PIR, the registry operator for .org, has sent notices to registrars that it is implementing an anti-abuse policy that offers no due process for innocent domain registrants... While it's good intentioned, there is great potential for innocent domain registrants to suffer harm, given the lack of appropriate safeguards, the lack of precision and open-ended definition of "abuse", the sole discretion of the registry operator to delete domains, and the general lack of due process. more
Where does this idea that the employees of all non-profit organizations alike shall lead a public-transportation lifestyle come from? ICANN's monetary resources do not come from war widows and pensioners, for ICANN to feel guilty about every penny that it spends on administration. Nor does its resources, wherever they come from, are any that are earmarked to be spent on famine relief or on basic health care for the most unfortunate. more
As recently reported, spam volumes indicate spam has nearly jumped back up to its pre-McColo shutdown levels. However, Symantec's The State of Spam report has also observed that in recent days spammers are increasingly piggybacking on legitimate newsletters and using the reputation of major social networking sites to try and deliver spam messages into recipients' inboxes... In its special URL investigation the report also indicates that on average approximately 90 percent of all spam messages today contain some kind of a URL. Additionally, analysis of data from past recent days, according to Symantec, have shown that 68% of all URLs in spam messages had a '.com' Top-Level Domain (TLD), 18% had a China's '.cn' ccTLD and 5% had a '.net'. more
ICANN's plan to begin accepting applications for new generic top-level domains (gTLDs) in mid-2009 may have been derailed by last week's outpouring of opposition from the global business community and the United States Government (USG). Having been involved with ICANN for over a decade and having served on its Board for three years, I've never seen such strong and broad opposition to one of ICANN's proposals. more
While doing research for a paper on telegraph codebooks, I was reminded of something I had long known: one could have short addresses for telegrams. A short article in The New Yorker described how it worked in New York City. Briefly, one could pick more or less any name that wasn't in use, and list it with the Central Bureau for Registered Addresses... more
Whatever your personal perspective of the rights and wrongs of the current Arab-Israeli war in Gaza, there is a second front being fought on the Internet, says Jart Armin of HostExploit.com in a blog post today. "This form of warfare is a battle of words and often vivid imagery engaged by hackers from either side of the divide." more
Back from the holidays I must admit I was thinking quite a bit on what is good policy for a registry? Of course I have my own personal favorites that I can not walk away from easily, but instead of thinking for too long, I decided to write down now immediately what is in my head. The main reasons for this are two: the decision by ICANN to change the rules for change in policy regarding the Add Grace Periods. more
Just after the government announces a crackdown on Internet smut. Yesterday, they announced plans for "Netizen Day" on September 14th, which apparently marks 15 years since the first e-mail message was sent from China in 1987. The new celebratory day (I don't think it's an official holiday) was unveiled at an official ceremony presided over by Chinese government officials and Internet execs, many of whose companies - including Google, Sina, and Sohu, who were named in the smut crackdown just 24 hours before. more
The recent research highlighting the alarming practice of Secure Socket Layer (SSL) Certificate Authority (CA) vendors using the MD5 hashing algorithm (which was known to be broken since 2005) has shown a major crack in the foundation of the Web. While the latest research has shown that fake SSL certificates with MD5 hashes can be forged to perfection when the CA (such as VeriSign's RapidSSL) uses predictable certificate fields, the bigger problem is that the web has fundamentally botched secure authentication. more
In fact WiFi (technically standard 802.11) and WiMAX (802.16) don't compete for broadband users or applications today. That's partly because WiFi is widely deployed and WiMAX is still largely an unfulfilled promise and partly because the two protocols were designed for very different situations. However, if WiMAX is eventually widely deployed, there will be competition between them as last mile technologies. Some people describe the difference between WiFi and WiMAX as analogous to the difference between a cordless phone and a mobile phone... more
Domain name disputes have been on steady rise for the past several years and have more than doubled since 2003. As reported today by Pingdom, while there was a period between 2000 and 2003 when the number of domain dispute cases declined, they have been continuously increased since 2003 with most cases involving more than one domain name. more
An acquaintance wondered why the people who run the systems that receive mail get to make all the rules about what gets delivered. After all, he noted: "The sender pays for bandwidth and agrees to abide by the bandwidth provider's rules." It is useful to think of the Internet as a collection of tubes, all leading from the periphery to the middle, where the middle is approximately "the peering point." The sender has paid for the tubes leading from himself to the middle... more
Well, it's a yearly tradition in the western hemisphere that at the end of the year, we compose a top 10 list of the 10 most
It seems highly likely to me that at some point in the future we'll all look back and say that 2008 was the year that the VoIP industry finally died... Voice over IP is just a transport and signalling technology. It's plumbing. It may come as a surprise to some of you to know that in the late 1980's and early 1990's there was a TCP/IP industry as well. TCP/IP is inarguably plumbing. As the IP stack became common on all computing devices, TCP/IP went from being a differentiator to a commodity. more
On Monday the Wall Street Journal published an article alleging that Google was trying to arrange a "fast lane for its own content" with telecom carriers and contending that Google and Professor Lessig were in the midst of changing their position on network neutrality policy. The WSJ reporters received a lot of flak for the piece -justifiably so. There was no real "news" in this news article. more