Dr. Laura DeNardis, Professor and Interim Dean of the School of Communication at American University and a Faculty Director of the Internet Governance Lab, is a featured panelist at this week's IGF-USA conference. In advance of the event, I would like to draw attention to her sixth book: The Internet in Everything. Freedom and Security in a World with no Off Switch. This treatise is one of those "should/must-reads" that come along from time-to-time as it focuses on a critical issue that is overlooked by either design or neglect: how digital infrastructure determines policy. more
Artificial intelligence (AI) has become synonymous with innovation, transforming industries at an unprecedented pace. While some may frame AI as a groundbreaking development of our time, it's essential to acknowledge that its roots run deep. AI has evolved immensely from early tools like the abacus to present-day GPU-driven large language models. What sets the current landscape apart? The sheer scale of data, computational demand, and complexity of workloads. more
On May 12th, European legislators head into their final trilogue negotiations around the NIS2 Directive. This week, the Internet Infrastructure Coalition (i2Coalition) shared guidance found below with negotiators, focused on the Directive's Article 23. i2Coalition has been detailing our concerns about Article 23 before even their public consultation in March 2021. more
A friend who read my Creating Sustainable Network Neutrality paper wrote to say, "Help me understand what is so bad about treating different types of communications differently." That's a really good question! If you want to offer vertically integrated services on special purpose networks, such as video entertainment or pager service or telephony, I do not have a problem with that, provided you don't use your market power to impede Internet applications that offer competing services... more
For over a decade, the Internet Corporation for Assigned Names and Numbers (ICANN) and its multi-stakeholder community have engaged in an extended dialogue on the topic of DNS abuse, and the need to define, measure and mitigate DNS-related security threats. With increasing global reliance on the internet and DNS for communication, connectivity and commerce, the members of this community have important parts to play in identifying, reporting and mitigating illegal or harmful behavior, within their respective roles and capabilities. more
ICANN is currently going through a complicated process in order to introduce more Top-Level Domains (TLDs). While the launch of new TLDs is something that a lot of people will welcome it is not without its issues. One of the areas that has been receiving quite a bit of attention is in relation to intellectual property rights. So what has this got to do with privacy? more
SpaceX is now serving customers (aka beta testers) in the northern United States. They will soon be doing so in Southern Canada and recently announced that Germany, where they have applied for permission and have begun construction on two ground stations, will probably be next. Early customers in the US are paying $499 for their user terminals and $99 per month for Internet service. more
Well, here we are on Friday the 13th and I couldn't think of a better way to spend the day than providing an update on GDPR, WHOIS and ICANN. There's lots to cover, so let's dive right in. As we have been talking about for a number of months now, the EU's new General Data Privacy Regulation (GDPR) will become enforceable on May 25th. The ICANN community has been struggling with how GDPR will impact the WHOIS system. more
While Starlink dominates the low-Earth orbit internet race, rivals like OneWeb, Telesat, Amazon's Project Kuiper, and Europe's IRIS² are slowly building capacity, buoyed by geopolitical necessity, state support, and commercial partnerships. more
This week, the ICANN Board will vote on whether to approve the transfer of control of the .ORG domain to a private equity firm called Ethos Capital. This is a weighty decision for ICANN, since in order to approve the sale, it will have to convince itself that this is the right choice in the face of tremendous and widespread opposition, including from those who will be most affected by the sale. more
News of cyberattacks is slowly becoming a new normal. We are still at a stage where high-profile cases, like the recent attack against the American credit reporting company Equifax, in which 145.5 million users had their personal information compromised, raise eyebrows. But we need those eyebrows to stay up because we should never accept cyber threats as the new normal. more
Many have heard of botnets, but for those that aren't certain what they are: Botnets are armies of hacked zombie computers that have malware on them, and send spam email at the command of operators anywhere in the world. They can also be told to deploy denial of service attacks, by all hitting the homepage of a given company, or attacking the DNS server or a service or country. more
Most of us, when we go to a website and see the little lock at the top of the browser, don't think twice and trust that we are communicating with the right company or organization. However, this is no longer the case because of a rather radical development that has largely occurred without notice or intervention by almost everyone. The web now has its own rapidly spreading version of CallerID spoofing that is about to get worse. more
Following on from last year's measurements after World IPv6 Day, the RIPE NCC carried out active measurements on World IPv6 Launch on 6 June 2012. These measurements included latency measurements both on IPv4 and IPv6 from our vantage points to selected hostnames of World IPv6 Launch participants and other dual-stacked parties. We used these measurements to determine the performance of IPv4 versus IPv6 connections. more
Previously, I wrote that the total amount of spam that we are seeing has seen a significant decline over the past year and a half. What does this mean in real terms? Are we finally winning the fight against spam? There are multiple angles. On the one hand, processing spam takes significant system resources... more
Sponsored byVerisign
Sponsored byCSC
Sponsored byWhoisXML API
Sponsored byRadix
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byIPv4.Global