I ran into a Reuters headline today, which illustrated to me the pace at which some legislative bodies operate. Yes, this .kids idea is timely. It is an idea so good, that I remember multiple different bidders proposing it in the initial wave of new TLDs laid in front of ICANN back in 2000. The contenders all had fantastic presentations and capabilities, which I heard voiced in the Marina Del Rey ICANN meetings as the 44 initial proposals were culled into seventeen, and then into the seven... more
Without commenting on the particulars as they relate to Goodmail -- especially since I am on the advisory board for Habeas, a competitor -- let me note that public discussion is largely missing the nature of the current Internet mail realities and the nature of the ways we can deal with them. There are two articles in the current issue of the Internet Protocol Journal, of which I wrote one, that provide some useful background about this reality. Simply put, Internet mail needs to sustain spontaneous communications... more
As I do every day, I was perusing Twitter and came across a link for a Business Insider piece on the world's most popular websites by country. Two researchers used web traffic data from Alexa to visually display each country's most visited website. It's an interesting read... But I couldn't help but wonder what the most popular website based in each country was. So, I put the Dyn research team to work and they came up with a comprehensive list. more
The long awaited Service Concession Contract to operate the .eu registry was signed yesterday (Oct. 12). Now the European Commission will formally notify ICANN of the selected registry operator allowing official negotiations to commence between EURid and ICANN to have .eu put in the root. According to the press release, registrations could begin in six to nine months... more
Most people who have wireless Ethernet at home, or the office, connect to the wireless network by attaching to a wireless Access Point, or AP. This method of wireless networking is called "Infrastructure Mode". If you have a secure wireless network configured in "Infrastructure Mode" you are using MAC address filtering, some level of encryption, and have made some additional changes to your AP in order to prevent just anyone from using it or capturing data. ...However, for those who are not using "Infrastructure Mode", and are configured to communicate from machine to machine, or "Ad-Hoc", there are a few things you should be aware of. more
Rep's Graves and Sinema recently introduced H.R. 4036, the catchily named Active Cyber Defense Certainty Act or ACDC act which creates some exceptions to criminal parts of computer crime laws. Lots of reports have decried "hack back" but if you read the bill, it's surprisingly well targeted. The first change is to what they call Attributional Technology, and says it's OK to put bait on your computer for an intruder intended to identify the intruder. more
Security for Internet-connected devices, the "Internet of Things" (IoT), is critically important. Now, more than ever, it is top of mind for device manufacturers, network operators, consumer advocates, lawmakers, and government regulators -- domestically and internationally. In the face of recent attacks, government authorities and consumer advocates have proposed legislation, frameworks, certifications, and labeling schemes. more
When domain names expire they leave skeletons - networks of inbound links that continue to funnel traffic to that name, even if ownership has changed. Via eWeek, we learn that Microsoft owned HARDWARE-UPDATE.COM and used the name for a site featuring Windows drivers. The domain name is embedded in various error messages in Windows 2000. However, Microsoft did not renew the domain name and Ultimate Search, a company that specializes in this sort of thing, scooped it up. Now the page provides sponsored links, courtesy of Overture. The article reports that the top sponsored link pays over $3 a click-through. more
The UN's WSIS Prepcomm in Geneva has ended on a divided note. The US Government's Ambassador Gross pre-announced war-cry "The United Nations will not be in charge of the Internet. Period." had been met by a nearly unanimous global response from nations for some sort of government control of the Internet on a multilateral basis. A raft of proposals to alter the current situation are on the table -- most of them fairly benign, but none supportive of the indefinite continuance of unilateral US control of the root zone authorisation. more
From 5 April to 14 May 2004 trade mark owners can apply in the .pro domain for defensive registrations corresponding to their marks. The .pro domain is only available to doctors, lawyers and CPAs during this period, known as a "sunrise period". ...During the period when the creation of ten new generic domains is being discussed, it seems timely to wonder whether the multiplicity of generic extensions is not killing the specificity inherent of each of them. In addition, having a "sunrise period" for this new domain might be perceived by trade mark owners as an invitation to spend money rather than as a measure aimed at protecting their intellectual property rights. more
The North American Network Operators Group (NANOG) conference, a gathering of Internet Service Provider (ISP) engineers and vendors convenes three times a year for mostly technical conversation along with social networking. The recent NANOG conference in Reston Virginia saw some unusually direct talk about Spam and the ISPs that tolerate it from America Online's Postmaster, Charles Stiles. more
Last month, John Klensin wrote an article published here on CircleID regarding Internationalized Domain Names (IDN) Top Level Domains (TLD). Based on his Internet Draft, John suggests using language translation in the application for TLD. The advantage of this method is that all existing TLDs can now be represented in any number of languages without additional need for ICANN to create new TLD. While this sounds like a clean solution to the IDN TLD problem, I don't think it is viable for the following five reasons... more
Most people, even seasoned IT professionals, don't give DNS (the Domain Name System) the attention it deserves. As TCP/IP has become the dominant networking protocol, so has the use of DNS... Due to the reliability built into the fundamental RFC-based design of DNS, most IT professionals don't spend much time worrying about it. This can be a huge mistake! more
Google has signed an agreement with the Cuban government allowing internet users on the Communist-run island quicker access to its branded content. more
The basic problem posed by WSIS was the role of national governments and national sovereignty in global Internet governance. That conflict remains completely unresolved by the WSIS document. The document's thinking is still based on the fiction that there is a clear divide between "public policy" and the "day to day operation" of the Internet, and assumes that governments should be fully in control of the policy-setting function. Moreover, new organizational arrangements are being put into place which will carry on that debate for another 5 years, at least. The new Internet Governance Forum is a real victory for the civil society actors, but also fails to resolve the basic issue regarding the role of governments and sovereignty. Although called for and virtually created by civil society actors, the language authorizing its creation asks to involve all stakeholders "in their respective roles." In other words, we still don't know whether this Forum will be based on true peer-peer based interactions among governments, business and civil society, or whether it will reserve special policy making functions to governments. more