acro.net: As an Escrow.com customer for the past 15 years, I’ve been using its services exclusively for the acquisition and sale of domain names. Exactly a year ago, Escrow.com launched its Domain Concierge service, during NamesCon 2016. I’ve just completed my first transaction using the Escrow.com Domain Concierge, and this is a quick review of my […]
DomainIncite: Public Interest Registry has “paused” its plan to allow copyright owners to seize .org domains used for piracy. In a statement last night, PIR said the plans were being shelved in response to publicly expressed concerns. The Systemic Copyright Infringement Alternative Dispute Resolution Policy was an in-house development, but had made its way into the […]
DomainingTips.com: I’ve written about LLLL.coms yesterday and since there’s been quite a bit of interest in LLLs over the past 24 hours after a ~10k CHIP LLL price drop (blog as well as forum discussions), I think it’s time to discuss LLL.coms from an end user perspective.
I’ll do my best to keep this post short.
The conclusion [...]
TheDomains: There has been discussion on Namepros and on social media about where the prices of 3L.com are going. One of the best performing and most liquid of all the domain name categories. So far in 2017, Namebio has recorded 34 three letter .com sales. 2 sales have eclipsed six figures, DiL.com sold by BQDN and […]
The post Where do you see 3L.com prices going ? appeared first on TheDomains.com.
Morgan Linton: As someone that has been blogging for almost ten years (yes, October of this year will be the 10th anniversary of this blog) I tend to be pretty blog-focused when it comes to reading. It’s how I’m programmed and I guess now I’m old so reprogramming me is hard. Okay, not that hard since I […]
CircleID: Ericsson, Nokia get go-ahead for LTE-U base stations despite early fears they might interfere with Wi-Fi – Jon Gold reporting in Network World: "The Federal Communications Commission today approved two cellular base stations — one each from Ericsson and Nokia — to use LTE-U, marking the first official government thumbs-up for the controversial technology. ... T-Mobile has already announced that it will be deploying LTE-U technology… Other major tech sector players, including Google, Comcast, and Microsoft, have expressed serious concerns that LTE-U doesn't play as nicely with Wi-Fi as advertised."
Follow CircleID on TwitterMore under: Mobile, Policy & Regulation, Wireless
In a joint announcement today, Dutch research institute CWI and Google revealed that they have broken the SHA-1 internet security standard "in practice". Industry cryptographic hash functions such as SHA1 are used for digital signatures and file integrity verification, and protects a wide spectrum of digital assets, including credit card transactions, electronic documents, open-source software repositories and software updates.
— "Today, 10 years after of SHA-1 was first introduced, we are announcing the first practical technique for generating a collision," said the Google Team in a blog post today. "This represents the culmination of two years of research that sprung from a collaboration between the CWI Institute in Amsterdam and Google. ... For the tech community, our findings emphasize the necessity of sunsetting SHA-1 usage. Google has advocated the deprecation of SHA-1 for many years, particularly when it comes to signing TLS certificates. ... We hope our practical attack on SHA-1 will cement that the protocol should no longer be considered secure."
— What types of systems are affected? "Any application that relies on SHA-1 for digital signatures, file integrity, or file identification is potentially vulnerable. These include digital certificate signatures, email PGP/GPG signatures, software vendor signatures, software updates, ISO checksums, backup systems, deduplication systems, and GIT." https://shattered.io/
— "This is not a surprise. We've all expected this for over a decade, watching computing power increase. This is why NIST standardized SHA-3 in 2012." Bruce Schneier / Feb 23
Follow CircleID on TwitterMore under: Cyberattack, Security