It appears people, governments, regulators and legislators worldwide may have forgotten Facebook's complicit involvement with Cambridge Analytica (CA). It is possible that new priorities such as the Covid-19 pandemic in 2020 may have pre-occupied them, and rightly so. But an unprecedented data breach in 2019 unfolded this weekend, bringing a recurring nightmare of the past back into today's reality. more
While Panels under the UDRP and judges under the ACPA draw upon a similar body of principles in determining infringement -- both mechanisms, after all, are crafted to combat cybersquatting -- and though arbitration panels and judges undoubtedly view alleged tortious wrongdoing by abusive registrations of domain names through similar lenses and apply laws that may be outwardly similar, each protective mechanism has developed its own distinct and separate jurisprudence. more
Recently, I had time to reflect on various matters after the alternator in my vehicle decided that the middle of a mountain pass was the appropriate time and place to go to that great big pick-and-pull scrapyard in the sky while leaving me stranded with no cell signal on the side of the road in the middle of nowhere. Until that point, I had been seriously considering applying to ICANN's Nominating Committee for one of the three open seats on ICANN's Board of Directors. more
The new Administration in the USA laid out a $100 billion proposal for broadband investment as part of its $2 trillion infrastructure plan. Under the proposal, the plan is to provide national broadband coverage. The Administration will use better competition measures, such as price transparency, the use of public utility infrastructure, and subsidies for low-income households to achieve its goals. more
China has agreed to buy $16 billion/year of Iranian oil in what amounts to a barter arrangement for Chinese goods. Telecommunications is specifically included, with a $billion or more for an upgraded mobile system. Huawei & ZTE will probably split the contract. Iran's population is 84 million, about the same as Germany or Turkey. That's as much as Ireland, Norway, Finland, Denmark, Switzerland, Austria, Sweden, Belgium, and the Netherlands combined. Nothing's announced, but it will be a big deal. more
The US war on Huawei brought down sales internationally, but China's 700,000 5G cells and explosive cloud growth meant Huawei had an up year. The chip blockade did hurt in Q4 and will continue to hold down sales in 2021. Huawei has sufficient reserves to outlast the United States until China catches up in chip production. Perhaps the most important figure in the financial report was the $55 billion cash. Another $10 billion will come in from the sale of Honor/Glory. more
We are getting closer to using alternative broadband solutions offered by international companies. Local telecommunication entities will, in this respect, be relegated to resellers. The reality of accessing low Earth-orbiting satellite (LEO) services is now clearly on the horizon. Most of the telcos and governments are not prepared for the potential shock this might cause to the structure of local telecommunications markets. more
We are on the cusp of a grave risk where unscrupulous groups with various agendas are using digital technologies to wage cultural war to stamp out dissent and gain control and power. The two most prominent recent examples are Donald Trump's "Make America Great Again" (MAGA) and China's Social Credit System (SCS). The following piece was prompted by work on the UDHR and Internet Governance series, for CircleID to deal with UDHR Article 27 and the role of culture, arts, and science in the life of the community. more
Why are networks so insecure? One reason is we don't take network security seriously. We just don't think of the network as a serious target of attack. Or we think of security as a problem "over there," something that exists in the application realm, that needs to be solved by application developers. Or we think the consequences of a network security breach as "well, they can DDoS us, and then we can figure out how to move load around, so if we build with resilience (enough redundancy)... more
Completely eradicating malware, botnets, phishing, pharming, and spam from the Domain Name System is not possible. That may be an odd statement from someone who just took the leadership position at the DNS Abuse Institute, but it's meant to underscore the scope of the work ahead of us. There will always be bad actors exploiting the DNS for their own criminal purposes, but working together, we can mitigate their impact. more
The largest traditional cable providers collectively lost over 1.3 million customers in the fourth quarter of 2020 -- an overall loss of 1.7% of customers. To put the quarter's loss into perspective, the big cable providers lost 14,158 cable customers per day throughout the quarter. The numbers below come from Leichtman Research Group, which compiles these numbers from reports made to investors, except for Cox, which is estimated. more
In an earlier post, I described what looked like two forthcoming Chinese broadband constellations, Hongyun and Hongyan and in another post, I described a third, identified as "GW" at the time. All three were projects of state-owned enterprises China Aerospace Science and Technology Corp. (CASC) and China Aerospace Science and Industry Corp. (CASIC). There was pushback from those contending that a broadband constellation was redundant ... more
Back in 2014, to foster innovation and to better the choice in domain names, ICANN introduced new generic top-level domains through its New gTLD Program. It was a monumental move that enabled businesses, individuals, and communities across the globe to mark their presence on the Internet. Allowing users to be present digitally in their chosen language (non-ASCII characters and scripts) gave opportunities to local businesses, civil societies, and governments to better serve their communities. more
Domain names, domain name systems (DNS), and digital certificates are fundamental components of the most important applications that enable your company to conduct business - including your website, email, voice-over IP, and more. However, these vital applications are being attacked with an increasingly high level of sophistication and severity. more
Most of the single-character .com labels were initially registered in 1993 by Dr. Jon Postel while performing work pursuant to a contract with, and funded by, the U.S. government and are currently assigned to a "shell registrar" created and controlled by ICANN. This shell - which is the 376th entry on ICANN's list of accredited registrars - is misleadingly identified as the IANA registrar while being engaged in the illicit warehousing of domain names for speculative purposes. more
Sponsored byCSC
Sponsored byIPv4.Global
Sponsored byRadix
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byWhoisXML API
Sponsored byVerisign