/ Most Viewed

A Targeted Blueprint for Tackling DNS Abuse

The NetBeacon Institute is pleased to publish its White Paper: Proposal for PDPs on DNS Abuse. We created this paper to support and advance ICANN Community discussions on potential policy development related to DNS Abuse. From our unique perspective, we believe there are a number of issues that are constrained enough to be a successful ICANN PDP and can make a meaningful difference in our collective work against DNS Abuse. more

Internet Stewardship Transition Critical to Internet’s Future

This article was co-authored by Ambassador Daniel A. Sepulveda, serving as U.S. Coordinator for International Communications and Information Policy at the U.S. Department of State, Christopher Painter, serving as Coordinator for Cyber Issues at the U.S. Department of State and Scott Busby, serving as Deputy Assistant Secretary of State for Democracy, Human Rights and Labor. ... The growth of the global Internet as an open platform for innovation and economic and social development has succeeded in large part because of its multistakeholder system of governance. more

World’s Largest DDoS-for-Hire Service Taken Down in Major International Probe

Webstresser.org, considered the world’s biggest marketplace to hire DDoS services, has been taken down according to an announcement issued today by the European Union Agency for Law Enforcement (Europol). more

Happy Birthday, Internet!

Oh, Internet. You had such potential when you were born — darling of the research community, supported by the wealthiest military the world has ever known. And you married well, into a powerful merchant family. Why are you so lost? Is it a midlife crisis? You were born, some say, 40 years ago this week in a lab at UCLA — one of ARPA's many children. It wasn't until nearly two months later that you first spoke, transmitting the letters "L" and "O" before crashing... more

The Blurr-Cade Proposal on Root Zone Oversight

Becky Burr (former NTIA official) and lobbyist Marilyn Cade has made a proposal to create a multilateral working group to oversee the root zone file updates. I would characterize the Burr-Cade proposal as a "small step for mankind and a giant step for the US" to paraphrase Neil Armstrong. The main merit of the proposal is that it looks like something the USG might want to follow. Sevaral people suggested there should be no governmental oversight at all but that does not look realistic, in the sense that there can be huge economic and political interests behind ICANN decisions. more

Working Group on Internet Governance Releases Report

The Working Group of Internet Governance has released its final report [PDF]. As I wrote this week in my Law Bytes column, the report comes on the heels of the U.S. statement that it has no intention of surrendering control of root zone file. The WGIG report developed a working definition of Internet governance that states: "Internet governance is the development and application by Governments, the private sector and civil society, in their respective roles, of shared principles, norms, rules, decision-making procedures, and programmes that shape the evolution and use of the Internet."... more

Is It Time for a Registration Operations Industry Association? (Part 2)

In Part 1 of this series of blog posts I described the need for an industry association of operators to discuss the technical tasks, such as the development, deployment, and ongoing systems administration of the Extensible Provisioning Protocol (EPP), performed by registries and registrars to ensure interoperability and share best practices when providing registration services. In this blog post I'll describe a way to make that happen. more

Verisign Provides Open Source Implementation of Merkle Tree Ladder Mode

The quantum computing era is coming, and it will change everything about how the world connects online. While quantum computing will yield tremendous benefits, it will also create new risks, so it's essential that we prepare our critical internet infrastructure for what's to come. That's why we're so pleased to share our latest efforts in this area, including technology that we're making available as an open source implementation to help internet operators worldwide prepare. more

WHOIS Redux: Demand Privacy in Domain Name Registration

Doc's post and the impending comments deadline for the next iteration of ICANN's never-ending WHOIS saga finally pushed me to write up my thoughts on the latest iteration of ICANN debate. As Doc points out, much of the current debate is very inside baseball, tied up in acronyms atop bureaucratic layers. Small wonder then that ordinary domain name registrants and Internet users haven't commented much, while the fora are dominated by INTA members turning out responses to an "urgent request" to "let ICANN know that Whois is important to the brand owners I represent"... more

Cloud Is the New Mainframe

Cloud computing, from a business and management perspective, has a great deal in common with mainframe computing. Mainframes are powerful, expensive and centralized pieces of computing equipment. This is in line with their role as infrastructure for mission-critical applications. For these types of applications, mainframes can be fairly efficient, even though they tend to need large teams of support specialists... Cloud computing is a new style of computing... more

Afilias’ Cynical Attempt to Secure a Windfall at Community Expense

On Friday, October 28, Afilias issued a public statement urging the Internet Corporation for Assigned Names and Numbers (ICANN) to nullify the results of its July 27, 2016 public auction for the .web new generic top level domain (gTLD) -- in which Nu Dotco, LLC (NDC) submitted the highest bid for .web -- and disqualify NDC from participation in the .web contention. The real issue here is whether ICANN should enforce the results of a fair and competitive public auction... more

30 Years Ago Today, the Switch to TCP/IP Launched Today’s Internet

It was 30 years ago today, on January 1, 1983, that the ARPANET had a "flag day" when all connected systems switched from using the Network Control Protocol (NCP) to the protocols known as TCP/IP. This, then, gave rise to the network we now know as the Internet. more

UN Cyber Diplomacy II: Cybersecurity and Autonomous Weapon Systems

Cybersecurity and artificial intelligence were among the key topics at the 79th UN General Assembly (UNGA). UNGA's 1st Committee, responsible for disarmament and international security, concluded its negotiations in mid-November 2024. It discussed the 3rd Annual Progress Report (APR) of the Open-Ended Working Group (OEWG) and adopted a resolution that recommends, inter alia, the establishment of a new permanent cybersecurity mechanism within the UN system. Furthermore, it adopted two resolutions on autonomous weapon systems (AWS). more

Can’t Connect… Won’t Connect

BBC technology correspondent Rory Cellan-Jones must be hoping that his near neighbours don’t decide they want a larger family. He recently spent ages setting up a high-speed wireless network at home, documenting the whole tortuous process on the BBC Technology blog, but all his hard work could apparently be ruined by a single baby listener in the neighbourhood... more

Feds Shut Down File-Sharing Website Megaupload.com, Seven People Charged

Federal prosecutors in Virginia have shut down one of the world's largest Internet file-sharing sites, Megaupload.com, charging its founder and others with violating piracy laws, the Associated Press reports today. "The indictment was unsealed Thursday, one day after websites shut down in protest of two congressional proposals [SOPA & PIPA] intended to thwart the online piracy of copyrighted movies and TV programs." more