This year, the IGF Multistakeholder Advisory Group which provide assistance in the preparations for Global IGF meetings called for Intersessional work (activities that are pursued in the months between annual IGFs with the aim of helping the IGF produce more tangible outputs that can become robust resources). Previously, the IGF has used best Practice Forums and Dynamic coalitions to bring out key issues that affect the world as it relates to the Internet. This year's Intersessional activity is centred on "Policy Option for connecting the Next Billion". more
The sixth month of the year is both symbolic and historic for IPv6 and a good time to take stock and see how we've progressed. But instead of looking at the usual suspects of number of networks, number of users, number of websites, etc... on IPv6, let's look at some new trends to see what's happening. At gogo6 we've been measuring the "Buzz" of the IPv6 market every week over the last two and a half years. more
The Australian has a good article describing the efforts some of their ISPs are making in an attempt to clean up their act: the government is encouraging ISPs to detect computers on their network that are infected and part of botnets, and to communicate to the customer that their system is compromised... Unless the customer feels a little bit of pain they will not change their ways. more
Throughout the second half of 2012 many security folks have been asking "how much is a zero-day vulnerability worth?" and it's often been hard to believe the numbers that have been (and continue to be) thrown around. For the sake of clarity though, I do believe that it's the wrong question... the correct question should be "how much do people pay for working exploits against zero-day vulnerabilities?" more
It's official. A team of market analysts from Oppenheimer are saying [PDF] what I've been saying since 1997, that the apps are separating from the network, and this is driving a wave of "explosive innovation." more
Recently, an article I wrote for Bitcoin Magazine talked about how we can use DNS underscore scoping to better abstract Lightning addresses and even create a de facto specification that could work on any resource (like a wallet or a smart contract) across all blockchains. more
To claim a superior right to a string of characters mark owners must (first) have priority (unregistered or registered) in using the mark in commerce; and secondly, have a mark strong enough to rebut any counter argument of registrant's right or legitimate interest in the string. A steady (albeit small) number of owners continue to believe it's outrageous for registrants to hold domain names earlier registered than their trademarks and be permitted to extort amounts far "in excess of [their] documented out-of-pocket costs directly related to the domain name." more
Rightfully, Olympic is a very sacred word and a very pure concept for the Olympic Committee as they have protected this brand and all of its related intellectual property components at every instance for about hundred years. However, the word Olympic as a name is geographic based on Mount Olympus and over the many centuries belonging to the public domain. ... Dot-Olympic ideally should belong to the Olympic committee, if they so desire, but in a contest or any other situation the ownership of this name would simply become a question of going after a diluted geography based public domain name. more
You might recall that I played an advisory role to the World Conference on International Telecommunications (WCIT) in 2012 in Dubai. In the run-up to that event -- as well as during and after it -- I gave my opinion on the role of internet governance, plus an analysis of what was happening. At that time I held a more conciliatory position on the issue, but you may have noticed that, in the wake of the Snowden revelations and the illegal NSA activities, as well as many other similar activities from ASIO in Australia and no doubt the Russian, Israeli and Chinese authorities, my position has shifted significantly. more
For those of you interested in IPv6 and/or DNSSEC, we'll have a live webcast out of the Internet Society's ION Singapore conference happening tomorrow, March 28, 2013, starting at 2:00pm Singapore time. more
Last Friday ICANN released an updated new generic Top-Level Domain (gTLD) Applicant Guidebook that appears to have taken a number of positive steps toward closing the divide between the ICANN Board and the Governmental Advisory Committee (GAC). One of the more important changes to the Applicant Guidebook was the following text... more
Arstechnica wrote an article recently entitled Spam levels still low a year after Rustock botnet takedown. The article is more detailed that numerous things have contributed to the decline in spam since then. However, the article misrepresents Rustock's effect on the spam levels. It's completely true that Rustock was the largest botnet and sent the most spam (by total individual spam connections). more
People are growing increasingly alarmed by recent examples of bad actors abusing proxy services offered by registrars. While proxy services are designed to protect the privacy of legitimate domain name users - they do the opposite when abused by cybercriminals. Responsible Proxy providers play a key role in mitigating abuse. When they don't act responsibly - it's clear they contribute to the problem. more
There has lately been a number of long-held investor registered domain names transferred to complainants under the Uniform Domain Name Dispute Resolution Policy (UDRP). Two of the domain names were registered 23 years ago. This has provoked several commentators to complain that the UDRP is tilted in favor of mark owners and trademark-friendly panelists expressing hostility to the domain industry. I think we have to dig deeper than this. more
Companies are moving to the cloud. According to Cloud Tech, CIOs are on the front lines: In 72 percent of companies surveyed, chief information officers lead the cloud computing charge. However, adoption without the right information is doomed to fail - here are 10 key questions CIOs should ask before moving operations to the cloud... First, it's critical to identify business benefits. Here the key to success lies in specifics rather than generalities... more
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byCSC
Sponsored byIPv4.Global
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byRadix