Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

The Report on “Securing Cyberspace for the 44th Presidency”

A report "Securing Cyberspace for the 44th Presidency" has just been released. While I don't agree with everything it says (and in fact I strongly disagree with some parts of it), I regard it as required reading for anyone interested in cybersecurity and public policy. The analysis of the threat environment is, in my opinion, superb; I don't think I've seen it explicated better. Briefly, the US is facing threats at all levels, from individual cybercriminals to actions perpetrated by nation-states. The report pulls no punches... more

ICANN Sends Termination Notice to Registrar

ICANN has sent EstDomains a termination notice: "BBe advised that the Internet Corporation for Assigned Names and Numbers (ICANN) Registrar Accreditation Agreement (RAA) for EstDomains, Inc. (customer No. 919, IANA No. 943) is terminated..." more

ITU’s Landmark Decisions

The ITU, through its Council acting as the executive body of the Member States, made a "landmark decision" to make available to the public "the main [WCIT] conference preparatory document" and to establish a publicly accessible page "where all stakeholders can express their opinions" on the preparatory document or other WCIT-related matters. more

USC: Solving the Digital Divide?

Like many in the UK communications industry my colleagues and I at Entanet have been eagerly awaiting the Digital Britain report. Darren Farnden, Entanet's Head of Marketing, has posted an interesting assessment of key parts of the report at opinion.enta.net. Given the content of Darren's article I thought it would be useful to post it in full here for CircleID readers... more

The Great Forking Bitcoins of China

Let's say I'm with the Chinese government and decide that I am tired of people evading currency controls and money laundering using Bitcoin. So we adjust the Great Firewall of China to block port 8333. We also add some proxies that allow some uncleared transactions from outside to flow into Chinese networks but not the other way and keep track of which ones we let through. Since a large fraction of the miners are inside China, and all of the hard currency exchanges are outside, this will cause a pretty serious fork. more

Coordinating Attack Response at Internet Scale

How do we help coordinate responses to attacks against Internet infrastructure and users? Internet technology has to scale or it won't survive for long as the network of networks grows ever larger. But it's not just the technology, it's also the people, processes and organisations involved in developing, operating and evolving the Internet that need ways to scale up to the challenges that a growing global network can create. more

Google Book Search Settlement: Another Digital Pandora’s Box

A very good friend of mine is an archivist with the Ontario government, and we share similar views on how technology is impacting modern life. He passed a really interesting item along that ran in yesterday's Washington Post. Some of you may be following this – Google's Book Search Settlement. I can definitely see how this has a direct bearing on the archive space, but also how it touches on a few tangents of my world – emerging communications technologies. more

YouTube, the Government, and Privacy

It was just announced that every member of Congress will be able to create his or her own channel on YouTube. Viewers can go to the House or Senate home pages and navigate via a map to find the videos they're interested in. While it is good that citizens will have more insight into what their Senators and Representatives think, the way this is being done poses a serious privacy risk. more

Copper Theft Costs $1.5 to $2 Billion Annually: A Growing Crisis with Severe Consequences

I recently saw that AT&T is offering a $10,000 reward to anybody who provides information that leads to the arrest and conviction of people stealing copper wiring. The particular announcement is related to a recent theft of copper in South Dallas, Texas, but there have been numerous other thefts. This is not a small problem, and the estimated value of stolen telephone copper is between $1.5 and $2 billion annually. more

Domain Registry/Registrar Cross Ownership: A Reality Check

Funny how marketplace reality can poke holes in claims and theories. A debate is raging between some existing registries (Afilias, PIR, Neustar) and registrars like ourselves over the issue of 'cross-ownership' in Top-Level Domains (TLDs). At question: should the same set of shareholders be allowed to own all or part of a registry as well as a registrar that sells names in the TLD owned by the registry? These registries are saying 'no', and one of their principal objections is they think current registrars have an unfair advantage in pursuing TLD deals. more

Counter-eCrime Operations Summit (APWG) In Prague Next Week

The sixth annual Counter-eCrime Operations Summit (CeCOS VI) will engage questions of operational challenges and the development of common resources for the first responders and forensic professionals who protect consumers and enterprises from the ecrime threat every day. This year's meeting will focus on the shifting nature of cybercrime and the attendant challenges of managing that dynamic threatscape. more

What Will ICANN Do with the $135 Million It Just Got for .WEB?

ICANN has just made USD $135 million from an auction completed today (July 29, 2016) to determine who gets to operate .WEB. The auction was part of ICANN's last resort mechanism, when several parties applied for the same suffix but were unable to resolve this contention by themselves. ICANN has just more than doubled its auction proceeds in one go. more

IPv6 and Airline Tickets… Tales of Two Transitions

The internet bus continues to accelerate straight into the IPv4 address depletion wall with spirited discussions continuing on how to divvy up the remnants of the address space. Obviously all five Regional Internet Registries (RIR's) want to make sure they get their fair share from IANA but what is a fair share remains the subject of interpretation. In the mean time, scenarios of a speculative land rush and auctions of ever smaller address blocks abound with unattractive consequences such as an explosion of the size of the routing table and a stunted growth of the global internet economy... In the meantime, the airline industry completed a rather significant migration of their own... more

Fixing the Internet Might Break It Worse Than It’s Broken Now

Willis Alan Ramsey, who wrote "Muskrat Love," recorded one and only one studio album. The cognoscenti of country think it's a gem, an all time top ten. There's an apocryphal story that when Ramsey was pushed to make another record he allegedly retorted, "What's wrong with the first one?" We who use the Internet every day risk losing sight of what a miracle it is, and the openness that keeps it so miraculous... We also lose sight of the fact that even as the Internet's miracles occur, it's almost always broken or malfunctioning or threatening or worse in many places along the line. more

Phish or Fair?

It shouldn't be a big surprise to hear that phishing is a big problem for banks. Criminals send email pretending to be a bank, and set up web sites that look a lot like a bank. One reason that phishing is possible is that e-mail has no built in security, so that if a mail message comes in purporting to be from, say, [email protected], there's no easy way to tell whether the message is really from bankofamerica.com, or from a crook. more

Topics

DNS Security

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days