I have returned to the subject of the title on a number of occasions and it is worth revisiting. Like judicial proceedings, the substance of disputes under the Uniform Domain Name Dispute Resolution Policy (UDRP) and Panel determinations are publicly available. The Internet Corporation for Assigned Names and Numbers (ICANN) mandates in its Rules that all decisions must be delivered to the parties within "three business days" of their receipt of the decision and posted on providers' websites. more
As outlined in CSC's recent 2020 Domain Security Report: Forbes Global 2000 Companies, cybercriminals are disrupting organizations by attacking the protocol responsible for their online presence -- their domain name system (DNS). When a DNS is overwhelmed with traffic due to a distributed denial of service (DDoS) attack or configuration error, content and applications become inaccessible to users, affecting both revenue and reputation. more
Broadband usage has spiked across the US this year as students and employees suddenly found themselves working from home and needing broadband to connect to school and work servers. But there is another quickly growing demand for broadband coming from gaming. We've had online gaming of some sort over the last decade, but gaming has not been a data-intensive activity for ISPs. more
Apple announced its decision to trust only one-year digital certificates on its Safari browser in February 2020. This decision created a domino effect, with Mozilla and Google following suit; certificate providers announced they would not issue two-year certificates after Aug. 19, 2020. We wrote an article in March to help brands to prepare for this change. more
If you are interested in presenting at the ICANN 69 DNSSEC and Security Workshop during the week of 17-22 October 2020, please send a brief (1-2 sentence) description of your proposed presentation to dnssec-hamburg@isoc.org by 27 August 2020. We are open to a wide range of topics related to DNS, DNSSEC, DANE, routing security, and more. There are some ideas in the Call for Participation below, but other ideas are definitely welcome, too! more
CENTR has published a white paper separating registry lock services into two standardized models. This categorization and the included recommendations can help top-level domain registries (re)design their registry lock services. The aim of the paper is to reduce fragmentation in implementation between registries to explain the value of registry lock to domain holders more easily. more
There are two kinds of new domain name extensions: those dedicated to selling domain names through the network of accredited Registrars and those dedicated to a personnel use. I call these "dotBRANDs" or ".brand" new gTLDs since they are used - most of the time - by Trademarks for their own benefit. This article focuses on .BRAND new generic Top-Level Domains. In the ICANN vocabulary, these are "Registry Agreements with Specification 13". more
In the coming days, the Internet Governance Forum Dynamic Coalition on Internet Standards, Security and Safety will be announced on the IGF website. The following is an invitation to participate, share ideas and best practices, the willingness to take on a new approach towards mass deployment of internet standards and ICT best practices. Feel free to reach out to us and start working towards a kick-off meeting at the global, virtual Internet Governance Forum in November. more
This isn't the blog post I had hoped to write. When I signed up to participate in ICANN's Expedited Policy Development Process for gTLD Registration Data, I knew we had a lot of work ahead of us, but I was cautiously optimistic that we would, eventually, reach a successful outcome. Today, I find myself looking at things differently. After hundreds of hours and countless meetings and emails, Phase 2 of the EPDP's work has wrapped up with the delivery of our final report to the GNSO Council. more
The battle to purge child abuse images from the Internet has been lost. That doesn't mean that we can't or shouldn't continue to work towards the elimination of image-based abuse. But it is widely acknowledged by law enforcement, reporting hotlines, and prevention groups alike that this can't be achieved merely by censoring images from the Internet and by criminalizing those who access or share them – which are the only strategies that society has focused on until now. more
The topic of satellite broadband has been heating up lately. Elon Musk's StarLink now has over 540 broadband satellites in the sky and is talking about starting a few beta tests of the technology with customers. OneWeb went into bankruptcy, but it is being bought out by a team consisting of the British government and Bharti Airtel, the largest cellular company in India. Jeff Bezos has continued to move forward with Project Kuiper, and the FCC recently gave the nod for the company to move ahead. more
Today, China accused Washington of damaging global trade with sanctions against the tech giant Huawei and says it will protect Chinese companies. more
Analysts at the Federal Reserve Bank of Atlanta looked at the long-term impact of working from home on the economy and ranked different parts of the economy on two factors related to working at home – the likelihood that an area will generate a lot of work-at-home opportunities, and the ability of an area to support a work-at-home economy. more
Either because of laxness on the part domain name holders or cunning on the part of thieves, registrars have been duped into transferring domain names to fraudsters' accounts. I discussed the matter last year in Recovering Domain Names Lost to Fraudulent Transfer. These cases are mostly filed in the Eastern District of Virginia, Alexandria Division, for the good reason that the registry for dot com is located in that jurisdiction and they are mostly recovered. more
Has your organization recently received an email claiming to be from NABP's Internet Drug Outlet Identification Program (IDOI)? If so, it is possible that someone is trying to trick you. The NABP IDOI team's email account has recently been illegally "spoofed" by unaffiliated persons or organizations. Email spoofing involves the forgery of an email header so that the email appears to have originated from someone other than the actual source. more