Featured Blogs

Latest

A Short History of DNS Over HTTP (So Far)

The IETF is in the midst of a vigorous debate about DNS over HTTP or DNS over HTTPS, abbreviated as DoH. How did we get there, and where do we go from here? (This is somewhat simplified, but I think the essential chronology is right.) Javascript code running in a web browser can't do DNS lookups, other than with browser.dns.resolv() to fetch an A record, or implicitly by fetching a URL which looks up a DNS A or AAAA record for the domain in the URL. more

ICANN Terminates AlpNames

AlpNames has been sent a notice of termination by ICANN. Unlike many termination notices that specify a future date, the one they were sent has an immediate effect. As reported in multiple fora over the last few days AlpNames had gone offline, and at time of writing still is. They've also become unresponsive. It's on the basis of this that ICANN decided to terminate their contract straight away. more

Portrait of a Single-Character Domain Name

Let's take some crayons and draw a picture of the current state of affairs regarding single-character domain names (SCDNs), and specifically O.COM. During the public comment period for the current O.COM RSEP, ICANN's own Intellectual Property and Business constituencies recommended implementation of rights protections mechanisms (RPMs) for intellectual property, including Sunrise and Priority Access periods. It is curious that such hard-won protections are being so easily set aside by Verisign and ICANN. more

ICANN Chair Elections Test Its Institutional Integrity

The ICANN Board will soon be considering candidates for election to the position of ICANN Chairperson and Vice Chair, which compels me to remind both the Board and the ICANN community of the fact that one of the members pursuing the Chairmanship is the subject of an on-going Australian Freedom of Information Act, which was initiated by the irregularities that brought about this individuals dismissal from the .au Domain Administration. more

4G Mobile Trials Have Begun in Cuba - What Is Their 3/4/5G Strategy?

During the first month of 3G mobile service, Cuban Internet use increased substantially. At the end of January, ETECSA had 5.4 million mobile users, 35% of which use the Internet and they are adding 5,000 new data customers per day. According to Eliecer Samada, head of ETECSA's wireless access group, the company is now at 160% of the expected capacity. more

How to Track Online Malevolent Identities in the Act

Want to be a cybersleuth and track down hackers? It may sound ambitious considering that malevolent entities are extremely clever, and tracing them requires certain skills that may not be easy to build for the typical computer user. But then again, the best defense is offense. And learning the basics of sniffing out cybercriminals may not only be necessary nowadays, it has become essential for survival on the Web. So where can you begin? more

Putting Cyber Threats Into Perspective

As society uses more digital technologies we are increasingly also faced with its problems. Most of us will have some horror stories to tell about using computers, smartphones, and the internet. But this hasn't stopped us from using the technology more and more. I believe that most people would say that their lives would be worse without technology -- in developed countries but equally in the developing world. more

Some Thought on the Paper: Practical Challenge-Response for DNS

Because the speed of DNS is so important to the performance of any connection on the 'net, a lot of thought goes into making DNS servers fast, including optimized software that can respond to queries in milliseconds, and connecting DNS servers to the 'net through high bandwidth links. To set the stage for massive DDoS attacks based in the DNS system, add a third point: DNS responses tend to be much larger than DNS queries. more

Facebook and Privacy

Mark Zuckerberg shocked a lot of people by promising a new focus on privacy for Facebook. There are many skeptics; Zuckerberg himself noted that the company doesn't "currently have a strong reputation for building privacy protective services." And there are issues that his blog post doesn't address; Zeynep Tufekci discusses many of them While I share many of her concerns, I think there are some other issues - and risks. more

Five Inconvenient Facts about the Migration to 5G Wireless

An unprecedented disinformation campaign purposefully distorts what consumers and governments understand about the upcoming fifth generation of wireless broadband technology. A variety of company executives and their sponsored advocates want us to believe that the United States already has lost the race to 5G global market supremacy and that it can regain it only with the assistance of a compliant government and a gullible public. more

Supporting Dot Amazon Strengthens Global Internet Cooperation

With the backlash against tech companies gaining steam, we've seen certain contrarian members of the media taking indiscriminate aim at companies and issues without due cause. This is what happened when Financial Times columnist Gillian Tett, in a paywalled March 7th editorial, inaccurately portrayed a process involving the Amazon's gTLD application for .AMAZON, an issue the i2Coalition has been engaged in for years. more

UDRP Panelists: Getting the Standard Right Where No Response is Filed

Over three-quarters of the more than 55,000 UDRP cases decided since 1999 have been undefended. Requiring adequate evidentiary support of the complainant's allegations in disputes where the respondent has not filed a response, is therefore critical for producing just outcomes under the UDRP. While most UDRP disputes involve clear cybersquats that are indefensible, a significant number involve domain names that are not clearly cybersquats... more

Collaboration to Prevent International Call Spoofing: Will the FCC Comply With Ray Baum’s Act?

As a former FCC senior staff member, the Commission's increasing disengagement in international telecommunication technology forums over the past two decades has been dismaying. One of the adverse effects of this obliviousness-by-design approach has been felt by American consumers in the massive, exponentially increasing volume of spoofed calling numbers and CallerIDs on communications from outside the United States. more

Community New gTLD Applications: The Wrong Choice

Community new gTLD applications were one of the three options offered by version one of ICANN new gTLD applicant guidebook. It was also possible to submit a "generic" or a "geographic application." I dug the ICANN website and found out that, in the end - and according to me only - it was a bad choice to submit such application...
I went through the 52 delegated applications to investigate which ones have lots of domain name registrations and which ones don't. more

Say YES to DNSSEC

With the latest "DNSpionage" attack, ICANN astutely prompted domain name holders to fully deploy DNSSEC on their names. Afilias absolutely supports this and encourages the same. In this post, I remind you of why DNSSEC is important and our continued role. Afilias has a long history in the development and advocacy of DNSSEC. In 2007, we partnered with Public Interest Registry to help found dnssec-deployment.org. more

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days

Topics

New TLDs

Sponsored byAfilias

DNS Security

Sponsored byAfilias

Domain Names

Sponsored byVerisign

IP Addressing

Sponsored byAvenue4 LLC

Cybersecurity

Sponsored byVerisign