Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Catalan Government Claims Spanish Online Censorship Breaching EU Laws

The Catalan government has written to the European Commission claiming that the Spanish government is in breach of EU law. In a letter from Jordi Puigneró Secretary of Telecommunications, Cybersecurity and the Digital Society at the Government of Catalonia addressed to Andrus Ansip, European Commissioner for Digital Economy and Society, the Catalan government calls out the moves by the Madrid government as censorship. more

The Internet and the Cloud Are Going Into Space

Unlike Bezos and Branson, they're going to stay there. Today we have space-based internet access and a terrestrial internet; within ten years, we'll have a space-based internet. Internet traffic will travel more miles in space than on terrestrial fiber. By that time, the great cloud data centers of Google, Amazon, Microsoft, and their competitors and successors will mostly be in orbit as well. Five years from now, this transition will be obvious, accepted, and well underway... more

Our Vision for Advancing and Growing the Domain Industry

ICANN 54 is upon us, and to commemorate it, we've got www.dublin.pub loaded up with friendly places to network, take advantage of the city's comedy and music scene, and possibly even enjoy a pint. With so many issues to discuss and address this week, a .PUB address wouldn't be the appropriate destination for the entire conference, but for a microsite discussing the cultural and social opportunities that Dublin has to offer, we happen to think it's perfect, especially in the place that gave the world the Irish pub. more

Have We Reached Peak Use of DNSSEC?

The story about securing the DNS has a rich and, in Internet terms, protracted history. The original problem statement was simple: how can you tell if the answer you get from your query to the DNS system is 'genuine' or not? The DNS alone can't help here. You ask a question and get an answer. You are trusting that the DNS has not lied to you, but that trust is not always justified. more

Developing Internet Standards: How Can the Engineering Community and the Users Meet?

There is currently a discussion going on between Milton Mueller and Patrik Fältström over the deployment of DNSSEC on the root servers. I think the discussion exemplifies the difficult relation between those who develop standards and those who use them. On the one hand, Milton points out that the way the signing of the root zone will be done will have a great influence on the subjective trust people and nation states will have towards the system. On the other hand, Patrik states that "DNSSEC is just digital signatures on records in this database". Both are right, of course, but they do not speak the same language... more

Broadband Routers and Botnets: Being Proactive

In this post I'd like to discuss the threat widely circulated insecure broadband routers pose today. We have touched on it before. Today, yet another public report of a vulnerable DSL modem type was posted to bugtraq, this time about a potential WIRELESS flaw with broadband routers being insecure at Deutsche Telekom. I haven't verified this one myself but it refers to "Deutsche Telekom Speedport w700v broadband router"... more

O3b Satellite Internet – Today and Tomorrow

I have written a lot about the potential of low-Earth orbit (LEO) satellites for Internet service, but have not said much about medium-Earth orbit (MEO) satellites - until now. O3b (other three billion) is an MEO-satellite Internet service provider. Greg Wyler founded the company, and it was subsequently acquired by SES, a major geostationary-orbit (GSO) satellite company. (Wyler moved on to found future LEO Internet service provider OneWeb). more

European Commission Pushes IPv6 Forward

The European Commission has released a communication on IPv6, in time for the IPv6 Day in Brussels next 30th May. It goes in the same direction as the report presented at the OECD Ministerial meeting on "Future of the Internet Economy", that was held in Seoul, Korea earlier this month. At the same time, the Commission committed to make its own web services available on IPv6 by 2010. It is good to see that intergovermental organizations take the lead on this, after 10 years of failure of the private sector to actually deploy IPv6... more

New TLD Public Comments: Jumping-to-Conclusions?

Having been involved in the whole TLD issue since its inception, back in the ancient history of the mid-1990's, one would think that nothing would surprise me anymore. As it turns out, however, watching the comments on ICANN's public comment list with respect to the new sTLD proposals, I find that I'm taken-back by some of the kinds of comments I'm seeing. more

Site Finder: The Technical, Legal & Privacy Concerns

It is openly admitted , in the same Implementation PDF file, that all accesses to the Site Finder service are monitored and archived. A further worry for users is the privacy policy and terms of service posted on the Site Finder service. Not only does the simple act of mistyping a URL implicitly cause you, the end user, to accept VeriSign's Terms of Service and Privacy Policy without the chance to review and accept or decline either, but critical information as described above is not disclosed in either policy (as of this writing). The Privacy Policy clearly states... more

Another Try at Proof-of-Work e-Postage Email

Another paper from the Fifth Workshop on the Economics of Information Security, (WEIS 2006) is Proof of Work can Work by Debin Liu and L, Jean Camp of Indiana University. Proof of work (p-o-w) systems are a variation on e-postage that uses computation rather than money. A mail sender solves a lengthy computational problem and presents the result with the message. The problem takes long enough that the sender can only do a modest number per time period, and so cannot send a lot of messages, thereby preventing spamming. But on a net full of zombies, proof of work doesn't work. more

Chinese Alternate Root as a New Beginning and Real Internet Governance

I suppose not many have been listening to Paul Vixie or surfing from China, I have done both. The Chinese "alternate root" has been going on for a while. China is creating an alternate root, which it can control while using the Chinese language. I doubt I need to tell any of you about ICANN, VeriSign, Internet Governance, alternate roots or the history of these issues. Everyone else will. Unlike most of my colleagues, I hold a different opinion on the subject and have for some time. China launches an alternate root? It's about time they do, too! more

A Closer Look at Why Russia Wants an Independent Internet

Actually practical and not necessarily a problem. The Security Council of the Russian Federation, headed by Vladimir Putin, has ordered the "government to develop an independent internet infrastructure for BRICS nations, which would continue to work in the event of global internet malfunctions." RT believes "this system would be used by countries of the BRICS bloc - Brazil, Russia, India, China and South Africa." Expect dramatic claims about Russia's plan for an alternate root for the BRICs and not under Western control. more

Closer Look at Domain Name Transfer Policy and the Hijacking of Panix.com

Given the recent panix.com hijacking, I will give an outline of the current ICANN transfers process for gtlds. In the case of panix.com, evidence so far indicates that a third party that holds an account with a reseller of Melbourne IT, fraudulently initiated the transfer. The third party appears to have used stolen credit cards to establish this account and pay for the transfer. That reseller is analyzing its logs and cooperating with law enforcement. more

Canada Emerging at the Forefront of LTE

Canada has made impressive progress in mobile broadband deployment in recent months. This is partly due to operators needing to arrest falls in revenue from mobile voice services by buttressing their data capabilities, as also by the stimulus to the market introduced through the auction of Advanced Wireless Services spectrum in 2008. This auction overhauled the wireless market, introducing a number of smaller players which have added to the competitive mix as well as furthered the development of LTE. more

Topics

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

DNS Security

Sponsored byWhoisXML API

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days