/ Most Viewed

Preparing for GDPR’s Impact on WHOIS - 5 Steps to Consider

With GDPR coming into effect this May, it is almost a forgone conclusion that WHOIS as we know it today, will change. Without knowing the full details, how can companies begin to prepare? First and foremost, ensuring that brand protection, security and compliance departments are aware that a change to WHOIS access is on the horizon is an important first step. Just knowing that the ability to uncover domain ownership information is likely to change in the future will help to relieve some of the angst that is likely to occur. more

IGF 2015: Running in Place

The Internet Governance Forum, held this year in the Brazilian beach resort town of João Pessoa, completed its 10th annual meeting Friday November 13. The IGF Secretariat claims that nearly 5,000 people attended. Moreover, it looks as if its existence will be continued for another 10 years when the UN meets in New York later this year. Vint Cerf declared it "the best IGF ever" in the closing open microphone session. But how good is "best?" more

Healthy Domains Revisited: The Pharmaceutical Industry

Users scored an exciting victory over copyright-based censorship last month, when the Domain Name Association (DNA) and the Public Interest Registry (PIR), in response to criticism from EFF, both abruptly withdrew their proposals for a new compulsory arbitration system to confiscate domain names of websites accused of copyright infringement. But copyright enforcement was only one limb of the the DNA's set of Registry/Registrar Healthy Practices. more

Three Reasons Why Apple Didn’t Have to Unlock a Phone

The US government is demanding Apple unlock iPhones in about a dozen cases beside the San Bernardino one. In a strikingly similar case, Judge James Orenstein in Brooklyn rejected the government's request for three separate reasons. In the decision the judge refers several times to the San Bernardino case, and it is clear he expects this decision to be an important precedent for that one. more

In Response to CADNA: Cybersquatting is Not Criminal But a Civil Matter

The Coalition Against Domain Name Abuse (CADNA) recently released a statement that implied that cybersquatting is a criminal activity. It said, "CADNA has been working diligently to further international and national policies that combat the practice of cybersquatting... As brands continue to learn about the prevalence and practice of online criminal activities..." While, Internet Commerce Association (ICA) vigorously opposes cybersquatting, it is important to note that cybersquatting is a civil matter, not a criminal one. There is a good reason that cybersquatting is a civil matter... more

The Threat from Within - US v. Fowler, SDFL 2010

The security vendor-phobe at the head of the conference bangs on the podium with his shoe declaring that "The greatest threat comes from within! (buy our product for your network's salvation)." Fear as a marketing strategy can never be underestimated. Particular when the fear is of the misunderstood. Media helps stoke the flames of fear-marketing with stories of fired or disgruntled IT staff who reportedly effectuate their revenge on former employers by bricking systems. more

Now Available: Worldwide and Local Current Starlink Performance

The blue dot circled is our dish in the center of Vermont. Volunteers run software that collects statistics every 15 minutes and uploads them to update the tables and the map at https://starlinkstatus.space. You can see below that we have been averaging download speeds of 143Mbps, upload around 12Mbps, and ping times of 43ms. Below, you can see our most recent updates, including the percentage of time our dish was obstructed (0% happily). There are also tables with country and region-wide averages. more

Australia to Block Domain Names That Host Extremist Content During Attacks

Following the Christchurch massacre in March which resulted in the killing of 51 worshippers at two New Zealand mosques, Australian Prime Minister Scott Morrison while attending the G7 summit in France, said the government will establish a new framework to block domains linked to violent attacks. more

ACLU Released Guide for Developers on How to Respond to Government Demands That Compromise Security

It is not uncommon for government agents to force technology companies to create or install malicious software in products in order to help them with surveillance. The American Civil Liberties Union (ACLU) has released a guide for developers that is intended to help preserve security and customers' privacy. more

Here They Come

Something has shifted. I think it might be the end of the holding pattern we as new gTLD applicants/followers/enthusiasts and generally speaking, the entire community, have been caught up in. We´re all looking forward to ushering in the next generation of the Internet. Someone press start please. Several major milestones have been reached. more

DNS Complexity Lessons

Recently, Bert Hubert wrote of a growing problem in the networking world: the complexity of DNS. We have two systems we all use in the Internet, DNS and BGP. Both of these systems appear to be able to handle anything we can throw at them and "keep on ticking." But how far can we drive the complexity of these systems before they ultimately fail? Bert posted a chart on the APNIC blog to illustrate the problem. more

Not World War III - This Time the ICT Revolution

In the past it has been wars and revolutions that created major changes in society. It was only after these events that old ideas, structures and doctrines gave way. And in many countries wars and revolutions are still functioning as a tool for change -- the Arab Revolution and the collapse of the Soviet Empire are good examples of this. But wars and revolutions are disruptive in an economic sense, cost the lives of many people, and necessitate costly rebuilds after the even more

Faceobook on Connecting the World from the Sky

Facebook has announced more details on how its Connectivity Lab is working to connect the world from the sky with drones, satellites and lasers. more

A Look Back at How the Internet of Iraq Came to be Dependent on Telecoms Based in Kurdistan

On the 25th of September, the northern autonomous region of Iraq known as Kurdistan voted to become an independent country. This vote has led to a current standoff between the central Iraqi government and the Kurdish Regional Government (KRG), with the Kurds threatening to cut off internet service into Iraq in retaliation for any punitive measures inflicted by Baghdad on the KRG. The following analysis was written by Doug Madory of Oracle Dyn after ISIS took control of Mosul, Iraq in 2014. It describes how the internet of Iraq came to be dependent on international connections through telecoms based in Kurdistan. more

Will October Be Our Biggest Month Yet for .brand TLDs?

I'll admit I tend to get evangelical when I'm talking about .brands. To me and the team at Neustar, every development in this space is exciting and significant and we're always eager to share the latest news and insights. But you don't have to be a .brands nut to see that the last few weeks have shown some serious signs of momentum. And it makes me wonder, with everything that's developed in just the last week or two, could we be set for October to be the biggest month in .brands we've ever seen? more