In a recent video interview conducted while he attended the World Economic Summit in Davos, Switzerland, ICANN CEO Fadi Chehade stated "legitimacy comes from accountability". That statement is correct. It is also troubling, in that many of ICANN's recent policies and activities raise serious questions regarding whether it is sufficiently accountable and therefore perceived as acting in a legitimate manner - as well as whether it is continuing to faithfully abide by the Affirmation of Commitments (AOC) it entered into when the US government terminated direct oversight of ICANN in 2009. more
With the recent passing of Paul Baran, IFTF is releasing an excerpt of a 1971 report in tribute, entitled "Brief descriptions of potential home information services." The excerpts are from the report titled, Toward a Study of Future Urban High-Capacity Telecommunications Systems, which included a handbook of forecasts for what was then called "broadband telecommunication and information services," later known as the Internet. more
When ICANN launched the new gTLD program five years ago, Amazon eagerly joined the process, applying for .AMAZON and its Chinese and Japanese translations, among many others. Our mission was -- and is -- simple and singular: We want to innovate on behalf of our customers through the DNS. ICANN evaluated our applications according to the community-developed Applicant Guidebook in 2012; they achieved perfect scores. more
I've watched coverage of Microsoft's bid for Yahoo! and the related maneuvering between Google and Yahoo!. The explanations are not very convincing. Microsoft doesn't need Yahoo's search technology or their morale-impacted work force. Yahoo's search market share continues to decline and there's little of strategic relevance in the rest of their business. What's the attraction? more
New research has uncovered evidence of spammers establishing their own fake URL-shortening services for the first time. According to the latest MessageLabs Intelligence report, shortened links created on these fake URL-shortening sites are not included directly in spam messages; instead, the spam emails contain shortened URLs created on legitimate URL-shortening sites. "Rather than leading directly to the spammer's final Web site, these links actually point to a shortened URL on the spammer's fake URL-shortening Web site, which in turn redirects to the spammer's final Web site." more
The terms Digital Sovereignty or Souveraineté numérique have recently risen in prominence to describe the international rule of law as it applies to information and communication technologies. At a time when disinformation is proliferating and the rule of law, democracy, and human rights, together with long-standing relationships, are being cast aside, digital sovereignty is scaling in importance as a key defensive measure among many nations. more
Yesterday, egregious financial truth-tellers (a client of ours at easyDNS) ZeroHedge broke the news that parties unknown, engineered what looks to be a textbook "pump-and-dump" on Twitter's stock by putting up a fake "Bloomberg Financial News" site on the domain bloomberg.market and proceeded to run a story on it about Twitter being acquired. The story spread and shares of Twitter stock promptly spiked on volume, Twitter finishing the day on nearly double the average daily volume. more
As the global digital order enters an era of intensifying geopolitical tension, debates over digital sovereignty have re-emerged as a defining fault line in Internet governance. At stake is not merely who controls data or infrastructure within national borders but whether the vision of a globally interoperable, open Internet, one of WSIS's founding principles, can be meaningfully sustained. more
One of the major principles of the architecture of the Internet was encapsulated in a paper by Saltzer, Reed and Clark, "End-to-End Arguments in System Design". This paper, originally published in 1981, encapsulated very clearly the looming tension between the network and the application: "The function in question can completely and correctly be implemented only with the knowledge and help of the application standing at the end points of the communication system. Therefore, providing that questioned function as a feature of the communication system itself is not possible." At the time this end-to-end argument was akin to networking heresy! more
The proposed new European Union (EU) Artificial Intelligence Act has been extolled in the media as a bold action by a major legislative body against the perceived dangers of emerging new computer technology. The action presently consists of an initial proposal for a Regulation with annexes from 2021, plus recent Amendments adopted on 14 June. This regulatory behemoth exists entwined among a multitude of other recent EU major regulations... more
For complainant, the second leg in determining cybersquatting under the Uniform Domain Name Dispute Resolution Policy (UDRP) is evidence respondent lacks both rights and legitimate interests in the challenged domain name (Paragraph 4(a)(ii)). I underscore "both" because proving one but not the other is not good enough. This seems obvious, so why suggest there is something to explore about "rights" and "legitimate interests" if their meanings hardly need explication? more
Attacks on ICANN are coming from several different directions, and the list of concerns includes "cybercrime and protection of intellectual property rights."... First, it's not apparent to me that any government can "control" the internet -- and it's even less likely that that control can happen through the DNS. The most that governments will do will be to build walls between nations, requiring their ISPs to point only to approved sites. (China is well on its way to doing this already.) That's not controlling the Internet, that's creating different, national Internets. more
Neustar, the registry operator of the .US domain and NTIA have reversed course, allowing the inclusion of previously restricted "seven dirty words" from future .US domain name registrations. more
After the court's decision, the PTA ordered all the operators in the country to block the website, www.facebook.com, until further orders. It said the directives had been issued by the ministry of information technology and telecommunication in view of the LHC's order. All the ISPs of Pakistan have blocked access to all the hosting servers of www.facebook.com. ...all the Mobile Network Operators of BlackBerry Services in Pakistan were also trying to block access to the FaceBook.com but they could not do it because the Blackberry Services are routed through RIM... more
The following provides and introduction to a study by Venugopalan Ramasubramanian and Emin Gun Sirer, called "Perils of Transitive Trust in the Domain Name System". The paper presents results from a large scale survey of DNS, illustrating how complex and subtle dependencies between names and nameservers lead to a highly insecure naming system... "It is well-known that nameservers in the Domain Name System are vulnerable to a wide range of attacks. We recently performed a large scale survey to answer some basic questions about the legacy DNS." more