Law

Law / Most Commented

Plumbing Neutrality

I've been having arguments about Network Neutrality with a lawyer. My position is that you can't adequately regulate ISPs to be neutral, because there's no agreement what "neutral" means in practice. He points out that the courts aren't interested in technical details like what packets are dropped, it's that all traffic has to be treated the same, and ISPs should just figure out how to do that. So I contemplated a city with Plumbing Neutrality with the simple rule that all people must be treated the same... more

Comcast vs the FCC - A Reply to Susan Crawford’s Article

This is a reply to Susan Crawford's circleid article "Comcast v. FCC - "Ancillary Jurisdiction" Has to Be Ancillary to Something". I started writing a reply to her article, adding some comments I had and also reminding her that she'd predicted this herself, in an earlier circleid article, but it turned out long enough that I decided to submit it as a circleid post instead. On the whole, the facts agree with this CNET article. This court decision was correct, and expected... more

What’s Driving Spam and Domain Fraud? Illicit Drug Traffic

Spam is not about who sent it, it's about who benefits from it. For a moment forget everything you know about filters, zombie PCs, firewalls, spoofing, viruses, beisyan algorithms, header forgery, botnets, or blacklists. These are all methods for sending spam or preventing spam delivery. None of these explain why spam is sent and for far too long all the attention has been paid to the effects and not the driving force. Under the endless onslaught of junk mail it is easy to feel that the goal of the game is send spam and annoy us all. more

Domain Tasting in the Spotlight

An article in BusinessWeek discusses "domain tasting" and its affects on major brands. The article, titled "The Great Internet Brand Rip-Off", discusses so-called "domain tasting" and how major brands are being exploited through domain tasting combined with typosquatting... It's important to distinguish between the two types of domain tasting... more

Do We Need Title Insurance for Domain Names?

Over the Thanksgiving holiday I read an article in Forbes (November 13, page 148) about real estate title insurance. The article was about how real estate title insurance is a joke and overpriced. But as I read in the article how titles are investigated, in dawned on me that a title check service for domain names would be helpful. Title checks and title insurance would prevent you from losing money when you bought a stolen domain. Last year I almost got bilked for $5,000 buying domains...before I discovered they were stolen... more

Domain Name Disputes Break Two Records in 2017

The year 2017 turned out to be a record-setting year for domain name disputes, in two ways: The number of complaints filed as well as the total number of domain names in those complaints. Specifically: The number of cases at WIPO crept up to 3,073 from 3,036 in 2016 (the previous record), a modest gain of just over 1 percent. Those cases included 6,370 domain names, up from 5,354 in 2016 (also a record-setting year), a spike of nearly 19 percent. more

Using Domain Name Privacy/Proxy Services Lawfully or to Hide Contact Information and Identity

Privacy/proxy services carry no per se stigma of nefarious purpose, although when first introduced circa 2006 there was some skepticism they could enable cybersquatting and panelists expressed different views in weighing the legitimacy for their use. Some Panels found high volume registrants responsible for registering domain-name-incorporating trademarks. Others rejected the distinction between high and low volume as a determining factor. more

PINGO: NETmundial Adopts Principles on INternet GOvernance

The Internet Governance Roadmap, which was adopted recently in Sao Paulo by the Global Multistakeholder Meeting on the Future of the Internet Governance Ecosystem (NETmundial) includes a lot of controversial issues -- from net neutrality to mass surveillance -- and it is unclear how this will be translated into reality. However, the Internet Governance Principles, also adopted by NETmundial, were less controversial, but will have probably a sustainable and deep effect for the future of the Internet. more

WHOIS Review and Beyond 3.7.8

We have posted our support of the WHOIS Policy Review Team Report with two important comments. First, on page 79 of the report it is confirmed that the RAA is unenforceable on WHOIS inaccuracy (we wrote about this while at the last ICANN meeting) because the language of RAA 3.7.8 has no enforcement provision. It is now time for ICANN to confirm this problem officially.  more

Trademarking .generics - the .bank Fiasco!

I, for one, have been a proponent of new gTLDs from the early days of their policy development process within ICANN. I always believed that the existing gTLDs -- and mainly the .com space -- have created artificial scarcity, which is primarily responsible for much of the cybersquatting and the abuse trademarks experience. I do not share the same fears as those who argue that new gTLDs will create intolerable levels of cybersquatting or will necessitate defensive registrations from brand and trademark owners alike. more

Analysis of Domain Names Registered Across Multiple Existing TLDs and Implications for New gTLDs

The following is an analysis based on the hypothesis that trademark holders are not, in general, registering their trademarks as domain names across the existing top-level domain namespace. To determine if the hypothesis is true, we examine domain names registered in the popular generic top-level domains ("gTLDs" such as .com, .net and .info), also using other publicly available information such as the USPTO database of trademarks, the English dictionary, DNS entries, UDRP records and whois records. more

What’s in a Name?

Internet domain names are truly bizarre. There is nothing especially remarkable about them from a technical perspective, but from a social and political perspective they are all sorts of fun. We can have arguments over control of the DNS root, arguments over whether names are property, arguments over innate rights to specific names, arguments over a registrar's right (or lack thereof) to exploit unregistered names for private gain, and many more arguments besides. In this article, I'd like to explore the argument-space rather than defend any particular position in it. In so doing, I hope to illuminate some novel (or under-emphasised) perspectives on the matter. more

Forgotten Principles of Internet Governance

Suddenly internet governance has become a hot topic. Words and phrases fly back and forth but minds rarely meet. We do not have discussion, we have chaos. We are not moving forwards towards a resolution. It's time to step back and review some basic principles. 1. Principle: The internet is here to serve the needs of people (and organizations of people); people are not here to serve the internet. Corollary: If internet technology does not meet the needs of users and organizations than it is technology that should be the first to flex and change. more

Domain Enforcement in a Post-GDPR World

The implementation of the General Data Protection Regulation (GDPR), and ICANN's conservative temporary policy, which favors privacy and limits registrar liability, has made domain enforcement against cybersquatters, cyber criminals and infringement more difficult, expensive and slow. With heightened concerns over privacy following high-profile breaches of consumer data and its subsequent illicit use and distribution, there is no question that consumer data protection practices would come under scrutiny. more

Enabling Privacy Is Not Harmful

The argument for end-to-end encryption is apparently heating up with the work moving forward on TLSv1.3 currently in progress in the IETF. The naysayers, however, are also out in force, arguing that end-to-end encryption is a net negative... The idea of end-to-end encryption is recast as a form of extremism, a radical idea that should not be supported by the network engineering community. Is end-to-end encryption really extremist? Is it really a threat to the social order? more