As I wrote in December 2015, some Internet commerce companies - including domain name registries, registrars, advertising providers, social media platforms, payment processors and shippers - are doing right by patients in taking voluntary action against illegal online drug sellers. This is no small feat as 97% of the roughly 35,000 active online drug sellers are operating illegally. more
There are two kinds of new domain name extensions: those dedicated to selling domain names through the network of accredited Registrars and those dedicated to a personnel use. I call these "dotBRANDs" or ".brand" new gTLDs since they are used - most of the time - by Trademarks for their own benefit. This article focuses on .BRAND new generic Top-Level Domains. In the ICANN vocabulary, these are "Registry Agreements with Specification 13". more
Kevin Shatzkamer, Chief Architect for Cisco Mobility, speaks to the mobile research Cisco has developed in helping Mobile Service Providers reach their ROI goals and objectives in projecting an increasingly demand driven market. ... There has been speculation for years that increased demand for mobile video would tax and possibly crash current networks and infrastructures of mobile operators. A predictor may be The World Cup games held in South Africa. more
The i2Coalition has unveiled a new report and website, DNS at Risk, spotlighting the growing misuse of Internet infrastructure by governments to control online content. Released on June 3rd, the initiative documents how states are increasingly deploying DNS resolvers and IP filtering—originally neutral systems—as tools of censorship and enforcement. more
Recently we speculated on the question "Will 2016 Politics Trump Bipartisan Support for the MSM and DOTCOM Act?" That article discussed the possibility that the Obama Administration's decision to relinquish ICANN stewardship via the periodic re-awarding of the IANA functions contract might arise in the ongoing U.S. Presidential sweepstakes, most likely from a Republican entrenched in the far right wing of that Party. We also discussed whether its introduction might erode the currently broad and bipartisan Congressional acceptance of the transition... more
It shouldn't be a big surprise to hear that phishing is a big problem for banks. Criminals send email pretending to be a bank, and set up web sites that look a lot like a bank. One reason that phishing is possible is that e-mail has no built in security, so that if a mail message comes in purporting to be from, say, accounts@bankofamerica.com, there's no easy way to tell whether the message is really from bankofamerica.com, or from a crook. more
Quite a number of articles and blogs including one I contributed had IPv6 haruspices dissect the entrails and divine the future of the internet in the wake of the june 8th IPv6 World Day. It came and went with some trepidation, the internet did not go comatose and some marveled at and reported on traffic peaks they witnessed. Preparation of a keynote for the Gogonet Live conference in San Jose, provided me the opportunity to have a look at how some variables evolved since June... more
Funny how marketplace reality can poke holes in claims and theories. A debate is raging between some existing registries (Afilias, PIR, Neustar) and registrars like ourselves over the issue of 'cross-ownership' in Top-Level Domains (TLDs). At question: should the same set of shareholders be allowed to own all or part of a registry as well as a registrar that sells names in the TLD owned by the registry? These registries are saying 'no', and one of their principal objections is they think current registrars have an unfair advantage in pursuing TLD deals. more
The first part of this series explained how Amendment 35 to the NTIA-Verisign cooperative agreement is highly offensive to the public interest. But the reasons for saving the Internet are more fundamental to Western interests than a bad deal made under highly questionable circumstances. One of the world's foremost experts on conducting censorship at scale, the Chinese Communist Party's experience with the Great Firewall... more
Let's say I'm with the Chinese government and decide that I am tired of people evading currency controls and money laundering using Bitcoin. So we adjust the Great Firewall of China to block port 8333. We also add some proxies that allow some uncleared transactions from outside to flow into Chinese networks but not the other way and keep track of which ones we let through. Since a large fraction of the miners are inside China, and all of the hard currency exchanges are outside, this will cause a pretty serious fork. more
This morning I learned about MicroIDs from Doc Searls. Jeremy Miller has proposed MicroIDs as a microformat that "allows anyone to simply claim verifiable ownership over their own pages and content hosted anywhere." A MicroID is a hash of two hashed values. The first is a verified communication ID. The second is the URI of the site that the content will be published on. You end up with a unique, long string of gibberish that can be put in the header of a Web page or even wrapped around one part of a page... more
I gave a talk yesterday at Northwestern called A DNS in the Air. My idea is that, in order to scale, the emerging wireless Internet needs something analogous to the domain name system (DNS) -- the infrastructure that allows you to reach sites across the Net. Billions of mobile phones, and even more billions of connected sensors and other wireless devices will completely overwhelm our current spectrum management regime. AT&T Wireless estimates we will need between 250 and 600 TIMES the current wireless capacity in 2018, less than a decade from now. more
When the ICM Registry initially launched .XXX last year, the notion of a 'registration block' was a fairly novel idea. Essentially, the ICM Registry allowed companies who were not part of the "global adult entertainment industry", to seek permanent removal of names matching their trademarks from the general pool of names available for registration for a low-cost fee. Many saw this move by the ICM Registry as a genuine attempt to protect the rights of brand owners, while others saw it as yet another mechanism for generating revenue from rights owners under the guise of a "Sunrise Period." more
Well, given the amount of malicious JavaScript, malware, and other possibilities to use Facebook (and other similar social networking platforms) for abuse, I certainly wouldn't categorize this news as a "clever move"... In fact, I foresee this as an extraordinarily short-sighted move with far-reaching security implications -- which will allow the levels of malicious abuse to reach new heights. more
Last week, I predicted that much of the Internet and most cloud datacenters would launch into space in the next ten years. Today the only part of the Internet in space is a very small amount of "bent-pipe" access: signals which go from a user to a satellite and bounce back down to a ground station which feeds them into the terrestrial internet where all processing is done and all queries answered by internet-connected servers, many of them in cloud data centers. more