ICANNWatch
 
  Inside ICANNWatch  
Submit Story
Home
Lost Password
Preferences
Site Messages
Top 10 Lists
Latest Comments
Search by topic

Our Mission
ICANN for Beginners
About Us
How To Use This Site
ICANNWatch FAQ
Slash Tech Info
Link to Us
Write to Us

  Useful ICANN sites  
  • ICANN itself
  • Bret Fausett's ICANN Blog
  • Internet Governance Project
  • UN Working Group on Internet Governance
  • Karl Auerbach web site
  • Müller-Maguhn home
  • UDRPinfo.com;
  • UDRPlaw.net;
  • CircleID;
  • LatinoamerICANN Project
  • ICB Tollfree News

  •   At Large Membership and Civil Society Participation in ICANN  
  • icannatlarge.com;
  • Noncommercial Users Constituency of ICANN
  • NAIS Project
  • ICANN At Large Study Committee Final Report
  • ICANN (non)Members page
  • ICANN Membership Election site

  • ICANN-Related Reading
    Browse ICANNWatch by Subject

    Ted Byfied
    - ICANN: Defending Our Precious Bodily Fluids
    - Ushering in Banality
    - ICANN! No U CANN't!
    - roving_reporter
    - DNS: A Short History and a Short Future

    David Farber
    - Overcoming ICANN (PFIR statement)

    A. Michael Froomkin
    - When We Say US™, We Mean It!
    - ICANN 2.0: Meet The New Boss
    - Habermas@ discourse.net: Toward a Critical Theory of Cyberspace
    - ICANN and Anti-Trust (with Mark Lemley)
    - Wrong Turn in Cyberspace: Using ICANN to Route Around the APA & the Constitution (html)
    - Form and Substance in Cyberspace
    - ICANN's "Uniform Dispute Resolution Policy"-- Causes and (Partial) Cures

    Milton Mueller
    - Ruling the Root
    - Success by Default: A New Profile of Domain Name Trademark Disputes under ICANN's UDRP
    - Dancing the Quango: ICANN as International Regulatory Regime
    - Goverments and Country Names: ICANN's Transformation into an Intergovernmental Regime
    - Competing DNS Roots: Creative Destruction or Just Plain Destruction?
    - Rough Justice: A Statistical Assessment of the UDRP
    - ICANN and Internet Governance

    David Post
    - Governing Cyberspace, or Where is James Madison When We Need Him?
    - The 'Unsettled Paradox': The Internet, the State, and the Consent of the Governed

    Jonathan Weinberg
    - Sitefinder and Internet Governance
    - ICANN, Internet Stability, and New Top Level Domains
    - Geeks and Greeks
    - ICANN and the Problem of Legitimacy

    Highlights of the ICANNWatch Archive
    (June 1999 - March 2001)


     
    The Big Picture Hacking ICANN
    posted by jon on Thursday July 04 2002, @09:00AM

    fnord writes "Chaos Computer Club member and ICANN director Andy Müller-Maguhn (elected to represent Europe, website here) will be a panelist at a hacker conference in New York next week, along with Paul Garrin of alt.root Name.Space, who also tried and failed during the ICANN new TLD application process. The topic: F**king Up the Internet at ICANN: Global Control Through the Domain Name System and How to Escape."



    I'm not a big fan of name.space (and not just because I'm confused whether they allowed me a .fnord TLD). Why would I pay them more for an alt.root domain than one in ICANN's legacy root? And I profess to being confused as to why Andy would vote for ICANN's reform proposal (and why director Karl Auerbach was MIA).

    Nevertheless I predict that now that ICANN has fully swooned into the arms of the multinat megacorps, someone will do some creative pranking to point out the Emperor's lack of attire, perhaps in a less illegal fashion than Eugene Kashpureff, and perhaps not. At the very least, attendees will learn how to turn VeriSign's WLS to their advantage. To kickstart the proceedings, Uzi Nissan (I covered his nissan.com story here) will also make an appearance. ICANN pats itself on the back and leaves a Kick Me sign. -g

     
      ICANNWatch Login  
    Nickname:

    Password:

    [ Don't have an account yet? Please create one. It's not required, but as a registered user you can customize the site, post comments with your name, and accumulate reputation points ("karma") that will make your comments more visible. ]

     
      Related Links  
  • ICANNWatch.org
  • proposal
  • Eugene Kashpureff
  • learn
  • WLS
  • here
  • appearance
  • here
  • panelist
  • conference
  • Name.Space
  •  
    This discussion has been archived. No new comments can be posted.
    Hacking ICANN | Log in/Create an Account | Top | 18 comments | Search Discussion
    Click this button to post a comment to this story
    The options below will change how the comments display
    Threshold:
    Check box to change your default comment view
    The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
    Re: Hacking ICANN
    by fnord (groy2kNO@SPAMyahoo.com) on Monday July 15 2002, @07:59AM (#7863)
    User #2810 Info
    Reuters coverage on H2K2 can be found here. The site link which should appear for hacktivismo in the story but is invisible can be found in the source code, but it appears to be a typo: hactivismo.com. The real site is hacktivismo.com (Dan Tobias should give them a slap), which at time of writing is returning HTTP Error 403 Access Forbidden. Wow, now that's numerous levels of privacy. Additional coverage here from infowar.com. -g
    [ Reply to This | Parent ]
    Re: Hacking ICANN
    by fnord (groy2kNO@SPAMyahoo.com) on Thursday July 04 2002, @04:21PM (#7644)
    User #2810 Info
    Don't get me wrong. I like Karl. He has done more than could reasonably be expected of anyone under the circumstances. He has always acted with integrity (a concept entirely foreign to ICANN) and I share his views on the big picture. But I see no reason why he couldn't more widely publicize why he wasn't there, even remotely. I thought his lawsuit might constrain him from interacting with those he was suing, but if that is the case, why take part in any BoD meetings? According to ICANN's snailpace record he has remotely attended at least two [1, 2] Special Meetings of the BoD since filing the lawsuit. I fail to see the distinction (in a relevant legal sense) between ICANN Board of Directors public and private meetings. If circumstances have changed in the meantime, a public statement to that effect would be helpful. -g
    [ Reply to This | Parent ]
    Re: Hacking ICANN
    by fnord (groy2kNO@SPAMyahoo.com) on Friday July 05 2002, @05:34AM (#7652)
    User #2810 Info
    In fact that is what the panel which Andy Müller-Maguhn and Paul Garrin are on is addressing:
    The question is raised: Is there hope for seeking fair access to the legacy ROOT.ZONE through due process or is it time to treat ICANN as "damage" and route around it?
    There doesn't seem to be any flood of users to the alternate roots, and as I've said many times, it's a chicken and egg problem. If there isn't much unique content available only via alt roots, why go there? And why put unique content there if most can't see it? Many of the hackers at H2K2 already know about, and use, alt roots but that doesn't amount to fighting corporate oppression. Although changing one's DNS or downloading/installling a plugin doesn't require hacker skills, most non-hackers don't use, or even know about, alt roots.

    What is needed for some kind of success is for unique content to be available, there are millions of users into P2P filesharing, what happens if those files are only available via an alt root? Well, you then have millions of willing users, and even those wishing to police such names and files for IP infringement would have to become users (one could police for files via IP address, there is no alt IP root, but I think that could be gotten around through the use of dynamic IP along with some other tricks). Perhaps someone will write such an app.

    Nevertheless, if this is as far as the hacking goes, it doesn't fight corporate oppression, it is running and hiding from it. With ICANN's growing centralized power and increasing involvement from governments (many of them nasty), it will become increasingly difficult to hide, which is where encryption can play a role.

    The end result of this would be that the SigInt of the USG and others that failed to forewarn about 9/11 would have to deal with thousands or millions of times as much suspicious traffic. Even blackhats don't want to create a conduit for that or such things as kiddie pr0n. But ICANN, by excluding the public from any say in the internet commons, is actually decreasing stability and security. -g

    [ Reply to This | Parent ]
    Re: Hacking ICANN
    by fnord (groy2kNO@SPAMyahoo.com) on Friday July 05 2002, @11:30PM (#7656)
    User #2810 Info
    Erm, he had 500+ TLDs before MdR, and you could vote for more than one representative, so ya, you are a troll, and a fool. -g
    [ Reply to This | Parent ]
  • 2 replies beneath your current threshold.

  • Search ICANNWatch.org:


    Privacy Policy: We will not knowingly give out your personal data -- other than identifying your postings in the way you direct by setting your configuration options -- without a court order. All logos and trademarks in this site are property of their respective owner. The comments are property of their posters, all the rest © 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008 by ICANNWatch.Org. This web site was made with Slashcode, a web portal system written in perl. Slashcode is Free Software released under the GNU/GPL license.
    You can syndicate our headlines in .rdf, .rss, or .xml. Domain registration services donated by DomainRegistry.com