/ Most Viewed

Al’s Story: Another Small Domain Holder Falls Victim to Flawed ICANN Policy

Al Bode is typical of the many small, individual domain name holders throughout the United States and the world. He is a high school teacher of the Spanish language, not a techie, and he registered the domain IOWAWLA.ORG to provide an online presence for the Iowa World Language Association, a professional association for foreign-language educators in the US State of Iowa, of which he is a member. This domain could in no way be considered a commercial venture. In his own words, "I am a school teacher from Iowa whose websites are personally funded for the express purpose of education. There is no profit motive or even profit other than the knowledge that others may gain from my website." more

Should Domain Names be Considered ‘Contracts for Service’ or ‘Property Rights’?

The legal status of domain names is one of the most hotly debated topics with regards to evolving property rights and how they should be applied to technological and intellectual property 'innovations' in cyberspace. At present, there are two opposing factions on this topic: On one hand, there are those who maintain that domain names should be considered as contracts for services, which originate from the contractual agreement between the registrant and the registrar. more

WIPO Crowing Again About “Cybersquatting”

Most of us would be put off if a court issued a press release cheering the number of prisoners its judges had put behind bars or the number of tenants it had helped landlords to evict. That seems antithetical to the neutral adjudication of disputes, and ethical rules regularly decry such "appearance of bias." Yet WIPO seems to think it perfectly natural to crow about its arbitrators' favoritism for complainants against "cybersquatters" in UDRP proceedings. It issued a release that reads like a solicitation for trademark claimants' business, not a promotion of neutral arbitration services... more

In Pursuit of IDN Perfection?

Many of the problems of IDNs come from trying to do multiple languages at the same time or languages one can't read. The biggest difficulty is implementing them in gTLDs like .com or .org. I think that if we focus on helping the country level TLDs (ccTLDs) get going with IDNs in their own native languages, we would be solving the problem for 80% or so of the people. My concern is holding up the ability for these people to use IDNs because we can find the perfect solution for the edge cases. more

Apple Under Fire for Removing VPN Apps from Russia’s App Store

Apple has reportedly removed nearly 60 VPN apps from its Russia App Store, significantly higher than the 25 VPNs acknowledged by Russian authorities, according to a recent report by the App Censorship Project. more

Post Delegation Dispute: A Once Supportable Concept Proposed by the IRT is Now Unsupportable

This comment is being presented in my personal capacity and does not represent the views of my employer (Neustar, Inc.) and its subsidiaries or affiliates, or the Implementation Recommendations Team. Ok. I admit it. I supported the concept of a post delegation dispute resolution process for generic Top-Level Domains (gTLD) Registries. I served as the only gTLD registry member of the Implementation Recommendation Team (IRT) appointed by the Intellectual Property Constituency of the Generic Names Supporting Organization of ICANN. I was one of the authors of the IRT Recommendation in favor of a Post Delegation Dispute Resolution Procedure. more

Ukrainian Representatives to ICANN Ask for Russia’s Domain to Be Revoked, Local DNS Root Servers Shut Down

A letter sent to ICANN and IANA by a Ukrainian representative to ICANN’s Government Advisory Council (GAC) asks for urgent and strict sanctions against the Russian Federation in “the field of DNS regulation.” The letter urges ICANN to permanently or temporarily revoke Russia’s top-level domains “.ru”, “.рф” and “.su” and to shut down DNS root servers located in Saint Petersburg and Moscow. more

Google Voice Dispute Highlights an Opportunity for Mobile Network Operators

The recent row between Google, Apple and AT&T concerning the removal of Google Voice from the Apple iPhone store highlights the friction existing between network operators and so-called over the top (OTT) application providers. Most observers believe that AT&T initiated the blockade because Google Voice (which offers free or highly discounted calling rates) is a direct threat to AT&Ts call revenue (Google Voice users need only pay AT&T for access to the Internet). more

Who Controls Spectrum in the USA?

In the wake of the unprecedented boom in mobile broadband, pressure is building around the world for governments and regulators to act quickly and decisively to the frantic demand for more spectrum. The telcos are leading the charge, but the broadcasters are lobbying for their case equally vigorously. The broadcasters do not necessarily need all the spectrum they currently have, but they view mobile broadband and telcos as competitors to their monopoly on video entertainment, so they will do everything to keep them out of that market for as long as possible. more

New Internet Study Finds Web and Streaming Higher Than P2P Traffic

ipoque, a European deep packet inspection hardware provider has published an Internet study for 2008/2009 providing an overview of the Internet's current state based on analyzing 1.3 petabytes of Internet traffic -- "the amount of data equal to 300,000 DVDs" -- in eight regions of the world (Northern Africa, Southern Africa, South America, Middle East, Eastern Europe, Southern Europe, Southwestern Europe, Germany). The study includes the use of about 100 of the most popular Internet protocols including P2P, VoIP, media streaming, instant messaging. more

Abusive and Malicious Registrations of Domain Names

When ICANN implemented the Uniform Domain Name Dispute Resolution Policy (UDRP) in 1999, it explained its purpose as combating "abusive registrations" of domain names which it defined as registrations "made with bad-faith intent to profit commercially from others' trademarks... Bad actors employ a palette of stratagems, such as combining marks with generic qualifiers, truncating or varying marks or by removing, reversing, and rearranging letters within the second level domain (typosquatting). more

Active and Passive Internet of Things

"The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it." -Mark Weiser ...The Internet of Things is a step in this very direction. And like all things new and mysterious, it has its fair share of utopian and dystopian soothsayers; with an almost certain probability that neither of their deterministic predictions will completely come to fruition in the future. more

More than 99% of Email is Spam?

One of my pet peeves is the headline "n %" of email is spam, it is inherently misleading, and conveys no useful data. I guess it makes for great newspaper headlines then! On our servers looking at one email address for 4 hours, we saw 208 attempted connections for SMTP traffic referring to this email address. ...One can't measure spam in relation to the amount of genuine email, because the amount of genuine email is not connected to the amount of spam... more

2011 Domain Name Year In Review: Top 10 Biggest Domain Stories

Who would have ever believed that .XXX would finally be approved AND launched, total domains registrations would continue to grow at 10% year over year, ICANN would be in the process of preparing for the launch of new gTLDs in the face of harsh criticism, and that both Go Daddy and Group NBT would be acquired by private equity firms. As we look back over the past year, here are the top 10 biggest domain stories of 2011. more

How You Can Be Hijacked Without Actually Being Hacked

Unsuspecting website visitors are often unaware when they have landed on a spoofed page or are re-directed to malware-hosting web servers designed to steal their sensitive data and information. This attack is known as subdomain hijacking, or subdomain takeover. A web user's private information is then traded on the dark web, and cybercriminals profit, further fueling the expansion of identity theft in the online world. more