Endpoint
3/30/2017
12:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Authenticated Reality Releases 'The New Internet' With Unrestricted Domain Extensions

Company also announces Android availability of The New Internet, the first-ever secure gateway to the Internet

AUSTIN, TX – Authenticated Reality (www.TheNewInternet.com), creator of The New Internet®, a secure gateway to the internet where all users are authenticated and identified, today announced the launch of its domain registry as well as open beta availability of The New Internet on Android. The ability to register domains on the platform enables companies and individuals to experience full expression of speech with its unrestricted domain extensions, allowing more options for anyone to own the domain name of their choice. Additionally, as all users are authenticated on The New Internet, the verified nature of the domain registry also helps to protect businesses and individuals from phishing scams, hacking and more.   

“With the launch of our domain registry on The New Internet, we’re not only providing fresh real estate for people on the web, but we’re also challenging both the ‘old internet’ and the Internet Corporation for Assigned Names and Numbers (ICANN)’s standards for freedom of expression,” said Chris Ciabarra, co-founder and CTO of Authenticated Reality. “After the U.S. government gave up control of ICANN, it’s more important than ever that we don’t suppress the communities that want their own domain extensions. For example, Dotgay LLC http://dotgay.com has been fighting for rights to ‘.gay’ as a domain extension for almost a decade. Now, with new domains open on The New Internet, any individual, group or business can express themselves any way they want by owning a domain extension that was previously unavailable.”

Launched in February, The New Internet is a new secure gateway to the internet that creates a more authentic experience for users surfing the web in an environment where, for the first time, all users are verified and all URLs are open for comments/ratings to foster real comments, conversations and online interactions from real people. This is accomplished by unprecedented levels of authentication (real-time validation via driver’s license) and patented, browser-based technology, eradicating fake profiles and ensuring the creation of a secure community of people who are authenticated and real.

Businesses and individuals/communities looking to purchase a domain on The New Internet, as well as the internet domain market overall, will benefit from the security of the platform due to the authenticated nature of all users. Here’s how:

●      Businesses - Since all users on The New Internet are authenticated, businesses know who are really visiting their sites, granting access to more accurate analytics about their online customers without having to worry about bots skewing results of online ads and more.  

●      Individuals and Communities - In addition to enhanced site analytics, security and pricing, individuals and communities have the added benefit of unique and creative expression when choosing their domain and extension -- for example, “first name.last name” style options offer a more personal way to market yourself and group.

●      The Domain Market - Current domain owners on the “old internet” have the chance to purchase their domain name on The New Internet as well. Authenticated Reality is also addressing the issue of domain squatting by allowing the purchase of domains on The New Internet that are currently parked by squatters on the old internet. 

“When we heard that The New Internet was opening domain names on the platform, we saw this as a great opportunity to not only protect our brand online, but to also increase security so that the customers of our bank will no longer have to worry about phishing attempts coming from emails that are not from the bank,” said Jim Schneider, Chairman of Horizon Bank. “To be most proactive on this front, Horizon Bank has purchased the domain horizonbanktexas.com on The New Internet."  

For more information about the platform’s domain registry process, including pricing, requirements for purchase and FAQs, please visit http://TheNewInternet.com. You can also see a quick video of the new domain feature here: https://vimeo.com/207035550

In addition to launching the domain feature on The New Internet, Authenticated Reality has also opened its closed beta to Android users, available today. Now, users can surf The New Internet on any iOS, Android, PC or Mac device. To be a part of The New Internet beta, users can visit www.TheNewInternet.com to request access or download it for free via The Apple App Store (download here) for iOS as well as the Google Play store (download here) for Android devices. 

Who is Authenticated Reality?

Authenticated Reality is a company built by seasoned security experts who have set out to create a real, transparent internet experience by creating an environment with only authenticated, real users to encourage more responsible internet behavior that’s in line with real-world actions and consequences. It is the only company that has an automated process to verify identities, ensuring each member of The New Internet® community is answering the question “are you real?” truthfully in order to eradicate fake profiles from the internet completely. The proprietary platform lets users have real and authenticated social interaction on all pages of The New Internet, including commenting, rating, email authentication and more.

Authenticated Reality was founded in 2016 and is headquartered in Austin, Texas with offices in San Diego and San Francisco. For more information, please visit www.TheNewInternet.com

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.