The Domaining Europe conference began in Valencia, Spain almost a decade ago and the first seven shows in the annual series were staged at the Hotel Sorolla Palace there. In 2016 conference founder Dietmar Stefitz decided to take the show on the road, staging that year's event in The Hague, Netherlands, followed by the 2017 show in Berlin, Germany this past May. more
A recent report by Pingdom looks at the booming growth of Internet's DNS infrastructure. From the article: "Five years ago there were 123 DNS root server sites (the "backend" of DNS) spread out on the Internet. Today there are more than twice as many, over 300. Five years ago, 46 countries had root servers. Today, 76 have them. In other words, not only has the number of root servers grown tremendously, but their geographical spread has increased as well. This is good news for the overall stability and performance of DNS worldwide." more
A group of ISPs on wednesday told U.S. Congress that passing new cybersecurity rules affecting broadband and mobile service providers is counterproductive and should be resisted. Jason Livingood, vice president of Internet systems engineering at Comcast, during a hearing before the U.S. House of Representatives Energy and Commerce Committee's communications subcommittee, said: ISPs have "strong incentives" to secure their networks and invest heavily in cybersecurity because of competition. more
To some applicants, ICANN's variant management policy in DAG4 has become a big obstacle to the new generic Top-Level Domain (gTLD) application. The policy is to delegate the string while reserving the variants, and these variants will not be delegated until a sound mechanism is developed and the desired variants are evaluated. But for some languages, Chinese for example, the so called string and its variant, namely simplified Chinese and traditional Chinese, are equivalent and must be simultaneously delegated. more
In my last post, I looked at what happens when a DNS query renders a "negative" response -- i.e., when a domain name doesn't exist. I then examined two cryptographic approaches to handling negative responses: NSEC and NSEC3. In this post, I will examine a third approach, NSEC5, and a related concept that protects client information, tokenized queries. The concepts I discuss below are topics we've studied in our long-term research program as we evaluate new technologies. more
The story of computing and communications over the past eighty years has been a story of quite astounding improvements in the capability, cost and efficiency of computers and communications. If the same efficiency improvements had been made in the automobile industry cars would cost a couple of dollars, would cost fractions of a cent to use for trips, and be capable of travelling at speeds probably approaching the speed of light! more
Today, in U.S. Patent and Trademark Office v. Booking.com, the Supreme Court of the United States has affirmed that generic terms including .com domain names may be trademarked when consumers do not perceive the mark to signify the class of services, with heightened distinctiveness and recognition attributable to top-level domains that add meaning like .club, .guru, and .vip. more
I have been having a number of conversations recently with several clients and colleagues about "semantics". It's clear that there is not a lot of clarity on this philosophical subject! Whilst is may be an obscure issue, it is a very important one. Our ideas lead us to take actions, and if we want those actions to have the consequences we had in mind, then we need to have done our epistemological homework. more
When it comes to protecting the end user, the information security community is awash with technologies and options. Yet, despite the near endless array of products and innovation focused on securing that end user from an equally broad and expanding array of threats, the end user remains more exposed and vulnerable than at any other period in the history of personal computing. more
A glitch in Google's security update on Saturday morning caused links to every search result -- including Google's own pages -- to get flagged with the warning: "This site may harm your computer." The errors caused panic among users around the world who at first feared the popular search engine had suffered a major security failure. The problem which lasted for approximately 40 minutes has now been acknowledged and fixed by Google. The reason for the hiccup, as explained by Google, was due to a human error in the list of URLs Google uses to identify and flag websites known to install malicious software. more
Internet Society President and Chief Executive Officer Lynn St. Amour today announced that she will leave the Internet Society in February 2014 at the conclusion of her contract. St. Amour joined the Internet Society in 1998 as Executive Director of its Europe, Middle East, and Africa division. She became Executive Director and Chief Operating Officer in 1999 and was appointed President and CEO in March of 2001. more
Essentially everyone in the computing field has heard how the creation of ICANN absolutely changed the development of the Internet and the organization of the Domain Name System (DNS). Consequently, the growth of ICANN promoted the deliberation about New Internet Trends. The blog is structured as an interview with Eugenio Triana who was one of ICANN's nine initial directors in October 1998. more
Brexit will impact many things. One that has not been getting much attention, however, is domain names and more specifically .eu domains. Under the current regulations, you need to be a resident of the European Union to register a .eu domain name. As I covered in a blog post last year, there is the potential for hundreds of thousand of .eu domain names being pulled overnight. more
While having a backup plan is usually a good idea, it's often not an effective way to obtain someone else's domain name - at least not when Plan B consists of a company filing a UDRP complaint with the hope of getting a domain name to which it is not entitled and could not acquire via a negotiated purchase. "Plan B" as a derogatory way of describing an attempted domain name acquisition usually arises in the context of a domain name that is not protected by exclusive (or any) trademark rights, or where the complainant clearly could not prevail in a UDRP proceeding. more
US House of Representatives’ committee on energy and commerce has sent a letter to John Hanke, CEO of Niantic, Inc. - the maker of the game Pokémon Go under a license from Nintendo - inquiring about the impact of the game on consumers' mobile data usage: more