/ Recently Commented

Rodney Joffe on Security Vulnerabilities of Modern Automobiles

Rodney Joffe, Senior Technologist at Neustar, explaines that vehicles (beginning with 1998 models) are vulnerable to hacking, but manufacturers have been unable to fix the problem. In the video below, Joffe explains the challenge to cars and the possible threats that exist for other machines connected to a network. more

Core Internet Institutions Abandon the US Government

Milton Mueller from Internet Governance Project writes: "In Montevideo, Uruguay [last week], the Directors of all the major Internet organizations -- ICANN, the Internet Engineering Task Force, the Internet Architecture Board, the World Wide Web Consortium, the Internet Society, all five of the regional Internet address registries -- turned their back on the US government. With striking unanimity, the organizations that actually develop and administer Internet standards and resources initiated a break with 3 decades of U.S. dominance of Internet governance..." more

DotGreen Debrief: How the Applicant Auction Helps Mission-Driven Applicants

DotGreen announced on Friday that it has withdrawn its application for .green from ICANN's new gTLD program. We were surprised to hear the news, particularly after all of the effort that DotGreen has put into building a community and a movement around its application. While we at Innovative Auctions agree with Annalisa that the ICANN Last Resort auction would have been a poor choice for the DotGreen Community, we believe that the Applicant Auction is a great tool for single-string applicants who want to see their TLD used for a community purpose. more

DotGreen Is No More

Kevin reported on this last night. As you can see from the reactions to his post a lot of people are surprised, shocked and even quite upset that the DotGreen application has been withdrawn. It's not the only application for the string, which is why it was withdrawn, but to many people in the ICANN space it was the applicant everyone associated with the string. The unfortunate reality of the new TLD process is that money speaks more loudly than anything else. more

Domain Name Registrar Allows Completely Blank WHOIS

In a very casual and low-key footnote over the weekend, ICANN announced it would be further bypassing the Affirmation of Commitments and ignoring the WHOIS Review Team Report. There will be no enhanced validation or verification of WHOIS because unidentified people citing unknown statistics have said it would be too expensive... As a topic which has burned untold hours of community debate and development, the vague minimalist statement dismisses every ounce of work put in by stakeholders. more

Canadian Government Quietly Pursuing New ISP Code of Conduct

If approved, the code would technically be voluntary for Canadian ISPs, but the active involvement of government officials suggests that most large providers would feel pressured to participate. The move toward an ISP code of conduct would likely form part of a two-pronged strategy to combat malicious software that can lead to cybercrime, identity theft, and other harms. First, the long-delayed anti-spam legislation features new disclosure requirements for the installation of software along with tough penalties for non-compliance. more

Speaking up for the Internet

For most of this year governments from outside the G8 have not wavered from their essential themes on the Internet: they regard it as a shared resource that works in part as a result of their own investment in infrastructure, they want to be included in its governance through a decision-making process that is transparent, accessible and, in broad character, multilateral, and they want to be able to trust it and know that as much as it is a tool of growth for others, it can also be for them. more

In Which We Consider the Meaning of ‘Authorized’: GIVAUDAN FRAGRANCES CORPORATION v. Krivda

What does authorized access mean? If an employee with authorized access to a computer system goes into that system, downloads company secrets, and hands that information over to the company's competitor, did that alleged misappropriation of company information constitute unauthorized access? This is no small question. If the access is unauthorized, the employee potentially violated the Computer Fraud and Abuse Act (CFAA) (the CFAA contains both criminal and civil causes of action). But courts get uncomfortable here. more

ICANN and Your Internet Abuse

In spite of the material we were presented with in Durban something has gone very wrong inside of ICANN Compliance. KnujOn has published a report which demonstrates that ICANN Compliance appears to completely collapse between September 2012 and December 2012. Following December 2012, ICANN seems to stop responding to or processing any complaints. It is around this time certain compliance employees start disappearing. This was not limited to the Sydney office as some would have us believe... more

Privacy and the Future: Are We Good Trustees of the Internet?

Recently I was reminded of the words, "responsibilities and service to the community." To individuals involved in internet governance, these words should be well known. But have we lived by the code exemplified by these words? Have we lived up to the high standards that they represent? I have always been a student of history because it never fails to show me that humanity, on many occasions, tends to repeat the same mistakes. more

Looking Internally for the Success of Your TLD Strategy

Last week, I had the privilege of presenting at the Digital Marketing & gTLD Strategy Congress in London on how to create a TLD strategy and activate your path to market for launch. Some of the best and brightest minds in the industry attended and it was encouraging to hear from major brands such as Phillips, Microsoft, Google and KPMG, as well as a variety of other applicants. While in my previous blog I discussed why a .brand TLD strategy is important, let's now delve deeper into engagement strategies and why this is the key to a successful .brand. more

ICANN Opens GNSO Whois Study on Privacy/Proxy Abuse for Comment

ICANN has opened the Generic Names Supporting Organization (GNSO) Whois study on privacy/proxy abuse for public comment. Performed by the National Physical Laboratory (NPL), this study is one of many commissioned by the GNSO to examine the current, disparate, and often maligned registration directory service, and aims to measure the hypothesis that "a significant percentage of the domain names used to conduct illegal or harmful Internet activities are registered via privacy and proxy services to obscure the perpetrator's identity." more

23 Countries Ahead of U.S. in Internet Usage According to ITU Broadband Report

United States ranks 24th worldwide in the percentage of residents who use the Internet, according to the International Telecommunications Union's 2013 State of Broadband Report, released recently at a meeting of the Broadband Commission for Digital Development. Eighty-one percent of U.S. residents use the Internet, the ITU said. Countries with the highest percentage of people using the Internet was Iceland, where 97 percent of the people are Internet users. The top 10 countries all had usage rates above 88 percent. more

Phishing: A Look Into the E-Crime Landscape

At the recent Anti-Phishing Working Group meeting in San Francisco, Rod Rasmussen and I published our latest APWG Global Phishing Survey. Phishing is a distinct kind of e-crime, one that's possible to measure and analyze in depth. Our report is a look at how criminals act and react, and what the implications are for the domain name industry. more

New gTLD Registration Strategies: Preparing for the Inevitable

As we draw closer to the first new gTLD registry launch, many companies are beginning the arduous task of developing their new gTLD registration and blocking strategies. And after speaking with dozens of clients, I can tell you that the planned approaches are ranging from very minimal registration and blocking strategies for one or two core brands, all the way through to registrations of multiple brands in every single new gTLD registry. more