The U.S. "Scorecard" for Brussels Proposes Draconian Trademark Rules - And May Mean the End of Unlimited New gTLDs and/or the ICANN Experiment in Private Sector-Led Internet Governance... On Friday, January 28th the U.S. Department of Commerce (DOC) circulated its submission to ICANN's Governmental Advisory Committee (GAC) containing suggestions for what positions the GAC should push for at its February 28 - March 1 meeting with ICANN's Board to air disagreements over provisions of the Proposed Final Applicant Guidebook (AG) for new gTLDs. more
It's fascinating to watch the Internet technical community grapple with policy economics as they face the problems creating by the growing scarcity of IPv4 addresses. The Internet Governance Project (IGP) is analyzing the innovative policies that ARIN, RIPE and APNIC are considering as a response to the depletion of IPv4 addresses. more
I've mentioned the topic of personal IE domains on here more than once in the past [also discussed here on CircleID] and in my conversations with the IE Domain Registry. Just to recap; Under the current rules you cannot register johndoe.ie if your name is John Doe. You would have to add a number to the name, thus rendering it totally useless eg. johndoe7.ie or something of that style... more
While the debate continues as to whether most new gTLDs are a sound long-term investment for their registry operators, there's no disputing that the program has been an economic boom for ICANN. The 1,930 first round applications each required an application fee of $185,000, which added up to a tidy $357 million. Even after refunds for withdrawn applications ICANN still cleared about a third of a billion dollars from the first round before a single string was delegated. more
Heartbleed, for anyone who doesn't read the papers, is a serious bug in the popular OpenSSL security library. Its effects are particularly bad, because OpenSSL is so popular, used to implement the secure bit of https: secure web sites on many of the most popular web servers such as apache, nginx, and lighttpd. A few people have suggested that the problem is that OpenSSL is open source, and code this important should be left to trained professionals. They're wrong. more
According to press reports, a water utility's SCADA network was hacked. The attacker turned a pump on and off too much, resulting in physical damage to the pump. ... For years, security specialists have been warning that something like this could happen. Although more and more people have started to believe it, we still hear all of the usual reassuring noises -- the hackers don't know enough, we have defenses, there are other safeguards, etc. That debate is now over... more
As the first semester of 2010 comes to a close, the IPv4 address pool has dropped to 6%. Another year and we will probably celebrate (mourn?) the end of the IANA IPv4 pool. As Vint Cerf commented on the topic of depletion in an e-mail to Bob Hinden: 'Sic transit Gloria Mundi'. The view of an abyss or the fear of judgment day always focuses attention and as a result IPv6 adoption is finally picking up speed. The Google invitational IPv6 Conference in Mountain View clearly illustrated the point. more
The "Decoding Internet Governance Stakeholders" series of articles invites the community to ponder what underlies the labels that define our interactions, roughly 20 years after the "Tunis Agenda for the Information Society" called for the "full involvement of governments, business entities, civil society and intergovernmental organizations," as well as to "make full use of the expertise of the academic, scientific and technical communities." more
Despite positive discussions currently underway at the ICANN54 meetings in Dublin regarding protection of privacy services for domain name registrants, another meeting in Paris seems to be contradicting the efforts. more
There was a meeting in Geneva a few weeks ago dealing with Internet names and addresses. Known as the Second Informal Expert Group Meeting of the Fifth World Telecommunication / Information and Communication Technologies Policy Forum, it was yet another of the endless blathering bodies on this subject that have met for the past fourteen years. more
It seems like most new technology today comes with a lot of hype. Just a few years ago, the press was full of predictions that we'd be awash with Internet of Thing sensors that would transform the way we live. We've heard similar claims for technologies like virtual reality, blockchain, and self-driving cars. I've written a lot about the massive hype surrounding 5G -- in my way of measuring things, there isn't any 5G in the world yet, but the cellular carriers are loudly proclaiming its everywhere. more
The .LY domain is Libya, and their government recently cancelled the registration of the short and snappy VB.LY, provoking great gnashing of teeth. If you direct your attention to the address bar above this page, you'll note that it's at JL.LY, equally short and snappy. The .LY registry started allowing two letter second-level domains last year, and there was a quiet land rush. Now they restrict those domains to people actually in Libya, but say they'll let us keep the ones we have. How concerned am I that they'll take my domain away, too? more
Solutions to cybersquatting and phishing must target brand customers instead of the trademark infringers, who are in effect liars. This post outlines why online-based traditional solutions fail, and it offers solutions to two types of lying (cybersquatting and phishing). more
Developments over the past few months - and especially the revelations about the spying work of the NSA on friendly governments and their people and businesses - show how important it is to try and establish some high-level strategies relating to managing the governance of the internet. While companies like Google have been lobbying hard against WCIT-12 - basically because they are opposed to any government interference in the internet - the reality is that, clearly without their knowledge, their own American government through the NSA is already directly interfering in their network. more
No baby boomers had been born when Congress enacted Title II of the Communications Act in 1934 as a means of regulating the Bell telephone monopoly, and the first Millennials were in elementary school when that monopoly was broken up in 1983. Title II was set to die along with plain old telephone service until the Obama administration decided Title II should be used to implement net neutrality -- the principle that consumers should have reasonable access to internet functionality. more