/ Most Viewed

J.D. Falk Award

This morning M3AAWG announced the creation of the J.D. Falk award to recognize and honor people like J.D. who work to make the Internet safer for all users... J.D. was a legend in the abuse prevention world when I first started learning about spam and abuse prevention back in the late 90's. more

Is Cable Broadband Equal to Fiber?

As I have blogged over the years, I have to give kudos to the folks at the big ISPs who have steadily provided controversial quotes that are worth writing about. The latest comes in an article by Linda Hardest at FierceTelecom. She quotes Charter's CEO Tom Rutledge talking about comparing cable broadband to fiber. She quotes Rutledge as saying... more

Fair Use Registration of Domain Names for Artists and Hobbyists

There is in the Anticybersquatting Consumer Protection Act a provision not expressly found in the UDRP (at least, not in so many words) but the concept is nevertheless present in the Policy by construction... The term "fair use" is typically associated with protected speech (criticism and commentary), fan websites, and nominative use of domain names but it is not limited to those uses. It's a flexible principle in both trademark and copyright law. more

Over $1 Billion in Payments Made on Venmo in January 2016

I was fascinated to read today that over $1 billion (USD) in payments were made on Venmo in January 2016. What is Venmo, you might ask? Essentially it is a mobile app (on both iOS and Android) that provides an easy payment system, in many ways like a "digital wallet" where you can securely reach in and pull out some cash to give to someone... more

Activist Hackers Target Government Websites Amid Escalating Israel-Hamas War

Hackers have intensified attacks on government websites and media outlets, both on the Israeli and Palestinian sides. more

Federal Data Crisis: Unreliable Federal Databases are Destroying Opportunities for Small Businesses

Databases are the infrastructure of the modern administrative state and data is its lifeblood. When the data is contaminated with errors, federal agencies have difficulty performing even the most basic administrative functions such as managing its inventory of office space and protecting the personally identifiable information (PII) of social security number holders. The federal dissemination of unreliable data doesn't just waste money; it undermines public trust in government and leaves it unmanageable. more

Broken Policies

As an email policy wonk, I think a lot about how specific policy implementations can go wrong. Sure, every policy can go wrong, or not fit a common case. A lot of people only write polices that address common cases and don't worry about the rarer cases. The problem is there are some rare cases that may cause significant harm and those cases should be addressed. Consumerist has a case up about email policy gone wrong with a clear path to harm but no policy for handling the issue. There are a couple places I see where this policy hole can be fixed. more

World’s Growing Refugee Population Requires Access to Broadband to Mitigate Problems, Says Report

Many of the problems refugees and their host countries face can be mitigated and made easier to solve if internet connectivity gaps are closed, says a team of senior communications experts working with UN High Commissioner for Refugees (UNHCR). more

From ICANN57 Hyderabad to the 3rd WIC Wuzhen Summit: A Moment of Consensus on Internet Governance

Two events that happened last month deserve an additional note. One is the ICANN57 conference held in Hyderabad on November 3-9. The other is the 3rd World Internet Conference Wuzhen Summit held in Zhejiang Province on November 16-18. Though being completely overwhelmed by the result of President election in the United States, both events mark the victory of non-state actors and serve as good news for the community. more

Trusting Zoom?

Since the world went virtual, often by using Zoom, several people have asked me if I use it, and if so, do I use their app or their web interface. If I do use it, isn't this odd, given that I've been doing security and privacy work for more than 30 years, and "everyone" knows that Zoom is a security disaster? To give too short an answer to a very complicated question: I do use it, via both Mac and iOS apps. Some of my reasons are specific to me and may not apply to you... more

New TLD Applications: What’s the Status of the Next Round?

For many industry participants, the timing around opening the next round of new Top-Level Domain applications has been frustrating, to say the least. However, with the recent ICANN Marrakech meeting now complete, we thought it timely to provide an update for those who may be interested to apply in the next round or for those merely following the journey. more

In Whose Language? Cybersquatting by Foreigners

There are no gatekeepers to prevent registrants from acquiring domain names incorporating marks that potentially violate third-party rights. Anyone anywhere can acquire domain names composed of words and letters in languages not its own through a registrar whose registration agreement is in the language of the registrant. For example, a Chinese registrant of a domain name incorporating a Norwegian mark as in <statoil.store> in which Complainant requests the proceeding be in English notes that Chinese is not an official language in Norway. more

Why 5G Won’t Be Here Tomorrow

I just saw another article yesterday written by a major-city newspaper telling the public that 5G is coming in 2020. I hate to see reporters who have accepted the nonsense being peddled by the carriers without digging a little deeper to find the truth. At some point in the near future, the public will finally realize that the 5G talk has mostly been hype. more

Pre-Registrations of .NYC Domain Names and the Shattered Dream

In response to United Domains pre-registration of .nyc domain names, we posted the below on our blog and the NARLO sites yesterday. While United Domains pre-registration service is free and non-binding, the North American Regional At Large Organization, part of the ICANN governance ecology, is concerned that "the offer of such a service could create artificial demand..." more

Hacker Has Released Close to a Billion User Records Over the Past Two Months, Reports ZDNet

A hacker by the name of Gnosticplayers has claimed responsibility for the hacking of 44 companies resulting in over a billion user data. Hacker also gotten dangerously close to releasing the records, ZDNet reports. more