Hot Topics:   Security    Policy & Regulation    Internet Governance    Privacy    Broadband    Domain Names    Top-Level Domains    more...

Featured Blogs

In Network Security Design, It's About the Users

Burt Kaliski One of the longstanding goals of network security design is to be able to prove that a system -- any system -- is secure. Designers would like to be able to show that a system, properly implemented and operated, meets its objectives for confidentiality, integrity, availability and other attributes against the variety of threats the system may encounter. A half century into the computing revolution, this goal remains elusive. more»

Only One Week Left to Submit Nominations for PIR Board of Directors (Closes Nov 30)

Dan York If you would like to help guide the future of the Public Interest Registry (PIR), the non-profit operator of the .ORG, .NGO and .ONG domains, the deadline for nominations is MONDAY, NOVEMBER 30, 2015! After reading the information about the PIR Board requirements, you are welcome to nominate either yourself or anyone else using the PIR Nomination Form. Nominations close at 23:00 UTC on November 30, 2015, so don't delay! more»

Zero Rating, a Poisoned Chalice for the Developing World

Mwendwa Kivuva A very Interesting meeting The Internet Governance Forum (IGF) with an ambitious theme of connecting the worlds next billion people to the Internet took place in early November 2015 in a beautiful resort city of João Pessoa in Brazil under the auspice of the United Nations. Few citizens of the world paid attention to it yet the repercussions of the policy issues discussed affect us all. more»

As WHOIS Transitions to RDAP, How Do We Avoid the Same Mistakes?

Scott Hollenbeck In 1905, philosopher George Santayana famously noted, "Those who cannot remember the past are condemned to repeat it." When past attempts to resolve a challenge have failed, it makes sense to consider different approaches even if they seem controversial or otherwise at odds with maintaining the status quo. Such is the case with the opportunity to make real progress in addressing the many functional issues associated with WHOIS. We need to think differently. more»

RIPE 71 Meeting Report

Geoff Huston The RIPE 71 meeting took place in Bucharest, Romania in November. Here are my impressions from a number of the sessions I attended that I thought were of interest. It was a relatively packed meeting held over 5 days. So this is by no means all that was presented through the week... As is usual for RIPE meetings, it was a well organised, informative and fun meeting to attend in every respect! If you are near Copenhagen in late May next year I'd certainly say that it would be a week well spent. more»

USA Fibre Investments Encouraging Further Operator Expansion

Paul Budde According to data from the FttH Council, the number of homes passed with fibre in the US increased 13% in 2015, year-on-year, to 26 million. Combined with Canada and Mexico, the number of passed homes has reached 34 million. The take-up rate is excellent by international standards, at more than 50%. Commonly operators look to about 20% to 30% take-up before work can begin on new fibre infrastructure to communities. more»


Nick Ashton-Hart Internet public policy -- and the technical ecosystem -- is at a crossroads and the choice of CEO that ICANN's board makes now is probably the most important such choice it has ever made. Since I work in Internet policy across the Geneva institutions where more than 50% of all international Internet-related policy meetings take place, and have worked at ICANN in senior positions in the past, I thought I would suggest some qualities the next CEO should have. more»

How DANE Strengthens Security for TLS, S/SMIME and Other Applications

Shumon Huque The Domain Name System (DNS) offers ways to significantly strengthen the security of Internet applications via a new protocol called the DNS-based Authentication of Named Entities (DANE). One problem it helps to solve is how to easily find keys for end users and systems in a secure and scalable manner. It can also help to address well-known vulnerabilities in the public Certification Authority (CA) model. Applications today need to trust a large number of global CAs. more»

Battling Cyber Threats Using Lessons Learned 165 Years Ago

Gunter Ollmann When it comes to protecting the end user, the information security community is awash with technologies and options. Yet, despite the near endless array of products and innovation focused on securing that end user from an equally broad and expanding array of threats, the end user remains more exposed and vulnerable than at any other period in the history of personal computing. more»

Another Day, Another Two Million Dollars

John Levine ICANN just published the results of the auction for .HOTELS and .HOTEIS. The high bidder (I'm not sure "winner" really applies here) was, who will use .HOTELS. The $2.2M they paid, along with the prior results, notably the $25 million Google paid for .APP, brings the total in ICANN's auction pot to about $60.5 million. There's a few more auctions scheduled for CAM, PHONE, and SHOP/SHOPPING, along with yet to be scheduled auctions for DOCTOR, INC, LLP, and LLC. more»

Did We Build the 'Right' Internet? (An Interview with Prof Andrew Russell)

Martin Geddes The longer I have been in the tech industry, the more I have come to appreciate the hidden complexity and subtlety of its past. A book that caught my attention is 'Open Standards and the Digital Age' by Prof Andrew Russell of Stevens Institute of Technology in New Jersey. This important work shines a fresh light on the process that resulted in today's Internet. For me, it places the standard 'triumphant' narrative of the rise of TCP/IP into a more nuanced context. more»

Exploiting Video Console Chat for Cybecrime or Terrorism

Gunter Ollmann A couple of days ago there was a lot of interest in how terrorists may have been using chat features of popular video console platforms (e.g. PS4, XBox One) to secretly communicate and plan their attacks. Several journalists on tight deadlines reached out to me for insight in to threat. Here are some technical snippets on the topic that may be useful for future reference. more»

IGF 2015: Running in Place

Milton Mueller The Internet Governance Forum, held this year in the Brazilian beach resort town of João Pessoa, completed its 10th annual meeting Friday November 13. The IGF Secretariat claims that nearly 5,000 people attended. Moreover, it looks as if its existence will be continued for another 10 years when the UN meets in New York later this year. Vint Cerf declared it "the best IGF ever" in the closing open microphone session. But how good is "best?" more»

Looking Beyond IGF 2015 to WSIS+10

Kathy Brown IGF 2015 in João Pessoa, Brazil will be seen as a milestone for the global Internet community. After 10 years of intense work, the Internet Governance Forum (IGF) has earned the right to celebrate its success and prepare itself for the future. As we come out of the meeting, we are urging all who want to be heard at this important moment in the evolution of the Internet to join over 110 organizations and individuals who have already signed on to a message to the UN General Assembly that will 1) help safeguard the IGF for the future; 2) preserve the multistakeholder model of governance; and 3) help keep us focused on the work at hand. more»

Telecoms Infrastructure As a Service

Paul Budde More than a decade ago we predicted that the telecoms industry would be transformed, driven by its own innovations and technological developments. As a result we indicated that in many situations the telecommunications infrastructure would be offered as a service by hardware providers. We also predicted that this would open the way for a better sharing of the infrastructure. more»

News Briefs

ISOC Joins 200 Others Urging UN to Safeguard Key Internet Principles

– The Internet Society today announced that it has joined more than 200 organizations and individuals who have signed a statement intended for leaders and governments participating in the United Nations General Assembly's 10 Year Review of the World Summit on the Information Society (WSIS+10 Review). ›››

Google Received 65.9 Million Take Down Requests Last Month, Company Reports

As part of its transparency report, Google says Copyright removal requests continue to be on steady rise and that the company received a new record 65,923,523 requests just last month. ›››

Under Pressure, ICANN Reveals Lobbying Expenses

Following several months of pressure, ICANN has revealed a breakdown of figures under its catch-all term of "professional services," exposing its political expenses, Kieren McCarthy reported today in the Register. ›››

China Seeking to Construct Its Own Uncrackable Smartphones

Beijing and leading Chinese tech firms are collaborating to build a secure smartphone for government officials that rely on domestically built operating system and processor chip, according to reports. ›››

UK Announces Additional £1.9 Billion in Cyber Security Funding

Chancellor George Osborne announces government plan to almost double its investment in cyber security initiatives over the next five years, spending an additional £1.9 billion. ›››

Vehicle Manufacturers Tell Govt to Stay Off Regulating "Internet of Cars"

Major car manufacturers in U.S. are asking Congress to stay away from any type of increased regulation unless "absolutely necessary" as the industry evolves to take advantage of the "Internet of cars." ›››

Sony Uses Brand TLD '.sony' for Bond Game Site

Sony is using it's newly secured brand Top-Level Domain, '.sony' for a game site as part of the promotion for its latest Bond movie. ›››

Bangladesh Govt Orders Internet Shutdown on 'Security Grounds'

Access to the internet was denied for about two hours in Bangladesh immediately after the Supreme Court upheld the death penalty for Salauddin Quader Chowdhury and Ali Ahsan Muhammad Mujahid. ›››

Email More Secure Today Than Two Years Ago, Research Suggests

Google in partnership with the University of Michigan and the University of Illinois, has published the results of a multi-year study that measured how email security has evolved since 2013. Although Gmail was the foundation of the research, insights from the study are believed to be applicable to email more broadly. ›››

Internet Society Reinforces Need to Connect the Unconnected, Build Trust

The Internet Society's President and CEO, Kathy Brown, has highlighted how connecting the unconnected and building trust are the two most pressing imperatives facing the Internet today. ›››

Internet a Key Catalyst for Sustainable Development, Says ISOC CEO

Internet Society President and CEO Kathy Brown wrote about the critical role that the Internet has in enabling the implementation of the UN Sustainable Development Goals (SDGs). ›››

Harm Caused by Typosquatting Is Still Modest, Research Suggests

Harm caused by domain name typosquatting is still modest, to both the user and the brand holder, and investment on anti-typosquatting products should be cautious, according to a paper published in Security and Privacy (SP), 2015 IEEE Symposium titled, "Every Second Counts: Quantifying the Negative Externalities of Cybercrime via Typosquatting." The paper presents a strategy for quantifying the harm caused by the cybercrime of typo squatting via an intent inference technique. ›››

GigaNet Symposium Will Be Held Next Week in Brazil

On Monday, 09 November 2015, the Global Internet Governance Academic Network (GigaNet) will hold its 10th Annual Symposium on Internet Governance Research in João Pessoa, Brazil. The symposium will take place as a pre-event of the United Nations Internet Governance Forum (IGF) which starts on Tuesday in the same location. During their symposium researchers from several parts of the world will address various topics including privacy, infra-structure, trust, security and more. ›››

Internet Activity in Britain Stored for a Year Under New Surveillance Law

The internet activity of everyone in UK will have to be stored for one year by Internet service providers, under the new surveillance law plans. "This duty would include forcing firms to hold a schedule of which websites someone visits and the apps they connect to through computers, smartphones, tablets and other devices. Police and other agencies would be then able to access these records in pursuit of criminals -- but also seek to retrieve data in a wider range of inquiries, such as missing people." ›››

Nauruan Gov't Says Ban on Facebook and Such Protects Citizens from "Abuse, Harassment and Bullying"

The Nauruan government says ban on websites such as Facebook is to protect its citizens from "abuse, harassment and bullying" as the United Nations urges the island's controversial regime to lift its ban on freedom of expression and human rights. ›››

Public Cloud Services in Mature Asia/Pacific Region to Reach $7.4 Billion in 2015

The public cloud services market in the mature Asia/Pacific (AP) region is on pace to grow 8.7 percent in 2015 to total $7.3 billion, up from $6.7 billion in 2014, according to new research from Gartner. ›››

New Bill Bans Internet Companies From Offering Unbreakable Encryption

Companies such as Apple, Google and others will be banned from offering encryption so advanced that even they cannot decipher it when asked to under the UK's Investigatory Powers Bill. ›››

EU Parliament Says Citizens Rights Still in Danger, Calls for Immediate Measures

Members of the European Parliament have taken stock of the lack of action taken to safeguard citizens' fundamental rights following revelations of electronic mass surveillance. ›››

Cuba's Internet Connection to the World Worse Than Expected

Inspired by expansion announcements from companies such as Netflix and Airbnb into Cuba, Fabián E. Bustamante, professor of electrical engineering and computer science in the McCormick School of Engineering, and his graduate student Zachary Bischof, conducted research examining feasibility of the business ideas given the region's notoriously weak network infrastructure. ›››

Neighbours Create Their Own Internet Service on Orcas Island

Faced with slow and outage-prone Internet access, residents of Orcas Island, one of the San Juan Islands in Washington state, decided to design their own network and built it themselves. ›››

Popular News – Last 30 Days

Recent Comments

Taking Back the DNS
The TPP and the DNS
The TPP and the DNS
The TPP and the DNS
The TPP and the DNS

Featured Cartoon

Meanwhile in Yet Another IG Panel

Sponsored Topics

Industry Updates

Radix's .ONLINE Fastest to Sell 100,000 Domains

Radix After a very successful launch (38,000 domains in the first 24 hours) and breaking all nTLDrecords, .online surpassed 100,000 domain registrations this morning. Radix shared the 100,000th domain to be registered -- that came through eNom. more»

To Where are Bounce Messages Sent?

Port25 This seems to be one of the greatest mysteries to new postmasters. It can be confusing as the messages go to the SMTP MAIL FROM address, which can be different from, or the same as the from header. The key to understanding bounces (sometimes referred to as DSNs, Delivery Status Notifications or NDRs, Non-Delivery Reports) is that they should always be sent to the SMTP MAIL FROM address. Some mail platforms may not adhere to this rule, but most do. more»

.PRO Domains Now Available to All

Afilias Global registry leader Afilias announced that beginning today, .PRO is an unrestricted Top Level Domain open to all registrants. That means that everyone is now eligible to register a domain name ending with .PRO, such ''. more»

Computerworld Names Afilias' Ram Mohan a Premier 100 Technology Leader

Afilias IDG's Computerworld announces Ram Mohan, Afilias' executive vice president and chief technology officer, as a 2016 Premier 100 Technology Leaders honoree. This year's Premier 100 spotlights 100 leaders of companies for their exceptional technology leadership and innovative approaches to business challenges. more»

An Open Source Perspective on Commercial MTAs

Port25 It's always refreshing to obtain a different perspective, especially from the open-source community regarding email sending infrastructure. For those who are currently utilizing an open-source product, we thought this feedback from one of our constituents would be valuable for decision makers. more»

Verisign Mitigates More Attack Activity in Q3 2015 Than Any Other Quarter During Last Two Years

Verisign As part of our efforts to support National Cyber Security Awareness Month by sharing the latest cybersecurity research, Verisign released its Q3 2015 DDoS Trends Report, which represents a unique view into attack trends unfolding online for the previous quarter. more»

Five Essential PowerMTA Configuration Tips

Port25 When asked what are the best configurations to use with PowerMTA? The answer is different for every region of the world. Configuration settings in the US will be vastly different than those in Europe for example, so global settings are not as effective. more»

Protect Your Privacy - Opt Out of Public DNS Data Collection

Verisign We've all seen the check boxes. They're hidden at the bottom of webpages. You can't ignore them, but sometimes you forget they are there. They offer to send you deals and coupons. Some even offer to connect you with their partners for similar benefits. Do you check the box? more»

What's New With Port25's PowerMTA v4.5

Port25 Port24 recently intruded PowerMTA v4.5 as a major new release of PowerMTA. It now includes a wide variety of new advanced features and functionalities that allow for greater flexibility and delivery control to help maximize overall performance and deliverability. more»

The ".law" Domain Gains Momentum Throughout the Legal Profession

Minds + Machines Minds + Machines has announced that the .law domain names may be applied for by qualified lawyers on a first-come, first-served basis at standard rates. The seven-day Early Access Program, during which .law domain names were priced higher to accommodate initial demand, ended at 1600 UTC on October 19. more»

Verisign & Forrester Webinar: Defending Against Cyber Threats in Complex Hybrid-Cloud Environments

Verisign Attend to learn some of the new tools and techniques to secure availability of applications in hybrid-cloud environments. more»


Community  –  CircleID Participants  |  View All  |  Join CircleID

Krista Papac
Chief Strategy Officer, AusRegistry InternationalJoined on Jan 30, 2010

Susan Brenner
Professor of Law and TechnologyJoined on Jan 27, 2009

Michael Twist
Chief Marketing Officer at dotHIVJoined on Nov 02, 2010

Steve Stolfi
VP of Global Partnerships at CT CorsearchJoined on Aug 09, 2010

Geoff Huston
Author & Chief Scientist at APNICJoined on Sep 06, 2003

Brough Turner
Founder & CTO at netBlazrJoined on Apr 24, 2007

Roy Balleste
Law Library Director & Professor of LawJoined on Feb 29, 2012

Gadi Evron
Security StrategistJoined on Feb 22, 2006

Andrew Mack
Principal at AMGlobal ConsultingJoined on Oct 08, 2009

Patrick Vande Walle
All around Internet governance troublemakerJoined on Jan 17, 2006

Thomas Roessler
MathematicianJoined on Jul 24, 2003

David Isenberg
Principal Prosultant(sm),, LLCJoined on Apr 24, 2007

Sheel Mohnot
Project Director, Applicant AuctionJoined on Apr 21, 2013

Kathy Nielsen
Head of Business Development, New gTLDs, SedoJoined on Oct 05, 2011

Internet policy and governance consultantJoined on May 16, 2005

Katim S. Touray
International Development Consultant, and ICT for development advocateJoined on Sep 16, 2012

Torbjörn Eklöv
CTO, Senior Network Architect, DNSSEC/IPv6Joined on Jan 27, 2010

Peter Cramton
Chairman, Cramton Associates; Professor of Economics, University of MarylandJoined on Nov 14, 2012

Richard Bennett
Senior Research FellowJoined on Oct 23, 2007

Chuck Kisselburg
Director, Strategic Partnerships at CommunityDNSJoined on Oct 28, 2009

Philip S. Corwin
Founding Principal of Virtualaw LLC, a Washington, DC Law and Public Policy FirmJoined on Feb 22, 2007

Udeme Ukutt
Joined on Oct 15, 2010

Amit Fridman
Vice President Engineering at Crescendo NetworksJoined on Dec 01, 2009

Stephanie Duchesneau
Secretariat, usTLD Stakeholder CouncilJoined on Jan 07, 2014

Konstantinos Komaitis
Policy Advisor for the Internet SocietyJoined on Apr 01, 2004

Alexa Raad
CEO of ArchitelosJoined on Jun 22, 2006

Sam Dickinson
Internet governance consultant & writerJoined on Aug 05, 2010

Bill Thompson
Journalist, Commentator and Technology CriticJoined on Sep 09, 2004

Jon Nevett
Co-Founder, Donuts Inc.Joined on Dec 06, 2005

Dan York
Author and Speaker on Internet technologiesJoined on Apr 24, 2007