Encryption is key to commerce online. Anything that weakens it is a threat to the digital economy, so the FBI vs Apple case is something that a lot of people are watching very closely... The most recent development is that Apple has filed "Motion to Vacate the Order Compelling Apple Inc. to Assist Agents in Search, and Opposition to the Government's Motion to Compel Assistance." Legal filings aren't light bedtime reading, but this one explores the legal issues as well as the privacy and security implications from multiple angles and underlines why this case is so important. more
It is rather amazing to follow the reporting on the FBI vs Apple case in relation to the FBI's order to Apple to provide them with software that would allow them to crack the security code on all Apple phones. In some of those reports spin doctoring from the FBI -- especially through the public media -- led you to believe that Apple is not willing to assist the FBI in the San Bernardino murder case. This is, however, blatantly false. more
The North American Network Operators Group (NANOG) continues to be one of the major gatherings on network operators and admins, together with the folk who work to meet the various needs of this community. Their program committee produces a program that never fails to provide thought provoking interest. Here are my reactions to some of the presentations I heard at NANOG 66, held in San Diego in February. more
Departing ICANN CEO Fadi Chehadé has penned a goodbye letter to the organisation's Board as he prepares to leave this March. The 7-page letter reads like a long list of Chehadé's achievements since he took over the helm in 2012. Whilst there can be little doubt about Chehadé's tireless energy and dedication to making ICANN a more effective governance mechanism for the Internet, his celebration of the last four years seems to overlook one important opportunity. more
Distributed Denial of Services (DDoS) attacks have been the frustration of information technology professionals for many years. When asked, most tell you they wish their internet service providers (ISPs) would simply provide them "clean pipes" all the time and take care of DDoS attacks upstream before they ever get to them. Unfortunately, the resources (equipment and personnel) necessary to clean Internet connections all the time are very expensive and come with several downsides. more
On 18th February, 2016, Uganda Communications Commission, the Telco regulator, ordered all ISPs to sever access to Facebook, Twitter and WhatsApp. 11 million Internet users, including myself were forced to live through a four-day Internet blackout. With this unprecedented move, Uganda joined Syria, Russia, Egypt, Burundi and other regimes that have weaponized the Internet to curtail free speech and access to information. more
The much-maligned Uniform Rapid Suspension System (URS) is not only failing to catch on -- it's actually starting to fade. Once envisioned as a popular rights-protection mechanism for trademark owners under the new generic top-level domain names (gTLDs), the URS instead is seldom used. In fact, despite the growth in new gTLD registrations, the URS is in decline. more
We tend to make a number of assumptions about the Internet, and sometimes these assumptions don't always stand up to critical analysis. We were perhaps 'trained' by the claims of the telephone service to believe that these communications networks supported a model of universal connectivity. Any telephone handset could establish a call with any other telephone handset was the underlying model of a ubiquitous telephone service, and we've carried that assumption into our perception of the Internet. On the Internet anyone can communicate with anyone else - right? more
In its security bulletin, Akamai's Security Intelligence Response Team (SIRT) reported on abuse of DNS Security Extensions (DNSSEC) when mounting a volumetric reflection-amplification attack. This is not news, but I'll use this opportunity to talk a bit about whether there is a trade-off between the increased security provided by DNSSEC and increased size of DNS responses that can be leveraged by the attackers. more
It's a story told a thousand times: founder of a company ousted by investors. It's a story so common you can find it any day of the week as a minor headline in a tech blog. Not much of a story at all really, until it happened to me. Minds + Machines, the company I founded in 2009, informed me last week that I was no longer wanted as CEO. Without going into details, which I can't, there were differences and disagreements. Still, it was a surprise. All the plans, the hopes -- pfhhht! into thin air. It sucked. Now what? more
ICANN's current CEO Fadi Chehadé is leaving the organisation in a few weeks time. His replacement has been announced and the upcoming public meeting in Marrakech, Morrocco, will be Chehadé's final public engagement as ICANN CEO. A couple of days ago Chehadé sent the ICANN board a letter entitled "Summary of My Tenure". While the letter may have been addressed to the board, it was published on the ICANN website immediately. more
The world has changed significantly since 2000, when the countries of the world adopted the United Nations Millennium Development Goals (MDGs). While strong economic growth in the developing world has helped lift millions out of poverty, global population growth, modern lifestyles and consumption are now stretching the limits of the planet's resources. During this time, technological advances in information and communication technologies (ICT) have radically transformed the way people communicate and lead their lives; now ICT can play a vital, transformative role in helping to put the world on a more sustainable path. more
How can we make the Internet of Things (IoT) more interoperable? How can we help ensure that when you buy a light bulb from one IoT vendor it will work with the light bulb from another IoT vendor? How can we avoid getting to a place where we have to use many different apps to control all the different devices in our homes? As we said in the Internet Society's IoT Overview: Understanding the Issues and Challenges of a More Connected World, "a fragmented environment of proprietary IoT technical implementations will inhibit value for users and industry. more
Think your organization is exempt from in-house network abuse? Think again. A CFCA Global Fraud Survey of communication service providers found that dealer fraud was one of the top five methods of fraud, costing $US 3.35 billion annually. In this scenario, customer service representatives (CSRs) or administrators with access to account information may upgrade friends or family to a premium service package or even provide free access to services. more
As promised, 2016 is off to a busy start at ICANN, with important discussions about Whois/Registration Directory Services, subsequent rounds of the New gTLD Program and internet governance already underway, and more to come. Brand owner concerns will be front and center in the coming months, as community stakeholders set priorities and begin discussions of key challenges and desired results. more
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byRadix
Sponsored byCSC
Sponsored byWhoisXML API