/ Most Viewed

US Government Releases Two IPv6 Papers

During the last week of December, two US Government agencies released papers on IPv6. NIST released Special Publication 800-119, Guidelines for the Secure Deployment of IPv6. This comprehensive 188 page paper provides guidelines for federal agencies (and anyone else who might want to take advantage of it) to securely deploy IPv6. more

Jefferson Rebuffed: The United States and the Future of Internet Governance

A paper by Viktor Mayer-Schoenberger and Malte Ziewitz was recently published at John F. Kennedy School of Government, Harvard University titled, "Jefferson Rebuffed: The United States and the Future of Internet Governance". The following excerpt provides an overview of the paper: "Over the last several years, many have called for an internationalization of Internet governance in general, and Internet naming and numbering in particular. The multi-year WSIS process that culminated in November 2005 was intended to create momentum in such direction. The United States has long resisted such internationalization, fearing in particular the growing influence of China and similar nations..." more

U.S. Government Strongly Affirms ICANN Model and New gTLDs

Larry Strickling, who runs the NTIA (the part of the U.S. Department of Commerce that handles ICANN), yesterday gave an important and remarkable speech to the Practicing Law Institute about Internet governance. His speech, timed to coincide with an orchestrated ICANN-bashing across town in the Senate, was a striking defense of the ICANN model and a repudiation of special pleading outside the process. more

The Importance of IP Resource Planning in Government ICT Strategic Plans

It seems everywhere I turn, there's someone throwing around statistics for how the Internet and broadband will drive economic growth, create jobs, end world hunger and bring world peace (ok, maybe not the later). Sure enough, government officials are buying into that rhetoric and extending it in initiatives like national broadband strategies, cybercrime and cybersecurity plans as well as e-governance strategies. more

ALAC Meets the ICANN Board

For three years, I've been a member of ICANN's "Interim" At-Large Advisory Committee, ALAC. At this Vancouver meeting, for the first time, the ICANN Board met with us, and Bret captured it on mp3 for podcast. ALAC criticized ICANN's proposed settlement with VeriSign, and then spoke about the problems with the current structure for at-large participation. more

IDN Scaremongering: Mashable and Times Online Screw Up

Internationalized Domain Names (IDNs) might be a slightly "hot" topic at the moment following on from ICANN's launch of the IDN country code Top-Level Domain (ccTLD) program recently. However, IDNs are NOT a new topic. Far from it. They've been around for quite some time. Unfortunately neither The Times Online or Mashable seem to have done any homework. more

How You Can Be Hijacked Without Actually Being Hacked

Unsuspecting website visitors are often unaware when they have landed on a spoofed page or are re-directed to malware-hosting web servers designed to steal their sensitive data and information. This attack is known as subdomain hijacking, or subdomain takeover. A web user's private information is then traded on the dark web, and cybercriminals profit, further fueling the expansion of identity theft in the online world. more

Closed Generic TLDs - The Final Battle?

Over the past couple of years I've posted several times on the issue of "closed generics". In essence these are new TLD applications where the string is a "generic term" AND the applicant wanted to keep all domains in the registry for their own use. The baseline registry agreement with ICANN now contains language that resolves the issue, or at least it would appear to do so. more

More Stepping Stones Before This Summer’s Seminal DNSSEC Events

The deployment of Domain Security Extensions (DNSSEC) has crossed another milestone this month with the publication of DURZ (deliberately unvalidatable root zone) in all DNS root servers on 5 May 2010. While this change was virtually invisible to most Internet users, this event and the remaining testing that will occur over these next two months will dictate the ultimate success of DNSSEC deployment across the Internet. more

Researchers Discover Over 1.5 Billion Files Exposed Through Misconfigured Data Services

Many administrators misconfigure cloud storage, such Amazon Simple Storage Service (S3) buckets, resulting in the contents being publicly-accessible. more

NTIA Committed to ICANN Reform

National Telecommunications and Information Administration (NTIA) has made a long term commitment to taking the actions necessary to reform ICANN. Specifically, the Department of Commerce's Strategic Plan for FY 2004-2009 discusses the need for NTIA to take action to reform ICANN. The Strategic Plan details three Strategic Goals for the Department to achieve over the next five years. The second goal is to "Foster science and technological leadership by protecting intellectual property, enhancing technical standards, and advancing measurement science."  more

WIPO Reports Cybersquatting Cases Grew by 12% Reaching New Records in 2018

According to a report from the World Intellectual Property Organization (WIPO), trademark owners filed a record 3,447 cases under the Uniform Domain Name Dispute Resolution Policy (UDRP) with WIPO's Arbitration and Mediation Center in 2018. more

Google: Not All ccTLD’s Are Created Equally in Generic Search Rankings

There is a very interesting video posted on YouTube.com from Matt Cutts of Google who answered the question about how ccTLD's are viewed by Google especially when they are being used as domain hacks. Here is the question: "We have a vanity domain (http://ran.ge) that unfortunately isn't one of the generic TLDs, which means we can't set our geographic target in Webmaster Tools. Is there any way to still target our proper location?" more

Securing the DNS in a Post-Quantum World: New DNSSEC Algorithms on the Horizon

One of the "key" questions cryptographers have been asking for the past decade or more is what to do about the potential future development of a large-scale quantum computer. If theory holds, a quantum computer could break established public-key algorithms including RSA and elliptic curve cryptography (ECC), building on Peter Shor's groundbreaking result from 1994. more

CENTR: Internet Governance in 2013 and What’s Coming Up in 2014

Council of European National Top Level Domain Registries (CENTR) has published an Issue Paper entitled "Internet Governance Landscape this year and next." The following is a summary from the paper along with links to download the document in full. more