/ Most Viewed

Advocating Ratio Model for Deleting Domains

To date, end-users (of all levels of technical ability) who are trying to find a good domain name to establish an online identity have been endlessly frustrated by the lack of a method to fairly re-allocate "used" domain names. A full resolution to that problem is a separate (and much bigger) discussion... more

WIPO Taking Screenshots of Filed UDRPs

Michael Berkens reporting in TheDomains.com: "WIPO has been taking Screenshots of whatever is on a domain name as soon as a UDRP Is filed and they have been furnishing the screenshot to the UDRP panel who has been taking the screenshot into account as evidence in making their determination... Mr. Berryhill has been working behind the scenes to confirm that WIPO has in fact has been taking a screenshot of the domain name upon receipt of a UDRP complaint and furnishing it to the panel without the knowledge of the domain holder and of course has been telling WIPO why its just plain wrong." more

CircleID’s Top 10 Posts of 2014

Here we are with CircleID's annual roundup of top ten most popular posts featured during 2014 (based on overall readership). Congratulations to all the participants whose posts reached top readership and best wishes for 2015. more

A Short-Term Suspension of GDPR Enforcement on WHOIS May Be Necessary, Says U.S. Government

Implementation of European Union's General Data Protection Regulation, or GDPR, is a major concern of our government, said David Redl during a meeting held on Thursday in Washington DC. more

WSIS Deal: Oversight

The UN Secretary-General has been invited to "convene a new forum for multi-stakeholder policy dialogue." Everyone can see his/her hearts' desires in the WSIS deal: ICANN can believe that it has survived for another day; governments can believe that they will have "an equal role and responsibility for international Internet governance"; and there will be an enormous meeting in Greece by the second quarter of 2006 to start the Internet Governance Forum going. more

Is IPv6 a Boon to Criminals and Foe to the FBI?

Declan McCullagh recently opined that the "FBI [and the] DEA warn [that] IPv6 could shield criminals from police." His post was picked-up relatively widely in the past few days, with the headlines adding more hyperbole along the way. So just how real is this threat? Let's take a look. more

Massive Spam and Malware Campaign Following Boston Tragedy

On April 16th at 11:00pm GMT, the first of two botnets began a massive spam campaign to take advantage of the recent Boston tragedy. The spam messages claim to contain news concerning the Boston Marathon bombing, reports Craig Williams from Cisco. The spam messages contain a link to a site that claims to have videos of explosions from the attack. Simultaneously, links to these sites were posted as comments to various blogs. more

The Dark Internet

I consult on communication issues for Neustar, an Internet infrastructure company. As most CircleIDers know, Neustar works behind the scenes to ensure the smooth operation of many critical systems like DNS, .us and .biz, local number portability and digital rights management. One of the cool things about working for them is the chance to attend the events they sponsor. Last week Neustar held a security briefing for senior federal IT personnel focused on Cybersecurity and Domain Name System Security Extensions (DNSSEC)... more

WIPO Arbitration and Mediation Center Registers Its 50,000th “Cybersquatting” Case

The WIPO Arbitration and Mediation Center on Monday announced it had registered its 50,000th "cybersquatting" case. The 50,000th case just received by WIPO coincides with the organization's 20th anniversary on November 20, 2020. more

Trademarks for TLDs

The United States Patent and Trademark Office (USPTO) has recently circulated proposed examination guidelines to allow the USPTO to begin providing Trademark Protection for Top Level Domains (TLDs). This is an important new development. TLDs today are currently ineligible for Trademark protection on the basis that they do not constitute a source-identifying mark. The USPTO is currently in the process of rectifying this situation by extending Trademark protection to Registry Service providers and has released its proposed examination procedures for that purpose. However, there are some very concerning elements to their proposed examination guidelines. more

The Slow Mainstreaming of IPv6

Slowly, we’re making progress mainstreaming IPv6. I wanted to post on a few interesting developments. Late last month, Netflix got an IPv6 allocation from ARIN, and they’re advertising it in BGP... I look forward to the day I can stream movies to my Netflix set-top box over IPv6. more

Cycling Legend Greg LeMond Sues Cybersquatters Upward of $6.6 Million

A federal restraining order has been issued against a father and son accused of registering several domain names based on cycling legend Greg LeMond's name and his company. more

Slippery Territory: IOC and Red Cross in the New gTLD Program

We know from life: There is no rule without exception. The problem is, exceptions create space for interpretations and have the risk to undermine the rule. Take Article 19 of the International Covenant on Political and Civil Rights from 1966. Article 19, paragraphs 1 and 2 define the individual right to freedom of expression. Paragraph 3 adds some exceptions where this right can be restricted to protect, inter alia, national security and public order. This is an understandable justification for a restriction, but it opens the door for misuse... more

The WSIS Deal

There is considerable coverage this morning (or this evening in Tunis) on the last minute WSIS deal struck yesterday. The gist of the coverage rightly reports that the U.S. emerged with the compromise they were looking for as the delegates agreed to retain ICANN and the ultimate U.S. control that comes with it (note that there is a lot in the WSIS statement that may ultimately prove important but that is outside the Internet governance issue including the attention paid to cybercrime, spam, data protection, and e-commerce). This outcome begs the questions -- what happened? And, given the obvious global split leading up to Tunis, what changed to facilitate this deal? more

Social Operating System: Connecting Domains and Social Media

Wired Magazine (Aug 2007 print issue, page 50) defines "social operating system" as a platform for online living; a social network such as MySpace that seamlessly integrates activities including entertainment and shopping. But Jon Udell points out that MySpace is not Your Space. He envisions a future in which each child would receive his or her own chunk of managed storage at birth.. Of course, we'd want the ability for Bob's Space to connect with Jane's Space - suppose they are siblings starring in the same family vacation video, or co-authors of a research report? more