The EARN IT Act was reintroduced into Congress last Monday, with the promise that it would end Internet platforms' "blanket immunity" for "tens of millions of photos and videos" of child sexual abuse that they allow to circulate online. With the bill already scheduled for hearing in committee, it's on track to be passed quickly. And why shouldn't it be, if its sponsors' claims about it are true? Perhaps because they're not true. more
Time has come again, another year of general elections in Brazil. Some 30,000 candidates are running for Executive and Legislative seats: 1 President, 27 State Governors, 27 Federal Senators, 513 Federal Deputies, 1059 State Deputies, 24 District Deputies to govern 212+ million people and one of the largest economies in the world. For a few lucky industries, success and failure do not correlate with who is in power; for others, policy and regulation are everyday business. more
In 2020, China applied to operate GuoWang, a constellation of 12,992 low-Earth orbit (LEO) broadband Internet satellites, and in 2021, it became clear that it was intended to become China’s global LEO broadband constellation. Can they do it? Maybe, but it will take a long time. China does not have the capacity to launch 12,992 satellites today. I don’t know the mass of their planned satellites, but GuoWang is informally referred to as China’s answer to Starlink. more
NameFind is a GoDaddy company that holds registrations of domain names and seeks to make money off of them by placing pay-per-click ads on parked pages found at the domain names. Global Licensing owns the DEJA VU trademark that is used in connection with strip clubs and other adult-related services. When NameFind used the domain name dejavushowgirls.com to set up a page of pay-per-click ads, Global Licensing sued, raising claims under the federal Anticybersquatting Consumer Protection Act (ACPA), 15 U.S.C. 1125(d). more
There is an interesting battle going on to be the technology that monetizes the control of Internet of Things devices. Like a lot of tech hype, IoT has developed a lot slower than initially predicted -- but it's now finally becoming a big business. I think back to a decade ago when tech prognosticators said we'd soon be living in a virtual cloud of small monitors that would monitor everything in our life. According to those early predictions, our farm fields should already be fully automated, and we should all be living in the smart home envisioned by the Jetsons. more
We do live in turbulent times. There is such a lot happening, with many people feeling overwhelmed and lost. One of the reasons given why we do have these problems is technology. I would argue against that. In all reality, technology is a tool that we can use, and yes, we all know that we can use it for the wrong reasons (cars kill people, atom bombs, killer robots, chemical and biological warfare and so on). However, we have learned to live with it, and in general, the outcome from science, innovation and technology has been positive. more
I work at APNIC, the Regional Internet Registry that serves the Asia Pacific Region. APNIC provides common infrastructure services for the region that support the unique assignment of IP address blocks to Internet network operators within our region through the operation of an address registry. In short, IP addresses are what we do. So, when there are discussions in technology circles about evolving the Internet's address model in varying ways,... more
A few weeks ago, a new vacancy was added to the UN Webpage for Senior Leadership Positions, inviting applications to become the new Tech Envoy. This position has a long and unfortunate backstory. It was created in 2019 as a new role, as an outgrowth of the UN's High-Level Panel on Digital Cooperation and the UN Secretary General's Roadmap for Digital Cooperation -- with a vague remit to "advise senior leadership of the United Nations on key trends in technology and... more
Resource Public Key Infrastructure (RPKI) is a method to secure internet routing traffic by cryptographically verifying routes. As we begin 2022, we look back at 2021 and see how the year saw another significant step towards its adoption. High-profile issues with the old trust-based model of Border Gateway Protocol, designed several decades ago, have shown the continued importance of protecting popular networks from mistakes or hackers. more
Hackers are using company domain names for malicious attacks more than ever before. Established research shows that phishing and related malware attacks most commonly occur from a compromised or hijacked legitimate domain name, a maliciously registered, confusingly similar domain name, or via email header spoofing. Domain security intelligence is the first line of defense in preventing domain cyberattacks. more
From open standards and software to data, 'open' has been a defining word of the internet since its early days. However, most of the digital growth around major platforms has been driven by proprietary software and 'closed' systems. Recently, companies such as Microsoft and Google have been shifting towards open-source software more and more. Over the last few years, additional momentum was created with the USA adopting the open-source approach to cope with lagging behind, mainly, Huawei in the development of 5G networks. more
Every year I write a blog talking about the trends that I think we're likely to see in the coming year. But 2021 was such an unusual year for all of us that I thought it would also be useful to talk about what we accomplished in the industry over the last year while fending off a pandemic. All in all, it was quite a year. more
The Year 2038 Problem relates to representing time in many digital systems as the number of seconds passed since 00:00:00 UTC on 1 January 1970 and storing it as a signed 32-bit integer. Such implementations cannot encode times after 03:14:07 UTC on 19 January 2038. At that time, systems might crash and be unable to restart when the time is changed to that date. It is like the Y2K problem caused by the widespread use of two decimal digits to store the year. While that problem was overhyped... more
The UK government is proposing new regulations to strengthen cyber resilience in the private sector. Their intention is to expand cybersecurity rules for critical infrastructure (CI) operators to include managed service providers (MSPs), more stringent breach notification requirements, and legislation to establish the UK Cyber Security Council as the standards development organization for the cybersecurity profession. This is a welcomed development, but more details about implementation and enforcement are needed. more
When an outage affects a component of the internet infrastructure, there can often be downstream ripple effects affecting other components or services, either directly or indirectly. We would like to share our observations of this impact in the case of two recent such outages, measured at various levels of the DNS hierarchy, and discuss the resultant increase in query volume due to the behavior of recursive resolvers. more
Sponsored byIPv4.Global
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byRadix
Sponsored byCSC
Sponsored byWhoisXML API