/ Most Viewed

Running DNSBLs in an IPv6 World

DNS blacklists for IPv4 addresses are now nearly 15 years old, and DNSBL operators have gathered a great deal of expertise running them. Over the next decade or two mail will probably move to IPv6. How will running IPv6 DNSBLs differ from IPv4? There aren't any significant IPv6 DNSBLs yet since there isn't significant unwanted IPv6 mail traffic yet (or significant wanted traffic, for that matter), but we can make some extrapolations from the IPv4 experience. more

How to Best Enhance Your Brand with New gTLDs

The essay examines the breadth of new generic Top-Level Domain (gTLD) registrations needed for best enhancing a .Brand. And if you don't own .Brand, what should the scope of your new gTLD strategy be? With the introduction of hundreds of new gTLDs, a lot of businesses still don't have reliable information for figuring out which of the newcomers to register under. more

New gTLDs, Last-Minute End-Arounds, and Fundamental Fairness

The ICANN community is ever closer to realization of its goal to bring long-overdue consumer choice and competition to Internet naming. Regrettably, but perhaps predictably, reliance on the Final Applicant Guidebook (AGB) is being challenged at the last minute by recent proposals from the Business and Intellectual Property Constituencies (BC/IPC), which demand "improvements" to the already extensive trademark protections that will be part of the new gTLD landscape. more

Multi-Stakeholder Debate at the IGF: Lessons from a Safari

Here at the IGF in Kenya, we're debating how governments, private sector, and civil society can improve the multi-stakeholder model that's helped the Internet become such a vital part of life around the world. Makes me think of another kind of multi-stakeholder model I saw last week on a photo safari in Kenya's Masai Mara National Reserve. more

“Do’s and Don’ts”: Commenting on New gTLD Applications

regarding the new gTLD applications and, unfortunately, I have been largely disappointed with the substance of most of them. Too many of the earliest comments express concern over the possibility of having more adult-related extensions. Okay, we hear you... Also, with all due respect to the supporters of Dadotart's application, I appreciate the display of loyalty to this particular applicant but if I have to read another comment from an "impassioned supporter" of the .ART application, I will bang my head on my desk. more

Cyber-Terrorism Rising, Existing Cyber-Security Strategies Failing, What Are Decision Makers to Do?

While conventional cyber attacks are evolving at breakneck speed, the world is witnessing the rise of a new generation of political, ideological, religious, terror and destruction motivated "Poli-Cyber™" threats. These are attacks perpetrated or inspired by extremists' groups such as ISIS/Daesh, rogue states, national intelligence services and their proxies. They are breaching organizations and governments daily, and no one is immune. more

It’s Time to Talk Solutions on Mass Surveillance

The public discussion of surveillance one year on from the Snowden revelations remains a search for the biggest sinner. New stories 'outing' countries and companies are great transparency and essential for healthy societies but they have a side effect that isn't so benign: they create an evergreen source of new justifications for security services to demand more money for a surveillance and counter-surveillance arms race. more

Making Sense of Google’s .xyz gTLD Branding

Google has a newly created parent, a holding company that is now its official owner. Of course, Google will keep using its extremely well-known name for its core search and related businesses. But the company now operates under an entity known as Alphabet -- to give its name with extension, Alphabet.xyz. Here specialists in gTLDs may be scratching their heads. Why .xyz? Why this little-known domain for one of the world's great corporations? more

Multiple (Even Random or Garbled) Domain Names to Bypass Spam Filters Not a Violation

The California Supreme Court issued its opinion in Kleffman v. Vonage, a case certified from the Ninth Circuit. The California Supreme Court held that the transmission of "commercial e-mail advertisements from multiple domain names for the purpose of bypassing spam filters" does not violate California's spam statute. more

Is Whois Data Accuracy Enough?

The Whois Task Force of the Domain Name Supporting Organization (DNSO) has been consulting with registrars over the past few months on the Whois accuracy issue for law enforcement. The Task Force has enumerated three primary areas of interest: accuracy, uniformity, and better searching capabilities. When the registrars met with the Task Force in Shanghai, a fourth area of interest was also brought forward and advocated by many of the registrars at the meeting as paramount to the other three areas. This fourth area of interest was privacy. more

Think Beyond .com: From Country Codes to Internationalized Domain Names

One of the major takeaways from the Web Globalization Report Card is the importance of providing "front doors" to your localized websites. These doors begin with the addresses themselves, which may not include the .com domain. In fact, I'd recommend that most localized websites not use the .com domain, as this is an overloaded domain. This article looks at the many ways brands are creating more localized addresses, beginning with country code top-level domains (ccTLDs). more

How Much Could Businesses and Consumers Save if .com Price Cap Benefits Were Passed On to Consumers?

Recently, a blogger whose website features posts and ads from domain speculators wondered what the cost of registering a .com domain name would be if somebody else ran the .com registry. But this blog post asks the more relevant question: "How much could businesses and consumers save if the benefit of .com price caps were passed along to consumers?" Now is a good time to focus on this question, since Verisign and the US Department of Commerce just amended their Cooperative Agreement to allow limited, regulated .com price increases. more

Strategic Use of Screenshots from the Wayback Machine

Internet Archive contains a vast library of screenshots of websites that its Wayback Machine captures sporadically over the course of domain names' histories. While it doesn't compile daily images it opens a sufficient window to past use which is unique, invaluable, and free. (There are also subscription services, but they come at a hefty cost!). How it's used (and why the Wayback Machine should be in a party's toolkit) for supporting and opposing claims of cybersquatting is illuminated in a number of recent UDRP cases. more

Report from UN Spam Meeting in Geneva

The International Telecommunication Union (ITU), held an ITU WSIS Thematic Meeting on Countering Spam from 7 to 9 July 2004, in Geneva, Switzerland. The meeting was focused around various topics including: Scope of the problem, Technical solutions, Consumer protection and awareness, Legislation and enforcement, and International cooperation. The following is a report by William J. Drake, Senior Associate International Centre for Trade and Sustainable Development in Geneva. more

DNS Level Action to Address Abuses: New Tools for DNS Operators and Legislators

The ways in which the Internet is embedded in our daily lives are too varied and numerous to catalogue. The Internet delivers information, access to goods, services, education, banking, social interaction and, increasingly, work space. The global pandemic has only heightened our dependence on the online world, which is why efforts to ensure that the Internet remains a trusted and secure environment are more important than ever. more