Featured Blogs

Latest

In AI, We Trust!?

When it comes to Artificial Intelligence (AI), there is a widespread fear that AI machines will "take over" and dominate humanity. Today, we should be concerned when governments and digital corporations use AI to replace trust as the fundamental value and principle in the digital domain. more

Can Large Language Models Use the Contents of Your Website?

Large Language Models (LLM) like GPT -- 4 and its front-end ChatGPT work by ingesting gigantic amounts of text from the Internet to train the model and then responding to prompts with text generated from those models. Depending on who you ask, this is either one step (or maybe no steps) from Artificial General Intelligence, or as Ted Chiang wrote in the New Yorker, ChatGPT Is a Blurry JPEG of the Web. more

The Internet as a Public Utility

I recently attended a workshop on Lessons Learned from 40 Years of the Internet, and the topic of the Internet as a Public Utility in the context of national regulatory frameworks came up. For me, 40 years is just enough time to try and phrase an answer to the big policy question: Has the Internet been a success in the experiment of using market forces to act as an efficient distributor of a public good? Or has it raised more issues than it has addressed? more

Australian Government Issues New Guidelines to Address 5G Security Concerns in Smart Cities

The Australian Signals Directorate (ASD) has issued a new set of guidelines warning about the security risks posed by the use of 5G technology in so-called Smart Cities. The ASD's concerns align with those of the Five Eyes security alliance, which has warned that the interconnected nature of a fully connected city makes it vulnerable to cyberattacks. more

Matter - The New IoT Standard

Anybody that uses more than one brand of Internet of Things (IoT) device in the home understands that there is no standard way to connect to these devices. Each manufacturer chooses from a range of different protocols to communicate with and control its devices, such as BLE, LoRa, LTE-M, NB-IoT, SigFox, ZigBee, and others. more

Flying the Flag for the Technical Community: CENTR Provides Feedback to the United Nations’ Initiative on a Global Digital Compact

CENTR, the association which represents European country code top-level domain name registries (ccTLDs), such as .de for Germany or .no for Norway, has provided feedback to the United Nations' initiative on a Global Digital Compact (GDC). The GDC seeks to "outline shared principles for an open, free and secure digital future for all", and invites multistakeholder participation in the consultation phase. more

How You Can Be Hijacked Without Actually Being Hacked

Unsuspecting website visitors are often unaware when they have landed on a spoofed page or are re-directed to malware-hosting web servers designed to steal their sensitive data and information. This attack is known as subdomain hijacking, or subdomain takeover. A web user's private information is then traded on the dark web, and cybercriminals profit, further fueling the expansion of identity theft in the online world. more

If You’re Thinking About Applying to Be the Next ICANN CEO…

ICANN is preparing to search for its next CEO. In the past and again now, each of us has been asked for advice about applying for the job. We have willingly offered our perceptions of what the job requires. The general thrust of our advice is to alert the potential applicant about the complexities and demands of the job so they can assess for themselves whether they might be a viable candidate. Our comments in these situations are, of course, purely our own opinions, and are not connected to the official posture of ICANN. more

The Trade War for Undersea Fiber

A recent article by Joe Brock for Reuters describes a new geopolitical battle over undersea fibers. There are about 400 undersea fiber routes that cross oceans and that connect the world with fiber. This is a huge business, and about 95% of all international broadband traffic passes through the undersea fibers. more

A Brief History and Recent Developments in the Co-Existence of Web2 and Web3 Domains

The Domain Name System (DNS, aka Web 2) and Web3 platforms are two different naming systems available to internet users. While the DNS (Web2) has been a reliable and trusted internet standard for decades, Web3 platforms (such as ENS, Handshake and Unstoppable) are a relatively new technology deployment that presents unique and different features. more

China and Taiwan Recognize Starlink’s Military Value

When Russia invaded Ukraine, SpaceX had around 2,000 satellites in orbit. It was clear from the first day of the war that a low-Earth orbit (LEO) constellation of around 2,000 satellites would be a valuable military and civilian asset. The first truckload of Starlink terminals arrived in Ukraine on February 28, 2022, four days after the invasion. By March 19, there were 5,000 terminals in Ukraine and 150,000 active daily users by May 2nd.China and Taiwan have both seen the strategic value of 2,000 Starlink satellites. more

For ICANN to Have a Future, It Needs to Take Human Rights Considerations Seriously

Despite previous attempts1 I think it is safe to say that the discussion about Human Rights in ICANN was, until recently, fairly dead, even taboo. Nowadays, there seems to be a renewed demand for ICANN to have a future, and it needs to take Human Rights considerations seriously. During the ICANN Cancun meeting, representatives from several stakeholder groups mentioned HR and how they might support ICANN by informing its policy-making processes. more

Humans’ Best Defense Against Cybersecurity

At regular intervals, I have discussed the cybersecurity situation in Australia. In those assessments, I wrote about my frustration that the previous government policies more or less resembled a fire brigade approach. Trying to address individual incidents with regulations and legislation rather than coming up with a holistic strategy. more

Amazon’s Huge IoT Network

In a recent blog post, Amazon invited developers to test drive its gigantic IoT network. This network has been labeled 'Sidewalk' and was created by tying together all of Amazon's wireless devices like Amazon Echos and Ring cameras. Amazon claims this huge wireless network now covers 90% of U.S. households. Amazon created the network by transmitting Bluetooth and 900 MHz LoRa signals from its various devices. more

Adding ZONEMD Protections to the Root Zone

The Domain Name System (DNS) root zone will soon be getting a new record type, called ZONEMD, to further ensure the security, stability, and resiliency of the global DNS in the face of emerging new approaches to DNS operation. While this change will be unnoticeable for the vast majority of DNS operators (such as registrars, internet service providers, and organizations), it provides a valuable additional layer of cryptographic security to ensure the reliability of root zone data. more

Topics

Threat Intelligence

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days