/ Most Viewed

2016 Predictions: What to Expect for the Next Year in New TLDs

Last week I published a blog looking back on the year that was 2015 and reflecting on some of the challenges and achievements for new TLDs. Turning our gaze forward, I think 2016 is shaping up to be the biggest and best year that we've enjoyed to date and will surpass many expectations as we continue the push towards mainstream adoption of these wonderful, innovative digital assets. more

Proxy-Privacy User Higher for Illicit Domains

WHOIS issues are looming large for the ICANN meeting next week, starting with an all-day WHOIS Policy Review on Sunday (background). WHOIS is a subject that has been the recent topic of a number of issues including a debacle over potentially disclosing the identities of compliance reporters to spammers and criminal domainers. more

Uniform Rapid Suspension Not Appropriate for .com Domain Names

The Internet Commerce Association has been actively involved for the last four years on the ICANN Working Group reviewing the Uniform Rapid Suspension (URS) policy and the Uniform Domain Name Dispute Resolution Policy (UDRP). The Working Group is currently wrapping up its review of the URS. The UDRP will be reviewed in an upcoming second phase. more

ICANN Asks U.S. Federal Trade Commission Whether .SUCK is Violating Any Laws

Allen Grogan, ICANN's Chief Contract Compliance Officer, has written a blog post today concerning a formal letter it has received asking the agency to halt the rollout of .SUCKS, a new gTLD operated by Vox Populi Registry Inc. As it stands, a ruling against Vox Populi by ICANN could result in federal prosecution or other legal action, according to ICANN officials. more

What Next for Email Service Providers?

It's been a very bad month for ESPs, companies that handle bulk mailings for their clients. Several of them have had internal security breaches, leaking client information, client mailing lists, or both. Many have also seen clients compromised, with the compromised credentials used to send spam. The sequence of events suggests all the ESPs whose clients were compromised were themselves compromised first. (That's how the crooks knew who to attack.) more

The Sad State of WHOIS, and Why Criminals Love It

I'm not even sure how to begin this post, but let me tell you -- my head explodes when I try to contact WHOIS "contacts" about criminal activity - FAIL. I think ICANN wants to do the right thing here, and has stated on multiple occasions that inaccurate WHOIS data is reason for registrar termination. That's a Good Thing... more

Strategic Use of Screenshots from the Wayback Machine

Internet Archive contains a vast library of screenshots of websites that its Wayback Machine captures sporadically over the course of domain names' histories. While it doesn't compile daily images it opens a sufficient window to past use which is unique, invaluable, and free. (There are also subscription services, but they come at a hefty cost!). How it's used (and why the Wayback Machine should be in a party's toolkit) for supporting and opposing claims of cybersquatting is illuminated in a number of recent UDRP cases. more

A Royal Opinion on Carrier Grade NATs

There are still a number of countries who have Queen Elizabeth as their titular head of state. My country, Australia, is one of those countries. It's difficult to understand what exactly her role is these days in the context of Australian governmental matters, and I suspect even in the United Kingdom many folk share my constitutional uncertainty... In the United Kingdom every year the Queen reads a speech prepared by the government of the day, which details the legislative measures that are being proposed by the government for the coming year. Earlier this month the Queen's speech included the following statement in her speech. more

IP Address Intelligence Burdening Content Providers with Regional Laws?

I've been looking into IP address filtering by content providers. I understand that IP addresses can be attached with confidence to geographical locations (at the country level, at least) about 80% of the time. You have to make up the rest with heuristics. So there are companies that are in the business of packaging those geolocation heuristics for sites. ...How widely are these services used? ...does it now make sense to put content sites to the burden of complying with the laws applicable to the people/machines they know are visiting them? more

Bandwidth: Why Fast is Important in a Global Economy

Bandwidth is the basic foundation for Internet traffic as a connector to everything important in our lives. Whether it is basic bandwidth for connecting to family and friends, or a super fast highway for global reach and competitiveness in the business world, bandwidth constitutes the speed at which we connect as a global presence within the expanding sphere of Internet communication. ... To understand why bandwidth is important to all Americans, including personal and business uses, we must understand the different types Internet traffic. more

The Tempest in the TLD Teapot

At its recent meeting in Seoul ICANN announced with great fanfare that it's getting ever closer to adding lots of new Top Level Domains (TLDs). Despite all the hype, new TLDs will make little difference... I agree with my old friend Lauren Weinstein that this is a tempest in a very expensive teapot, because all of the purported reasons that people want new TLDs have been proven false, and the one actual reason that a new TLD would be valuable has no public benefit. more

Interview With Michael Froomkin: Watching ICANN Through IETF: Part I

Michael Froomkin, a Professor of Law at the University of Miami School of Law and one of the founding members of ICANNWatch has recently written an article for the Harvard Law Review called, "Habermas@discourse.net: Toward a Critical Theory of Cyberspace". One of the areas covered in this article is a comparison made between the ICANN model and that of the Internet Engineering Task Force (IETF).

Michael Froomkin has underlined several lessons that can be learned from this contrast, including a suggestion "that claiming kinship with the IETF model is a way of claiming legitimacy, but that not every one who makes this claim is entitled to do so".

What follows is a two-part interview with Michael Froomkin and a closer look at his recent article in the Harvard Law Reviewmore

Microsoft Cancels Plans to Move Its Internal Wireless Network to IPv6-Only

Microsoft has digressed from a previously announced plan to move its internal wireless guest network to IPv6-only. more

Aalyria, a Space Internet Startup With Nearly a Decade’s Worth of Intellectual Property From Alphabet

Aalyria, a new space Internet company, just burst out of stealth mode. It is based on work done on Alphabet's "moonshot" Project Loon and Alphabet transferred almost a decade's worth of technology IP, patents, office space, and other assets to Aalyria in return for an equity stake in the company. Spacetime is Aalyria's intelligent network orchestration technology, and Tightbeam is its advanced atmospheric laser communications technology. more

The UK Seeks to Enforce Tougher Standards on MSPs

The UK government is proposing new regulations to strengthen cyber resilience in the private sector. Their intention is to expand cybersecurity rules for critical infrastructure (CI) operators to include managed service providers (MSPs), more stringent breach notification requirements, and legislation to establish the UK Cyber Security Council as the standards development organization for the cybersecurity profession. This is a welcomed development, but more details about implementation and enforcement are needed. more