/ Most Commented

Here They Come

Something has shifted. I think it might be the end of the holding pattern we as new gTLD applicants/followers/enthusiasts and generally speaking, the entire community, have been caught up in. We´re all looking forward to ushering in the next generation of the Internet. Someone press start please. Several major milestones have been reached. more

Google DNS to Be Discontinued in Brazil Ahead of New Law

Doug Madory from Renesys reports: "In response to recent NSA spying allegations, Brazil is pressing ahead with a new law to require Internet companies like Google to store data about Brazilian users inside Brazil, where it will be subject to local privacy laws. The proposed legislation could be signed into law as early as the end of this week. However, Google's DNS service started leaving the country on September 12th, the day President Rousseff announced her intention to require local storage of user data." more

Google’s Project Shield May Actually Be A Double-Edged Sword

Google has received a lot of press regarding their Project Shield announcement at the Google Ideas Summit. The effort is being applauded as a milestone in social consciousness. While on the surface the endeavor appears admirable, the long-term impact of the service may manifest more than Google had hoped for. Project Shield is an invite-only service that combines Google's DDoS mitigation technology and Page Speed service... more

Nobody Has Proposed a Sustainable Model for Internet Governance Yet

The idea that the US would maintain a strategic position in the Internet was always a pipe dream. Allowing the US to pick the DNS contractors is one thing, allowing the US the power to arbitrarily shut countries off the net is quite another. And that is what deployment of DNSSEC and the rPKI under the current models would do. The idea that some US congressman would promote a bill to force ICANN to drop Cuba, Palestine or the enemy of the moment off the Internet is really not far fetched. The US government was just shut down for over two weeks in a bizarre act of political theater. more

Anti-Consumer ICANN Can Not be Trusted To Protect Domain Registrants’ Property Interests

Domain name registrants who purchase a name in any of the present or pending generic (gTLD) top level domains should think twice before entrusting a domain name property interest to ICANN, even though ICANN levies a money tariff on each domain registration. ICANN has no policy language that indemnifies domain name registrants. ICANN language does not even contemplate the possibility of domain theft by an ICANN registrar. more

Core Internet Institutions Abandon the US Government

Milton Mueller from Internet Governance Project writes: "In Montevideo, Uruguay [last week], the Directors of all the major Internet organizations -- ICANN, the Internet Engineering Task Force, the Internet Architecture Board, the World Wide Web Consortium, the Internet Society, all five of the regional Internet address registries -- turned their back on the US government. With striking unanimity, the organizations that actually develop and administer Internet standards and resources initiated a break with 3 decades of U.S. dominance of Internet governance..." more

DotGreen Debrief: How the Applicant Auction Helps Mission-Driven Applicants

DotGreen announced on Friday that it has withdrawn its application for .green from ICANN's new gTLD program. We were surprised to hear the news, particularly after all of the effort that DotGreen has put into building a community and a movement around its application. While we at Innovative Auctions agree with Annalisa that the ICANN Last Resort auction would have been a poor choice for the DotGreen Community, we believe that the Applicant Auction is a great tool for single-string applicants who want to see their TLD used for a community purpose. more

DotGreen Is No More

Kevin reported on this last night. As you can see from the reactions to his post a lot of people are surprised, shocked and even quite upset that the DotGreen application has been withdrawn. It's not the only application for the string, which is why it was withdrawn, but to many people in the ICANN space it was the applicant everyone associated with the string. The unfortunate reality of the new TLD process is that money speaks more loudly than anything else. more

Rodney Joffe on Security Vulnerabilities of Modern Automobiles

Rodney Joffe, Senior Technologist at Neustar, explaines that vehicles (beginning with 1998 models) are vulnerable to hacking, but manufacturers have been unable to fix the problem. In the video below, Joffe explains the challenge to cars and the possible threats that exist for other machines connected to a network. more

Canadian Government Quietly Pursuing New ISP Code of Conduct

If approved, the code would technically be voluntary for Canadian ISPs, but the active involvement of government officials suggests that most large providers would feel pressured to participate. The move toward an ISP code of conduct would likely form part of a two-pronged strategy to combat malicious software that can lead to cybercrime, identity theft, and other harms. First, the long-delayed anti-spam legislation features new disclosure requirements for the installation of software along with tough penalties for non-compliance. more

Speaking up for the Internet

For most of this year governments from outside the G8 have not wavered from their essential themes on the Internet: they regard it as a shared resource that works in part as a result of their own investment in infrastructure, they want to be included in its governance through a decision-making process that is transparent, accessible and, in broad character, multilateral, and they want to be able to trust it and know that as much as it is a tool of growth for others, it can also be for them. more

In Which We Consider the Meaning of ‘Authorized’: GIVAUDAN FRAGRANCES CORPORATION v. Krivda

What does authorized access mean? If an employee with authorized access to a computer system goes into that system, downloads company secrets, and hands that information over to the company's competitor, did that alleged misappropriation of company information constitute unauthorized access? This is no small question. If the access is unauthorized, the employee potentially violated the Computer Fraud and Abuse Act (CFAA) (the CFAA contains both criminal and civil causes of action). But courts get uncomfortable here. more

Phishing: A Look Into the E-Crime Landscape

At the recent Anti-Phishing Working Group meeting in San Francisco, Rod Rasmussen and I published our latest APWG Global Phishing Survey. Phishing is a distinct kind of e-crime, one that's possible to measure and analyze in depth. Our report is a look at how criminals act and react, and what the implications are for the domain name industry. more

23 Countries Ahead of U.S. in Internet Usage According to ITU Broadband Report

United States ranks 24th worldwide in the percentage of residents who use the Internet, according to the International Telecommunications Union's 2013 State of Broadband Report, released recently at a meeting of the Broadband Commission for Digital Development. Eighty-one percent of U.S. residents use the Internet, the ITU said. Countries with the highest percentage of people using the Internet was Iceland, where 97 percent of the people are Internet users. The top 10 countries all had usage rates above 88 percent. more

ICANN Opens GNSO Whois Study on Privacy/Proxy Abuse for Comment

ICANN has opened the Generic Names Supporting Organization (GNSO) Whois study on privacy/proxy abuse for public comment. Performed by the National Physical Laboratory (NPL), this study is one of many commissioned by the GNSO to examine the current, disparate, and often maligned registration directory service, and aims to measure the hypothesis that "a significant percentage of the domain names used to conduct illegal or harmful Internet activities are registered via privacy and proxy services to obscure the perpetrator's identity." more