Last month, some of my colleagues at MarkMonitor and I traveled to Buenos Aires, Argentina for ICANN 48. With the recent delegation and launch of the first new gTLDs, the atmosphere had an air of both excitement and anxiety. In my opinion, there is much to be done before brand owners should begin to feel comfortable in the post-new gTLD Internet environment, which brings a host of new challenges, as companies attempt to scale monitoring and enforcement to the new (huge) domain name space. more
Many readers will recall that nearly one year ago, the U.S. government launched a global takedown of Megaupload.com, with arrests of the leading executives in New Zealand and the execution of search warrants in nine countries. Canada was among the list of participating countries as the action included seizure of Megaupload.com servers located here. more
So I heard about this ridiculous news the other day that now Australian customs officers have been given new powers to search incoming travelers' laptops and mobile phones for pornography, according to The Age. Really? Come on. Really? First the Internet filtering, a la porn wall, and now this? more
Security researchers have found a new variant of the Macadocs malware to be using Google docs as a proxy server and not connecting to a command and control server directly. In a blog post on Friday, Symantec researcher Takashi Katsuki, wrote... more
Rightfully, Olympic is a very sacred word and a very pure concept for the Olympic Committee as they have protected this brand and all of its related intellectual property components at every instance for about hundred years. However, the word Olympic as a name is geographic based on Mount Olympus and over the many centuries belonging to the public domain. ... Dot-Olympic ideally should belong to the Olympic committee, if they so desire, but in a contest or any other situation the ownership of this name would simply become a question of going after a diluted geography based public domain name. more
Section 230 of the Communications Decency Act (CDA), says that "No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider." The law was passed in 1996 in order to shield ISPs that transported content or platforms that hosted it from lability. Bloggers were not responsible for comments on their posts, YouTube and Facebook were not responsible for things users posted, etc. more
ISOC-Bulgaria has been following the developments around Internet governance on the global arena since 2001, when we started participate in the WSIS process. Our representatives supported the efforts of the Bulgarian government to make sure the Internet is developed in an open, bottom-up, and transparent way. Last week in Geneva (November 11-12) at the ITU there was a meeting of the ITU Council Working Group on international Internet-related public policy issues. more
Comcast is now the first large ISP in North America to start deploying IPv6. According to the company, this initial phase will support certain types of directly connected customer premises equipment (CPE), where a single computer is connected directly to a cable modem. "Subsequent phases in 2011 and 2012 will support home gateway devices and variable length prefixes." more
The Democratic Staff Report Prepared for the use of the Committee on Foreign Relations United States Senate, July 21, 2020, entitled "The New Big Brother," is actually all about 5G technology. The report jumps on the runaway anti-China train chaotically flailing around Washington these days to "out-Trump, Trump." It characterizes 5G technology, longstanding international collaboration, and COVID-19 tracking as all part of a global conspiracy for "digital authoritarianism" run out of Beijing. more
A notice released by the Internet Corporation for Assigned Names and Numbers (ICANN) has disclosed that the Office of the Attorney General of the State of California has requested extensive information from the agency regarding the proposed sale and transfer of Public Interest Registry (PIR) from the Internet Society (ISOC) to Ethos Capital. more
On the question of reselling domain names on the secondary market, a dissenting panelist in a 2005 case observed that "[t]here is no doubt Respondent is in the business of being a reseller of domain names that consist of common English words" and then suggested that the "fundamental question before the Panel is whether or not such a business should be allowed under the UDRP." He concluded that such a business should not be allowed... more
Google announced Friday that it would now be "personalizing" all searches, not just those for signed-in users. If your browser has a Google cookie, unless you've explicitly opted out, your search results will be customized based on search history. Danny Sullivan, at Search Engine Land, wonders why more people aren't paying attention. more
Internet freedom is under threat from governments around the world, including the United States, warned Vint Cerf on Monday. Andrew Feinberg reporting in the Hill: "Cerf, a computer scientist who was instrumental in the Internet's creation, now employed by Google as its 'Internet evangelist,' said officials in the United States, United Kingdom and Europe are using intellectual property and cybersecurity issues 'as an excuse for constraining what we can and can't do on the 'net.' 'Political structures ... are often scared by the possibility that the general public might figure out that they don't want them in power,' he said." more
Amazon filed applications for the .AMAZON top-level domains in several scripts in 2012. Five years later, ICANN will re-examine the applications after an Independent Review Process (IRP) proceeding. The IRP Panel found that ICANN's Board failed to demonstrate the existence of public policy reasons for denying the applications. more
How was the state of the Internet's routing system in 2017? Let's take a look back using data from BGPStream. Some highlights: 13,935 total incidents (either outages or attacks like route leaks and hijacks); Over 10% of all Autonomous Systems on the Internet were affected; 3,106 Autonomous Systems were a victim of at least one routing incident; 1,546 networks caused at least one incident. more