[DNS] auDA domain news - 9 September

[DNS] auDA domain news - 9 September

From: David Goldstein <david>
Date: Mon, 9 Sep 2013 15:43:23 +1000

The domain name news is supported by auDA


Policy, not tech, threatens the Internet's progress, Cerf warns

Practical Steps for Protecting Domain Names by Patrick Jones, on behalf of the ICANN Security team

Meltdown II: The Unilateral Right to Amend by Milton Mueller

No, ICANN isn?t moving to Switzerland

Teething troubles for TMCH testing

US State Dept Donates US$350K To UN-Led Internet Governance Forum
The United States State Department has made a one-time contribution of US$350,000 to the perennially cash-strapped Internet Governance Forum, a multi-stakeholder discussion forum established by the 2003-2005 WSIS.

Policy, not tech, threatens the Internet's progress, Cerf warns
The main threat to the future of the Internet lies in attempts to control the Internet through governance policy, according to Google executive and "godfather" of the Internet, Vint Cerf.

Customer Portal User Guide Created to Help Applicants Transition to Delegation
Upon becoming eligible for Contracting, applicants will notice added functionality when logging into the Customer Portal. Within the Cases View, new filters for Transition to Delegation cases (e.g., Contracting, Pre-Delegation Testing, and Transition to IANA) may be selected.

Selection of Integration Panel for the IDN Root Zone Label Generation Rules (LGR)
ICANN is pleased to announce that the Internationalized Domain Names (IDN) Variant TLD Program has completed the selection of the Integration Panel for the IDN Root Zone Label Generation Rules (LGR). We received many applications from well-qualified individuals and we thank all the applicants for their interest in the IDN Variant TLD Program.

Practical Steps for Protecting Domain Names by Patrick Jones, on behalf of the ICANN Security team
In the wake of high-profile hacking attacks against the New York Times, Twitter, Huffington Post, and others, we thought it would be useful to re-post the blog from November 2012 written by Dave Piscitello, ICANN?s Senior Security Technologist on What You Should Learn from the Diigo Domain Hacking incident. The post describes a set of practical steps that anyone who has a domain name registration can take to protect against domain hacking and related attacks.

New Contracting Statistics Released - CIRs Sent Through Priority 700

The Contact Page at ICANN.org Has a New Look
The Contact page at ICANN.org has a new look along with new ways of reaching us! The page reflects ICANN?s global expansion and our commitment to regionalizing operations. It now includes contact information for our Hub and Engagement offices.

IANA & Technical Operations Department Recognized for Commitment to Excellence b Elise Gerich, VP, IANA & Technical Operations Department
Following four years of applying the EFQM principles of continuous improvement, our IANA and Technical Operations Department was recognized for their Commitment to Excellence. In August we received the Commitment to Excellence recognition from EFQM, the international not-for-profit membership foundation that develops the EFQM Excellence Model, which is used by over 30,000 organizations around the world.

Meltdown II: The Unilateral Right to Amend by Milton Mueller
The multi-year fight over the unilateral right to amend registry contracts is instance #1 of this series. It?s also interesting because it shows that ICANN has the power and the propensity to abuse not just weaker civil society groups, but well-off businesses as well.

No, ICANN isn?t moving to Switzerland
There?s a rumor going around this morning that ICANN is planning to up sticks from its US base in California and become subject to Swiss jurisdiction instead.

Thomas Rickert to continue in ICANN Leadership
ICANN Nominating Committee has announced their decisions for nine leadership positions. The selectees reflect a variety of cultural and geographical backgrounds, and were chosen unanimously from a field of over 100 candidates. Lawyer Thomas Rickert, who represents the interests of eco members from the domain industry in his role as eco?s Director Names & Numbers, was chosen to continue for a further two years as a member of the Council of the Generic Names Supporting Organization (GNSO).

Is ICANN Looking To Move From US Jurisdiction to Switzerland?
According to a taped interview with the CEO of ICANN Fadi Chehade at the Asia-Pacific Regional IGF in Seoul, ICANN is looking to ?Become an International Organization and indicted that ICANN would consider setting up a legal structure in Switzerland which to some means that ICANN maybe looking to move jurisdictions from the United States to Switzerland

How to write a letter to ICANN for maximum impact
ICANN is somewhat unique in that it publishes much of the correspondence it receives. This means a lot of interest groups and stakeholders in the ICANN process tailor their letters for public consumption, not for ICANN.

 - ccTLD & gTLD NEWS
al: AKEP issued the first certificates of accreditation as "registrars for ccTLD.al"
Today as of 02/08/2013, AKEP issued the first certificates of accreditation as ?Registrars for ccTLD.al? for ?Albtelecom? sh.a, ?Shqip?riaCom? sh.p.k and ?Webhost? sh.p.k.

Domain names as trademarks in Austria
Digital brand engagement has become more and more important in the last years in the CEE: for example, in the realms of e-books, training courses, software and domain names. In some cases, domain names can qualify for trade mark protection in the CEE.

EURid Reports Fall In .EU Registrations in Second Quarter
During the second quarter of 2013, the total number of .eu domain names under management fell, a trend that has been common in previous years as the anniversary of the TLD comes around and a small percentage of domain registrations are not renewed.

.eu registrations down 19,000 sequentially to 3.7 mln in Q2
The total number of .eu registrations increased in 13 of the 28 EU member states to reach 3.70 million domain names, according to the Q2 quarterly progress report of .eu registry EURid.

.Eu Issues 2nd Quarter Report & Ends Quarter with 3.7 Million Registered Domain Names
Eurid,the company behind .EU extension,released its Q2 2013 progress report tonight.

Afnic Recommends Using the .fr ccTLD to Support the "France" Brand
The public consultation conducted by the "France Brand" task force from 28/06 to 06/09 was used to collect the opinions of professionals and citizens.

jp: JPRS Submitted its comments in response to the questionnaire of WGEC
On August 30th, 2013, JPRS submitted its comments in response to the questionnaire of the Working Group on Enhanced Cooperation (WGEC), which is under the Commission on Science and Technology for Development (CSTD) within United Nations.

Free .ML Domains Come With Extra Phishing
Registering domain names in Mali?s ccTLD, .ml, has been free since July, but they come with an added bonus ? phishing. According to a report published by Netcraft, ?Mali now has the most phishy TLD of any country in the world.?

Free domains put Mali back on the map ? for phishing
When the African nation of Mali announced that it was going to provide free .ml domains from July, their goal was to put Mali back on the map. It appears they have now succeeded, but perhaps not in the way they had intended ? thanks to the free domains, Mali now has the most phishy TLD of any country in the world.

Mali .ml Domain Phishiest TLD of Any Country in the World: Netcraft
After offering free .ml domains in July, Mali seems to have a huge phishing problem with its ccTLD, according to a report on Thursday by Netcraft.

pl: NASK terminates agreement with one of its partners
Research and Academic Computer Network (NASK) effectively blocked operations of several tens of domains used to distribute malicious programs and spam. At the same time, the NASK research institute decided to terminate with an immediate effect the agreement with the company Domain Silver Inc. that was responsible for handling dangerous internet addresses. The performed actions are the next step for the institute on the path to guard internet users against online threats.

.SE completes successful transition of the .nu domain
As of September the 2nd .SE (The Internet Infrastructure Foundation) has assumed responsibility for administration and technical operation of the .nu domain.

Policy consultations on second level domain registrations and the .uk Registrar Agreement ? a reminder
Two current .uk policy consultations close in September ? the review of the .uk Registrar Agreement, which closes on the 12th September, and the proposed opening up of .uk registrations at the second level, which closes on the 23rd September.

.xxx sales spike 1,000% during discount
ICM Registry saw an over 1,000% spike in .xxx domain name registrations in May, during which it offered new registrations at a steep discount over its regular price.

Teething troubles for TMCH testing
With the first new gTLD delegation likely just a matter of weeks away, registries and registrars are reporting problems getting access to the Trademark Clearinghouse for testing purposes.

Five gTLDs fail the geo test, but .banque passes IE
Five new gTLD applications failed their Initial Evaluation this week after being ruled ?geographic?, according to results just published by ICANN.

Famous Four says that Demand Media?s .cam should be rejected
Demand Media?s application for .cam should be rejected because it lost a String Confusion Objection filed by .com registry Verisign, according to rival applicant Famous Four Media.

Top-level domains to soon increase in number, diversity [PC Advisor]
The internet is chock full these days, and if you want to stand out and compete you need not only a great website but also a memorable?and preferably short?domain name.

DIGITAL, RETAIL, SPECTACLE: Think Fashion Week Has Gone Digital This Year? Wait ?til .FASHION launches.
Fashion Week, now underway in NYC, is perhaps the ultimate example of the retail industry?s proclivity for spectacle and showmanship. Even though producing just one runway show can cost over $1 million dollars, as industry expert Kate Betts explained to Marketplace?s Kai Ryssdal yesterday, the residual exposure is worth it thanks in large part to digital devices and social media.

The fuss over name collisions, and what it means for new TLDs
Lately you've probably been hearing a lot about name collisions, and unless you?re a nerd (no problem there, because we love nerds), you might not know what a name collision is, or why ICANN is projecting a 3-6 month wait for 20 percent of new TLDs that pose a moderate name collision risk.

dotShabaka Diary ? Day 8, Launch Uncertainty
Today, the eighth installment of dotShabaka Registry?s journal, charting its progress towards becoming one of the first new gTLDs to go live, written by general manager Yasmin Omer.

Islamic Republic of Iran Wants .Islam and .Halal Managed and Operated by the Muslim Community
The Islamic Republic of Iran in a letter to ICANN said that the new gTLD applications of .ISLAM and .HALAL ?should be managed and operated by the Muslim community through a neutral body that represents the different sections and segments of the Muslim community including Governments, NGOs and IGOs, Private Sector, Academia, as different stakeholders of internet in the this community.?

New gTLDs: The Registry Lock by Jean Guillon
Last week, The New York Times website domain was hacked by "the Syrian Electronic Army". Other famous websites faced the same attack in 2012 by the Hacker group "UGNazi" and, in 2011 by Turkish hackers. Basically, it seems that no Registrar on the Internet is safe from attack, but the launching of new gTLDs can offer new ways to mitigate these attacks.

NST Cyber Security Framework Proposal Provides No 'Measurable Cybersecurity Assurance' [CSO]
The latest draft of the Cyber Security Framework (CSF) mandated by President Barack Obama in February fails to provide an effective battle plan for defending the nation's critical infrastructure, experts say.

World's Trouble Spots Escalating Into Cyberthreats For Businesses
In the past, companies could avoid the world's trouble spots, pulling out of war-torn countries and unstable regions to avoid conflict. Yet, as the world's citizens become more savvy online, local unrest is quickly transforming into global threats that companies cannot easily evade.

Security Experts: Expect U.S. Cyber Offensive Efforts To Grow
That the U.S. is stocking its cyber arsenal should come as little surprise, but recent revelations from documents leaked by fugitive Edward Snowden revealed just how much.

Sudden spike of Tor users likely caused by one ?massive? botnet
Researchers have found a new theory to explain the sudden spike in computers using the Tor anonymity network: a massive botnet that was recently updated to use Tor to communicate with its mothership.

Botnet Behind Mysterious Spike In Tor Traffic
Turns out the massive jump in millions of new Tor clients during the past month wasn't about the NSA, Syria, or Tor-based Pirate Bay bundles -- it was pure cybercrime

What?s Theirs Is Mine?
This week?s chosen UDRP decision drives home the point that you can only file a UDRP to enforce your own registered trademarks ? it?s not a tool to enforce pending trademarks and certainly not one to grab domain names from a competitor.

UDRP Files On 11 Year Old Driveups.com; You Got To Watch Double Meanings
United Parcel Service has filed a UDRP against the 11 year old domain name Driveups.com which is generic in nature, but actually has a double meaning.

 - IPv4/IPv6
UAE TRA to Host 4th IPv6 Roadshow for UAE Government Entities
The Telecommunications Regulatory Authority (TRA) has announced September 8 - 12th 2013 as the dates for the fourth IPv6 (internet protocol version 6) Roadshow for UAE Government entities. Hosted at the Authority?s Dubai office, the bespoke

CNN?s African Voices Spotlights Ghanaian Nii Quaynor as the Pioneer of Internet in Africa
The Ghanaian professor is known as ?Africa?s father of the internet,? a web pioneer who helped establish some of the continent?s first online connections.

Netnod Selected to Host RIPE NCC "Warm Node"
On 1 July 2013, the RIPE NCC issued a call for organisations willing to host a "warm node" able operate some of the RIPE NCC's critical services in case of a major disaster in the Amsterdam area. In response, we received expressions of interest from 88 organisations, of which 22 submitted a full Request for Proposal (RFP).

2 subtle changes to GoDaddy.com that are a big deal to the domain industry
GoDaddy rolled out a new marketing message and site enhancements overnight.

GoDaddy says It?s Go Time: new marketing, improved site
GoDaddy rolled out a new marketing program and site enhancements today that are a big step forward from its old marketing approach.

Netcraft September 2013 Web Server Survey
In the September 2013 survey we received responses from 739,032,236 sites, 22.2M more than last month.

Moniker and SnapNames Announce Premium .INFO Domain Name Auction
Moniker? and SnapNames?, both KeyDrive S. A. companies and leading providers of domain name solutions, announced today that Afilias Limited, the .INFO domain name registry, has chosen them to exclusively auction twenty-four premium .INFO domains. This online auction begins September 5 and ends October 10, 2013, at 3:15 pm PDT.

Stop Doing Digital Advertising
Of late, there's been a lot of speculation about the future of online advertising, especially with a recent report on the rise of ad-blocking. The report found that web publishers tend to underestimate the effect of ad-blocking in their business and found that as many as 22.7 percent of people who visited 220 websites in the research were using ad-blocking software. It also found that ad-blocking is set to grow by 43 percent yearly. This spells bad news for both publishers as well as brands that have shifted media budgets online for increased reach, better accountability, and higher return of investment in media investments.

Facebook Delays New Privacy Policy
Facebook has apparently decided to delay a proposed new privacy policy after a coalition of privacy groups asked the Federal Trade Commission on Wednesday to block the changes on the grounds that they violated a 2011 settlement with the regulatory agency.

Privacy Groups Criticize Facebook in FTC Letter on Policies
Privacy groups asked the Federal Trade Commission to prevent Facebook Inc. from changing its data use policies on concern with how the social-network operator handles user information for advertising.

Privacy groups want FTC to oppose Facebook's policy changes [IDG]
Six privacy groups have asked the U.S. Federal Trade Commission to strike down proposed changes to Facebook's policies, as they violate a 2011 settlement with the agency over user privacy.

Privacy groups ask FTC to stop Facebook policy changes
Half a dozen privacy groups have asked the Federal Trade Commission to stop Facebook from enacting changes to two of its governing documents.

G?nter Grass: Facebook is 'crap'
Nobel Laureate and Germany's favourite grumpy old man G?nter Grass is living up to his reputation for voicing everyone's dad's thoughts and called on people to distance themselves from Facebook and "all that crap".

Facebook is 'crap', says Gunter Grass
Facebook is "crap," German novelist and Noble Prize laureate G?nter Grass said in an interview reported Thursday in The Local, a German news website in English.

>From dental braces to astronauts? seats - The signs are that 3D printing is transforming manufacturing, but not in the ways you might expect
Ever since 3D printing?the ability to construct solid objects by building them up, a layer at a time, in plastic or metal?hit public consciousness a couple of years ago, comment has veered towards two extremes. Fans, often in America, insist it will have a dramatic impact, undermining the economics of mass production and repatriating jobs to the West. According to the Harvard Business Review, ?China will have to give up on being the mass-manufacturing powerhouse of the world.? Critics denounce it as overblown hype??a gimmick? according to Terry Gou, the boss of Foxconn, a manufacturing giant in China: he says he will start spelling his name backwards if he is proved wrong.

3D printing scales up
Peek through the inspection windows of the nearly 100 three-dimensional (3D) printers quietly making things at RedEye, a company based in Eden Prairie, Minnesota, and you can catch a glimpse of how factories will work in the future. It is not simply that the machines, some as big as delivery vans, run day and night attended by just a handful of technicians. Instead it is what they are making that shows how this revolutionary production process is entering the manufacturing mainstream.

How 3D printers work
At first, 3D printing was known as stereolithography, a process invented in 1986 by Chuck Hull of 3D Systems. Variations of this process are still used. It begins, like all 3D printing, with software that takes a series of digital slices through a computer model of an object. The shape of each slice is used selectively to harden a layer of light-sensitive liquid, usually with ultraviolet light, to form the required shape. After each layer has been made, the build tray lowers by a fraction, another layer of liquid is added and the process is repeated until the object is complete.

Workers' rights 'flouted' at Apple iPhone factory in China
The new cheaper iPhone that Apple will unveil to a global audience on Tuesday is being produced under illegal and abusive conditions in Chinese factories owned by one of America's largest manufacturing businesses, investigators have claimed.

Google Sued in Europe-Privacy Test Case - Max Mosley Wants Search Results Showing Sexual Escapade Scrubbed
A sadomasochistic sex party is the latest battlefield in the Web's privacy war.

Americans Go to Great Lengths to Mask Web Travels, Survey Finds
Most Americans say they believe the law is inadequate in protecting their privacy online. The e-mail or social media accounts of one in five have been broken into. And most American consumers take great efforts to mask their identities online.

Almost 90 Percent of Internet Users have Taken Steps to Avoid Surveillance, Survey Finds [IDG]
A majority of U.S. Internet users polled in a recent survey report taking steps to remove or mask their digital footprints online, according to a report from the Pew Research Center's Internet Project and Carnegie Mellon University.

Anonymity, Privacy, and Security Online
Overview: A new survey finds that most internet users would like to be anonymous online, but many think it is not possible to be completely anonymous online. Some of the key findings:

The US government has betrayed the internet. We need to take it back by Bruce Schneier
Government and industry have betrayed the internet, and us. By subverting the internet at every level to make it a vast, multi-layered and robust surveillance platform, the NSA has undermined a fundamental social contract. The companies that build and manage our internet infrastructure, the companies that create and sell us our hardware and software, or the companies that host our data: we can no longer trust them to be ethical internet stewards.

Schneier on NSA's encryption defeating efforts: Trust no one [IDG]
The U.S. National Security Agency's efforts to defeat encrypted Internet communications, detailed in news stories this week, are an attack on the security of the Internet and on users' trust in the network, some security experts said.

NSA and GCHQ unlock privacy and security on the internet
US and British intelligence agencies have successfully cracked much of the online encryption relied upon by hundreds of millions of people to protect the privacy of their personal data, online transactions and emails, according to top-secret documents revealed by former contractor Edward Snowden.

N.S.A. Is Able to Foil Basic Safeguards of Privacy on Web
The National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications in the Internet age, according to newly disclosed documents.

NSA decryption revelations 'provide roadmap' to adversaries, US warns
The Obama administration has responded to revelations on the NSA's successes in defeating online security and privacy published on Thursday by the Guardian, New York Times and ProPublica.

NSA Code Cracking Puts Google, Yahoo Security Under Fire
Disclosures that the U.S. National Security Agency can crack codes protecting the online traffic of the world?s largest Internet companies will inflict more damage than earlier reports of complicity in government spying, according to technology and intelligence specialists.

Encryption protocols compromised by NSA and GCHQ, according to leaked Edward Snowden documents
Intelligence agencies from Britain and the US have cracked many of the encryption protocols used to secure communications on the internet, according to documents leaked by the NSA whistleblower Edward Snowden.

Google encrypts data amid backlash against NSA spying
Google is racing to encrypt the torrents of information that flow among its data centers around the world in a bid to thwart snooping by the NSA and the intelligence agencies of foreign governments, company officials said Friday.

Microsoft and Yahoo voice alarm over NSA's assault on internet encryption
Two of the world's biggest technology companies, Microsoft and Yahoo, expressed deep concern on Friday about widespread attempts by the US and UK intelligence services to circumvent the online security systems that protect the privacy of millions of people online.

us: Legislation Seeks to Bar N.S.A. Tactic in Encryption
After disclosures about the National Security Agency?s stealth campaign to counter Internet privacy protections, a congressman has proposed legislation that would prohibit the agency from installing ?back doors? into encryption, the electronic scrambling that protects e-mail, online transactions and other communications.

NSA can see through encryption, including your private e-mail's, says report
Despite losing a '90s era debate over allowing a government back door into all encryption technologies, the US National Security Agency set up a clandestine program code-named Bullrun and can now circumvent much of the virtual armor intended to protect digital communications -- from everyday e-mails to financial and medical records -- according to a report from The New York Times.

NSA defeats many online encryption efforts [IDG]
The U.S. National Security Agency has been circumventing many online encryption efforts through a combination of supercomputers, back doors built into technology products, court orders and other efforts, according to a new report from The New York Times and ProPublica.

NSA Can Spy on Smart Phone Data
SPIEGEL has learned from internal NSA documents that the US intelligence agency has the capability of tapping user data from the iPhone, devices using Android as well as BlackBerry, a system previously believed to be highly secure.

NSA 'boasts' accessing smartphone data
The US spy agency NSA boasted internally of being able to unlock encrypted data on smartphones by leading manufacturers, a German news magazine reports.

NSA Can Access Most Smartphone Data, Der Spiegel Reports [AP]
The U.S. National Security Agency is able to crack protective measures on iPhones, BlackBerry and Android devices, giving it access to users' data on all major smartphones, according to a report Sunday in German news weekly Der Spiegel.

U.S. tapped into networks of Google, Petrobras, others - report
The U.S. government tapped into computer networks of companies including Google Inc. and Brazilian state-run oil firm Petroleo Brasileiro SA, according to leaked U.S. documents aired by Globo, Brazil's biggest television network.

Internet experts want security revamp after NSA revelations
Internet security experts are calling for a campaign to rewrite Web security in the wake of disclosures that the U.S. National Security Agency has developed the capability to break encryption protecting millions of sites.

NSA Surveillance Makes for Strange Bedfellows
The controversy over U.S. government surveillance has produced a king-size collection of strange bed fellows. Beneath the covers one finds both amusing ironies and sober insights into the nature of American governance and political psychology.

Dear NSA, Thanks for Making Us All Insecure
Dear stupid, stupid NSA, I?ve got to hand it to you: As an agency set up with the task of breaking codes and spying on people, you seem to be doing a pretty sterling job.

How internet encryption works: You may not realise you use encryption, but you probably do ? and if someone breaks it, your details are theirs to own
Don't be fooled by the suggestion that only terrorists, paedophiles and those with "something to hide" use encryption on the internet. Anyone who shops online uses it ? though probably without realising that that's what the padlock symbol in the address bar of their browser means.

Sigint ? how the NSA collaborates with technology companies
Document shows how 'signals intelligence', or Sigint, 'actively engages US and foreign IT industries to covertly influence and/or overtly leverage their commercial products' designs'

Yahoo Says U.S. Government Requests Most Data
Yahoo! Inc. said it received 12,444 requests for user data from the U.S. government in the first half of this year, more than any other country for which it shares information about data collection.

David Goldstein

 email: david at goldsteinreport.com

 web:   http://goldsteinreport.com/ / http://davidgoldstein.tel/
 phone: +61 418 228 605 - mobile; +61 2 9663 3430 - office/home

"Every time you use fossil fuels, you're adding to the problem. Every time you forgo fossil fuels, you're being part of the solution" - Dr Tim Flannery
Received on Mon Sep 09 2013 - 05:43:23 UTC

This archive was generated by hypermail 2.3.0 : Sat Sep 09 2017 - 22:00:11 UTC