The lexicon of domain names consists of letters, words, numbers, dots, and dashes. When the characters correspond in whole (identical) or in part (confusingly similar) to trademarks or service marks and their registrations postdate the first use of marks in commerce registrants become challengeable under the Uniform Domain Name Dispute Resolution Policy (UDRP) as cybersquatters. more
A Tipping Point for the Internet? Catching the precise moment of a tectonic shift in a global system as large and important as the Internet may be viewed as an exercise in the improbable. However, I point out in this summary that I think we are precisely in the midst of such a shift... more
A spamming group called River City Media (RCM) has had its database of 1.4 billion records leaked. This was revealed today by MacKeeper Security Researcher, Chris Vickery in cooperation with CSO Online and Spamhaus. more
A few early technical hiccups with the system streaming it live did not prevent ICANN's prioritization draw from running smoothly yesterday, December 17, 2012. All 1917 remaining applications (out of initial 1930 announced last June) were processed in one of the meeting rooms at the Los Angeles Airport Hilton, starting at 13:00 local time. Shortly before midnight, or more than 10 hours later, Google's Dot MBA was the last application to be pulled out of the box. more
In Akamai Technologies' "State of the Internet" report for Q4 2010 Hong Kong (as a region/country) was identified as the market with the fastest average peak internet connection speed in the world. Hong Kong fixed line users can access the internet with an average peak speed of 37.9Mb/s, ahead of South Korea at 32.3Mb/s, Romania at 31.7Mb/s and Japan at 30.5Mb/s. more
On November 15th, Russia used an anti-satellite missile to destroy COSMOS 1408, a defunct spy satellite. The explosion quickly created over 1,500 pieces of trackable debris and will likely generate hundreds of thousands of smaller pieces. As a precautionary measure, the astronauts on the International Space Station, two of whom are Russians, took shelter in escape shuttles during two orbits. The anti-satellite test was widely criticized, but the Russian defense ministry released a statement saying... more
The UN Panel on Digital Cooperation presented last week in New York its final report, and an old question is back on the international agenda: Could the global Internet be ordered by a reasonable arrangement among stakeholders which would maximize the digital opportunities and minimize the cyber risks by keeping the network free, open and safe? more
Google has launched a new Public Policy Blog focused on U.S. government legislation and regulation -- reported in the media as part of Google's efforts in setting up focus on the U.S. government since early 2005. In an entry posted over the weekend on the blog by Richard Whitt, Washington Telecom and Media Counsel, key argument within the net neutrality debate is explained... more
The recent news that Mozilla and Cloudflare are deploying their own DNS recursive resolver has once again raised hopes that users will enjoy improved privacy, since they can send DNS traffic encrypted to Cloudflare, rather than to their ISP. In this post, we explain why this approach only moves your private data from the ISP to (yet another) third party. You might trust that third party more than your ISP, but you still have to trust them. In this post, we present an alternative design -- Oblivious DNS -- that prevents you from having to make that choice at all. more
As spearhead of the Yes2DotAfrica Campaign, I recently wrote a letter on behalf of DCA, to the Chairman of the United States Senate Committee on Commerce, Science & Transportation, Senator Jay Rockefeller which was also copied to other U.S. leaders and officials to express support for the present status quo on Global Internet Goverenance and a Reaffirmation of the Mult-stakeholder model. The full text of the letter is published in this post. more
At the IETF 95 meeting at the start of April, I was in a meeting of the IPv4 Sunset Working Group, and heard Lee Howard, Director of Network Technology at Time Warner Cable, present on a proposal that recommended that IP version 4, or to be specific, that the technical protocol specification documented in RFC 791, be declared "Historic"... The rationale for this proposed re-designation of IPv4 was that this protocol has indeed been superseded by a more recent specification, namely IP version 6. more
In the past few months, a flurry of gift card scams leveraging such high-profile brands as Best Buy, Whole Foods and IKEA have emerged on Facebook. These scams often use the brand's logo, website URL, or general "look and feel" on Facebook "fan" pages to give the impression that these offers are legitimate. Some scams are even bold enough to include bogus, non-interactive fan comments to add a greater sense of authenticity to the gift card offer. To date, these scams have been successful at tricking tens of thousands of consumers. In just one day, for example, a fan page titled "IKEA Get a FREE $1000 IKEA Gift Card! (ONLY AVAILABLE 1 DAY)" registered 40,000 fans before being shut down. more
One of the consequences of the Jan 6th events is a renewed attention towards Surveillance Capitalism as a key doctrine undermining democracy.2 This part 2 of the 2 part series of discusses the rise and fall of Surveillance Capitalism under the premise that the better we understand the danger at the door, the better we are able to confront it. more
The National Science Foundation awarded a small contract to the IEEE to host a small two-day meeting on 30 Sept 1994 of selected invitees at the IEEE's Washington DC 18th Street offices on "Name Registration For The '.COM' Domain." Being part of the InterNIC contract oversight committee, I was one of the eight invitees. It turned out in many ways to be the single most important meeting in the long, checkered history of what is today referred to as "the internet," that made an extraordinarily bad decision. more
In 2021, we discussed a potential future shift from established public-key algorithms to so-called "post-quantum" algorithms, which may help protect sensitive information after the advent of quantum computers. We also shared some of our initial research on how to apply these algorithms to the Domain Name System Security Extensions, or DNSSEC. In the time since that blog post, we've continued to explore ways to address the potential operational impact of post-quantum algorithms on DNSSEC, while also closely tracking industry research and advances in this area. more