Here we are, half-way through this list of the top 10 IPv6 security myths! Welcome to myth #6. Since IPv6 is just now being deployed at any real scale on true production networks, some may think that the attackers have yet to catch up. As we learned in Myth #2, IPv6 was actually designed starting 15-20 years ago. While it didn't see widespread commercial adoption until the last several years, there has been plenty of time to develop at least a couple suites of test/attack tools. more
It is no secret that in the Caribbean people are crazy about their cell phones. In fact, the Caribbean has one of the highest levels of mobile phone penetration in the world. According to a report from BuddeComm, an Australia-based telecom research firm, mobile phone penetration in Latin America and the Caribbean reached an estimated 80% in early 2009, well above the world average which was about 58%. The report stated that Latin America and the Caribbean together now account for an estimated 12% of the world's 3.97 billion mobile subscribers. more
The Internet Engineering Task Force (IETF) has a curious, non-linear history as a "non-organization" of technical innovators now approaching 47 years. As it approaches a landmark 100th official meeting, it has become embroiled in a controversy that takes it further down the political rabbit hole it has been deepening in recent years. The IETF is considering cancelling its 100th meeting now scheduled in Singapore in November 2017... because "concerns were raised about anti-LGBT laws." more
It has been just over 3 years since the General Data Protection Regulation (GDPR) came into effect, and the work within ICANN (type "EPDP 2a" into your acronym decoder ring) to develop a permanent Registration Data policy is progressing at a snail's pace. At issue is a proposed mandatory requirement for Contracted Parties (really just Registrars), to differentiate between "legal persons" (a fancy way of saying corporations and similar organizations) and "natural persons" (the kind that eat and breathe and schedule Zoom calls). more
The Working Group of Internet Governance has released its final report [PDF]. As I wrote this week in my Law Bytes column, the report comes on the heels of the U.S. statement that it has no intention of surrendering control of root zone file. The WGIG report developed a working definition of Internet governance that states: "Internet governance is the development and application by Governments, the private sector and civil society, in their respective roles, of shared principles, norms, rules, decision-making procedures, and programmes that shape the evolution and use of the Internet."... more
Thanks to Prof. Goldman I see that the Virginia Supreme Court issued its opinion in Jaynes, the state-law criminal spam case that has wound its way through the courts there. It affirms the conviction and rejects the various challenges to Virginia's spam statute... As a side note I should say that it's not often one is actually excited to read an order in a case you're not involved with. This is definitely one of those instances where the excitement is palpable... The news reports billed the case as the first felony conviction for sending spam. more
Yesterday, the National Telecommunications and Information Administration of the U.S. government hosted a workshop discussing the state of IPv6 in the United States and its impact on industry, government, and the Internet economy. I was asked to be a panelist, along with industry executives from ARIN, ISOC, ICANN, Comcast, Akamai, Verizon, Google, VeriSign, DOE, NIST, and DREN. Moderated by Aneesh Chopra, Chief Technology Officer of the United States and Vivek Kundra, Chief Information Officer of the United States, this was the first event in the past few years to truly shine a spotlight on IPv6 adoption (or lack thereof) and introduce key directives to move this issue forward. more
This article was co-authored by Ambassador Daniel A. Sepulveda, serving as U.S. Coordinator for International Communications and Information Policy at the U.S. Department of State, Christopher Painter, serving as Coordinator for Cyber Issues at the U.S. Department of State and Scott Busby, serving as Deputy Assistant Secretary of State for Democracy, Human Rights and Labor. ... The growth of the global Internet as an open platform for innovation and economic and social development has succeeded in large part because of its multistakeholder system of governance. more
When you're standing close to ICANN, the domain business may seem pretty big, but when you stand farther away, not so much. Verisign's revenues are about $1 billion/year. The .COM and .NET top-level domains together have about 150M names. The next biggest gTLDS are .ORG with 25M and .INFO with 12M. The biggest new TLDs are TOP with 2.9M and .XYZ with 1.8M, with both bloated by firesale prices. The rest are smaller, mostly much smaller. more
In a recent interviewed with Roger Collins, president of ProProject and the new owner of Afternic.com, CircleID investigates the logics behind ProProject's strong belief in the domain name secondary market. Once known as a primary domain name auction site, Register.com had purchased Afteric.com in the September of 2000 for $48 million in cash and stock -- 2 years later the site was shut down as money-losing unit until ProProject came along. more
As part of Verisign's ongoing effort to make global internet infrastructure more secure, stable, and resilient, we will soon make an important technology update to how we protect the top-level domains (TLDs) we operate. The vast majority of internet users won't notice any difference, but the update will support enhanced security for several Verisign-operated TLDs and pave the way for broader adoption and the next era of Domain Name System (DNS) security measures. more
Oh, Internet. You had such potential when you were born — darling of the research community, supported by the wealthiest military the world has ever known. And you married well, into a powerful merchant family. Why are you so lost? Is it a midlife crisis? You were born, some say, 40 years ago this week in a lab at UCLA — one of ARPA's many children. It wasn't until nearly two months later that you first spoke, transmitting the letters "L" and "O" before crashing... more
Posted here on behalf of DotConnectAfrica Trust as rejoinder and reply to Andrew Mark's recent article... In his article, Mr. Mark tried to re-frame the ongoing discussions and commentary about DCA Trust's recent IRP victory against ICANN as one about "requisite support for geographic string" to assist him reach the biased conclusion that ZACR's bid has the required support to run .Africa whilst DCA Trust's bid does not. more
In the last few years there have been many discussions on how the Internet is governed, and how it should be governed. The whole World Summit on the Information Society (WSIS) ended talking about this problem. It caused exchange of letters between the US Secretary of State and the European Union presidency. And it caused a public discussion, organized by the US Department of Commerce on that issue. I saw some reflection of this discussion and here are some comments on that. My colleague Milton Mueller of the Syracuse University sent me an e-mail today in which, among other, it says, "A global email campaign by IGP generated comments from 32 countries... more
Reflection amplification is a technique that allows cyber attackers to both magnify the amount of malicious traffic they can generate, and obfuscate the sources of that attack traffic. For the past five years, this combination has been irresistible to attackers, and for good reason. This simple capability, of turning small requests into larger, 'amplified' responses, changed the Distributed Denial of Service (DDoS) attack landscape dramatically. more
Sponsored byCSC
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byIPv4.Global
Sponsored byVerisign
Sponsored byRadix
Sponsored byWhoisXML API