/ Most Commented

A Data Dumb Exposes 773 Million Unique Email Addresses, 22 Million Passwords

Close to 773 million unique email addresses and 22 million unique passwords were found to be hosted on cloud service MEGA. more

The Need for Sustainable Open Source Projects

As a long-standing contributor to open standards, and someone trying to become more involved in the open source world (I really need to find an extra ten hours a day!), I am always thinking about these ecosystems, and how they relate to the network engineering world. This article on RedisDB, and in particular this quote, caught my attention. more

In a Rare Meeting, Huawei Founder Addresses Concerns Over Tech Giant Spying for Chinese Government

In a rare meeting, Ren Zhengfei the founder of the Chinese tech giant Huawei assured foreign reporters that his company would refuse to disclose secrets about its customers and their communication networks. more

FCC Declines Emergency Briefing Request Concerning Location Data Collection

U.S. Federal Communications Commission (FCC) chairman Ajit Pai declined a top House Democrat's request for an emergency briefing on the wireless industry's data collection practices amid troubling reports about the availability of real-time location information, reports Harper Neidig in The Hill. more

New Book: Managing Mission Critical Domains & DNS

The idea behind my recent book "Managing Mission Critical Domains & DNS" is to provide a unifying overview around the area of domains and naming where I think there exists an artificial divide, and that divide exists between domain policy, and managing ones' domain portfolio; and the DNS ops side of things: running your nameservers or outsourcing to a vendor, or both. I've been doing this for over 20 years, I've seen almost every failure condition that can happen to your domain or DNS... more

Not Another Yearly Recap: What 2018 Tells Us About .brand Domains

It's that special time again! Time to unwind, spend time with loved ones -- and to reflect on another 12 months of progress across the .brand movement. Over the last few years, we've used this end of year assessment and our efforts with MakeWay.World to show you how the industry is being embraced globally -- through a range of examples, statistics and predictions about how the year ahead will be our best ever. more

Why “.brands” Domains Make Sense

I receive spam on a daily basis from various Banks... as well as mine. None are legitimate but actually, that is not what is catching my attention receiving spam. There is something else and it deals with stealing information from me. Creating a personalized ".brand" domain name extension allows avoiding all that. Many are familiar with receiving spam through phishing attempts to have you answering an email and providing personal information such as login and passwords... more

Global DNS Record Manipulation, Hijacking Campaign at Massive Scale Linked to Iran

A wave of DNS hijacking is reported to have affected dozens of domains belonging to government, telecommunications and internet infrastructure entities across the Middle East and North Africa, Europe and North America. more

Dozens of U.S. Government Websites Rendered Either Insecure or Inaccessible Amid Government Shutdown

Dozens of U.S. government websites have become insecure or inaccessible during the ongoing U.S. federal shutdown. more

Cuba Censors SMS Messages ... for Now

What could the Cuban government do with Russia-style access to Facebook data? What sorts of fake news could they create and circulate on YouTube and Pinterest? What can be done to control the dark side of the Cuban Internet? Cuba is about to hold a referendum on a proposed constitution that the government supports and Eduardo Sanchez posted a test showing that SMS messages with anti-referendum terms. more

CircleID’s Top 10 Posts of 2018

It is once again time for our annual review of posts that received the most attention on CircleID during the past year. Congratulations to all the 2018 participants for sharing their thoughts and making a difference in the industry. more

Who Played a Major Role in Advancing the Internet? Nominations Open for 2019 Internet Hall of Fame

Do you know someone who has played a major role in the development and advancement of the Internet? Now is the time to recognize their contribution. Nominate them for the 2019 Internet Hall of Fame. With more than 100 inductees, the Internet Hall of Fame celebrates Internet pioneers and innovators who have pushed the boundaries to bring the Internet to life and make it an essential resource for billions of people today. more

Typosquatting as Per Se Cybersquatting Unless Proved Otherwise

The quintessence of typosquatting is syntactical variation: adding, omitting, replacing, substituting, and transposing words and letters. Since these minor variations are mostly indefensible, respondents rarely respond to complaints, although as I will explain in a moment there can also be innocent and good faith syntactical variations which are not typosquatting. It follows that if there are defenses, respondents should prudently respond and explain their choices because default generally favors complainants. more

Are We Ready to Defend Our Freedom? Book Review: “The Age of Surveillance Capitalism”

It is not often that you read a book where afterward nothing seems the same again. Like Adam Smith's The Wealth of Nations, Shoshana Zuboff's book: The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power,, puts what we do in these times into a context and gives a focus to ongoing issues of privacy and governance with regard to the Domain Name System. This is even more astonishing as the book does not even mention the DNS, the Internet ecosystem or even Internet Governance directly. more

ITU-T Takes Lead on Drone IoT Identification in 2019

In today's fast-paced world of IoT, perhaps one of the most significant involves the rapid identification of civilian drones -- more formally known as an Unmanned Aerial Vehicle (UAV). The identification of civilian UAVs has become a critical public safety concern today. Establishing a flexible, trusted global means for identifying these objects through worldwide supply chains and resolving the identifier tags to a responsible party rapidly via a network-based resolver is a high priority. more