/ Recently Commented

An Institute to Combat DNS Abuse

Over the last few years, it's become clear that abuse of the Domain Name System -- whether in the form of malware, botnets, phishing, pharming, or spam -- threatens to undermine trust in the Internet. At Public Interest Registry, we believe that every new .ORG makes the world a better place. That means anything that gets in the way of that is a threat, and that includes DNS Abuse. more

Facebook Is Right to Call the Australian Government Bluff

As mentioned in previous analyses, the way that the Government has approached its battle with the digital giants has been flawed from the beginning. True, its tough stand had made Google pay media companies well above what these companies would have been able to negotiate individually with Google, but the fundamentals of why these battles are taking place are still unchanged. more

ECFiber: Building a Fiber-to-Premises Network in the Rural United States

Nestled in the northeastern part of the United States is the small state of Vermont, the 14th State to join the United States in 1789. Its name comes from the French, in which 'vert montagne' means 'green mountain.' and it is known as the Green Mountain state. With only about 625,000 inhabitants, it is the 45th state out of 50 in size, and 49th of 50 in number of people, even less populated than Alaska. more

Now We Know Why It’s Hard to Get a .COM

As executive director of CALinnovates, an organization that advocates for innovation and startups, as well as a new business owner myself, I know how important a .COM domain name can be to a new company's online presence and marketing strategy. That's why I read with interest a new Boston Consulting Group report on how the .COM market is changing. I have a much better understanding of why new businesses find it hard to get relevant .COM domain names. more

What Are the Connected Assets of Confirmed Fake FBI Domains?

Two months ago, the Federal Bureau of Investigation (FBI) alerted the public to a list of domains that could easily be mistaken to be part of its network. The list of artifacts contained a total of 92 domain names, 78 of which led to potentially malicious websites, while the remaining 14 have yet to be activated or are no longer active as of 23 November 2020. more

3 Most Scary Attacks that Leaked Personally Identifiable Information (PII) of Millions of Users

Cybercriminals are increasingly targeting Personally Identifiable Information (PII). The reason being "data is the new gold" in this digital world, and the more sensitive some data is, the more value it has. There is no more sensitive data than personally identifiable information because it contains enough information to identify you digitally. Examples of personally identifiable information include name, email, contact number, address, social security number, tax file number, banking or financial information, and more such data that helps identify you. more

Emergence, Rise and Fall of Surveillance Capitalism, Part 1: Emergence

One of the consequences of the Jan 6th events is a renewed attention towards Surveillance Capitalism as a key doctrine undermining democracy. This 2-part series of articles discusses the emergence, rise, and fall of Surveillance Capitalism under the premise that the better we understand the danger at the door, the better we are able to confront it. more

WHOIS Record Redaction and GDPR: What’s the Evolution Post-2018?

We all use the Internet daily. Practically every element of our reality has its equal in the virtual realm. Friends turn into social media contacts, retail establishments to e-commerce shops, and so on. We can't deny that the way the Internet was designed, to what it has become, differs much. One example that we'll tackle in this post is the seeming loss of connection between domains and their distinguishable owners. more

Why the Internet is Not Like a Railroad

When one person transmits the speech of another, we have had three legal models, which I would characterize as Magazine, Bookstore, and Railroad. The Magazine model makes the transmitting party a publisher who is entirely responsible for whatever the material says. The publisher selects and reviews all the material it published. If users contribute content such as letters to the editor, the publisher reviews them and decides which to publish. more

The Netizen’s Guide to Reboot the Root (Part I)

In the world of ICANN and Internet policy, complexity is manufactured to create an illusion that issues are impenetrably technical such that normal and everyday principles can't apply. This causes a pervasive and entrenched phenomenon of eyes that glaze over at the mere mention of the word "ICANN" -- including those of government regulators and other officials that might otherwise take more of an active interest. more

More Warning Shots for ICANN, or the End of the Road?

Last fall, I wrote about ICANN's failed effort to achieve its goal of preserving the Whois domain name registration directory to the fullest extent possible. I predicted that if the policy effort failed, governments would take up the legislative pen in order to fulfill the long-ignored needs of those combating domain name system harms. That forecast has now come true through significant regulatory actions in the United States and the European Union in the form of a proposed directive from the European Commission (EC) and instruction from the US Congress to the National Telecommunications and Information Administration (NTIA). more

A Look Back at the World of IP Addressing in 2020: What Changed and What It Means

Time for another annual roundup from the world of IP addresses. Let's see what has changed in the past 12 months in addressing the Internet and look at how IP address allocation information can inform us of the changing nature of the network itself. Back around 1992, the IETF gazed into their crystal ball and tried to understand how the Internet was going to evolve and what demands would be placed on the addressing system as part of the "IP Next Generation" study.  more

Digital in 2021 – Five Predictions for Brand Protection

While smartphones were an integral part of our lives before 2020, now, as a result of the changes associated with COVID, our mobile devices are virtually "super-glued" to our hands. The worldwide pandemic has heavily influenced our lives. Based on our past experiences with digital brand protection and the trends we're currently seeing, we've made five predictions regarding the future of internet usage in 2021. more

.com Is A Clear and Present Danger to Online Safety

"The Internet is the real world now." This assessment was offered by Protocol, a technology industry news site, following the very real violence on Capitol Hill during the counting of the electoral college votes that officially determines the next president of the United States. The media outlet went on to say that, "[t]he only difference is, you can do more things and reach more people online -- with truth and with lies -- than you can in the real world." more

Trump’s Parting NTIA 5G Debacle

As Trump's horrific Administration of non-stop debacles and self-serving gambits headed toward the exit over the past few weeks, one last regulatory grab after another has been pushed out the door while the toddler-in-chief rants. Sure enough, the last of the 5G debacles just appeared in the Federal Register courtesy of the President's policy instrument, the National Telecommunication and Information Administration (NTIA). It was titled the 5G Challenge Notice of Inquiry. more