A few months ago, there was a lot of discussion that despite its claims, Zoom did not actually offer end-to-end encryption. They're in the process of fixing that, which is good, but that raises a deeper question: why trust their code? (To get ahead of myself, this blog post is not about Zoom.) If Zoom has the key but doesn't abuse it, there isn't a problem, right? Let's fast-forward to when they deploy true end-to-end encryption. Why do we trust their code not to leak the secret key? more
How are new technologies adopted in the Internet? What drives adoption? What impedes adoption? These were the questions posed at a panel session at the recent EuroDiG workshop in June. In many ways, this is an uncomfortable question for the Internet, given the Internet's uncontrolled runaway success in its first two decades. The IPv4 Internet was deployed about as quickly as capital, expertise, and resources could be bought to bear on the problem... more
Trending news and global events impact domain registration behaviors. We observed a slew of coronavirus-themed domain name registrations, for example, as early as January. George Floyd's death, which sparked several Black Lives Matter movements, is no different. Three days after George Floyd died, our data feed started detecting George Floyd-themed domain names... We retrieved all domain names that contain the strings "eorge," and "lackliv" from 28 May to 7 June and found 402. more
The Federal Communications Commission (FCC) has adopted procedures for Phase I of the Rural Digital Opportunity Fund (RDOF) auction, which will award up to $16 billion in support over ten years for the deployment of fixed broadband networks to homes and businesses in census tracks that are unserved by voice and broadband with download speeds of at least 25 Mbps. more
One thing I've noticed recently is that a lot of people are climbing on board the idea of building better broadband to rural America. Many people seem to think that the FCC can somehow act to fix a lot of the shortcomings of rural broadband - but in doing so, they have missed the entire point of what the FCC calls 'light-touch' regulation - because, from a practical perspective, broadband is not regulated at all. more
When UN Secretary-General Antonio Guterres announced in January 2020 that he was preparing a global "roadmap for digital cooperation," he had no idea that six months later, the world had made a quantum leap into the digital age. Home office, distance learning, online shopping, and video conferencing have been around for a long time, but the standstill of the real world during the pandemic has led to an unexpected expansion of the virtual world. more
Does the ICANN Board putting its thumb on the scale, change the status quo assumption of a Policy Development Process (PDP)? The primary assumption of most PDPs is that, in the absence of consensus for change, the status quo remains. Otherwise, Policy would be made by fiat by the PDP's Chair or Co-Chairs and there would be a mad rush to occupy those unpaid, thankless positions. more
The Registration Operations Workshop (ROW) was conceived as an informal industry conference that would provide a forum for discussion of the technical aspects of registration operations in the domain name system and IP addressing. The 9th ROW will be held online on Tuesday, June 16th, 2020 at 13h00-16h00 UTC. more
The bottom line is that success is not guaranteed, but neither is failure -- there is a non-zero probability of success. On May 26th, SpaceX applied for permission to launch 30,000 "second-generation" Starlink broadband Internet satellites. (Note that the software on Starlink satellites is updated about once a week). The application narrative states that the second-generation satellites will be configured... more
Every second, 4.5 billion people using computers and other electronic devices send 100,000 gigabytes of information to each other. Around 60% of the world's population has an Internet connection. North America and Europe have penetrations of 95% and 87%. But Asia and Africa do not yet get beyond 54% and 40%. On those continents, there are many remote areas where there is no Internet yet. At least no affordable Internet. more
The Washington Post reports that a recent poll conducted shows that 3 out of 5 Americans are unable or unwilling to use an infection-alerting app developed by Google and Apple. About 1 in 6 adults can't use the app because they don't own a smartphone -- with the lowest ownership levels for those 65 and older. People with smartphones evenly split between those willing versus unwilling to use such an app. more
Huawei is the strong favorite of Canadian network builders, for good products and extraordinary support. It displaced the incumbents at Bell Canada years ago and has a joint "Living Lab" in Vancouver with Telus. Huawei had already won the 5G contracts. It has a thousand researchers and spends a quarter billion dollars on Canadian R&D. It was a government decision. more
A new survey of security and IT leaders by csoonline.com sheds light on how organizations across industries are dealing with the COVID-19 crisis, how prepared they were when the pandemic first hit, how vulnerable they are, and what the long-term impact on companies may be. Unsurprisingly, the survey found there has been an increased number of employees working from home. more
Surveillance capitalism monetizes private data that it collects without consent of the individuals concerned, data to analyze and sell to advertisers and opinion-makers. There was always an intricate relationship between governments and surveillance capitalists. Governments have the duty to protect their citizens from the excesses of surveillance capitalism. On the other hand, governments use that data, and surveillance capitalism's services and techniques. more
Four years ago, progressive intergovernmental organizations like the European Union became increasingly concerned about the proliferation of hate speech on social media. They adopted legal mechanisms for removing Twitter accounts like Donald Trump's. The provisions were directed at Facebook, Twitter, and YouTube. In June of 2016, a "deconstruction" of these mechanisms was presented to one of the principal global industry standards bodies with a proposal to develop new protocols to rapidly remove such accounts. more
Sponsored byIPv4.Global
Sponsored byRadix
Sponsored byVerisign
Sponsored byCSC
Sponsored byVerisign
Sponsored byWhoisXML API
Sponsored byDNIB.com