/ Most Viewed

SnapNames: Why the WLS is Better for Consumers

In 2002, VeriSign, the registry for .COM and .NET domain names, proposed the idea of a centralized, registry-level "wait list" for currently registered domain names. The system would let anyone around the world get "next in line" for a name that is registered now but may become available later.

This new registry service, titled Wait List System (or WLS), would augment what is now an ad-hoc group of registrar-level services that are useful, but aren't always fully dependable or even available to the general public. more

XXX Litigation Looms

The XXX drama isn't over. Today ICM Registry announced that it would file a reconsideration request with ICANN and a judicial appeal to challenge redactions and omissions from the internal US government documents released to it under a Freedom of Information Act (FOIA) request. These could prove to be opening moves in a more extended round of litigation. In connection with its judicial appeal, ICM Registry released 88 pages of internal US Commerce Department documents obtained under the FOIA showing how the U.S. handled its application. more

Alphabet to Shut down Loon, its Balloon Based Internet Access Project

Despite several groundbreaking technical achievements over the past nine years, Google's parent company Alphabet has decided to end the Loon project. The company said the road to commercial viability has proven much longer and riskier than hoped.  more

Massive Spam and Malware Campaign Following Boston Tragedy

On April 16th at 11:00pm GMT, the first of two botnets began a massive spam campaign to take advantage of the recent Boston tragedy. The spam messages claim to contain news concerning the Boston Marathon bombing, reports Craig Williams from Cisco. The spam messages contain a link to a site that claims to have videos of explosions from the attack. Simultaneously, links to these sites were posted as comments to various blogs. more

IPv4 Addresses Not Property, Canada Weighs in on the Nortel/Microsoft Transfer

The recent tempest in a teacup on ARINs PPML list over the transfer of IP address blocks from Nortel (a company in Chapter 11) to Microsoft has some interesting Internet Governance dimensions that are yet to be discussed. One aspect that has been overlooked amidst all the sound and fury, is the governmental perspective on IP address transfers. more

ISPs Saw a 30% Increase in Traffic During the Pandemic, 40% During Peak Business Hours

ISPs in the U.S. saw a significant surge in both downstream and upstream traffic, increasing at least 30% and as much as 40% during peak business hours and as much as 60% in some markets, according to a new report from the Broadband Internet Technical Advisory Group (BITAG).  more

Building Caribbean Internet Infrastructure… One IXP at a Time

Encouraging the development of Internet-based services and accelerating the development of local content are often touted as noble objectives. It is also widely acknowledged that reaping the benefits of technology is dependent on reducing Internet connectivity and bandwidth costs, improving infrastructure, and improving quality of service to all Internet users. Yet in a region with over 20 million potential Internet users and great ambitions to create a "knowledge-based society" and develop "technology-driven economies", the cost of access remains prohibitively high and there is a glaring absence of critical Internet infrastructure. more

ICANN Workshop Displays Diverging Perspectives on WHOIS

At a workshop held in late June in Montreal (Canada) -- Karl Auerbach had submitted some live coverage to CircleID --, the Internet Corporation for Assigned Names and Numbers (ICANN) had an in-depth look at various aspects of the Internet's WHOIS databases. These databases associate social information (like holders' names and contact information) with network identifiers, such as IP addresses and domain names. Current policy for these databases -- in particular in the generic top level domain area -- is part of ICANN's contracts with domain name retailers ("registrars") and database operators ("registries"), and permits for use of the data by arbitrary parties for arbitrary purposes. more

U.S. Military Is Buying Location Data of People Around the World Through Ordinary Apps

The U.S. military is buying the granular movement data of ordinary people worldwide, harvested from innocuous-seeming apps, reports Motherboard. Among the apps connected to this type of data sale is a Muslim prayer and Quran app with more than 98 million downloads worldwide. more

Notes from NANOG 81

As the pandemic continues, the network operator community continues to meet online. NANOG held its 81st meeting on February 8 and 9, and these are my notes from some of the presentations at that meeting... Ethernet, developed in 1973 at Xerox PARC, was a revolutionary step in network architectures in many ways. The common bus architecture imposed several constraints on the network that have echoed through the ensuing four decades in all kinds of ways. more

Bashbleed - A Nasty Reminder Never to Forget Security 101

After the botched burglary at the Watergate Apartments, every scam and scandal that hit the headlines became a 'gate' -- Irangate, Contragate, you name it. The Heartbleed bug is possibly the closest thing to Watergate that this generation of computer security had seen till the past few days -- an exploit in a component that is "just there" -- something you utterly rely on to be there and perform its duties, and give very little thought to how secure (or rather, insecure) it might be. So, fittingly, every such catastrophic bug in an ubiquitous component is now a 'bleed'. more

Congress Will Oversight ICANN: And You Can Take That to the Bank

Even though the Internet Corporation for Assigned Names and Numbers (ICANN) plays a very important role in the global Internet ecosystem, its activities are not frequently mentioned in the mainstream international media; that is, until ICANN's name is mentioned alongside that of the US Congress in a US$1.1 trillion Omnibus spending bill. Since the bill was passed by the House of Representatives, the issue of ICANN has assumed a certain topicality and has attracted commentary from many pundits. more

The Importance of Understanding Attacker Target Selection

There's a bit of a debate going on about whether the Kaseya attack exploited a 0-day vulnerability. While that's an interesting question when discussing, say, patch management strategies, I think it's less important to understand attackers' thinking than understand their target selection. In a nutshell, the attackers have outmaneuvered defenders for almost 30 years when it comes to target selection. more

Cyber Threats Yes, But Is It Cyber War?

Last night Intelligence Squared and Neustar conducted a fascinating, Oxford style debate on whether the threat of cyber war has been exaggerated. A packed house at the Newseum in Washington, DC heard four cyber heavyweights go toe-to-toe verbally both for and against the proposition that the threat has been exaggerated. more

ICANN and the Data Quality Act: Part I

The first part of a multi-part series report by ICANNfocus. This part discusses the history of the data quality act. "The Center for Regulatory Effectiveness (CRE) has determined that ICANN is subject to the Data Quality Act. Specifically, because ICANN carries out the technical management of the internet, including the IANA function and the implementation of new top level domains, under agreement with the U.S. Department of Commerce, ICANN's information disseminations are "sponsored" by the Department and thus subject to the Act." more