You are here: Fairness.com > Resources > Computers & Information Technology > Internet General (see also Fraud, Free Speech, etc.) > Internet: Infrastructure / Domain Names
Internet: Infrastructure / Domain Names
Articles and Resources
Date Fairness.com Resource Read it at: Mar 14, 2012 Domain seizures for copyright infringement likely to go global
QUOTE: Efforts to take down websites for copyright infringement are likely to move beyond U.S.-based registries, with ICANN (the Internet Corporation for Assigned Names and Numbers) promising to more closely cooperate with global law enforcement agencies and governments.
Computerworld Feb 29, 2012 Stop the ‘Do Not Track’ Madness
QUOTE: There are certainly aspects of our lives where genuinely intrusive practices can have serious detrimental impacts. But with so much in our world that needs attention, a misguided focus on web advertising personalization is not only irrational, but could ultimately undermine the “free services” basis of the web in ways that we could very soon come to severely regret.
Wired Feb 09, 2012 Texas Jury Strikes Down Patent Troll’s Claim to Own the Interactive Web
QUOTE: The chief issue in the case was whether the first computer program that allowed access to an “interactive web” was created by the little-known Chicago biologist Doyle, who runs Eolas out of Chicago. Or was it one of the web pioneers put on the stand by the defendant companies — such as Pei-Yuan Wei and his Viola browser, or Dave Raggett and his embed tag?
InfoWorld Dec 08, 2011 Breaking News: Feds Falsely Censor Popular Blog For Over A Year, Deny All Due Process, Hide All Details...
QUOTE: The US government has effectively admitted that it totally screwed up and falsely seized & censored a non-infringing domain of a popular blog, having falsely claimed that it was taking part in criminal copyright infringement. Then, after trying to hide behind a totally secretive court process with absolutely no due process whatsoever...
Techdirt Sep 02, 2011 Group Says It Has New Evidence of Cisco’s Misdeeds in China
QUOTE: An advocacy group that accuses Cisco Systems of aiding the Chinese government in monitoring and apprehending members of the banned Falun Gong organization said Friday that it had new evidence to suggest that Cisco specifically tailored its technology for that purpose.
New York Times Aug 31, 2011 Hackers may have stolen more than 200 SSL certificates: Source say DigiNotar breach generated fraudulent certs for Mozilla, Yahoo and Tor, not just Google
QUOTE: Hackers may have obtained more than 200 digital certificates from a Dutch company after breaking into its network, including ones for Mozilla, Yahoo and the Tor project....Security researchers now wonder what else DigiNotar hasn't told users.
Computerworld Aug 22, 2011 Browsing and Privacy: How to Not Get Tracked: All modern browsers have built-in tools and add-ons to protect users from having their Web behavior tracked. But regardless, some sites still find ways to
QUOTE: Every time browser developers and others come up with a defense against tracking — the use of tiny bits of computer code that tells Web sites where you've been on the Internet — the other side ups the ante with a new trick. And it's happening again.
CIO Magazine Jul 11, 2011 Google+: Too many eggs in the Google basket
QUOTE: this isn’t necessarily wrong of Google — it’s just following the law, after all — but it perfectly illustrates a far larger and more pressing issue: Alex lost his Gmail account, his contacts list, and every email he’s ever sent or received, because he updated his Google Profile. These are two services that are only tenuously linked by the Google Taskbar, yet inexorably linked by the Google umbrella.
ExtremeTech Jul 07, 2011 To Slow Piracy, Internet Providers Ready Penalties
QUOTE: After years of negotiations with Hollywood and the music industry, the nation’s top Internet providers have agreed to a systematic approach to identifying customers suspected of digital copyright infringement and then alerting them via e-mail or other means....concerns that consumers might be punished “based on allegations that have not been tested in court.”
New York Times Jun 22, 2011 Nazi hunting: How France first "civilized" the Internet
QUOTE: France has long attempted to "civilize" the Internet out of things like racism and Nazi ideology by curbing their dissemination. In fact, the first battle in this war concluded a decade ago. The winner was France; the loser was the then-reigning giant of the Web—Yahoo—along with the notion that the Internet is a "global" place that inherently transcends national boundaries.
Ars Technica Jun 10, 2011 U.S. Senators Want to Shut Down Bitcoins, Currency of Internet Drug Trade
QUOTE: The tone of the senators' letter comes off as though they themselves don't know what entity they want to destroy or how to go about it. Bitcoins, by nature and general practice, are harmless; they're merely an Internet-based alternative to traditional federal banks. Silk Road is what the U.S. government is really after.
PC World Apr 19, 2011 Freedom on the Net 2011
QUOTE: A large number of governments are also engaging in deliberate efforts to block access to information related to politics, social issues, and human rights.
CNN (Cable News Network) Feb 17, 2011 Feds wrongly links 84,000 seized sites to child porn: Homeland Security overshoots as it takes down popular mooo.com domain alongside child porn sites
QUOTE: As part of the successful seizure of 10 Web domains suspected of storing, displaying, or peddling child pornography, the Department of Justice and Homeland Security's ICE (Immigration and Customs Enforcement) office also seized a domain called mooo.com....it's home to some 84,000 websites primarily belonging to individuals and small businesses.
InfoWorld Jan 09, 2011 Twitter Shines a Spotlight on Secret F.B.I. Subpoenas
QUOTE: THE news that federal prosecutors have demanded that the microblogging site Twitter provide the account details of people connected to the WikiLeaks case, including its founder, Julian Assange, isn’t noteworthy because the government’s request was unusual or intrusive. It is noteworthy because it became public.... the government — in the course of conducting inquiries — has been able to look through much of the information without the knowledge of the people being investigated.
New York Times Dec 21, 2010 F.C.C. Approves Net Rules and Braces for Fight (Media Decoder)
QUOTE: The new rules [approved by the FCC-- Ed.] are, at best, net semi-neutrality. They ban any outright blocking and any “unreasonable discrimination” of Web sites or applications by fixed-line broadband providers, but they afford more wiggle room to wireless providers like AT&T and Verizon.
New York Times Dec 08, 2010 ‘Operation Payback’ Attacks Fell Visa.com (The Lede)
QUOTE: A group of Internet activists took credit for crashing the Visa.com Web site on Wednesday afternoon, hours after they launched a similar attack on MasterCard. The cyber attacks, by activists who call themselves Anonymous, are aimed at punishing companies that have acted to stop the flow of donations to WikiLeaks in recent days. The group explained that its distributed denial of service attacks — in which they essentially flood Web sites site with traffic to slow them down or knock them offline — were part of a broader effort called Operation Payback, which began as a way of punishing companies that attempted to stop Internet file-sharing and movie downloads.
New York Times Dec 01, 2010 F.T.C. Backs Plan to Honor Privacy of Online Users
QUOTE: Saying that online companies have failed to protect the privacy of Internet users, the Federal Trade Commission recommended a broad framework for commercial use of Web consumer data, including a simple and universal “do not track” mechanism that would essentially give consumers the type of control they gained over marketers with the national “do not call” registry.
New York Times Dec 01, 2010 How Lieberman Got Amazon To Drop Wikileaks
QUOTE: [Amazon's] terms of acceptable use include a ban on illegal activities (it's not yet clear whether Wikileaks has broken any laws) and content "that may be harmful to our users, operations, or reputation." It also prohibits using Amazon's servers "to violate the security or integrity of any network, computer or communications system," although Wikileaks obviously obtained the cables long before hopping on Amazon's servers.
Talking Points Memo (TPM) Nov 05, 2010 What happens when Internet Explorer breaks big-time: Much like a bad antivirus signature file, Microsoft's browser is flagging harmless sites and blocking access to them
QUOTE: Much like a bad antivirus signature file, Microsoft's browser is flagging harmless sites and blocking access to them
InfoWorld Oct 28, 2010 Will the lawyers shut down the Web over privacy?
QUOTE: A class-action lawsuit accuses Google of leaking personal data to advertisers -- but would the Web survive if search engines and social networks really had to preserve your privacy?
InfoWorld Jun 02, 2010 Heaviest Users of Phone Data Will Pay More
QUOTE: The trouble for AT&T was that a fraction of users — fewer than 2 percent — made such heavy use of the network that they slowed it down for everyone else. Starting on Monday, AT&T will offer tiered pricing. People will pay based on what they use, which the company says is fairer to everyone.
New York Times May 18, 2010 EFF: Forget cookies, your browser has fingerprints
QUOTE: Even without cookies, popular browsers such as Internet Explorer and Firefox give Web sites enough information to get a unique picture of their visitors about 94 percent of the time, according to research compiled over the past few months by the Electronic Frontier Foundation.
MacWorld May 18, 2010 The cloud's conflict of interest over interoperability: It's time for cloud customers to vote with their dollars to get the openness and portability they've been promised
QUOTE: The core motivation behind the lack of cloud interoperability is based on a simpler rationale: greed. Cloud providers have a clear conflict of interesting in support interoperability, as it deprives them of the ability to lock in customers.
InfoWorld Apr 22, 2010 Is Google the new Rome? Cloud computing may be leading to a federation-like worldview on data management, but national laws will be a major obstacle
QUOTE: Google's Rome-like worldview extends to how it will treat the location of customer data. Google is not offering U.S. businesses any specific assurance that their data will be stored in a U.S.-based data center.
InfoWorld Apr 08, 2010 Complicating Relationships in Media: Apple, NY Times Dealings Raise Questions
QUOTE: By appearing on stage at the Apple event and by launching an iPad app that the Times wants to monetize in every possible way — an app from which Apple will likely make money as well — the Times is becoming more of a business partner with a company it covers incessantly.
MediaActive Feb 24, 2010 Microsoft Takes Down Whistleblower Site, Read the Secret Doc Here
QUOTE: Microsoft has managed to do what a roomful of secretive, three-letter government agencies have wanted to do for years: get the whistleblowing, government-document sharing site Cryptome shut down. Microsoft dropped a DMCA notice alleging copyright infringement on Cryptome’s proprietor John Young on Tuesday after he posted a Microsoft surveillance compliance document that the company gives to law enforcement agents seeking information on Microsoft users.
Wired Jul 14, 2009 Brokering Peace Between Brand Owners and Domainers (Bits)
QUOTE: the proposal [in the Icann meeting] by a group of intellectual property lawyers about how to handle domains with trademarks — there was at least one agreement from nearly all sides: The current approach, which is based on an arbitration proceeding, is broken.
New York Times Jul 07, 2009 Is Cybersquatting Against the Law? When is it OK to buy up an expired domain name? (Explainer)
QUOTE: Cybersquatting, the practice of buying up a domain in order to profit from a trademarked name, is prohibited under the 1999 Anticybersquatting Consumer Protection Act... The First Amendment makes it legal to grab even a famous person's domain name in some situations:...
Slate Jun 25, 2009 Registrars under fire in domain disputes: Are domain registrars making money from cybersquatters at the expense of legitimate brands? If so, why isn't ICANN stopping it?
QUOTE: [Sarah] Deutsche says that all of the companies Verizon has sued for cybersquatting are domain-name registrars that have been accredited by the Internet Corporation for Assigned Names and Numbers...
Computerworld Jun 18, 2009 The future of broadband And access for all: Fast internet for everyone, and a new tax to help pay for it
QUOTE: Spending public money on whizzy new networks appeals to technophiles, but the benefits are not clear for others.
Economist Jun 18, 2009 Internet Marketing: Is Regulation Coming?
QUOTE: Up to now the government has had a hands-off policy toward online marketing, giving companies relatively free rein in how they use tools that track what people do online and then use that data to deliver tailored marketing messages....Advocates of regulation say Internet companies need to be more up-front about their use of so-called behavioral targeting.
BusinessWeek Jun 17, 2009 Keeping a True Identity Becomes a Battle Online
QUOTE: Staking out and protecting their names and trademarks on the Internet has become a seemingly never-ending battle.
New York Times Jun 08, 2009 Paying too much for .com domains? One group blames VeriSign
QUOTE: A group of DNS registrars claims that VeriSign's exclusive contract to manage the .com registry is a product of lobbying, astroturfing, meeting stacking, and legal threats—and it has meant that .com domains cost twice what they otherwise would.
Ars Technica Jun 05, 2009 US shuts 'criminal' internet service provider
QUOTE: The US Federal Trade Commission for the first time has sued and immediately shut down an internet service provider it accused of being a haven for a wide range of criminal activity, including child pornography and the electronic theft of personal banking data.
Financial Times Nov 22, 2008 New Paid Links Service Sparks More Debate: And the Gloves Come Off...
QUOTE: Quite a storm of debate has erupted over a new service called InLinks - essentially a paid text link service that allegedly makes it hard for Google (and other search engines) to detect them.
WebProNews Nov 17, 2008 How to Reclaim Your Online Privacy
QUOTE: Have we as a culture abandoned our right to privacy? Absolutely not. While it's easy to give up, it's also easier than ever to take back your privacy. The new generation of Web browsers takes the possibility of your being snooped on seriously—and that's just the beginning. We'll show you how to go online and remain as stealthy as can be, so the chances of you being ID'd without your consent, or having your ID stolen, are slim to none.
PC Magazine Nov 08, 2008 China Hijacks Popular BitTorrent Sites
QUOTE: China is not new to censoring the Internet, but up until now, BitTorrent sites have never been blocked. Recently however, several reports came in from China, indicating that popular BitTorrent sites such as Mininova, isoHunt and The Pirate Bay had been hijacked.
TorrentFreak Nov 05, 2008 Google Wins the Presidential Election (So Does Obama)
QUOTE: if Lessig has Obama's ear, you might see more policies leaning towards "fair use" of other people's copyrighted works. That also dovetails with Google's agenda, which needs net neutrality and could use less content protection so it can take over the world by providing other people's content and its own advertising over other people's pipes.
PC Magazine Oct 31, 2008 The Midnight Regulation Rush is On!
QUOTE: While most of us are distracted watching the presidential election, the U.S. Treasury Department is quietly pushing through new rules that potentially will have devastating consequences for privacy and e-commerce.
CNET Oct 16, 2008 ISPs are pressed to become child porn cops: New law, new monitoring technology raise concerns about privacy
QUOTE: New technologies and changes in U.S. law are adding to pressures to turn Internet service providers into cops examining all Internet traffic for child pornography....Privacy advocates are raising objections to such tools, saying that monitoring all traffic would be an unconstitutional invasion....But such monitoring just became easier with a law approved unanimously by the Congress and signed on Monday by President Bush.
MSNBC Oct 06, 2008 China's Eye on Web Chatter
ABSTRACT: In China, you can't search for anything you want on popular search engines like Yahoo! or Google. The government has set filters on words that it's leaders think may jeopardize the political state of China. In addition to this search limitation movement, there has been a surveillance scheme employed. In fact, the United States has assisted in the scheme.
Technology Review Oct 01, 2008 Surveillance of Skype Messages Found in China
QUOTE: A group of Canadian human-rights activists and computer security researchers has discovered a huge surveillance system in China that monitors and archives certain Internet text conversations that include politically charged words.
New York Times Sep 03, 2008 Microsoft proposes age-limited digital playgrounds
QUOTE: Microsoft proposes using existing identity verification systems such as school rosters, Department of Motor Vehicle registrations and/or Post Office passport documentation to create identity digital credentials that people would use online to access certain web sites.
CNET Aug 19, 2008 Why You Should Enable Gmail's SSL Feature Right Now
QUOTE: SSL requires a key generated on your end and on the Gmail server’s end. There’s no way for the local guy at Starbucks to get those keys and unencrypt the data by packet sniffing...Did Google know about this? It turns out they were well aware of it. The reason Google didn’t grant users the SSL feature before, according to Perry, was because SSL is expensive.
Wired Aug 15, 2008 Google Privacy Practices Worse Than ISP Snooping, AT&T Charges
QUOTE: Online advertising networks -- particularly Google's -- are more dangerous than the fledgling plans and dreams of ISPs to install eavesdropping equipment inside their internet pipes to serve tailored ads to their customers, AT&T says...AT&T denies that it currently digs deep into the net habits of its users "for the purpose [of] developing a profile of a particular consumer's online behavior."
Wired Aug 08, 2008 Internet Security Hole Revealed: A researcher discloses the details of the major flaw he discovered earlier this year.
QUOTE: "We haven't had a bug like this in a decade," Kaminsky says. Because the attack takes advantage of an extremely common Internet transaction, the flaw is difficult to repair. "If you destroy this behavior, you destroy [the domain name system], and therefore you destroy the way the Internet works," Kaminsky says.
Technology Review Jul 28, 2008 Comcast Spoiling for Fight With FCC
QUOTE: Comcast is poised for legal showdown with the Federal Communications Commission as the agency moves to fine the cable giant for blocking file-sharing traffic on its Web network.
Wired Jul 07, 2008 Telecoms Sue Over High-Speed Links
QUOTE: Telecommunications companies are suing cities around the nation to stop the construction of publicly owned fiber optic systems to bring high-speed Internet, telephone and cable television to communities far from metropolitan centers. Attorneys for cities say the telecommunications suits, whether brought under state law, the Federal Telecommunications Act or other laws, are veiled attempts to stop construction of competing public systems providing an essential utility in the digital age.
National Law Journal, The (NLJ) Jun 18, 2008 Report: NebuAd Forges Packets, Violates Net Standards
QUOTE: An online advertising firm called NebuAd that pays ISPs to let it eavesdrop on web users doesn't just passively record traffic, but actively injects fake packets into responses from other websites in order to deliver cookies to users, according to a technical report released by the advocacy groups Free Press and Public Knowledge on Wednesday.
- Arts & Humanities
- Businesses & Organizations
- Computers & Information Technology
- Family & Friends & Interpersonal
- Government & Politics / History
- Health & Medicine
- Law & Justice
- Media & Journalism
- Personal Finance & Career
- Philosophy & Religion
- Recreation & Entertainment
- Science & Technology
- Social Sciences & Groups
- Arctic / Antarctic / Greenland
- Central America / Caribbean
- Eurasia / Central Asia
- Middle East
- North America
- Oceania / AustralAsia
- South America
- About Fairness.com
- Contact Us
- Conditions of Service
- Fair Use Notice
- Advisory Board
Not a current user? Sign up!