Privacy/proxy services carry no per se stigma of nefarious purpose, although when first introduced circa 2006 there was some skepticism they could enable cybersquatting and panelists expressed different views in weighing the legitimacy for their use. Some Panels found high volume registrants responsible for registering domain-name-incorporating trademarks. Others rejected the distinction between high and low volume as a determining factor. more
In an article published over two years ago, I cited a disturbing trend of third parties seeking to obtain national trademark registrations in an apparent attempt to game ICANN's new gTLD process. While many of these applications have withered and died on the vine some have sneaked through. However, it appears that the United States Trademark Trial and Appeal Board (TTAB) has issued a very well-reasoned and articulate opinion... more
After the DNS root zone was finally signed and a number of Top-Level Domains (TLDs) began signing their zones, we were curious to see how many clients actually request DNSSEC information. We looked at the RIPE NCC server that provides secondary service to several country code top-level domains (ccTLDs). more
The mainly politically-driven debate - FttH versus wireless broadband - is spreading uninformed messages and half-truths in the market. And confusing messages from mobile operators are also blurring the picture. All well-informed people confirm that this is a nonsensical debate -- both infrastructures will coexist with, and supplement, each other. more
The reports and analysis by Dr. Dennis Carlton are deeply, deeply flawed. I will prepare a long rebuttal to it in the coming weeks, but wanted to go on the record early as to its weaknesses. The analysis appears to be based on a very limited review of the market for domain names, and utilizes little actual data. It fails to even consider how nuanced the market for domain names has become, and how registry operators can exploit those nuances, including tiered-pricing... more
Until the launch of the New gTLD Program, TLD launches were relatively straightforward. They generally consisted of a Sunrise Period, a Landrush Phase, and then General Availability. We would see the occasional Grandfather Phase or "Founders" program, but all in all, launches were pretty standard and straightforward. Things started to change with the launch of the new gTLD program. more
Jonathan Zittrain's recent book, The Future of the Internet -- And How to Stop It, has spurred a lot of discussion both online and offline, with blog posts lauding his insights or criticising his over-apocalyptic imagination. The book itself makes fascinating reading for those who have watched the network grow from its roots in the research community into today's global channel for communications, commerce and cultural expression... One of the reasons that Zittrain puts forward for the growing popularity of closed or, as he prefers 'tethered', devices, is that they are less vulnerable to hacking, security flaws, malware and all the other perils that face any internet-enabled system. more
The following speech was prepared with the intention of using portions of it during the FTC Spam Summit, but CAUCE was not given the opportunity to participate due to time constraints... "I am here today to question. Yesterday we heard how the tenor of the discussion about spam became more mature. How, in the period of time that has elapsed since the last summit, things have developed as an industry. That may be true, but I question if the discussion at hand here this week is truly a big tent effort. I see few anti-spammers here..." more
Even as we increasingly discover that every facet of our modern lives now revolve around, and are dependent on the Internet, for which reason its availability, functionality, safety, stability and security are now of great and continuing concern to all of us. These issues have a profound impact on its overall governance. To most of us, during the past three decades, the Internet has always been available, stable, affordable and open; and it should continue this way even as it is controlled and administered in a secure manner... more
During last week's ICANN71 Virtual Policy Forum, the Brand Registry Group (BRG) held a very informative session about how ICANN can help potential applicants prepare for the next new gTLD round. Speakers during the session provided historical perspective that applicant guidebooks have regularly evolved over time as a result of community review and feedback provided to ICANN, providing concrete examples of how the current applicant guidebook was developed. more
OK. Now my lawyer has given me the green light, I can officially announce I am working on a proposal for a .sport TLD, to be submitted to ICANN for consideration as a new TLD next year. There is still a long way to go in terms of getting the proposal ready, but I this this one is a winner... more
It highly concerns me when domain registries controlling a certain Top-Level Domain (TLD) raise the wholesale prices they charge to registrars (domain retailers) without consultation to domain registrants (domain buyers). When this happens, all the registrars will need to pay more to the registry for every domain which they register or renew for a customer. They will in turn raise their prices to cover the additional cost to them. Transferring the domains to a different registrar will not help, as all the registrars for that TLD will be forced to raise prices as they all have to pay more to the registry. Don't think it hasn't happened before? more
What exactly is that "reserved list of names" Fadi Chehadé refers to in his letter dated October the 22nd? If we already have an idea, we wonder if they considered protecting more than just "accents". The name of Hogan Lovells was mentioned in the last Safebrands "RINDD" and their input on this question is welcome if they are the company to be working on that list. more
Startups in the process of selecting a company or product name are often frustrated to see that someone else, years ago, registered the .com version of their newly thought-of name. Similarly, companies that have acquired a trademark registration wonder whether they can use their crisp new registration certificate to stomp out someone else who has been using a domain name similar to the company's new mark. A recent case arising under the UDRP shows us that the earlier domain name registration is usually going to be on solid ground against a later-arriving trademark owner. more
Chinese hackers have breached U.S. Navy contractors to steal a wide range of data from ship-maintenance data to missile plans through what is reported as the most debilitating cyber campaigns linked to Beijing. more