/ Most Viewed

President of Tucows Responds to WLS Issue

I will try and take a different approach with this post. There are two elements of WLS that I think are most material and are not discussed often enough. They are i) the scope of the original NSI-ICANN contract and ii) the use of multiple accreditations.

...Verisign is paid a sum of money to perform a service. They own neither the primary nor the secondary data. I will not bore you with a recitation of various sections of the agreement nor with long-winded legal arguments. They are for another forum. The implication of this conclusion as it relates to WLS is that any re-registration market service is outside the scope of the original contract and should be treated as any new service should. more

SnapNames: Why the WLS is Better for Consumers

In 2002, VeriSign, the registry for .COM and .NET domain names, proposed the idea of a centralized, registry-level "wait list" for currently registered domain names. The system would let anyone around the world get "next in line" for a name that is registered now but may become available later.

This new registry service, titled Wait List System (or WLS), would augment what is now an ad-hoc group of registrar-level services that are useful, but aren't always fully dependable or even available to the general public. more

Ethiopia Shows That Congress Is Right to Be Worried About UN Control of the Internet

Today a key committee in the US Congress approved a resolution opposing United Nations "control over the Internet." While some in the Internet community have dismissed the bipartisan effort as mere political grandstanding, recent actions by some UN Member States show that lawmakers have good reason to be worried. Last month, UN voting member Ethiopia made it a crime -- punishable by 15 years in prison - to make calls over the Internet.  more

Evolving the Internet Through COVID-19 and Beyond

As we approach four months since the WHO declared COVID-19 to be a pandemic, and with lockdowns and other restrictions continuing in much of the world, it is worth reflecting on how the Internet has coped with the changes in its use, and on what lessons we can learn from these for the future of the network. The people and companies that build and operate the Internet are always planning for more growth in Internet traffic. more

Looking at .Net Bids

ICANN is now seeking public comments regarding the .net bids. Unlike before, I am not going to offend one friend or another by siding with one proposal over another. They are all qualified and experienced registry operators. Instead, I will make some general observations. 1. None of the Revenue and Pricing Model (i.e. Section 4) about the bids are available to public... more

Russian Behind Massive LinkedIn, Dropbox Hack Subject of Extradition Fight Between US and Russia

A young Russian alleged to have masterminded a massive hacking of social networks including LinkedIn and Dropbox is now at the center of an extradition struggle between the United States and Russia. more

2008: The Year That VoIP Died

It seems highly likely to me that at some point in the future we'll all look back and say that 2008 was the year that the VoIP industry finally died... Voice over IP is just a transport and signalling technology. It's plumbing. It may come as a surprise to some of you to know that in the late 1980's and early 1990's there was a TCP/IP industry as well. TCP/IP is inarguably plumbing. As the IP stack became common on all computing devices, TCP/IP went from being a differentiator to a commodity. more

.XXX is Back on the Radar Screen

The DoC seems to have finally realized it went too far by using ICANN to serve the interests of some conservative groups, as mentioned in a previous post. The new story is now that the ICANN board did not reject the .XXX application as such, but only the agreement negotiated between ICM Registry and the ICANN staff at that time. How subtle these things are... more

Garth Bruen Discussing Whois, DNSSEC and Domain Security

NameSmash has interviewed Garth Bruen, Internet security expert and creator of Knujon, on some key issues under discussion during the recent ICANN meetings in San Francisco. Topics include Whois, DNS Security Extensions (DNSSEC) and generic Top-Level Domains (gTLDs) -- issues of critical importance particularly with ICANN's expected roll-out of thousands of new gTLDs in the coming years. more

On the Hunt for “Critical Internet Resources”

I'm writing this column in November, and that means that it is time for the traveling circus known as the Internet Governance Forum (IGF) to come down to earth, unpack its tents and sell tickets for its annual song and dance routine. The script for this year's show has been changed, and after being excluded from the main arena last year at the Athens gig, the headline act of "Critical Internet Resources" is taking a starring role this year in Rio. Some folk are even saying that it is the single most contentious issue to be scheduled at this year's IGF show. So what are "Critical Internet Resources" anyway? If folks are going to spend all this time, energy and carbon emissions traveling to Rio to talk on this topic, then wouldn't it be helpful to understand what it means in the first place? There are probably a number of ways to answer this question, so in this heavily opinionated column I'd like to look at the range of possible answers to this question. more

Is Africa Ready for a dotAfrica gTLD Future?

It's approximately 2 months to go before the grand application process for the new gTLDs begins, ICANN the international internet body made a revolutionary announcement in June that is going to change the entire internet namespace. With the current 21 gTLDs, the world is bracing for a surge of close to 500 new applications. Among the domains of my interest is the .Africa gTLD. more

The Importance of Understanding Attacker Target Selection

There's a bit of a debate going on about whether the Kaseya attack exploited a 0-day vulnerability. While that's an interesting question when discussing, say, patch management strategies, I think it's less important to understand attackers' thinking than understand their target selection. In a nutshell, the attackers have outmaneuvered defenders for almost 30 years when it comes to target selection. more

U.S. Senate’s Hearing on ICANN

Later today, Senator Conrad Burns, who chairs the U.S. Senate subcommittee responsible for supervising ICANN, will be holding a hearing on a number of issues.

At the beginning of the year, a press release called "Burns Unveils NexGenTen Agenda For Communications Reform and Security in the 21st Century", had reported:

"U.S. Sen. Conrad Burns (R-Mont.) announced his top priorities for his chairmanship of the Senate Communications Subcommittee during the 108th legislative session. The ten items, called the Burns NexGenTen Tech Agenda, aim to strengthen security and usher reform for 21st Century Communication... more

World’s Largest DDoS-for-Hire Service Taken Down in Major International Probe

Webstresser.org, considered the world’s biggest marketplace to hire DDoS services, has been taken down according to an announcement issued today by the European Union Agency for Law Enforcement (Europol). more

No Barrier to Reading Across the Dot with New TLDs and Trademark Infringements

Even before the introduction of new top level domains in 2014, Panels had grappled with the before and after the dot issue with country code suffixes. The traditional procedure is to compare the characters of the accused domain names with the characters of trademarks for identity or confusing similarity. But this did not exclude the possibility of reading across the dot. more