A lot of people are fascinated by the news story that Anonymous managed to listen to a conference call between the FBI and Scotland Yard. Some of the interest is due to marvel that two such sophisticated organizations could be had, some is due to schadenfreude, and some is probably despair: if the bad guys can get at these folks, is anyone safe? more
In looking back at what has occurred in the new TLD world in 2015, it is hard to believe that it's all taken place in just a short 12 month period. As an industry, we set off into this year realising that we had a hard game ahead -- as with all innovation, we knew that each step forward would require significant effort, knowhow and collaboration. We'd made big steps in 2014 to get started, but would 2015 move us forward or fizzle out? more
Will new gTLDs just be more of the same, or will they bring real diversity and innovation to the Internet's namespace? For Hong Kong based Stable Tone, applicant for two Chinese character IDN TLDs (?? or "Dot WORLD" and ?? or "Dot HEALTHY"), it's the smaller applicants that give the new gTLD program its soul. more
Of all the many applications and services that run on top of the Internet, arguably none has been more successful than that of the World Wide Web. Invented by Tim Berners-Lee back in 1989 while he was a physicist at CERN, the "Web" has fundamentally changed almost every aspect of our life... and become a part of basically every aspect of our life. Think of a part of your life... and then think of the websites that are part of that. more
Time flies. Although it was over 18 months ago, it seems just like yesterday that a small Czech provider, SuproNet, caused global Internet mayhem by making a perfectly valid (but extremely long) routing announcement. Since Internet routing is trust-based, within seconds every router in the world saw this announcement and tried to pass it on. Unfortunately, due to the size of this single message, quite a few routers choked -- resulting in widespread Internet instability. Today, over a year later, we were treated to a somewhat different version of the exact same story. more
There have been a number of reports recently about customer lists leaking out through Email Service Providers (ESPs). In one case, the ESP attributed the leak to an outside hack. In other cases, the ESPs and companies involved have kept the information very quiet and not told anyone that data was leaked. People do notice, though, when they use single use addresses or tagged addresses and know to whom each address was submitted. Data security is not something that can be glossed over and ignored. more
According to the latest report from Anti-Phishing Working Group (APWG) while the total number of conventional, spam-based phishing campaigns declined in 2018, users of software-as-a-service (SaaS) systems and webmail services are increasingly targeted. more
How do we make DNSSEC even more secure through the use of elliptic curve cryptography? What are the advantages of algorithms based on elliptic curves? And what steps need to happen to make this a reality? What challenges lie in the way? Over the past few months we've been discussing these questions within the community of people implementing DNSSEC, with an aim of increasing both the security and performance of DNSSEC. more
I think we are finally getting somewhere: ICANN is no longer fluttering flusteredly whenever a lobbying group sends a nastygram over the transom. Case in point: a Association of National Advertisers (ANA) that arrived a few days ago, full of bombast and muscle-flexing, demanding that ICANN immediately stop the new gTLD program until a long list of demands from the ANA were met, or else the ANA would be forced to take some Very Scary Actions... more
A fabled, serial cybersquatter of the early Internet argued that typographical errors in domain names were not cybersquatting at all because they had their own distinct identities. Moreover, "I have" (he argued) "just as much right to own the [misspelled] Domain Names as the person who owns the correct spelling of [a] domain name." That dispute involved and <wallstreet journel.com>. Dow Jones & Company, Inc. and Dow Jones LP v. John Zuccarini, D2000-0578 (WIPO September 10, 2000). more
For those closely following the ICANN Meeting in Nairobi this week, the EOI (Expression of Interest) model seemed like a foregone conclusion. In fact, ICANN had scheduled a webinar on March 18th to explain the process despite the complaints of the community and large-scale disagreement amongst proponents of the EOI. more
One of the fallouts of disruptive inventions is the need for new laws to counter their unexpected consequences. As it concerned the Internet, these consequences included a new tort of registering domain names identical or confusingly similar to trademarks and service marks with the intention of taking unlawful advantage of rights owners. Prior to 2000 the only civil remedy for "cybersquatting" or "cyber piracy" was expensive and time-consuming plenary actions in courts of competent jurisdiction under national trademark laws. more
I just came across a post telling of the Security and Human Behavior workshop. As some of you may be aware, I've been researching this subject for about two years now, and I am very excited that a conference has now happened! It means I did not waste the last two years of my life after all! more
Russians have targeted Ukrainian electricity and communication infrastructure. In some areas, there may not be any utility poles left standing, and underground conduits may have been bombed to oblivion. Starlink has been an important tool for these brave people to coordinate their resistance to Putin's brutal invasion. Satellite communication doesn't require any middle-mile infrastructure. more
A group of researchers from Belgian University of Leuven and US-based Stony Brook University have conducted a one of a kind content-based typosquatting experiment that studies the typosquatting phenomenon "longitudinally", i.e., in time. more