Privacy/proxy services carry no per se stigma of nefarious purpose, although when first introduced circa 2006 there was some skepticism they could enable cybersquatting and panelists expressed different views in weighing the legitimacy for their use. Some Panels found high volume registrants responsible for registering domain-name-incorporating trademarks. Others rejected the distinction between high and low volume as a determining factor. more
Until the launch of the New gTLD Program, TLD launches were relatively straightforward. They generally consisted of a Sunrise Period, a Landrush Phase, and then General Availability. We would see the occasional Grandfather Phase or "Founders" program, but all in all, launches were pretty standard and straightforward. Things started to change with the launch of the new gTLD program. more
In Internet Draft draft-lee-dnsop-scalingroot-00.txt, I described with my coauthors a method of distributing the task of providing DNS Root Name Service both globally and universally. In this article I will explain the sense of the proposal in a voice meant to be understood by a policy-making audience who may in many cases be less technically adept than the IETF DNSOP Working Group for whom the scalingroot-00 draft was crafted. I will also apologize for a controversial observation concerning the addition of new root name servers... more
Today's case involves the classic alleged scenario of a gripe site which used a Plaintiff's trademark in Defendant's web site domain name -- and whether this might be a violation of the Anti Cybersquatting Consumer Protection Act (ACPA). more
In an article published over two years ago, I cited a disturbing trend of third parties seeking to obtain national trademark registrations in an apparent attempt to game ICANN's new gTLD process. While many of these applications have withered and died on the vine some have sneaked through. However, it appears that the United States Trademark Trial and Appeal Board (TTAB) has issued a very well-reasoned and articulate opinion... more
China is preparing for a new crackdown on cryptocurrency, planning to stamp out remaining trading in the country, according to state media. more
Someone needs to take a good hard look at those Internet surveillance stories being strategically placed on the front page of the New York Times. There's a trail here, I believe, that's worth following. Here are some data points... there appears to be a deep interest in the ability to declare war online, as evidenced by cybersecurity research and public speeches by Herbert Lin, a key player who has worked on several cybersecurity reports for the National Research Council.
more
The Tyee, an independent on-line magazine based in BC wrote a story about net neutrality more than a year ago, noting that most Canadians are sleeping through the debate. They followed up again last week. Despite what is called a "perfect storm of events that may crystallize the issue for consumers, businesses, politicians, and regulators," there hasn't been an overwhelming outcry, despite extensive press coverage of the most recent network activities. There are a number of voices who present a conspiracy theory on traffic shaping in Canada... more
Attention so far has been focusing on the ethics of the move (positively satanic), its effects on DNS and non-Web applications (Considered Harmful), and on possible technical responses (Software Aimed at Blocking VeriSign's Search Program). On the legal side of the fence, though, we're not just talking about a can of worms. We're talking about an oil drum of Arcturan Flesh-Eating Tapeworms. more
Despite several groundbreaking technical achievements over the past nine years, Google's parent company Alphabet has decided to end the Loon project. The company said the road to commercial viability has proven much longer and riskier than hoped. more
The National Cybersecurity Center of Excellence (NCCoE) has invited comments on a draft practice guide to help organizations improve email security and defend against phishing, man-in-the-middle, and other types of email-based attacks. more
In the previous installments, we looked at the overall design of the DNS and the way DNS name matching works. The DNS gains considerable administrative flexibility from its delegation structure. Each zone cut, the place in the DNS name tree where one set of DNS servers hands off to another, offers the option to delegate the administration of a part of the DNS at the delegation point. more
While we are spending years figuring out how to create the perfect generic Top-Level Domain (gTLD) launch and guidebook, the Internet is moving along at an extraordinary pace without any care about ICANN policy-making. The fact of the matter is ICANN is a ghost to the ordinary person or Internet company. You can not imagine how many times I had to explain what ICANN is, what ICANN does and why ICANN is important. more
There was a recent dispute between OneWeb and SpaceX regarding the possibility of a collision between two of their low-Earth orbit (LEO) satellites. OneWeb's satellite (OneWeb-1078) was launched on March 25 and headed for its orbit at an altitude of 1,200 km when, in early April, it passed near a SpaceX satellite (Starlink-1546) in orbit at about 450 km. There was no collision, but subsequently, OneWeb's government affairs chief Chris McLaughlin said... more
This is a reply to Susan Crawford's circleid article "Comcast v. FCC - "Ancillary Jurisdiction" Has to Be Ancillary to Something". I started writing a reply to her article, adding some comments I had and also reminding her that she'd predicted this herself, in an earlier circleid article, but it turned out long enough that I decided to submit it as a circleid post instead. On the whole, the facts agree with this CNET article. This court decision was correct, and expected... more