/ Most Viewed

The Need to Keep Congress Fully Informed

The MOU between the Department of Commerce and ICANN includes a series of specific milestones that the corporation is required to accomplish by certain specified dates. One of the specific requirements placed on ICANN by the agency is to define "a predictable strategy for selecting new TLDs using straightforward, transparent, and objective procedures that preserve the stability of the Internet...." The MOU goes on to state that "(strategy development to be completed by September 30, 2004 and implementation to commence by December 31, 2004)." more

Live Streaming Apps: Piracy Trends Are-A-Changing

Until recently, digital pirates have used both P2P sites and cyberlockers to upload and share pirated content. But as Internet connection speeds have increased, the piracy landscape has changed, and the appearance of streaming content has proliferated. In fact, 38% of online sporting fans are watching live streaming of their favorite events. However, the recent introduction of live streaming apps is further compounding issues surrounding online piracy... more

How to Translate a Gov’t IPv6 Mandate Into an Action Plan: Guidance for National IPv6 Task Forces

Last year, I gave a short talk at the Commonwealth Telecommunications Organisation (CTO) Forum in (Abuja, Nigeria) on this topic and I thought I'd offer more details here. Let's say an African government has realised that IPv4 address exhaustion imposes limits its country's ICT development. Initial investigations indicate that deploying IPv6 is the only sustainable solution. Governments are however not very skilled in the bottom-up approach that is popular in the Internet world. more

Marking the 30th Anniversary of the Internet and Cybersecurity Treaty

Next week on 1 July 2020 marks the 30th anniversary of one of the most significant treaty instruments in modern times. On 1 July 1990, the Melbourne Treaty came into force as the first and only global treaty that enabled worldwide internets and mobile networks to exist, together with the cybersecurity provisions designed to protect those infrastructures. The achievement remains as an enduring tribute to Richard Edmund Butler of Australia who was one of the most influential, and best-loved Secretaries-General of the ITU. more

Risk vs Benefit: The Impact of Shorter 90-Day SSL Certificate Life Cycles

In today's digital age, securing your website and ensuring your users' safety has never been more critical. Secure sockets layer (SSL) certificates are the go-to solution for securing websites by encrypting the data transmitted between web servers and browsers. Historically, SSL digital certificates could be valid for years, after which they had to be renewed or replaced.  more

Is ICANN Running a Racket?

On March 13, 2019, I published an article on CircleID, Portrait of a Single-Character Domain Name, that explored the proposed release and auction of o.com, a single-character .com domain name that was registered in 1993 and assigned to the Internet Assigned Numbers Authority (IANA) by Dr. Jon Postel. Although the National Telecommunications and Information Administration (NTIA) has since raised serious objections... more

Comcast Fires Back at E360

Back in January, bulk mailer E360 filed a suit against giant cable ISP Comcast. This week Comcast responded with a withering response... Their memorandum of law wastes no time getting down to business: "Plaintiff is a spammer who refers to itself as a "internet marketing company," and is in the business of sending email solicitations and advertisements to millions of Internet users, including many of Comcast's subscribers." Comcast's analysis is similar to but even stronger than the one I made in January... more

Questioning “Net Neutrality”

I'm kinda foxed by the some of the discussion going on about "Net Neutrality". The internet was designed from the outset not to be content neutral. Even before there was an IP protocol there were precedence flags in the NCP packet headers. And the IP (the Internet Protocol) has always had 8 bits that are there for the sole purpose of marking the precedence and type-of-service of each packet. It has been well known since the 1970's that certain classes of traffic -- particularly voice (and yes, there was voice on the internet even during the 1970's) -- need special handling... more

As WGIG forms, Ideas about Defining its Scope Circulate

The Internet Governance Project (IGP) issued a set of reports analyzing the current "state of play" in Internet governance. The reports were commissioned by the United Nations ICT Task Force as an input into the deliberations of the UN Secretary-General's Working Group on Internet Governance (WGIG). The report identifies the international organizations and agreements affecting the Internet, and points out where there are conflicts and gaps. more

.???? Brings the Promise of a New Digital India

On August 27, 2014, the world became a bit more connected as the Internet welcomed more than 400 million Hindi language speakers in their own language. .???? (.Bharat), which means India in the Hindi language, was inaugurated on August 27 in New Delhi by Mr. Ravi Shankar Prasad, India's Minister of Law & Justice and Communications & Information Technology. more

False Positives and Ignorance

Content inspection is a poor way to recognise spam, and the proliferation of image spam recently drums this home. However if one must use these unreliable techniques, one should bring mathematical rigour to the procedure. Tools like SpamAssassin combine content inspection results, with other tests, in order to tune rule-sets to give acceptable rates of false positives (mistaking genuine emails for spam), and thus end up assigning suitable weights to different content rules. If one is going to use these approaches to filtering spam, and some see it as inevitable, one better know one's statistics... more

Understanding the Threat Landscape: Cyber-Attack Actors and Motivations

The threat landscape has rapidly expanded over the past few years, and shows no signs of contracting. With major establishments in both the public and private sectors falling victim to cyber-attacks, it is critical for organizations to identify the motivations, modus operandi (MO) and objectives of adversaries in order to adequately and effectively defend their networks. Understanding the taxonomy of cyber-attacks is the first step in preparing an organization against exposure to them. more

Domain Tasting: Big Multifaceted Action on Bad Actors

Reported in the Washington Post no less: "Dell Takes Cybersquatters to Court". As reported a few weeks ago, this is a very thorough action targeting certain practices and practitioners... I'm surprised a suit this thorough didn't name Google as a co-defendant. Then again, maybe it's not that surprising because Google offers a well liked product, has a lot more money; and a search partnership with Dell that allows Dell to share in the profit when its users engage in "right of the dot" typosquatting on Dell keyboards. It's funny, because one day, Dell could find itself on the defendant's side of the courtroom... more

ICANN Threatens RegisterFly Termination

ICANN sent a 10-page letter to RegisterFly on February 21st threatening to terminate its accreditation. The letter is available here. ICANN's not exactly advertising this -- no conspicuous notice appears on its home page and, more curiously, no update has been posted by the Ombudsman despite two prior postings about RegisterFly in the past week. A member of the general public would be hard pressed to find out that any action has been threatened. more

Big Brands Recognizing the Value of New gTLDs

Successful companies already understand the importance and impact of brand control in domain names. No company would ever consider using hotmail.com or gmail.com email addresses for official business. A decade ago, did companies invest in Geocities or Tripod URLs, or did they promote their own domain names? Today, if a company hosts its blog with WordPress.com, do they take the default brand.wordpress.com Web address, or do they upgrade to their own branded second-level domain name? more