Azure researchers propose attested DNS, a system that embeds confidential computing into the internet's naming infrastructure. By binding domain names to trusted hardware and software, it enhances service verification while maintaining compatibility with existing web technologies. more
In the world of ICANN and Internet policy, complexity is manufactured to create an illusion that issues are impenetrably technical such that normal and everyday principles can't apply. This causes a pervasive and entrenched phenomenon of eyes that glaze over at the mere mention of the word "ICANN" -- including those of government regulators and other officials that might otherwise take more of an active interest. more
When I last wrote about the NETmundial Initiative (NMI) project developed by the World Economic Forum (WEF) in conjunction with ICANN it was noted that its August 28th announcement event "ended with significant dissent from the broad groups comprising "civil society", and only lukewarm support from the business sector". Indeed, during the concluding session on that late summer day, "NTIA head Larry Strickling appeared to startle the participants when he intervened to observe that perhaps the event was over-engineered... more
Apple has reportedly formed a new internal group to work on building out their own content delivery network (CDN) to deliver Apple software updates, apps and other Apple related content. more
Wait and see approach on abuse attracts ICANN Stakeholder attention: A few weeks ago I made a detailed argument as to why product safety applies to domains, just like it does to cars and high chairs. I also argued that good products equal good business or "economically advantaged" in the long run. Then I really made a strong statement, I said if we don't actively engage other Internet stakeholders -- those that interact with our products, we would eventually lose the opportunity to self-regulate. more
This week SpaceX petitioned the FCC to reconfigure their Starlink constellation and Elon Musk outlined their beta testing plan. As shown below, the most significant configuration change is reducing the altitude of four of the five groups of orbital planes by around 50%. The total number of satellites and the number orbiting at a 53-degree inclination, which gives good coverage over relatively affluent regions, are not changed very much. more
The NANOG 95 conference spotlighted breakthroughs in fibre optics, wireless technology, routing security, and quantum computing, offering a forward-looking assessment of internet infrastructure and its vulnerabilities, as reported by APNIC's Geoff Huston. more
The ICANN Board made a couple of important decisions regarding accountability and transparency at its 8 December meeting. Specifically, it approved compensating Directors and also enhanced ICANN's conflicts of interest rules. These are positive developments for the organization, and come at a critical juncture as the Internet governance debate heats up in 2012. more
Announcement of the Verizon Wireless (VZW) iPhone and last week's announcements of Androids for AT&T mean that we're going to have better mobile data networks at lower prices. That's the most important consequence of being able to choose your phone and your network separately. We in North America have a long way to go to have the mix and match choices of phones and service that most of the world has... more
Our problem isn't the lack of capacity -- it's our inability to achieve simple connectivity. We have abundant capacity but can’t use it because we have gatekeepers who set a price on our ability to communicate and innovate. If we were able to take advantage of what we already have we would find ourselves with a wealth of opportunities rather than having to pay billions to "stimulate" the gatekeepers into letting us create new value. more
As counterfeit networks grow more elusive, AI-driven clustering could revolutionize brand protection. By linking disparate findings, identifying serial infringers, and enabling bulk enforcement, AI offers a smarter approach to monitoring and takedown efforts. Yet, challenges remain - from data reliability to analyzing complex content. Companies that master AI-driven clustering may gain a significant advantage in the fight against brand abuse. more
Several people abroad have started mailing me and others asking if rumors of new legislation to be passed in Sweden on the 17th of June is for real. There are also reports in international forums starting to pop up. This is fairly old news, and I think that most of us are surprised that this has not generated more press both inside and outside Sweden earlier. This legislation will allow for the Swedish National Defense Radio Agency (FRA) to wiretap Internet traffic leaving the country... more
Panels adjudicating cybersquatting claims, defenses, and rebuttals under the Uniform Domain Name Dispute Resolution Policy (UDRP) expect parties to prove their contentions, and this means having a working understanding of what this entails. There is, first, a set of fundamental rules or principles -- such as pending applications for a mark do not constitute a right, or recognizing unregistered marks as constituting rights... more
Paragraph 4(a)(ii) of the Uniform Domain Name Dispute Resolution Policy requires complainants to offer evidence conclusive by itself or sufficient from which to infer that respondents lack rights or legitimate interests in the accused domain names. As I've pointed out in earlier essays (here and here) the standard of proof is low and relies on inference, for good reason; beyond the visual proof and what may be obtainable from on- and offline research, respondents control evidence of their choices. more
Today NBC is streaming the NFL's Super Bowl live for free through mobile apps as well as their NBC Sports website. Given the number of "cord-cutters" and mobile users out there, I suspect there should be a good number of people watching the event through the live streams today. more