/ Most Viewed

SnapNames: Why the WLS is Better for Consumers

In 2002, VeriSign, the registry for .COM and .NET domain names, proposed the idea of a centralized, registry-level "wait list" for currently registered domain names. The system would let anyone around the world get "next in line" for a name that is registered now but may become available later.

This new registry service, titled Wait List System (or WLS), would augment what is now an ad-hoc group of registrar-level services that are useful, but aren't always fully dependable or even available to the general public. more

IPv4 Addresses Not Property, Canada Weighs in on the Nortel/Microsoft Transfer

The recent tempest in a teacup on ARINs PPML list over the transfer of IP address blocks from Nortel (a company in Chapter 11) to Microsoft has some interesting Internet Governance dimensions that are yet to be discussed. One aspect that has been overlooked amidst all the sound and fury, is the governmental perspective on IP address transfers. more

My Experience With Starlink Broadband, It Passes “Better Than Nothing” Beta Test

May become the access answer for many at the end of the road. The icicle dripping dish in the picture is the antenna for Starlink, a satellite-based broadband service from SpaceX -- one of Elon Musk's other companies. It came Saturday, just before the snow arrived here in Stowe, VT. It's heated, so I didn't have to shovel it out, and it's working despite its frozen beard. The pandemic has shown us that it is socially irresponsible to leave any family without broadband access. more

XXX Litigation Looms

The XXX drama isn't over. Today ICM Registry announced that it would file a reconsideration request with ICANN and a judicial appeal to challenge redactions and omissions from the internal US government documents released to it under a Freedom of Information Act (FOIA) request. These could prove to be opening moves in a more extended round of litigation. In connection with its judicial appeal, ICM Registry released 88 pages of internal US Commerce Department documents obtained under the FOIA showing how the U.S. handled its application. more

Private vs. ICANN Auction of Last Resort

As an applicant in this new gTLD round with quite a few overlapping strings, I've had a keen interest in the various proposed auction platforms. In the past six months the ideas behind private auction have matured significantly and I now see it as a strong mechanism for resolving contention. Following are my observations. more

ISPs Saw a 30% Increase in Traffic During the Pandemic, 40% During Peak Business Hours

ISPs in the U.S. saw a significant surge in both downstream and upstream traffic, increasing at least 30% and as much as 40% during peak business hours and as much as 60% in some markets, according to a new report from the Broadband Internet Technical Advisory Group (BITAG).  more

The DNS Still Isn’t a Directory

Back in the mid 1990s, before ICANN was invented, a lot of people assumed that the way you would find stuff on the Internet would be through the Domain Name System. It wasn't a ridiculous idea at the time. The most popular way to look for stuff was through manually managed directories like Yahoo's, but they couldn't keep up with the rapidly growing World Wide Web. Search engines had been around since 1994, but they were either underpowered and missed a lot of stuff, or else produced a blizzard of marginally relevant results. more

Cyber Threats Yes, But Is It Cyber War?

Last night Intelligence Squared and Neustar conducted a fascinating, Oxford style debate on whether the threat of cyber war has been exaggerated. A packed house at the Newseum in Washington, DC heard four cyber heavyweights go toe-to-toe verbally both for and against the proposition that the threat has been exaggerated. more

Bashbleed - A Nasty Reminder Never to Forget Security 101

After the botched burglary at the Watergate Apartments, every scam and scandal that hit the headlines became a 'gate' -- Irangate, Contragate, you name it. The Heartbleed bug is possibly the closest thing to Watergate that this generation of computer security had seen till the past few days -- an exploit in a component that is "just there" -- something you utterly rely on to be there and perform its duties, and give very little thought to how secure (or rather, insecure) it might be. So, fittingly, every such catastrophic bug in an ubiquitous component is now a 'bleed'. more

NeuStar Experiences Partial Outage as DynDNS Tries to Turn up the Heat

NeuStar's UltraDNS faced attack on two fronts on Tuesday, March 31. One of the attacks was technical -- a massive denial-of-service attack. The second was a rather surprising opening strike from competitor Dynamic Network Services (DynDNS), which launched a full-scale (and in T1R's opinion, misguided) public relations broadside. First, to the actual denial of service attack. Contrary to many early reports, UltraDNS was not 'down' on Tuesday... more

Aviation: The Dirty, Not-So-Little Secret of Internet Governance

Almost a year ago, I began writing about the relationship between the Internet/information and communications technologies (ICTs), the environment, and sustainability. One of the points I made in my first article on the subject is that there is much more we as a community can do to reduce our ecological footprint and enhance the sustainability of the Internet... This necessity combined with the ever-growing urgency to act hit hard when I recently read a New York Times article about how bad flying is for the environment. more

ICANN and the Data Quality Act: Part I

The first part of a multi-part series report by ICANNfocus. This part discusses the history of the data quality act. "The Center for Regulatory Effectiveness (CRE) has determined that ICANN is subject to the Data Quality Act. Specifically, because ICANN carries out the technical management of the internet, including the IANA function and the implementation of new top level domains, under agreement with the U.S. Department of Commerce, ICANN's information disseminations are "sponsored" by the Department and thus subject to the Act." more

The Importance of Understanding Attacker Target Selection

There's a bit of a debate going on about whether the Kaseya attack exploited a 0-day vulnerability. While that's an interesting question when discussing, say, patch management strategies, I think it's less important to understand attackers' thinking than understand their target selection. In a nutshell, the attackers have outmaneuvered defenders for almost 30 years when it comes to target selection. more

Help Science Fight COVID-19

Many organizations and individuals are socially committed and voluntarily help the weak, the poor, and the sick. Others consider how they can contribute. Supporting organizations and individuals by starting an aid project, donating money, or providing human resources, can make a crucial difference. The corona crisis is a challenge for many, if not all. Scientists around the world are experimenting with cures and vaccines, and they need help. However, you don't have to be a virologist to help science fight COVID-19. more

Building Caribbean Internet Infrastructure… One IXP at a Time

Encouraging the development of Internet-based services and accelerating the development of local content are often touted as noble objectives. It is also widely acknowledged that reaping the benefits of technology is dependent on reducing Internet connectivity and bandwidth costs, improving infrastructure, and improving quality of service to all Internet users. Yet in a region with over 20 million potential Internet users and great ambitions to create a "knowledge-based society" and develop "technology-driven economies", the cost of access remains prohibitively high and there is a glaring absence of critical Internet infrastructure. more