GNSO Council on .net Criteria

The GNSO Council today accepted the .net criteria (draft resolution text) designed by its .net criteria subcommittee. Due to conflicts of interest, Alick Wilson carried the proxies of all three registrar representatives on Council, and Amadeu Abri…

The GNSO Council today accepted the .net criteria (draft resolution text) designed by its .net criteria subcommittee. Due to conflicts of interest, Alick Wilson carried the proxies of all three registrar representatives on Council, and Amadeu Abril i Abril’s proxy. The registry vote was split.Council also adopted a position submitted by the registry constituency during the conference call. This position calls for all material provisions of the future .net contract, including the proposed fee structure (?), to be published in the draft and final RFPs. It will form part of the cover letter for the report on the .net criteria. There was little discussion on the substance of this; procedurally, there was considerable confusion: Only some council members had received the proposal prior to the call. One joined as late as during the vote, and didn’t even know what it was all about. The vote was then cast as instructed by the single representative of the same constituency who had attended the entire call.MP3 recording here.

Security Theater at the Constitution

While in Boston two weeks ago, I walked along the “Freedom Trail” and also visited the USS Constitution — a strange superposition of a commissioned warship, a national park, and a well-guarded national symbol. While Freedom Trail’s red trace runs…

Media_httplogdoesnote_khkku

While in Boston two weeks ago, I walked along the “Freedom Trail” and also visited the USS Constitution — a strange superposition of a commissioned warship, a national park, and a well-guarded national symbol. While Freedom Trail’s red trace runs straight to the ship, visitors have to pass by blocks of concrete, an armed soldier standing by a camouflage colored Hummer, and finally through security screening: Empty all pockets, remove the belts, and have some Navy soldiers hand-search all bags — while here is a metal detector gate in place, no x-ray device is available.These hand-searches are, on the one hand, intimidating, and ineffective on the other hand: The soldier who searched my laptop bag (used for tourist equipment that day), for instance, would play around with my mobile phone — apparently, he hadn’t seen a Siemens SL55 before –, but would both miss the front compartment of the bag, and the Palm in the main compartment, which — in a consistent security control — should have warranted the same kind of inspection as the mobile phone.Ultimately, one has to wonder what the actual point of this kind of control is, and what kind of attack model is behind it. Terrorists hijacking the Constitution and using it to attack the Fleet Center?Looks a lot like security theater to me.

WHOIS Health Warning

The group of people formerly known as WHOIS Task Forces 1 & 2 met today for its first two-hour conference call after Council’s decision to formally merge the groups. The group received a briefing on what happened in KL, spent too much time on deba…

The group of people formerly known as WHOIS Task Forces 1 & 2 met today for its first two-hour conference call after Council’s decision to formally merge the groups. The group received a briefing on what happened in KL, spent too much time on debating whether the two Task Force chairs should continue as co-chairs (they will do so), and finally addressed “prioritizing.”