ARIN today recognizes Interop, an organization with a long-standing presence in the Internet industry, for returning its unneeded Internet Protocol version 4 (IPv4) address space. Interop was originally allocated a /8 before ARIN's existence and the availability of smaller-sized address blocks. The organization recently realized it was only using a small portion of its address block and that returning the remainder to ARIN would be for the greater good of the Internet community. more
The ordinary run of cybersquatting cases is neither "exceedingly close nor difficult." Quote from Harvest Dispensaries, Cultivations & Production Facilities, LLC v. Rebecca Nickerson / Rock City Harvest, FA2004001892080 (Forum June 26, 2020) which is one of those rare cases in which the case was exceedingly close and difficult. For 90% of the docket (the percentage has been creeping up since 2016), even when Respondent appears (which it mostly does not), there is neither a defense nor merit to Respondent's contentions. more
Last month a bill in the Israeli Knesset would have required ISPs to provide portable e-mail addresses, analogous to portable phone numbers that one can take from one phone company to the other. As I noted at the time, e-mail works differently from telephone calls, and portability would be difficult, expensive, and unreliable. So I was wondering, idly, if we really wanted to provide portable e-mail addresses, how hard would it be? more
As recently reported, spam volumes indicate spam has nearly jumped back up to its pre-McColo shutdown levels. However, Symantec's The State of Spam report has also observed that in recent days spammers are increasingly piggybacking on legitimate newsletters and using the reputation of major social networking sites to try and deliver spam messages into recipients' inboxes... In its special URL investigation the report also indicates that on average approximately 90 percent of all spam messages today contain some kind of a URL. Additionally, analysis of data from past recent days, according to Symantec, have shown that 68% of all URLs in spam messages had a '.com' Top-Level Domain (TLD), 18% had a China's '.cn' ccTLD and 5% had a '.net'. more
On May 31, British broadband provider EE discontinued service for a number of email domains: Orange.net, Orangehome.co.uk, Wanadoo.co.uk, Freeserve.co.uk, Fsbusiness.co.uk, Fslife.co.uk, Fsmail.net, Fsworld.co.uk, and Fsnet.co.uk. These domains were acquired by EE as part of multiple mergers and acquisitions. On their help page, EE explains that the proliferation of free email services with advanced functionality has led to a decrease in email usage at these domains. more
A team of security researchers on Wednesday issued a stern warning about a DNS Hijacking campaign being carried out by an advanced, state-sponsored actor believed to be targetting sensitive networks and systems. more
When ICANN approved the New generic Top-Level Domain (gTLD) Program in Singapore in June 2011, it pushed the activities in this space to a new level. I think we will all agree that everyone involved are very busy working on new gTLD applications and getting organized per the Applicant Guidebook requirements. This to be ready in time for the 12th of January 2012 ICANN new TLD Program launch date. However, good activities also brings along bad activities. more
I am writing to you as someone who is not your citizen, (although I had the fortune to wed the most beautiful of your daughters), to share my thoughts about the recent US Government Cyber Solarium Commission report. U.S.A. We owe you one! Without you and your citizens there would be no free Internet as we know it. Thank You! Your constitution is our inspiration. We, the global digital citizenship want to be "the people", in order to "secure the Blessings of Liberty to ourselves and our Posterity..." more
RIPE 63 is on this week in Vienna, Austria. Yesterday evening saw the General Meeting where members were asked to vote on a number of motions. While some of the motions were more formalities than anything else, the votes on RPKI and the membership fee structure for 2012 provoked some emotive debate. more
Last week, Synacor joined other major mailbox providers by introducing a complaint feedback loop service -- powered by ReturnPath. This increases the number of public complaint feedback loops available today across the internet. more
Iran has disrupted mobile internet access for some three hours on 19 January 2023. Real-time NetBlocks metrics show that mobile networks were disrupted for three hours on Thursday morning, while fixed-line services were largely unaffected. more
Veteran domain investor Abner Duarte from PremiumDomains.com.br is featuring a new event called Domaining Americas, to be held in Rio de Janeiro, Brazil, in October 2018. He is puting together a major domain conference for South America. The debut edition of Domaining Americas will be held at the five-star Grand Hyatt Rio De Janiero on Saturday and Sunday, October 6-7, 2018. more
At the IGF2010 in Vilnius, two folk are floating a trial balloon about separating the allocation function from the registry services function. Currently, these functions are seen as indivisible by the Internet addressing community. In other words, one gets an allocation or assignment from a RIR and the RIR adds the assignment to their database... The question being asked is "Is it time for a split between allocation and services for Internet number resources as was the case for domain name resources?" My answer is no more
Before the Internet, the sole competition for strings of characters employable as marks was other businesses vying to use the same strings for their own products and services. National registries solved this competition by allowing businesses in different channels of commerce to register the same strings but prohibiting competitors in the same industries from using identical or confusingly similar marks on the grounds that they were likely (at best) to create confusion and (at worst) to deceive the public. more
An extensive analysis of WannaCry seems to indicate attackers would be unable to determine which users have paid the ransom and they cannot decrypt on a per-user basis. more