/ Most Viewed

Searching for Truth in DKIM: Part 4 of 5

Once you've determined that you can trust the signer of a message, as we discussed in part 3, it's easy to extrapolate that various portions of the message are equally trustworthy. For example, when there's a valid DKIM signature, we might assume that the From: header isn't spoofed. But in reality, DKIM only tells us two basic things... more

eco to Address the Impact of Brexit on the Domain Industry

eco, which is the largest internet industry association in Europe, is holding a virtual meeting later this month to discuss Brexit. The meeting, which is scheduled for July 27th at 1200 UTC, will be the first of several dialogues among industry to discuss the potential impact of the UK's exit from the EU on the domain name industry. As I mentioned in a recent post, the exit of the UK from the EU has an "unknown" impact on how domain name registries and registrars will interact with UK based registrants. more

A Cautionary Tale of Reputation Damage: Striking the Right Balance With Brand Protection

In early March 2020, a well-known European fashion brand found themselves on the receiving end of a protest campaign on social media. The background to the case was the fact that, in 2019, the brand had launched a cease and desist (C&D) action against a small, U.K.-based company in response to their use of similar product names and sale of associated clothing merchandise. more

Why Do We Assume Cable Broadband is Always Good?

One of the oddest aspects of FCC monitoring of broadband is that the agency has accepted the premise that any broadband product faster than 25/3 Mbps is adequate broadband. This means that the FCC has completely accepted that broadband provided by cable companies is adequate and is something the agency doesn't have to be concerned with. The FCC makes the automatic assumption that broadband from cable companies is good broadband... more

Brand Protection Beyond the “Whack-a-Mole” Approach

I recently shared at a conference how a seasoned brand and fraud expert from one of the world's largest global financial institutions lamented a major attack where multiple fraudulent websites would pop up every single day. All attacks were launched from the same registrar and web hosting company, and no matter how much they reached out to these providers, they received the same reply: "we will pass on your request to the registrant or site owner," and then nothing happened. more

An Update on Telemedicine

I’ve been keeping tabs on the news about telemedicine since it was touted throughout the industry as one of the big benefits of having good broadband. One piece of news comes from a survey conducted by Nemours Children’s Health. This is a large pediatric health system with 95 locations in Delaware, Florida, New Jersey, and Pennsylvania. The company treats almost half a million children annually. Nemours released a report on Telehealth in July. The report was based on a survey of 2,056 parents/guardians of children. The survey had some interesting results, more

Cybersecurity Is Failing Big-Time and This Is Hard to Fix

It has become clear that having a big cybersecurity war room is not enough to deliver true end-to-end security throughout the complex networks, systems and structures on which our modern society is based. Furthermore, looking at the forever changing draconian government interventions in this space, it is also obvious that they are often stabbing in the dark. more

June 8 Deadline for Survey on Recommendations for Future of the Internet

What do you think must be done to ensure the development of an open, trusted, accessible, and global Internet in the future? As part of the Internet Society's "Internet Futures" project, we'd like your input on recommendations for Internet leaders and policy makers. For more background, please read "Help Shape the Future of the Internet" by my colleague Constance Bommelaer, or browse through the Internet Futures pages. more

Submarine Cable Resiliency in the Face of Disruptions

I have on my desk a rather small tube. It's a little under 2cm in diameter, 6 cm long, and looks like it's made from a dull white polycarbonate material. At the end, I can see a copper inner tube, and inside that, another polycarbonate layer, and then a smaller steel tube that holds a thin steel thread and some fibre optic cables. There are no layers of steel jacketing, nor any other additional wrapping at all. more

Thinking Carefully About New gTLD Objections: Limited Public Interest (Part 2 of 4)

The second installment in my four-part series on New gTLD objections will focus on the limited public interest ("LPI") variety. The overarching theme however is essentially the same: new gTLD objections are generally more complicated (and costly) than UDRP actions and need to be approached with care. In fact, LPI represents one of the best examples of the tough climb that would-be objectors are likely to face. Understanding exactly what is required beforehand - and whether or not you can deliver - is absolutely critical. more

Watch The IGF 2012 Live From Baku

The Seventh Annual Internet Governance Forum (IGF) is underway now in Baku, Azerbaijan, from November 6-9, 2012. Very appropriately, it is possible to listen in to any of the sessions remotely across the Internet. Details can be found here... more

NSA to Stop Collecting American Emails To and From Overseas

U.S. National Security Agency (NSA) will halt its controversial warrantless surveillance program which collects Americans' emails and texts sent to and from people overseas and that mention a foreigner under surveillance, according to a New York Times report today. more

Virtual ICANN Meetings – YES, Please

In the early 2000s, when I began working in the domain name industry, I remember hearing from colleagues about these seemingly elusive ICANN meetings invariably hosted in some pretty incredible places, including Rio de Janeiro, Rome and Cape Town. I remember how some of my colleagues complained about being stuck in windowless conference rooms for hours on end, but secretly thinking that they were probably going to a few meetings, but then actually enjoying a fabulous vacation. more

The Case of Mobile Users’ Bandwidth Consumption and Causality

It started with a report in the New York Times, citing a study from Arieso, saying that "Top 1% of Mobile Users Consume Half of World's Bandwidth". Arieso said that part of the reason for the increase in download volumes may be Apple's Siri voice feature on the iPhone 4S which allows consumers to dictate to the phone and enter more text and data... Other news outlets picked up the story and lost all perspective. more

Call for Participation – ICANN DNSSEC and Security Workshop at ICANN66, Montreal, Canada

The ICANN Security and Stability Advisory Committee (SSAC) and the Internet Society Deploy360 Programme are planning a DNSSEC and Security Workshop on Wednesday, 06 November 2019, during the ICANN66 meeting held from 02-07 November 2019 in Montreal, Canada. The original DNSSEC Workshop has been a part of ICANN meetings for many years and has provided a forum for both experienced and new people to meet, present and discuss current and future DNSSEC deployments. more