On September 24, 2015, the free supply of IPv4 numbers in North America dwindled to zero. Despite fears to the contrary, IPv4 network operators have been able to support and extend their IP networks by purchasing the IPv4 address space they need from organizations with excess unused supply through the IPv4 market. The IPv4 market has proved to be an effective means of redistributing previously allocated IPv4 numbers, and could provide enough IPv4 addresses to facilitate the Internet's growth for several more years while the protracted migration to IPv6 is underway. more
ToDus, a messaging application described as a "Cuban WhatsApp" and Apklis, a distribution site for Android mobile apps, were featured at the First Computerization Workshop held recently at the Universidad de Ciencias Informáticas (UCI). One might ask, why do we need a Cuban WhatsApp and Apklis when we already have WhatsApp itself and the Google Play Store? more
The existence of the 2001 Cybercrime Convention is generally well known. The treaty has now been ratified/acceded to by 60 countries worldwide, including the United States. Less well known is the existence of the Additional Protocol to the Convention "concerning the criminalization of acts of a racist and xenophobic nature committed through computer systems." more
The dream of a faster, safer, more affordable Internet in the Caribbean sometimes seems elusive. One group of Internet pioneers is taking steps to make it a reality. The Caribbean Peering and Interconnection Forum, or simply CarPIF, is an annual event that brings together the people responsible for delivering Internet services to the region, including internet service providers, internet exchange point operators, content delivery networks, data centre managers and other computer network professionals. more
The lexicon of domain names consists of letters, words, numbers, dots, and dashes. When the characters correspond in whole (identical) or in part (confusingly similar) to trademarks or service marks and their registrations postdate the first use of marks in commerce registrants become challengeable under the Uniform Domain Name Dispute Resolution Policy (UDRP) as cybersquatters. more
My Comcast bill arrived today with a sneaky new $2.68 charge, $2.50 for leasing one (and only one) set-top box and $0.18 for the remote. This new billing line item, like the many others Comcast has introduced, adds to its bottom line with no additional capital expenditure. It shows how resisting the obligation to return to accepting set-top box free, "cable ready" sets was a smart strategy. more
The legal status of domain names is one of the most hotly debated topics with regards to evolving property rights and how they should be applied to technological and intellectual property 'innovations' in cyberspace. At present, there are two opposing factions on this topic: On one hand, there are those who maintain that domain names should be considered as contracts for services, which originate from the contractual agreement between the registrant and the registrar. more
Layered security is a concept that's important for anyone who wants to create a strong, successful defense strategy to understand. This is a strategy that relies on the use of multiple lines of defense in an attempt to repel any potential attacks. For this reason, it's based on the principle that says "no single form of protection is enough to stop a determined cybercriminal. more
What we call a "backend registry" is the mandatory technical platform to operate a domain name extension and all registries have one. It is the backend registry that allows accredited registrars to technically sell domain names for each top-level domain (TLD). The question here is: what happens to a registry, who sells domain names to accredited registrars when his backend registry solution provider is too expensive? more
Is the recently announced Cisco Networking Academy at the Universidad de Ciencias Informáticas a belated drop in the bucket or the first step in a significant opening? Cisco dominated the infrastructure equipment market in Cuba and elsewhere during the early days of the Internet, but Huawei replaced them in Cuba... What does this mean? It might be a belated drop in the bucket. UCI has only 19 trained CNA instructors while the CNA curriculum is being taught by over 20,000 instructors at over 10,000 institutions. more
Ten years ago, I wrote an article that looked back on the developments within the Internet over the period from 1998 to 2008. Well, another ten years have gone by, and it's a good opportunity to take a little time once more to muse over what's new, what's old and what's been forgotten in another decade of the Internet's evolution... The evolutionary path of any technology can often take strange and unanticipated turns and twists. more
The need for an access model for non-public Whois data has been apparent since GDPR became a major issue before the community well over a year ago. Now is the time to address it seriously, and not with half measures. We urgently need a temporary model for access to non-public Whois data for legitimate uses, while the community undertakes longer-term policy development efforts. more
With the DNSSEC Root Key Rollover coming up on October 11, how prepared are we as an industry? What kind of data can we collect in preparation? What is the cost-benefit (or not) of implementing DANE? What can we learn from an existing rollover of a cryptographic algorithm? All those questions and more will be discussed at the DNSSEC Workshop at the ICANN 62 meeting in Panama City, Panama, on Monday, June 25, 2018. more
I recently served on a panel at the Toronto RightsCon 2018 conference (Making Safe Online Access to Affordable Medication Real: Addressing the UN Human Rights resolution for access to essential medicines), where I represented the perspective of Americans struggling to afford their daily medications and desperate to have safe, affordable Internet access to their prescriptions. more
It's been nearly two months since the high profile BGP hijack attack against MyEtherwallet, where crypto thieves used BGP leaks to hijack MEW's name servers, which were on Amazon's Route53, and inserted their own fake name servers which directed victims to their own fake wallet site, thereby draining some people's wallets. It generated a lot of discussion at the time... What isn't fully appreciated is that attack has, in fact, changed the game somewhat... more
Sponsored byRadix
Sponsored byVerisign
Sponsored byVerisign
Sponsored byCSC
Sponsored byWhoisXML API
Sponsored byIPv4.Global
Sponsored byDNIB.com