/ Most Viewed

Was the ClimateGate Hacker Justified? Join the Debate!

A few days ago a story broke where someone hacked into a global warming research institute and stole all emails from the past 10 years, proving a conspiracy. In the vast amount of emails stolen, some emails were also found with clear-cut lies, showing how some scientists conspired to deceive in scientific research about data that did not fit their agenda of proving global warming. I am opening the subject for debate... more

Officially Compromised Privacy

The essence of information privacy is control over disclosure. Whoever is responsible for the information is supposed to be able to decide who sees it. If a society values privacy, it needs to ensure that there are reasonable protections possible against disclosure to those not authorized by the information's owner. In the online world, an essential technical component for this assurance is encryption. If the encryption that is deployed permits disclosure to those who were not authorized by the information's owner, there should be serious concern about the degree of privacy that is meaningfully possible. more

Silly Bing

Bing is Microsoft's newish search engine, whose name I am reliably informed stands for Bing Is Not Google. A couple of months ago, as an experiment, I put up a one page link farm at wild.web.sp.am. As should be apparent after about three seconds of clicking on the links there, each page has links to 12 other pages, with the page's host name made of three names, like http://aaron.louise.celia.web.sp.am. The pages are generated by a small perl script and a database of a thousand first names. more

Some Considerations for New TLD Operators from a Registrar Perspective

The "hot topic" at the upcoming ICANN meeting in Singapore will, of course, be whether or not the new Top-Level Domains (TLDs) will actually launch or not. Sure, they'll launch at some point, but ICANN has been pushing to make the big announcement at Singapore. There has been a lot written over the last couple of years about new TLDs over the last couple of years. We are now coming into what might be called the "end game". more

WCIT-12 Disappoints, More Work to Be Done

In the end it was a disappointment that the treaty on International Telecommunications regulations (ITRs) that had been under negotiation for two weeks at WCIT-12 was not acceptable to 55 countries, and that, as a consequence, these countries did not sign the final version of the international treaty (89 did sign). After two weeks of sometimes fractious negotiation - 1,275 proposals were discussed in all - the contentious issues were significantly watered down. However the dissenting countries felt that the key issue - anything in relation to the internet - should not be included at all and, quite correctly, did not compromise on that. more

Shouting ‘Bug’ on a Crowded Internet…

In the last few weeks we've seen two very different approaches to the full disclosure of security flaws in large-scale computer systems. Problems in the domain name system have been kept quiet long enough for vendors to find and fix their software, while details of how to hack Transport for London's Oyster card will soon be available to anyone with a laptop computer and a desire to break the law. These two cases highlight a major problem facing the computing industry, one that goes back many years and is still far from being unresolved. Given that there are inevitably bugs, flaws and unexpected interactions in complex systems, how much information about them should be made public by researchers when the details could be helpful to criminals or malicious hackers? more

Exploring the Meanings of “Right” and “Legitimate Interest” (UDRP Proceedings)

For complainant, the second leg in determining cybersquatting under the Uniform Domain Name Dispute Resolution Policy (UDRP) is evidence respondent lacks both rights and legitimate interests in the challenged domain name (Paragraph 4(a)(ii)). I underscore "both" because proving one but not the other is not good enough. This seems obvious, so why suggest there is something to explore about "rights" and "legitimate interests" if their meanings hardly need explication? more

More Targeted Phishing, Spam and Mobile Attacks; IBM Reports 150K Security Events Per Second

IBM today released the results from its annual X-Force 2010 Trend and Risk Report, identifying more targeted phishing, spam and mobile attacks. The report also finds cloud security continuing to evolve. "From Stuxnet to Zeus Botnets to mobile exploits, a widening variety of attack methodologies is popping up each day," says Tom Cross, threat intelligence manager, IBM X-Force. "The numerous, high profile targeted attacks in 2010 shed light on a crop of highly sophisticated cyber criminals, who may be well-funded and operating with knowledge of security vulnerabilities that no one else has. Staying ahead of these growing threats and designing software and services that are secure from the start has never been more critical." more

Another Big Step Forward for New TLDs

So after the initial reaction and "over-reaction" by some folks in the audience, I have been thinking about the implications of the ICANN resolution on new gTLDs at its Board meeting in Cartagena, Colombia. In short, the resolution and subsequent comments by the chair, Peter Dengate-Thrush have shown that there is positive momentum with respect to the program overall. "We have reached a turning point in the new gTLD program" he said. more

Analysis of 7.5 Trillion DNS Queries Reveals Public Resolvers Dominate the Internet

A recent report by NS1 provides a comprehensive look at global DNS traffic trends. It reveals that public resolvers dominate the internet, accounting for nearly 60% of recursive DNS usage. Telecom giants represent nearly 9%, with Google the clear front-runner at a little over 30%, followed by Amazon Web Services at 16%. more

Mergers and Acquisitions in Domain Industry Increasing at an Impressive Rate

As the year progresses the number of mergers and acquisitions in the domain industry is increasing at an impressive rate. Hot on the heels of GoDaddy's acquisition (saving?) of RegisterFly another media company acquires a domain company. Is anyone beginning to see a pattern emerging? Oversee.net has acquired SnapNames... It's an interesting acquisition for Oversee.net which already owns DomainSponsor as well as a very interesting portfolio of domains. more

Which Comes First, the Trademark or Domain?

For years, the question of exactly when to register a domain name has been one asked by legal departments, as they've sought to formalize their internal processes. If you were to think about it logically, it would make most sense to register it after the trademark had been cleared. After all, why bother to register a domain, if you aren't going to use it to support a product, service or campaign? more

Internet Records Retention Bill

A lot of pixels have been spilled lately over an Internet records retention bill recently introduced in both the House and the Senate. The goal is to fight child pornography. That's a worthwhile goal; however, I think these bills will do little to further it. Worse yet, I think that at least two of the provisions of the bill are likely to have bad side effects... more

The Term Web3 Has Been Seized by the Crypto Market: An Internet Governance Perspective

In late 2021, the term Web3 began to increasingly appear in mainstream media outlets. This does not refer, however, to a sudden increase in interest in the Semantic Web as defined by Tim Berners-Lee, but rather to something entirely different. Enthusiasts of cryptocurrencies and nonfungible tokens (NFTs) seized this term and changed its meaning to reflect a supposed new stage of the Web, running on top of blockchains and having decentralization as its core value. To summarize the narrative being spun, the first generation of the Web afforded independence to the owners of websites, but this did not extend to the average user... more

Net Neutrality Not a Serious Issue Outside America

Most countries, don't have to fear internet quality problems in the same way as would be possible in the USA. The US competition watchdog has little power to hold telcos accountable to the nature of their broadband services. Back in 1996 broadband was classified as a content service and not a telecom service. So, for example, if a telco wants to provide preferred access to Google, it can sell them a superior broadband services which could create a two speed internet service... more