Encouraging the development of Internet-based services and accelerating the development of local content are often touted as noble objectives. It is also widely acknowledged that reaping the benefits of technology is dependent on reducing Internet connectivity and bandwidth costs, improving infrastructure, and improving quality of service to all Internet users. Yet in a region with over 20 million potential Internet users and great ambitions to create a "knowledge-based society" and develop "technology-driven economies", the cost of access remains prohibitively high and there is a glaring absence of critical Internet infrastructure. more
The arrangements regarding the composition and organisation of the provision and operation of authoritative root servers are one of the more long-lasting aspects of the public Internet. In the late 1980s, Jon Postel, as the IANA, worked with a small set of interested organisations to provide this service. It was informally arranged, without contracts and without payment of any form. more
One of the major principles of the architecture of the Internet was encapsulated in a paper by Saltzer, Reed and Clark, "End-to-End Arguments in System Design". This paper, originally published in 1981, encapsulated very clearly the looming tension between the network and the application: "The function in question can completely and correctly be implemented only with the knowledge and help of the application standing at the end points of the communication system. Therefore, providing that questioned function as a feature of the communication system itself is not possible." At the time this end-to-end argument was akin to networking heresy! more
Yesterday, The Epoch Times reported on leaked internal Chinese government documents revealing that premier Xi Jinping has "personally directed the communist regime to focus its efforts to control the global Internet, displacing the influential role of the United States." Xi's ultimate aim is for the Chinese Communist Party (CCP) to wield "discourse power" over communications and discussions on the global geopolitical stage by controlling content on the Internet. more
On the afternoon of June 17 of this year, there was a widespread outage of online services. In Australia, it impacted three of the country's largest banks, the national postal service, the country's reserve bank, and one airline operator. Further afield from Australia, the outage impacted the Hong Kong Stock Exchange and some US airlines. The roll call of affected services appeared to reach some 500 serv more
In the aftermath of the shutdown of Wikileaks.org by a court order issued at the request of Swiss Bank Julius Baer, Wikileaks has called for the boycott of registrar eNom. eNom is best known as the domain registrar that complied with the federal government's order to shut down a Spanish travel agency because it did business with Cuba -- the agency was not under U.S. jurisdiction and so was hardly violating U.S. law, but their domain was registered in the United States, and that was good enough for the feds. more
The proposed new European Union (EU) Artificial Intelligence Act has been extolled in the media as a bold action by a major legislative body against the perceived dangers of emerging new computer technology. The action presently consists of an initial proposal for a Regulation with annexes from 2021, plus recent Amendments adopted on 14 June. This regulatory behemoth exists entwined among a multitude of other recent EU major regulations... more
It is pretty common knowledge now that domain name growth started to drop around two years ago and is falling still. At this rate there is every chance that TLDs that have only ever seen growth will start to see a decline sometime in the next few years. What follows is a theory on where that growth has gone. It is widely stated that the greater choice provided by hundreds of new gTLDs means that demand is dissipating across them and that's where the growth has gone. more
The new gTLD program and the introduction of 1200+ new domain name registries has significantly altered the marketplace dynamics. New domain name registries must navigate an environment that is, to an extent, stacked against them. This article recommends creation of some improvements and a general de-regulation of the marketplace to encourage innovation and promote its overall health. ICANN, or a combination of Registry Operators, should fund a brief, thorough study of the current marketplace because of the changes that have occurred from the original marketplace for which current regulations were developed. more
Last year there was a "threat" by anonymous group to black out Internet by using DNS Reflection/Amplification attack against the Internet DNS Root servers. I even wrote a little article about it: "End of the world/Internet". In the article I was questioning if this was even possible and what was needed as general interest and curiosity. Well, looking at the "stophaus" attack last week, we are getting some answers. more
Over the past several months, CITP-affiliated Ph.D. student Sarthak Grover and fellow Roya Ensafi been investigating various security and privacy vulnerabilities of Internet of Things (IoT) devices in the home network, to get a better sense of the current state of smart devices that many consumers have begun to install in their homes. To explore this question, we purchased a collection of popular IoT devices, connected them to a laboratory network at CITP, and monitored the traffic that these devices exchanged with the public Internet. more
After the botched burglary at the Watergate Apartments, every scam and scandal that hit the headlines became a 'gate' -- Irangate, Contragate, you name it. The Heartbleed bug is possibly the closest thing to Watergate that this generation of computer security had seen till the past few days -- an exploit in a component that is "just there" -- something you utterly rely on to be there and perform its duties, and give very little thought to how secure (or rather, insecure) it might be. So, fittingly, every such catastrophic bug in an ubiquitous component is now a 'bleed'. more
There's a bit of a debate going on about whether the Kaseya attack exploited a 0-day vulnerability. While that's an interesting question when discussing, say, patch management strategies, I think it's less important to understand attackers' thinking than understand their target selection. In a nutshell, the attackers have outmaneuvered defenders for almost 30 years when it comes to target selection. more
While exploring the UNESCO's interactive atlas of the world's languages in danger, I am happy to see that new generic Top-Level Domains could help save some of these languages. .CAT for Catalan language already exist; .BZH will probably have the "Breton" language to help survive; "Basque" is vulnerable but there is a .EUS initiative; .CORSICA will certainly help the "Corsican" language to develop... more
JavaScript started out as a simple extension for the browser but has become so much more. In part, this is true in building on rich concepts going back to Lisp. Along the way, it has challenged the givens of programming and given us a high-performance flexible language along with rich libraries and rich tools. We're just beginning to discover the possibilities. more
Sponsored byVerisign
Sponsored byVerisign
Sponsored byRadix
Sponsored byCSC
Sponsored byIPv4.Global
Sponsored byDNIB.com
Sponsored byWhoisXML API