There have been a number of reports recently about customer lists leaking out through Email Service Providers (ESPs). In one case, the ESP attributed the leak to an outside hack. In other cases, the ESPs and companies involved have kept the information very quiet and not told anyone that data was leaked. People do notice, though, when they use single use addresses or tagged addresses and know to whom each address was submitted. Data security is not something that can be glossed over and ignored. more
China as a nation with a population of 1.3 billion people, represents over a fifth of the whole world and for this reason, if not for any other, we need to sit up and listen to anything that China says, though a lot of what China says may be disagreeable. China unambiguously stated its position during the Internet Governance Forum (IGF) Open Consultations at Geneva on May 13. On this instance, I consider the views expressed by China largely respectable, but needs to be bridged in some areas. more
There's been a lot of ink and pixels spilled of late over the Heartbleed bug. Yes, it's serious. Yes, it potentially affects almost everyone. Yes, there are some precautions you should take. But there's good news, too: for many people, it's a non-event. Heartbleed allows an attacker to recover a random memory area from a web or email server running certain versions of OpenSSL. The question is what's in that memory. It may be nothing, or it may contain user passwords (this has reportedly been seen on Yahoo's mail service), cryptographic keys, etc. more
If you've followed the telecom industry at all, you've heard of the effort to rip-and-replace Chinese network gear used mostly in cellular networks and in some fiber networks. The U.S. government ordered that such equipment be replaced, although it has funded the replacement in dribs and drabs. There has been heightened scrutiny of Chinese electronics since the recently discovered Beijing-sponsored cyberattacks that have been reported to have infiltrated the networks of major U.S. more
We now know how wireless carriers are going to continue the string of new G generations of cellular technology. 5G was originally defined to include spectrum up to 90 GHz or 100 GHz. In the last few years, international standards bodies have been developing new 6G standards in what is called the terahertz wavelengths between 100 GHz and 1 THz. more
A fabled, serial cybersquatter of the early Internet argued that typographical errors in domain names were not cybersquatting at all because they had their own distinct identities. Moreover, "I have" (he argued) "just as much right to own the [misspelled] Domain Names as the person who owns the correct spelling of [a] domain name." That dispute involved and <wallstreet journel.com>. Dow Jones & Company, Inc. and Dow Jones LP v. John Zuccarini, D2000-0578 (WIPO September 10, 2000). more
Microsoft has joined the Mutually Agreed Norms for Routing Security (MANRS) initiative, supported by the Internet Society (ISOC) with the primary objective is to reduce the most common threats to the Internet's routing system. Microsft is the latest of a number of industry giants around the world - including Oracle, GÉANT, and Comcast - to join MANRS. more
In the run up to the launch of new TLDs there were a lot of rumours about which organisations would apply for which strings. Detractors might pick holes in the entire project, but it's very hard to argue against the merits of new TLDs specifically in the context of cultural linguistic communities that fall outside the realm of ccTLDs (country code top level domains). The case of Catalonia and .cat is probably the best one and has been vaunted as the poster child for new TLDs in some circles. more
Once upon a time in a universe not very long ago phone service in the US was provided by regulated monopolies. AT&T was the big one and there were (and are) hundreds of small ILECs (Independent Local Exchange Carriers) around the country. These monopolies were regulated both at the federal and state level. Then we began on the long road toward competition and deregulation. more
The Association of National Advertisers (ANA) has shifted its campaign against ICANN's new gTLD program to YouTube with a video from its President accusing the organization of "lying" about having reached a consensus over its plans, reports Kieren McCarthy at .Nxt. "The video ends with a dramatic statement, clearly devised to produce stories such as this one: 'So we'd like to say to ICANN: your claim for consensus it wrong, it is false, it is a lie." more
When I first read this post about Predictable Network Solutions on the excellent Telco 2.0 blog, I thought it was an April Fool's Day hoax. Then I remembered that it's a UK site, and some Googling confirmed that it's a real company. So my question is, will this technology -- or something like it -- eventually make network neutrality a non-issue? Or will it be the means for network operators to implement the discrimination that everyone is worried about? more
For a brief moment earlier this week, I thought my days spent dreaming of hover-boards, flying cars and Biff's elusive Sports Almanac were finally over. From reports circulating online, we had finally reached "Back to the Future Day". Those movie buffs out there will know exactly what I'm referring to... But it got me thinking. What would the Domain Name world look like if that crazy cat Doc Brown swung past in his DeLorean, with a fully-charged flux capacitor and a return ticket to October 21st 2015? more
A lot of people are fascinated by the news story that Anonymous managed to listen to a conference call between the FBI and Scotland Yard. Some of the interest is due to marvel that two such sophisticated organizations could be had, some is due to schadenfreude, and some is probably despair: if the bad guys can get at these folks, is anyone safe? more
Often when looking at IPv6 deployment statistics, the size of the organisation or the network is not taken into account. In this article, we look at IPv6 deployment of Local Internet Registries (LIRs) per country in correlation to the size of the LIR. When looking at IPv6 deployment at the LIR level, we can look at the following two metrics... more
My new essay, "Valuing Trademarks in Domain Names," outlines the various approaches to valuing trademarks, pointing out the approaches’ different strengths and weaknesses, with emphasis on domain names. Using court cases, the essay points out that there is no one right way to value intangible assets but there are wrong ways. more