/ Most Viewed

ICANN Clarifying Questions - How to Respond (Part 2 of 3)

In the first part of this series on ICANN's impending Clarifying Questions period, I outlined what you can expect in terms of question structure. Here I would like to outline how the points work and provide some advice on how to answer questions for best success. more

ccTLD Market Share Catching Up to gTLDs, CENTR Reports

Council of European National Top level Domain Registries (CENTR) has released its latest quarterly Domain Name Stat Report stating that ccTLDs have continued increasing their market share against gTLDs -- this quarter rising from 44% to 45%. ccTLD IDNs continue to grow although at a slightly lower rate. more

Newer Cryptographic Advances for the Domain Name System: NSEC5 and Tokenized Queries

In my last post, I looked at what happens when a DNS query renders a "negative" response -- i.e., when a domain name doesn't exist. I then examined two cryptographic approaches to handling negative responses: NSEC and NSEC3. In this post, I will examine a third approach, NSEC5, and a related concept that protects client information, tokenized queries. The concepts I discuss below are topics we've studied in our long-term research program as we evaluate new technologies. more

European ccTLDs Have Reached 66.5 Million Registrations, CENTR Reports

According to the latest DomainWire, CENTR's quarterly report, european ccTLDs closed August 2014 with 66.5 million registrations -- a net growth of 0.3% over the past 3 months. Chart below shows growth rates (3m averages) for both European ccTLDs and legacy gTLDs over the past 12 months. It suggests a continued trend downward of both TLD types with a stabilization observed since July. more

Unexplained Glitch Disrupts Root-Server, Raises Security Concerns

For over four days, a crucial server within the Internet's domain name system (DNS) experienced an unexplained glitch, causing it to fall out of sync with its 12 peer root servers. The server, operated by Cogent Communications, is one of the 13 essential root servers that manage the Internet's root zone. more

ICANN Holding Its First North American Meeting Since 2014 in Puerto Rico

As ICANN wraps up its Annual General Meeting in Abu Dhabi, the organization is inviting participation in its 61st ICANN meeting in San Juan, Puerto Rico, from 10–15 March 2018. more

I Didn’t Put My Name on the Census

On many occasions I have written about the dangers of electronic communications in relation to data retention laws, government e-spying and other activities undermining our democracy and our liberty. To date governments still have to come up with evidence that all of this spying on their citizens has prevented any terrorist attacks. Terrorism has been given as the key reason for the government's spying. more

Competing Processes Obfuscate Internet Policy-Making in India

Net Neutrality has become a hot topic in India, following a brief but high-profile national debate instigated by a consultation paper from the Telecom Regulatory Authority of India (TRAI) that solicited views on what net neutrality is, and whether regulations protecting it are needed in India. The paper also hinted at possible regulation of all kinds of online services (like Skype, Uber, or Google) in the future. But no-one could have predicted what happened next... more

Study Indicates Nearly Half A Million Jobs Created from “App Economy” in US

A new study reveals close to 466,000 jobs have been created in the "App Economy" in United States -- up from zero in 2007. The total number of Apps Economy jobs includes jobs at 'pure' app firms such as Zynga as well as app-related jobs at large companies such as Electronic Arts, Amazon, and AT&T, as well as app 'infrastructure' jobs at core firms such as Google, Apple, and Facebook. In addition, the App Economy total includes employment spillovers to the rest of the economy. more

Exploiting Video Console Chat for Cybecrime or Terrorism

A couple of days ago there was a lot of interest in how terrorists may have been using chat features of popular video console platforms (e.g. PS4, XBox One) to secretly communicate and plan their attacks. Several journalists on tight deadlines reached out to me for insight in to threat. Here are some technical snippets on the topic that may be useful for future reference. more

Obama to Sign Executive Order for Streamlining Approval of Internet Networks

Currently, the process for approving broadband construction projects on federal property varies from agency to agency. Property controlled by the federal government includes roads, about 30 percent of the nation's land and more than 10,000 buildings. The order will require the Departments of Agriculture, Commerce, Defense, Interior, Transportation and Veterans Affairs as well as the Postal Service to develop a single process for approving Internet construction projects. more

Lessons From an E-Voting Debacle

There has been a significant focus over the past two years on the vulnerability and cyber threat risks faced for voting systems at the local level. That focus has typically been on State and local jurisdictions like cities, counties and towns, and resulted in the creation of the DHS Elections Infrastructure Information Sharing and Analysis Center (ISAC) to assist. However, there are other local governance entities at significant risk as well. more

NTAG Chair Blog: A Better Auction Framework

New gTLD Applicants now have a more fair and reasonable ICANN auction framework. A collaborative negotiation between the New TLD Applicant Group (NTAG) Auctions Working Group and ICANN Staff resulted in changes that improve the auction rules and bidder agreement. The indemnification and waivers in the agreement are now aligned with breaches that applicants can control. Applicants also now have an indemnification from Power Auction for third party claims related to IP infringement. more

Botnets: Most Prevalent Threat on the Internet for the Enterprises

Based on the total number of transactions, Zscaler reports botnets as the biggest security risk on the Internet for the enterprises. "Once a host gets infected, the botnet usually spreads quickly within an enterprise. It also generates a significant amount of traffic to the command and control server, to download additional malware or perform other actions." more

Data Broker Reported to Have Exposed a Database Containing Close to 340 Million Individual Records

A data broker based in Palm Coast, Florida, is reported to have exposed a database that contained close to 340 million personal records on a publicly accessible server. more