Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Building Caribbean Internet Infrastructure… One IXP at a Time

Encouraging the development of Internet-based services and accelerating the development of local content are often touted as noble objectives. It is also widely acknowledged that reaping the benefits of technology is dependent on reducing Internet connectivity and bandwidth costs, improving infrastructure, and improving quality of service to all Internet users. Yet in a region with over 20 million potential Internet users and great ambitions to create a "knowledge-based society" and develop "technology-driven economies", the cost of access remains prohibitively high and there is a glaring absence of critical Internet infrastructure. more

The Governance of the Root of the DNS

The arrangements regarding the composition and organisation of the provision and operation of authoritative root servers are one of the more long-lasting aspects of the public Internet. In the late 1980s, Jon Postel, as the IANA, worked with a small set of interested organisations to provide this service. It was informally arranged, without contracts and without payment of any form. more

The End of End-to-End?

One of the major principles of the architecture of the Internet was encapsulated in a paper by Saltzer, Reed and Clark, "End-to-End Arguments in System Design". This paper, originally published in 1981, encapsulated very clearly the looming tension between the network and the application: "The function in question can completely and correctly be implemented only with the knowledge and help of the application standing at the end points of the communication system. Therefore, providing that questioned function as a feature of the communication system itself is not possible." At the time this end-to-end argument was akin to networking heresy! more

Leaked Documents Reveal Xi Jinping’s Communist Chinese Plan to Control the Internet’s Root

Yesterday, The Epoch Times reported on leaked internal Chinese government documents revealing that premier Xi Jinping has "personally directed the communist regime to focus its efforts to control the global Internet, displacing the influential role of the United States." Xi's ultimate aim is for the Chinese Communist Party (CCP) to wield "discourse power" over communications and discussions on the global geopolitical stage by controlling content on the Internet. more

The Risk Factors of CDNs and Centrality

On the afternoon of June 17 of this year, there was a widespread outage of online services. In Australia, it impacted three of the country's largest banks, the national postal service, the country's reserve bank, and one airline operator. Further afield from Australia, the outage impacted the Hong Kong Stock Exchange and some US airlines. The roll call of affected services appeared to reach some 500 serv more

Wikileaks Calls for Boycott of Domain Registrar eNom

In the aftermath of the shutdown of Wikileaks.org by a court order issued at the request of Swiss Bank Julius Baer, Wikileaks has called for the boycott of registrar eNom. eNom is best known as the domain registrar that complied with the federal government's order to shut down a Spanish travel agency because it did business with Cuba -- the agency was not under U.S. jurisdiction and so was hardly violating U.S. law, but their domain was registered in the United States, and that was good enough for the feds. more

The EU AI Act: A Critical Assessment

The proposed new European Union (EU) Artificial Intelligence Act has been extolled in the media as a bold action by a major legislative body against the perceived dangers of emerging new computer technology. The action presently consists of an initial proposal for a Regulation with annexes from 2021, plus recent Amendments adopted on 14 June. This regulatory behemoth exists entwined among a multitude of other recent EU major regulations... more

Where Has the Domain Name Growth Gone?

It is pretty common knowledge now that domain name growth started to drop around two years ago and is falling still. At this rate there is every chance that TLDs that have only ever seen growth will start to see a decline sometime in the next few years. What follows is a theory on where that growth has gone. It is widely stated that the greater choice provided by hundreds of new gTLDs means that demand is dissipating across them and that's where the growth has gone. more

Changes to the Domain Name Marketplace

The new gTLD program and the introduction of 1200+ new domain name registries has significantly altered the marketplace dynamics. New domain name registries must navigate an environment that is, to an extent, stacked against them. This article recommends creation of some improvements and a general de-regulation of the marketplace to encourage innovation and promote its overall health. ICANN, or a combination of Registry Operators, should fund a brief, thorough study of the current marketplace because of the changes that have occurred from the original marketplace for which current regulations were developed. more

DNS Reflection/Amplification Attack: Proved

Last year there was a "threat" by anonymous group to black out Internet by using DNS Reflection/Amplification attack against the Internet DNS Root servers. I even wrote a little article about it: "End of the world/Internet". In the article I was questioning if this was even possible and what was needed as general interest and curiosity. Well, looking at the "stophaus" attack last week, we are getting some answers. more

Who Will Secure the Internet of Things?

Over the past several months, CITP-affiliated Ph.D. student Sarthak Grover and fellow Roya Ensafi been investigating various security and privacy vulnerabilities of Internet of Things (IoT) devices in the home network, to get a better sense of the current state of smart devices that many consumers have begun to install in their homes. To explore this question, we purchased a collection of popular IoT devices, connected them to a laboratory network at CITP, and monitored the traffic that these devices exchanged with the public Internet. more

Bashbleed - A Nasty Reminder Never to Forget Security 101

After the botched burglary at the Watergate Apartments, every scam and scandal that hit the headlines became a 'gate' -- Irangate, Contragate, you name it. The Heartbleed bug is possibly the closest thing to Watergate that this generation of computer security had seen till the past few days -- an exploit in a component that is "just there" -- something you utterly rely on to be there and perform its duties, and give very little thought to how secure (or rather, insecure) it might be. So, fittingly, every such catastrophic bug in an ubiquitous component is now a 'bleed'. more

The Importance of Understanding Attacker Target Selection

There's a bit of a debate going on about whether the Kaseya attack exploited a 0-day vulnerability. While that's an interesting question when discussing, say, patch management strategies, I think it's less important to understand attackers' thinking than understand their target selection. In a nutshell, the attackers have outmaneuvered defenders for almost 30 years when it comes to target selection. more

New gTLDs and Endangered Languages

While exploring the UNESCO's interactive atlas of the world's languages in danger, I am happy to see that new generic Top-Level Domains could help save some of these languages. .CAT for Catalan language already exist; .BZH will probably have the "Breton" language to help survive; "Basque" is vulnerable but there is a .EUS initiative; .CORSICA will certainly help the "Corsican" language to develop... more

The JavaScript Ecosystem

JavaScript started out as a simple extension for the browser but has become so much more. In part, this is true in building on rich concepts going back to Lisp. Along the way, it has challenged the givens of programming and given us a high-performance flexible language along with rich libraries and rich tools. We're just beginning to discover the possibilities. more

Topics

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

DNS Security

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days