/ Most Viewed

Confusing New gTLDs

Choosing the right domain name is like choosing a Trademark, it has to be taken seriously because it is a long time image investment. If new gTLDs have brought new options to those in charge of creating a name (precision, availability, novelty) and registering its (their) domain name(s), they also brought the possibility to make a terrible mistake when choosing the right extension for a domain name. more

Beavers Chewing Through Fiber Cable Cause Hundreds Lose Internet in a Canadian Remote Community

Internet service was down for nearly 900 customers in Tumbler Ridge, British Columbia, over the weekend after beavers chewed through a crucial fiber cable, resulting in "extensive" damage. According to a statement from the area's telecom provider, Telus, the outage also affected some cable TV customers and caused disruptions to local cell phone services. more

Yahoo Addresses a Security Problem by Breaking Every Mailing List in the World

DMARC is what one might call an emerging e-mail security scheme. It's emerging pretty fast, since many of the largest mail systems in the world have already implemented it, including Gmail, Hotmail/MSN/Outlook, Comcast, and Yahoo. DMARC lets a domain owner make assertions about mail that has their domain in the address on the 'From:' line. It lets the owner assert that mail will have a DKIM signature with the same domain, or an envelope return (bounce) address in the same domain that will pass SPF validation. more

.EU TLD Comes Closer Than Ever to Becoming a Reality

With much awaited fanfare, .EU is inching ever closer to becoming real! I am a bit reluctant to say it is actually here until the gates are actually open, but I can imagine that there are many who are grateful as I am that the process has gotten as far as it has. On March 23rd, 2005, ICANN announced that they had approved an agreement earlier that week with EURid to have .eu added to the root zone... more

How to Listen to the Individual Internet User

The recent ICANN meeting in Vancouver touched upon many issues important to ordinary Internet users: privacy in domain name registration; the cost and terms of .com domain names; internationalized domains; introduction of new domain suffixes. But there were few "ordinary Internet users" at the meeting. Few people can roam the globe to keep up with ICANN's travels, and not many more participate in online forums. more

Blockchain, Cryptocurrency Channels Considered by European Interests to Bypass U.S. Sanctions

Bitcoin's unreal hype has obscured that it is mostly used to facilitate drug deals, ransomware, tax evasion, and even the occasional murder for hire. After the 60% price drop, demand for bitcoin mining gear has fallen so much TSMC has to lower sales estimates for 2018... Now, Austrian Ambassador in Tehran Stefan Scholz has suggested it could be a powerful boost to the European intent to bypass the U.S. economic blockade. That could provide demand for $billions of bitcoins. more

How Registrants Can Reduce the Threat of Domain Hijacking

Because domain names represent the online identity of individuals, businesses and other organizations, companies and organizations large and small have expressed increasing concern over reports of "domain name hijacking," in which perpetrators fraudulently transfer domain names by password theft or social engineering. The impact of these attacks can be significant, as hijackers are typically able to gain complete control of a victim's domain name - often for a significant period of time. more

Upcoming Latin America and Caribbean DNS Forum

The Latin America and Caribbean Domain Name System (LAC DNS) Forum will be held on November 15, 2013 in Buenos Aires, Argentina. This follows on a similar initiative that took place at ICANN 47 in Durban, South Africa. The event's global, regional and local organizers plan to address key online issues, including more regional involvement with Internet governance. more

Number Misuse, Telecommunications Regulations and WCIT

Another twenty five years has just zoomed by, and before you know it, it's all on again. The last time the global communications sector did this was at the WATTC in 1988, when "the Internet" was just a relatively obscure experiment in protocol engineering for data communications. At that time the Rather Grand telephone industry bought their respective government representatives... to the Rather Grandly titled "World Administrative Telegraph and Telephone Conference (WATTC) in November 1988 in Melbourne, Australia and resolved to agree to the Rather Grandly titled "International Telecommunication Regulations." more

Skype’s End User License Agreement

I was looking at the End User License Agreement to which Skype wants people to assent. I noticed the following odd provision (Section 3.2.4): You hereby grant to Skype a non-exclusive, worldwide, perpetual, irrevocable, royalty-free, sublicensable and transferable licence to Use the Content in any media in connection with the Skype Software, the Products and the Skype Website. more

Do Agencies Already Have the Authority to Issue Critical Infrastructure Protection Regulations?

The President and Congress are deliberating how best to ensure appropriate cybersecurity protection for private sector critical infrastructure. Legislative action and Executive Order are both under consideration. It is possible, however, that the White House Office of Management and Budget (OMB) already has sufficient statutory authority to enact new cybersecurity regulations through the normal notice-and-comment rulemaking process. more

Google Chrome: Cloud Operating Environment

Rather than blathering on to the blogosphere about the superficial features of Google's new Chrome browser I've spent some time studying the available material and [re]writing a comprehensive Wikipedia article on the subject which I intend for anyone to be free to reuse under a Creative Commons Attribution 3.0 license rather than Wikipedia's usual strong copyleft GNU Free Documentation License (GFDL). This unusual freedom is extended in order to foster learning and critical analysis, particularly in terms of security. more

New gTLD Registration Strategies: Preparing for the Inevitable

As we draw closer to the first new gTLD registry launch, many companies are beginning the arduous task of developing their new gTLD registration and blocking strategies. And after speaking with dozens of clients, I can tell you that the planned approaches are ranging from very minimal registration and blocking strategies for one or two core brands, all the way through to registrations of multiple brands in every single new gTLD registry. more

What is WSIS Getting At?

Attacks on ICANN are coming from several different directions, and the list of concerns includes "cybercrime and protection of intellectual property rights."... First, it's not apparent to me that any government can "control" the internet -- and it's even less likely that that control can happen through the DNS. The most that governments will do will be to build walls between nations, requiring their ISPs to point only to approved sites. (China is well on its way to doing this already.) That's not controlling the Internet, that's creating different, national Internets. more

Will Anyone Qualify As a Community TLD?

Some Top-Level Domain (TLD) applicants have been saying that they're "community" applications, which means that would avoid an auction and prevail over even deep-pocketed competitors. But according to ICANN's Applicant Guidebook, very few if any applications will qualify as a community. If you're an applicant who's been telling your supporters or investors that you're going to win because you're a community, you might want to take a step back. more