We're in an interregnum where society has paused, and there's no telling how things may turn. In such times of crisis, we are the explorer; exploring the uncharted waters of change, where dangers and opportunities lie. How the pandemic caused this greater societal change may not be something that an individual can alter, we may, however, take the helm and navigate. more
Section 230 of the Communications Decency Act (CDA), says that "No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider." The law was passed in 1996 in order to shield ISPs that transported content or platforms that hosted it from lability. Bloggers were not responsible for comments on their posts, YouTube and Facebook were not responsible for things users posted, etc. more
The posting with a similar name seems a bit contrived by anonymous in some strange attempt to enhance its significance. Many others, including myself, have been discussing this subject for some time. Indeed, a concerted lobbying effort and anti-competitive efforts by legacy TCP/IP internet stakeholders have been really ramped up over the past year to mischaracterize what is occurring. more
Chinese technology policy is now more effective even than their naval posture in the South China Sea, and both are playing out in full sunshine. This success is not about the hardware pillar of Chinese tech policy, though: its focus is the structural approach China and, increasingly, other stakeholders are taking to global Internet Governance... Late in the Year of the Pig just gone, China's offer of a New Internet Protocol was chewed over in senior-level advisory groups of the International Telecommunication Union (ITU)... more
Great article by the BBC about email vs. mobile apps in China -- and why email is losing out to the most popular apps. It's important for Westerners such as myself to remember that most of the world did not first interact with the Internet via desktop computer. In most emerging markets, people leapfrogged computers altogether on their way to using mobile apps. more
The Internet has become an integral part of our lives. Its growth is dependent upon the interaction of engineers, researchers, and network operators to advance networking technologies, policies, governance mechanisms, and deployment. In this undertaking, the Internet's multi-stakeholder governance has relied heavily upon regular face-to-face meetings and conferences to gather individuals and organizations from numerous participating communities. more
Over the past two years, governments and foreign intelligence agencies around the world have tried to understand the inexplicable, chaotic, irrational, indeed maniacal 5G policies of the Trump Administration. Revelations by former Trump administration officials and most recently Trump's niece confirm that there is no rational basis for Trumpian positions and policies and that the best response is to recognize that Washington is no longer capable of playing a meaningful role... more
A cybersecurity company recently attempted reverse domain name hijacking for an exact match domain name of its brand, and in so doing, failed in both its bid to take ownership of the domain and potentially damaged their reputation by using this somewhat nefarious tactic and abusing the Uniform Domain Name Dispute Resolution Policy (UDRP) process. more
The Information Technology Industry Council (ITI) published a recent report that looks at "5G policy Principles and 5G Essentials for Global Policymakers." For those who don't know ITI, they are a DC-based lobbying group that represents most of heavy-hitter tech firms, and which works to help shape policy on tax, trade, talent, security, access, and sustainability issues. I don't think I've seen another document that so clearly outlines the hopes of the big US cellular companies. more
ICANN's founding promise and mandate are optimistic -- ensure a stable and secure internet that benefits the internet community as a whole. Recent months, however, have highlighted the uncomfortable truth that ICANN's and the industry's approach to DNS abuse is actually moving backward, ignoring growing problems, abdicating on important policy issues, and making excuses for not acting. Further, the impending failure of ICANN's new WHOIS policy to address cybersecurity concerns will add fuel to the fire, resulting in accelerating DNS abuse that harms internet users across the globe. more
The Democratic Staff Report Prepared for the use of the Committee on Foreign Relations United States Senate, July 21, 2020, entitled "The New Big Brother," is actually all about 5G technology. The report jumps on the runaway anti-China train chaotically flailing around Washington these days to "out-Trump, Trump." It characterizes 5G technology, longstanding international collaboration, and COVID-19 tracking as all part of a global conspiracy for "digital authoritarianism" run out of Beijing. more
A consortium of the UK Government and Bharti Enterprises bought bankrupt OneWeb, a company that had raised $3.2 billion and had acquired valuable spectrum rights, for $1 billion. That is a good start, but a BBC article says experts believe that at least $3 billion is needed to complete the OneWeb constellation. Will they make it?
The UK government will be a source of further funding. OneWeb's primary goal is closing the digital divide by bringing broadband connectivity... more
One of the recurring themes used to promote 5G is that wireless broadband is going to become a serious competitor to wireline broadband. There are two primary types of broadband competition - competition by price or performance. Cable companies have largely won the broadband battle in cities and suburbs, and I've been thinking about the competition that cable companies might see from 5G. more
The word "confusion" in the Uniform Domain Name Dispute Resolution Policy (UDRP) signifies two separate states of mind. The first in ΒΆ4(a)(i) appears in the phrase "identical or confusingly similar to a trademark or service mark in which the complainant has rights." It is a test to determine whether the mark owner has standing to maintain a UDRP proceeding. more
If you read this blog, you've probably heard by now about the massive Twitter hack. Briefly, many high-profile accounts were taken over and used to tweet scam requests to send Bitcoins to a particular wallet, with the promise of double your money back. Because some of the parties hit are sophisticated and security-aware, it seems unlikely that the attack was a straightforward one directly on these accounts. more
Sponsored byVerisign
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byCSC
Sponsored byWhoisXML API
Sponsored byRadix
Sponsored byDNIB.com