Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Help Science Fight COVID-19

Many organizations and individuals are socially committed and voluntarily help the weak, the poor, and the sick. Others consider how they can contribute. Supporting organizations and individuals by starting an aid project, donating money, or providing human resources, can make a crucial difference. The corona crisis is a challenge for many, if not all. Scientists around the world are experimenting with cures and vaccines, and they need help. However, you don't have to be a virologist to help science fight COVID-19. more

Mitigating Spoofed Attacks Using IPv6 Address Space

Timothy D. Morgan's recent paper titled, "IPv6 Address Cookies", seeks to apply the fundamental shift in resource availability brought about by the vastly increased Internet address space in IPv6 to develop a novel, lower cost solution to mitigating spoofed attacks. "Spoofed denial of service attacks have plagued the Internet for a number of years, and show no signs of abating. Research into mitigation techniques has apparently not led to a financially viable solution, and new attacks have been discovered in the wild without being widely anticipated". The following provides an introduction to this paper. more

Congestion in the Backbone: Telecom and Internet Solutions

When a network is subject to a rapid increase in traffic perhaps combined with a rapid decrease in capacity (for example due to a fire or a natural disaster), there is a risk of congestion collapse. In a congestion collapse, the remaining capacity is so overloaded with access attempts that virtually no traffic gets through. In the case of telephony, everyone attempts to call their family and friends in a disaster area. The long standing telephony approach is to restrict new call attempts upstream of the congested area... This limits the amount of new traffic to that which the network can handle. Thus, if only 30% capacity is available, at least the network handles 30% of the calls, not 3% or zero... more

Is IPv6 an Essential Precondition for Internet of Things? Or Are Things Just Fine with IPv4?

It has often been claimed that IPv6 and the Internet of Things are strongly aligned, to the extent that claims are made they are mutually reliant. An Internet of Things needs the massively expanded protocol address space that only IPv6 can provide, while IPv6 needs to identify a compelling use case to provide a substantive foundation to justify the additional expenditures associated with a widespread deployment of this new protocol that only the Internet of Things can provide. more

President of Tucows Responds to WLS Issue

I will try and take a different approach with this post. There are two elements of WLS that I think are most material and are not discussed often enough. They are i) the scope of the original NSI-ICANN contract and ii) the use of multiple accreditations.

...Verisign is paid a sum of money to perform a service. They own neither the primary nor the secondary data. I will not bore you with a recitation of various sections of the agreement nor with long-winded legal arguments. They are for another forum. The implication of this conclusion as it relates to WLS is that any re-registration market service is outside the scope of the original contract and should be treated as any new service should. more

Marking the 30th Anniversary of the Internet and Cybersecurity Treaty

Next week on 1 July 2020 marks the 30th anniversary of one of the most significant treaty instruments in modern times. On 1 July 1990, the Melbourne Treaty came into force as the first and only global treaty that enabled worldwide internets and mobile networks to exist, together with the cybersecurity provisions designed to protect those infrastructures. The achievement remains as an enduring tribute to Richard Edmund Butler of Australia who was one of the most influential, and best-loved Secretaries-General of the ITU. more

Brand Impersonation Online is a Multidimensional Cybersecurity Threat

Brand impersonation happens much more often than people realize. In CSC's latest Domain Security Report, we found that 75% of domains for the Global 2000 that contained more than six characters from the brand names were not actually owned by the brands themselves. The intent of these fake domain registrations is to leverage the trust placed on the targeted brands to launch phishing attacks, other forms of digital brand abuse, or IP infringement... more

My Experience With Starlink Broadband, It Passes “Better Than Nothing” Beta Test

May become the access answer for many at the end of the road. The icicle dripping dish in the picture is the antenna for Starlink, a satellite-based broadband service from SpaceX -- one of Elon Musk's other companies. It came Saturday, just before the snow arrived here in Stowe, VT. It's heated, so I didn't have to shovel it out, and it's working despite its frozen beard. The pandemic has shown us that it is socially irresponsible to leave any family without broadband access. more

The Digital Sovereignty Ecosystem

The terms Digital Sovereignty or Souveraineté numérique have recently risen in prominence to describe the international rule of law as it applies to information and communication technologies. At a time when disinformation is proliferating and the rule of law, democracy, and human rights, together with long-standing relationships, are being cast aside, digital sovereignty is scaling in importance as a key defensive measure among many nations. more

Spectrum Crisis: Wireless Auctions Preferred Method

Talk, conjecture and analysis have predicted a wireless spectrum crisis for years. The official word seems to project a culmination of dropped calls, slow loading of data, downright network access denials as impending by 2015. If so, then we should look at the current argument about how that additional spectrum can be disseminated to wireless carriers in a fair and balanced fashion. more

A Threat to Europe’s Digital Human Rights Stewardship

In a contemporary era when the human rights, democracy, and the rule of law are under attack, Europe has asserted itself as the leading global digital steward for maintaining those values. However, doing so through its Digital Sovereignty initiatives is significantly dependent on the ability to produce timely technical standards that underpin the implementing legislation. more

Estonian Cyber Security Strategy Document: Translated and Public

The Estonians have a public version of their cyber security strategy translated into English (currently available offline only). The concept of a national strategy for cyber security is one which I am particularly fond of... The following is the Summary section from the document which might be of interest... more

Congress Will Oversight ICANN: And You Can Take That to the Bank

Even though the Internet Corporation for Assigned Names and Numbers (ICANN) plays a very important role in the global Internet ecosystem, its activities are not frequently mentioned in the mainstream international media; that is, until ICANN's name is mentioned alongside that of the US Congress in a US$1.1 trillion Omnibus spending bill. Since the bill was passed by the House of Representatives, the issue of ICANN has assumed a certain topicality and has attracted commentary from many pundits. more

Think Beyond .com: From Country Codes to Internationalized Domain Names

One of the major takeaways from the Web Globalization Report Card is the importance of providing "front doors" to your localized websites. These doors begin with the addresses themselves, which may not include the .com domain. In fact, I'd recommend that most localized websites not use the .com domain, as this is an overloaded domain. This article looks at the many ways brands are creating more localized addresses, beginning with country code top-level domains (ccTLDs). more

China Hacks Google, Etc.

Many news sources are reporting on how Google and other corporations were hacked by China. The reports, depending on vendor, blame either PDF files via email as the original perpetrator, or lay most of the blame on an Internet Explorer 0day. more

Topics

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

DNS Security

Sponsored byWhoisXML API

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days