/ Recently Commented

Addressing Anticompetitive Behavior in Internet Standards Bodies

A significant focus is emerging today on the anticompetitive behaviour of Silicon Valley companies directed at dominating critical sectors of the on-line marketplace, and a U.S. Congressional hearing is scheduled. Such practices can be pursued in many ways. One of the more elusive, but very effective anticompetitive playbooks - known legally as the "antitrust conspiracy" - can occur in internet standards bodies. more

DNS: An Essential Component of Cloud Computing

The evolution of the internet is anchored in the phenomenon of new technologies replacing their older counterparts. But technology evolution can be just as much about building upon what is already in place, as it is about tearing down past innovations. Indeed, the emergence of cloud computing has been powered by extending an unlikely underlying component: the more than 30-year-old global Domain Name System (DNS). more

The State of DNS Abuse: Moving Backward, Not Forward

ICANN's founding promise and mandate are optimistic -- ensure a stable and secure internet that benefits the internet community as a whole. Recent months, however, have highlighted the uncomfortable truth that ICANN's and the industry's approach to DNS abuse is actually moving backward, ignoring growing problems, abdicating on important policy issues, and making excuses for not acting. Further, the impending failure of ICANN's new WHOIS policy to address cybersecurity concerns will add fuel to the fire, resulting in accelerating DNS abuse that harms internet users across the globe. more

Senate Report on 5G: Recipe for Disaster

The Democratic Staff Report Prepared for the use of the Committee on Foreign Relations United States Senate, July 21, 2020, entitled "The New Big Brother," is actually all about 5G technology. The report jumps on the runaway anti-China train chaotically flailing around Washington these days to "out-Trump, Trump." It characterizes 5G technology, longstanding international collaboration, and COVID-19 tracking as all part of a global conspiracy for "digital authoritarianism" run out of Beijing. more

Beware of Abandoned Domain Names in this Turbulent Time and as the Global Economy Changes

The outbreak of COVID-19 has caused worldwide disruption -- for whole nations and their economies. Unfortunately, there will be some side effects for businesses. A number of brands will disappear from the streets and shelves, as businesses that fail to weather the storm will have to fold. Companies that do survive will likely focus more on their core markets, pulling brands out of higher risk, less profitable markets... more

Macro Musings for Digital Strategies Using Unstructured Data

When Doug Dawson wrote his article in February on Artificial Intelligence, he felt that #ai is saddled with too much hype as is its current counterpart, 5G. Certainly, there is a great deal of technology out there that deserves the hype and others that do not. After receiving a certification (Intro to AI) from IBM (while using Watson), I'm here to share that artificial intelligence, and its subsets of machine learning and deep learning definitely deserve a soundbite. more

Explaining the Legal Enforceability of the PIC Proposed by Ethos for .ORG

Ethos Capital has recently announced that it has voluntarily proposed to add an amendment to Public Interest Registry's (PIR) .ORG Registry Agreement with ICANN in the form of a Public Interest Commitment, also known as a "PIC." In the press release Ethos indicated that the PIC would become "legally binding" and "enforceable" both by ICANN and by members of the community. I anticipate that some would ask a number of logical questions: How would that work in practice? more

Freedom of Expression Part 1: Hate Speech, Linehan, Trans as a Protected Class in California

Graham Linehan was banned from Twitter last week. Graham Linehan is an Irish writer and creator of Father Ted and Black Books. Twitter closed Graham Linehan's account for tweeting "men aren't women though" which twitter perceived as "hate speech" and offensive to the Trans community. Context always shapes meaning, and so I thought it would be useful to explore how hate speech is interpreted in California and then to see how it is treated in Fiji. more

Cybersecurity Is Failing Big-Time and This Is Hard to Fix

It has become clear that having a big cybersecurity war room is not enough to deliver true end-to-end security throughout the complex networks, systems and structures on which our modern society is based. Furthermore, looking at the forever changing draconian government interventions in this space, it is also obvious that they are often stabbing in the dark. more

Is Booking.com a Generic Term?

A fundamental rule of trademarks is that they have to be distinctive, and that nobody can register a trademark on a generic term like "wine" or "plastic." In a case decided today by the U.S. Supreme Court, the court decided 8-1 that online travel agent Booking.com could register its domain name as a trademark. In this case, I think the majority got it wrong, and Justice Breyer's lone dissent is correct. more

Many Libraries Still Have Slow Broadband

During the recent pandemic, many homes came face-to-face with the realization that their home broadband connection is inadequate. Many students trying to finish the school year and people trying to work from home found that their broadband connection would not allow them to connect and maintain connections to school and work servers. Even families who thought they had good broadband found they were unable to maintain multiple connections for these purposes. more

Japan Fueling China’s Leap to 5G, but for How Long?

As the U.S. is making it tough for American companies to help China roll out super-fast cellular networks, Japan, a U.S. ally, is fueling China with parts needed to blanket the nation with 5G cellular service. more

Marking the 30th Anniversary of the Internet and Cybersecurity Treaty

Next week on 1 July 2020 marks the 30th anniversary of one of the most significant treaty instruments in modern times. On 1 July 1990, the Melbourne Treaty came into force as the first and only global treaty that enabled worldwide internets and mobile networks to exist, together with the cybersecurity provisions designed to protect those infrastructures. The achievement remains as an enduring tribute to Richard Edmund Butler of Australia who was one of the most influential, and best-loved Secretaries-General of the ITU. more

Article 22 of the GDPR Should Not Preclude Contemplated Automation

There is an ongoing disagreement among various members and groups in the ICANN community regarding automation -- namely, whether and to what extent automation can be used to disclose registrant data in response to legitimate data disclosure requests. A major contributing factor to the complications around automation has been confusion about how to interpret and apply Article 22 of the GDPR. more

Trust Binding

A few months ago, there was a lot of discussion that despite its claims, Zoom did not actually offer end-to-end encryption. They're in the process of fixing that, which is good, but that raises a deeper question: why trust their code? (To get ahead of myself, this blog post is not about Zoom.) If Zoom has the key but doesn't abuse it, there isn't a problem, right? Let's fast-forward to when they deploy true end-to-end encryption. Why do we trust their code not to leak the secret key? more