/ Most Commented

China Hacks Google, Etc.

Many news sources are reporting on how Google and other corporations were hacked by China. The reports, depending on vendor, blame either PDF files via email as the original perpetrator, or lay most of the blame on an Internet Explorer 0day. more

Google Puts Its Foot Down

Google's announcement that it will "review" its business operations in China and is no longer willing to censor its Chinese search engine, Google.cn, is generating a range of reaction in China. Conversation over at the #googlecn hashtag on Twitter -- created shortly after the announcement -- has been raging fast and furious. more

How Not to Develop Public Policy

Some of ICANN's current proceedings on the introduction of new generic top level domains (gTLDs) provide a case study on how not to develop public policy. In particular, the Rights Protection Mechanism proceedings, with serious implications for trademark owners, have followed a course that does not correspond to the ideal of ICANN's bottom-up, consensus-based processes for policy development. More importantly, these proceedings are effectively unilateral developments in international law without the benefit of treaties or international conventions. more

The World’s Most Dangerous Country Code Top-Level Domains

If you want to know the world's most dangerous country code Top-Level Domains (ccTLDs), ask an anti-virus software company. McAfee has released its list of most dangerous country codes. Here are the top five... more

Spymaster Sees Israel As World Cyberwar Leader

HaAretz, an Israeli newspaper, quotes Major-General Yaldin as saying: "Fighting in the cyber dimension is as significant as the introduction of fighting in the aerial dimension in the early 20th century." (my translation) If this statement is to be believed, Israel is active in cyberspace. And yet, why would Israel admit that, regardless of if it really happens? One option is... more

FiOS: A Reality Check

I wrote this in response to some interest in my experience with the reality of FiOS. The short summary is that there is no magic. Sure having Fiber is nice but it isn't that much different than my "cable" service. The bigger difference between Comcast and Verizon is in the nature of the businesses. Comcast is a content company trying to move on to it looks beyond the STB with its purchase of NBCU whereas Verizon seems to want to continue the 1990's vision of the STB as its entrĂ©e into the home. more

End of Domain Name Auction Sites

Having eBay has worked out pretty well for the world at large; now it's time for the world of domain names to start using it. We need to throw away the jumble of different auctions and dealer sites. Speculators may not like having their haunts cleaned out, but corporate (end-user) buyers and investors will welcome the chance to deal with one centralized auction mechanism with one set of rules. more

Country Internet Registries: One African Perspective

Paul Wilson, Secretary-General of APNIC, was correct when he reminded the panelists of the IGF2009 workshop "Adopting IPv6: What You Need To Know" that "countries don't typically get IP address allocations, network service providers do". The ITU stills seems to cling to the notion that countries get IP blocks... more

The ITU and IPv6 Transition: Controversy at the IGF

At today's "Managing Critical Internet Resources" session of the Internet Governance Forum 2009, the ITU agenda on taking a role in IPv6 distribution once again reared its ugly head. In a heated exchange, Professor Dr Sureswaran Ramadass, the Director of Nav6 an ITU consultant/fanboy squared off with the new ICANN CEO about competition in IPv6 address distribution. more

Yahoo, Gmail, Hotmail Compromised - But How?

One of the bigger news stories is that of 10,000 usernames and passwords of Hotmail users were posted this past week, victims of a phishing scam... It seems unlikely to me that this would be a hack where someone would break into Hotmail's servers and access the account information that way. It is much more likely that the spammers got the information by social engineering. Why is this more likely? For one, they'd have to get past all of the firewalls and security measures that Microsoft/Hotmail have to keep intruders out. more

ICANN Releases New gTLD Applicant Guidebook ...Would Apple Need Permission from China for .MAC?

The much-anticipated New gTLD Draft Application Guidebook is out! ICANN has released Version 3. Lots of changes, some minor, some large. All worth reading if you're a potential applicant or just interested in the promise of new Top-Level Domains (TLDs). The public comment period clock started October 4, and runs until November 22 of this year. more

Risk of Portfolio Approach to Cybersquatting

A secret weapon is falling into dangerous hands. Organized cybercriminals are building up portfolios of cybersquatting domain names. A smart operator with such a portfolio can go beyond simple stealing and competing full out for traffic and revenues. Rightful brand owners, feeling the squeeze, will find out too late that the bandits have the money to fight legal action. The time to act is now, before pieces of the playing field have been bought up by the enemy. more

Trademark Owners Beware: Cybersquatting Spreads to Twitter

TechCrunch reports that its brand has been taken as a Twitter name, and that there is a landrush going on to get these names, which are already trading for money. The problem is so bad that a name brokerage, Tweexchange, has sprung up to get to facilitate sales. more

Helping Banks Fight Phishing and Account Fraud, Whether They Like It or Not

On Wednesday, Project Honey Pot filed an unusual lawsuit against "John Does stealing money from US businesses through unauthorized electronic transfers made possible by computer viruses transmitted in spam." Their attorney is Jon Praed of the Internet Law Group, who is one of the most experienced anti-spam lawyers around, with whom I have worked in the past. more

New gTLDs: Let the Gaming Begin (Part I - TLD Front Running)

A series of recent applications for national trademark rights in terms that correspond to likely strings for new top-level domain names, or TLDs, (e.g., ".BLOG") highlight just one way in which ICANN's new generic TLD (gTLD) application process is likely to be "gamed." But it is also a strategy to which some trademark holders may feel compelled to resort to defend their rights to that string. Unfortunately, it does not appear that ICANN is addressing these important public policy considerations. more