web site has a press release saying that the were granted a temporary restraining order on Monday requiring that Registerfly cough up all the info on their registrants, or else.
My assumption all along has been that the reason that Registerfly hasn't provided full info is because they don't have it. ICANN agrees that they got partial data last month, and it's hard to imagine a reason that Registerfly would have given them some of the data but deliberately held back the rest. I guess we'll know soon enough.
By the way, I hear that ICANN plans to implement their registrar escrow policy, the one that's been in the contracts since 2000, pretty soon. more
A wave of DNS hijacking is reported to have affected dozens of domains belonging to government, telecommunications and internet infrastructure entities across the Middle East and North Africa, Europe and North America. more
A lot of ink and pixels have been spilled about the FCC's new rules for network neutrality. It's impossible to comment sensibly yet about the actual proposal, since as far as I know it's not been published anywhere, but the various news reports have left me confused about just what is being addressed. There are a number of different sorts of behavior that can result in performance differences to the end user... The purpose of this post is to give a simplified (with luck, not too horribly oversimplified) explanation of the different issues here. more
If you're interested in learning more about Internationalized Domain Names (IDNs), UNESCO and EURid recently released a report on the evolution and challenges of IDNs. It's a good read and it highlights some of the struggles that countries and registries face and taking IDNs mainstream. Though Russia has so far proven to be a major success story - with more than 800,000 IDN registrations so far (and counting) - most other IDNs are have a long ways to go yet. more
Tomorrow Internet Governance Forum (IGF) starts. The overall discussion topic this year is How to reach the next billion(s), and that builds on the fact that today we have around one billion Internet users. A number that will explode when all different kinds of devices, from cellphones, to TV sets to toasters will be Internet connected... Some workshops have been cancelled and panelists have been replaced as many people and organisations have made the decision to not go to India. more
Internet Governance, like all governance, needs to be founded on guiding principles from which all policymaking is derived. There are no more fundamental principles to guide policymaking than the Universal Declaration of Human Rights (UDHR). This article, Part 7 of a series, looks at Articles 20 and 21 and explores how principles in the UDHR and lessons learned over the last half-century help define the rights and duties of one's engagement in the digital spaces of the Internet ecosystem. more
Why are networks so insecure? One reason is we don't take network security seriously. We just don't think of the network as a serious target of attack. Or we think of security as a problem "over there," something that exists in the application realm, that needs to be solved by application developers. Or we think the consequences of a network security breach as "well, they can DDoS us, and then we can figure out how to move load around, so if we build with resilience (enough redundancy)... more
In the business world, there are two main paths a company can take with cybersecurity -- the reactive and the proactive approach. The problem with a purely reactive attitude is that it can easily put companies in constant firefighting mode. And for small companies with limited resources, this can turn out to be an increasingly uncomfortable place to be in.
With that in mind, experts today suggest proactive cybersecurity by monitoring suspicious activity and identifying risks before they turn into full-blown attacks. more
The UDRP has the form of a substantive Policy, but it operates as a "smell test".1 If the evidence smells bad, the panel will likely order a transfer. If it doesn't, the panel won't. An aim of this article is to help improve UDRP panels' sense of smell when it comes to differentiating between domain name investors and cybersquatters. I will provide some insight into the business of domain name investing that I hope will be helpful to UDRP panelists in making more accurate inferences in disputes involving investors. more
According to press reports, a water utility's SCADA network was hacked. The attacker turned a pump on and off too much, resulting in physical damage to the pump. ... For years, security specialists have been warning that something like this could happen. Although more and more people have started to believe it, we still hear all of the usual reassuring noises -- the hackers don't know enough, we have defenses, there are other safeguards, etc. That debate is now over... more
HaAretz, an Israeli newspaper, quotes Major-General Yaldin as saying: "Fighting in the cyber dimension is as significant as the introduction of fighting in the aerial dimension in the early 20th century." (my translation) If this statement is to be believed, Israel is active in cyberspace. And yet, why would Israel admit that, regardless of if it really happens? One option is... more
Starlink recently launched a new webpage that advertises the future ability to deliver text, voice, and data to 4G cell phones via satellite. The texting service is supposed to be available in 2024, with voice and data coming in 2025. The service will require a user to have a view of the open sky. more