In a previous post, I suggested that Cuba might be able to leap over 4G to 5G wireless infrastructure using satellite and terrestrial networks for backhaul. While that would require political and policy change, it would be a good fit with Cuban culture and skills. Before talking about Cuba, let me say a bit about wireless generations. Each mobile technology generation used new technology and enabled new applications. more
The smartphone has effectively transformed us into cyborgs, we have in our hands a highly efficient computing device equipped with a photo and video camera, microphone, GPS, accelerometer, gyroscope, magnetometer, light and proximity sensors, as well as other features that allow creation of increasingly useful, impressive and addictive applications. more
The current revelations about Cambridge Analytica's use of Facebook data illustrate an important drawback to using a Facebook account as your business' online presence: Facebook knows and sells your customers! Millions of companies - especially small companies and start-ups - rely on a Facebook account for their online presence. On the surface, it seems like a great idea... more
The ICANN Intellectual Property Constituency (IPC) and Business Constituency (BC) will be hosting a community-wide discussion regarding the proposed accreditation and access model for non-public WHOIS data, which was first circulated to the community during ICANN 61. The discussion will take place via ICANN-supported remote participation and/or audio bridge this Friday, April 6, 2018, from 1400-1600 UTC. more
The recent news that Mozilla and Cloudflare are deploying their own DNS recursive resolver has once again raised hopes that users will enjoy improved privacy, since they can send DNS traffic encrypted to Cloudflare, rather than to their ISP. In this post, we explain why this approach only moves your private data from the ISP to (yet another) third party. You might trust that third party more than your ISP, but you still have to trust them. In this post, we present an alternative design -- Oblivious DNS -- that prevents you from having to make that choice at all. more
We are on the brink of the most serious threat to the open and public Internet for decades. ICANN, under pressure from domain name registrars and EU data protection authorities, has proposed an "interim" plan that will hide critical information in WHOIS. Security, threat intelligence, and anti-abuse professionals rely on WHOIS to track down bad guys and keep the Internet as safe and secure as possible. more
Security for Internet-connected devices, the "Internet of Things" (IoT), is critically important. Now, more than ever, it is top of mind for device manufacturers, network operators, consumer advocates, lawmakers, and government regulators -- domestically and internationally. In the face of recent attacks, government authorities and consumer advocates have proposed legislation, frameworks, certifications, and labeling schemes. more
After the Brexit vote, I wrote that there could be an impact on EU registrants based in the UK. Over the past year, the UK government has been engaged in negotiations with the EU to navigate the application of Article 50 and the UK's exit from the European Union. While there has been a lot of focus on issues like the customs union and the border between Ireland and Northern Ireland, the eventual departure of the UK from the EU will have a tangible impact on the European digital economy. more
Having Comcast et al provide Internet connectivity is like having your barber do surgery because he knows how to use a knife. I was reminded of this when my Comcast connection failed. This is part of the larger topic of consumerization. In the past, we were happy to have products that worked at all. I grew up in the world of consumer products and got my start in software building online services meant for use by non-experts. more
For years, corporate domain name portfolio managers have struggled with determining whether or not their portfolios were the "right" size. Managers of mature domain name portfolios have often felt that their portfolios were bloated, containing domains that were no longer needed. Conversely, domain managers of newer portfolios have sometimes known that gaps existed. Regardless, the question remains -- just how many domains should a corporate portfolio contain? more
I'm never surprised by the ability of an IETF Working Group to obsess over what to any outside observer would appear to be a completely trivial matter. Even so, I was impressed to see a large-scale discussion emerge over a single bit in a transport protocol being standardized by the IETF. Is this an example of a severe overload of obsessive-compulsive behaviour? Or does this single bit represent a major point of design principle... more
For decades, academics and technologists have sparred with the government over access to crypographic technology. In the 1970s, when crypto started to become an academic discipline, the NSA was worried, fearing that they'd lose the ability to read other countries' traffic. And they acted. For example, they exerted pressure to weaken DES... The Second Crypto War, in the 1990s, is better known today, with the battles over the Clipper Chip, export rules, etc. more
This post is speculative, but I think Cuba may use satellite for 3G backhaul and, when the technologies are ready, leapfrog over 4G to 5G mobile connectivity and next-generation satellite. ETECSA began rolling out 3G connectivity for Cubans about a year ago and a few things have led me to believe they will continue... But, could they provide widespread 3G mobile? Doing so would require more base stations and more backhaul from those base stations to the Intenet. more
In October of 2016 the Mirai botnet came thundering onto the internet landscape. A digital Godzilla, a DDoS King Kong, this Internet of Things-powered behemoth began smashing DDoS attack records, online powerhouses like Reddit, Etsy, Spotify, CNN and the New York Times crumbling under its fists. When the dust had settled, and services had been restored, one thing seemed certain: a new era of DDoS attacks was upon us. Mirai was terrifying as a botnet but even worse as a harbinger. more
Barely a week passes without something in the news that reminds us of the critical role encryption plays in securing our data. It is a technology that protects so much of what we rely on, as individuals protecting our privacy, as companies securing our business assets and transactions, and as governments responsible for critical national infrastructure. ... The request Kathy mentions came after the San Bernardino shootings in California... more
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byRadix
Sponsored byVerisign
Sponsored byCSC
Sponsored byDNIB.com
Sponsored byIPv4.Global