/ Most Viewed

DNSSEC Takes Off in Wake of Root Zone Signing

The Domain Name System Security Extensions (DNSSEC) is a suite of IETF-developed specifications designed to validate information provided by the Domain Name System (DNS). ... When the root zone was signed in June 2010, this acted as a catalyst for TLD operators to deploy DNSSEC on their side. We have seen a gradual but significant increase in signed TLDs since then. The map in this post shows the level of DNSSEC deployment in Europe. more

ICANN Gets Crazy… Again!

The same thing happens before every ICANN meeting. It starts raining. Not men, as the song goes, or droplets of H2O. It starts raining documents. In the run-up to one of its three-a-year international meetings, ICANN goes into hyperdrive. And this time, days before the Prague meeting (from the 24th to the 29th), the usual downpour has turned into a veritable deluge. Let's just take June 4th as an example. more

ICANN and the Data Quality Act: Part V

This is the fifth part of a multi-part series reported by ICANNfocus. This part focuses on Securing the Quality of WHOIS Data. "Information for which ICANN has responsibility includes the WHOIS databases. ICANN has been given specific responsibilities for these databases under: 1) their contract with the U.S. government's Department of Commerce to perform the technical management of the Internet; and 2) their Memorandum of Understanding with the Department of Commerce." more

Steve Jobs: Apple is a Mobile Device Company

Apple CEO, Steve Jobs today announced the highly anticipated iPad and told the crowed that the company is now a $50 Billion a year company -- the majority of it being from sales of mobile devices including iPod, iPhone, and laptops. Now with the introduction of iPad, Jobs calls apple a mobile device company: "Apple is a mobile devices company. This is what we do." Jobs says Apple is the number one mobile devices company in the world. more

Spamhaus Policy Block List Update

Recently, I wrote about the Spamhaus Policy Block List (PBL), suggesting senders encourage their network/connectivity service providers (whomever they lease or purchase IP addresses from) to list their illegitimate email-sending IPs as a step towards improving the overall email stream on the internet. The initial PBL was seeded with listings from the Dynablock NJABL ("Not Just Another Bogus List"), which at the time of the cut-over was at more than 1.9 million entries... more

STIR Working Group Officially Formed to Work on Secure Caller ID For VoIP

Interested in working on an open standard for "secure Caller ID" for voice-over-IP (VoIP)? If so, the new "Secure Telephone Identity Revisited (STIR)" working group was just officially chartered within the IETF and the mailing list is open for all to subscribe.  more

Google, China, and Lawful Intercept

Like many people, I was taken by surprised by Google's announcement about its threatened withdrawal from China in the wake of continued censorship and attacks that appeared to emanate from there. My immediate reaction was quite simple: "Wow". There's been a lot of speculation about just why they pulled out. Some reports noted that Google has been losing market share to Baidu... I don't think, though, that that's the whole story. more

UN Cybercrime Convention: Time Is Running Out to Address Draft’s Urgent Risks to Human Rights

In two weeks, final negotiations will begin on the UN's proposed Cybercrime Convention, a document which has elicited widespread concern from civil society, industry groups, and some states due to the serious risks it poses to human rights, including privacy and freedom of expression. Since 2022, GPD and other groups, including EFF, Human Rights Watch and Privacy International, have sought to alert stakeholders within the process to the need for substantial revisions... more

Verisign Issues Statement on ICANN’s Decision on .Web Auction

Verisign, a global provider of domain name registry services and internet infrastructure, released a statement today regarding the ICANN Board of Directors' decision on the .web auction. more

ICANN Senate Hearing: The Battle Between Intellectual Property and Multistakeholderism

The US Senate Committee on Commerce, Science and Transportation Hearing on ICANN's Expansion of Top Level Domain Names on December 8, 2001 was all about strategy. The strategy was simple: while the world has its attention turned to the debate on the copyright legislative proposals of the Stop Online Piracy Act (SOPA) and the PROTECT IP Act, let's have another ICANN hearing and try to re-open trademark protection for new gTLDs. more

Universal Acceptance of New Top-Level Domains Reloaded

One challenge for all new top-level domains (TLDs) is the so-called Universal Acceptance. Universal Acceptance is a phenomenon as old as TLDs exist and may strike at many occasions... The effect when universal acceptance hits you is that you cannot send or receive email, get error messages or even worse when it looks like everything works but it does not and you do not even get a notification. more

Policies to Promote Broadband Access in Developing Countries

In the 2014 Istanbul-Turkey IGF workshop on policies to promote broadband access in developing countries organised by Rui ZHONG of ISOC China, we realized that while technological solutions are advancing rapidly, policy and regulations remain a significant barrier to affordable internet especially in the developing world. According to a report by Alliance for Affordable Internet ( A4AI), the key to affordability is the policy and regulatory environment that shapes the different actors in the market. more

“lo” and Behold

Happy 50th Internet! On October 29, 1969, at 10:30 p.m. Leonard Kleinrock, a professor of computer science at UCLA along with his graduate student Charley Kline sent a transmission from UCLA's computer to another computer at Stanford Research Institute via ARPANET, the precursor to the internet. more

How Big is the Storm Botnet?

The Storm worm has gotten a lot of press this year, with a lot of the coverage tending toward the apocalyptic. There's no question that it's one of the most successful pieces of malware to date, but just how successful is it? Last weekend, Brandon Enright of UC San Diego gave a informal talk at the Toorcon conference in which he reported on his analysis of the Storm botnet. According to his quite informative slides, Storm has evolved quite a lot over the past year... more

Internet Society Urges for Increased Effort to Address Unprecedented Challenges Facing the Internet

During the 11th Internet Governance Forum (IGF), a United Nations-convened conference taking place in Mexico, 6-9 December, the Internet Society urged the global Internet community to redouble its efforts in addressing the wave of unprecedented challenges facing the Internet. more