I have been an active participant in the ICANN "grand experiment" from the beginning. An experiment in which a private sector led organization was entrusted by the Internet community and governments to be a trustee of a global public resource. However, at no time during my twelve years of participation in ICANN have I been more concerned about the long term viability of this organization than I do now heading into the Singapore meeting. Failure of the ICANN Board to do the right thing in Singapore will have a profound impact on the future of the private sector led model. more
Around 2014, as Stephen (Steve) J. Lukasik proceeded well into his 80s, he began to consider ways to capture the enormous sweep of activities and history in which he was a key figure. Indeed, that sweep was so broad and often compartmentalized, and his output so prolific, that even his closest associates only knew of slices of his accomplishments. So he began sorting through his career and produced this autobiographical essay on his accomplishments at ARPA that is being made posthumously available now. more
I can't help but think that the situation in this rather old joke applies very precisely to the current Australian efforts to compel network operators, through some contemplated regulatory instrument, to record and retain network-collected data about their customers' online activities. What I'd like to examine here the emerging picture that while networks, and network operators, make convenient targets for such surveillance efforts, the reality of today's IP network's are far more complex, and Internet networks are increasingly ignorant about what their customers do. more
Many of you will have seen news stories that explained what was going on: a huge DDoS attack on the infrastructure of Dyn had taken down access to many large websites like Twitter. A great deal of digital ink has since been spilled in the mainstream press on the insecurity of the Internet of Things, as a botnet of webcams was being used. Here are some additional issues that might get missed in the resulting discussion. more
Rather than blathering on to the blogosphere about the superficial features of Google's new Chrome browser I've spent some time studying the available material and [re]writing a comprehensive Wikipedia article on the subject which I intend for anyone to be free to reuse under a Creative Commons Attribution 3.0 license rather than Wikipedia's usual strong copyleft GNU Free Documentation License (GFDL). This unusual freedom is extended in order to foster learning and critical analysis, particularly in terms of security. more
It seems like there is more disturbing news every day about Chinese infiltration of our telecommunications networks. A recent headline said that nine large ISPs have now been infiltrated. Tom Wheeler, a previous Chairman of the FCC, recently wrote an article for the Brookings Institute that speculates that the ability of the Chinese to infiltrate our networks stems back to decisions made decades ago that have never been updated for the modern world of sophisticated hacking. more
Cybersecurity and digitalization were not at the center of the recent summit meetings of the presidents and prime ministers of G7 (US, Canada, UK, Germany, Italy, France, Japan) and BRICS (Brazil, Russia, India, China, South Africa). But cybersecurity and digitalisation are meanwhile too important issues to be ignored if world leaders meet. Insofar it was very natural that both the "XIV BRICS Summit Beijing Declaration" from June 23, 2022, and... more
It depends on whose numbers you like. Andrew Odlyzko claims it's up 50-60% over last year, a slower rate of growth than we've seen in recent years. Odlyzko's method is flawed, however, as he only looks at public data, and there is good reason to believed that more and more traffic is moving off the public Internet and its public exchange points to private peering centers. Nemertes collects at least some data on private exchanges and claims a growth rate somewhere between 50-100%. more
There was one obvious take-away from this week's ICANN meetings in Toronto, and for once it was less about policy and more about geography. Simply put, Africa is really - finally - coming together at ICANN, with a new energy, new unity and lots of new participation from African participants. And from top to bottom, the ICANN community seems to be taking notice. more
Expect a charm offensive as Comcast and scores of sponsored researchers explain how acquiring Time Warner Cable will promote competition and enhance consumer welfare. You might not hear too much about two traditional concerns remedied by actual facilities-based competition: incentives to innovate and reduce prices. Comcast will frame its acquisition as necessary to achieve even greater scale to compete with other sources of video content and maybe to compete with the limited other sources of broadband access. more
As far back as 2011 we predicted that Apple would eventually enter the voice market. We indicated at that time that it was just a matter of time -- in the end it took another three years... While it didn't happen at Christmas that year the company is now ready and will use the VoLTE service to enter this market, which will make it possible to replace Telstra with any other mobile operator around the world... he telcos are not ready for this. While they should be seen as the leaders in the voice call market they are too preoccupied with protecting their traditional business and it is companies like Apple and Samsung who are now leading the charge. more
IT security strategies invariably focus on maintaining impenetrable fortresses around computers and network systems. Firewalls, virtual private networks and anti-virus programs are the tools IT engineers use to create their digital security. Sophisticated defense systems can be very effective at keeping the obvious attackers at bay, yet they often create a false sense of security because the real attacks, the kind that inflict irreparable damage on a system or network, avoid the obvious routes into the secure fortress. more
Jacuzzi, Inc., owner of rights in the mark JACUZZI, challenged the domain name jacuzzi.net.au in this first WIPO decision involving the .au domain. The Australian respondent had used the JACUZZI name for nearly 15 years. more
Today, I share a warning about serious changes to the Community Priority Evaluation (CPE) of the New gTLD Applicant Guidebook. They are not driven by public comment, but by a few voices within the SubPro Implementation Review Team - and they are very likely to lead to disastrous misappropriation of well-known community names, including those of Tribes, Indigenous Peoples and NGOs around the world. more
Bitcoin's unreal hype has obscured that it is mostly used to facilitate drug deals, ransomware, tax evasion, and even the occasional murder for hire. After the 60% price drop, demand for bitcoin mining gear has fallen so much TSMC has to lower sales estimates for 2018... Now, Austrian Ambassador in Tehran Stefan Scholz has suggested it could be a powerful boost to the European intent to bypass the U.S. economic blockade. That could provide demand for $billions of bitcoins. more
Sponsored byRadix
Sponsored byIPv4.Global
Sponsored byVerisign
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byWhoisXML API
Sponsored byCSC