As I noted on May 26, the final decision issued on May 20 in the Independent Review Process (IRP) brought by Afilias against the Internet Corporation for Assigned Names and Numbers (ICANN) rejected Afilias’ petition to nullify the results of the public auction for .WEB, and it further rejected Afilias’ demand to have it be awarded .WEB (at a price substantially lower than the winning bid). Instead, as we urged, the IRP Panel determined that the ICANN Board should move forward with reviewing the objections made about .WEB, and to make a decision on delegation thereafter. more
Yesterday's post explained how peer-to-peer (P2P) applications use the processing power, bandwidth, and storage capacity of participants in a service rather than centralized resources. This makes such applications generally less subject to catastrophic failure, much less subject to running out of resources (since each new user brings new capacity as well as new demand), and much cheaper FOR THE PROVIDER of the application in terms of hardware and bandwidth required. It's the FOR THE PROVIDER part that's the rub. Let's consider the case of BBC's iPlayer service... more
ICANN comment periods on policy proposals don't normally garner much attention. In the case of the current comment period on proxy/privacy services, however, things are very different. To date several thousand comments have been filed, while the topic of the policy proposals has received media attention across hundreds of outlets. more
Many of us are familiar with network effects within telecommunications. Fundamentally, the notion is that as the number of participants in a network increases, the value of that network increases superlinearly. Though many different theories exist about how best to value these networks, the general idea is that the more people on a network, the more benefits accrue to everyone on the network... more
Cloud-based interest in email infrastructure trended up this past quarter. Port25, a Message Systems Company, tracks cloud-based interest (CBIs) among large volume senders based on evaluation and purchase requests received, in conjunction with overall site engagement. In Q3, CBIs on Port25's website grew by 34.97% over Q2, to a total of 48.2% of unique evaluation and purchase requests. more
The U.S. is unusual in that grievants of a UDRP award have a statutory remedy from an adverse UDRP award, namely an action for declaratory judgement under the Anticybersquatting Consumer Protection Act (ACPA). The action is not an appeal, but a de novo assessment of the parties' rights, either that the domain name holder is cybersquatting or its registration was lawful. Under U.S. law UDRP awards are not treated as arbitration awards subject to the Federal Arbitration Act but as new disputes. more
In a widely reported court case, Facebook won an $800M default judgment and injunction against a Montreal man named Adam Guerbuez, who has a long and sordid history. But it probably won't make any difference. The problem is that he's in Canada. more
ICANN has started dot name evaluations and charging ahead at their full speed. Mathematically it can be proven that any reasonable success of the current 1500 proposed dot names will result in tens of thousands of additional applications in the subsequent rounds. It is estimated that by the year 2020 there will be 10,000 dot names in operation and by 2025 the number would easily double. Such forecasts are not based on technological advances more
Proposals to enhance online property protection have received a lot of attention lately. Brand managers, goods manufacturers, and content distributors strenuously argue that current law enforcement mechanisms are inadequate to meet the challenges of today's fast-paced marketplace. They specifically note that foreign-based "rogue websites" continue to distribute unlicensed products and content despite existing rules; they maintain that new legislation is needed to empower intellectual rights holders to counter such cyber-criminals more effectively. more
The following is a paper presented as a keynote speech at Studienkreis 2013 in Pisa, Italy last week. ICANN is beginning to look more and more like a government. It assesses taxes, it has amassed an enormous treasury, it passes laws with international effect, and it has developed an ad hoc judiciary system to enforce its laws. This paper will take a look at that judiciary system and ICANN as dispenser of Internet justice. more
The papers have been abuzz with the shutdown of Liberty Reserve, an online payments system, due to accusations of large scale money laundering via anonymous transactions. Many people have noted similarities between LR and Bitcoin and wonder whether Bitcoin is next. I doubt it, because with Bitcoin, nothing is anonymous. more
ICANN has announced that they will be having a Special Meeting of the ICANN Board on 19 February 2010 (3:00 UCT) to discuss the "upcoming ICANN International meeting." It is reasonable to assume that the 17 February 2010 security update will be a topic of discussion... I trust that the ICANN Board will make the right decision balancing the obligations that ICANN has to the global Internet community, with the safety and security of those ICANN stakeholders that participate in person at these ICANN events. However, the ICANN Board needs to gain the trust of the global community in connection with this and other important decisions that it will be making. more
Under the leadership of Fadi Chehade and Steve Crocker, ICANN finally runs like an organization that has grown up. When it comes to process, accountability, and transparency, this is excellent news for the Internet. But it also raises a new question: how far will we let ICANN grow "out" of the limited technical mission for which it was created? In his opening remarks here in Durban, Chehade announced the expansion of local engagement centers and significant expansion of ICANN staff - for the second straight year. more
As of today, Innovative Auctions has successfully completed private auctions for a total of 18 contested generic Top-Level Domains, resolving contention for more gTLDs than all other mechanisms combined -- including straight-up withdrawals, private negotiations, and swaps. Here is this week's update. more
One of the big trends this year is spear phishing. These are phish attacks that are frequently (though not always) against high profile users. The purpose of these attacks is to steal sensitive data or get elevation of privilege inside the service by exploiting a software vulnerability within the user's computer that transmits usernames and passwords back to the phisher. more