Every now and then I get emails from readers of my blog. I mostly reply to them in private, but I recently got one question where I thought my reply might be of general interest. I took the liberty of editing the question somewhat, but in essence it was: "If you have any insight you can share with my class on cyber warfare and security, I would be delighted on hearing it." In general, I think that it's an obvious conclusion that both offensive and defensive actions with regard to national telecommunications infrastructure is becoming an integral part of a nations security assessments.... more
As a follow up to Susan Brenner's Networks and Nationalization and my comment there, I will go further in this post and talk about the "cyberwar" and "offense" aspects of her article. I think I made this point elsewhere as well... but before getting into a war, it'd be a brilliant idea to actually know that you can win. Cyberwarfare is the sort of game where you don't really need to be a huge government with the largest standing army in the world and sophisticated weaponry in order to win... more
In interviews last Spring, Elon Musk said the data throughput of the next version of Starlink satellite (Gen2) would be almost an order of magnitude greater than that of the first generation and that the new Starship rocket would be needed to launch them. Regulatory and engineering delays slowed Starship's progress, so the Gen2 satellites Musk referred to at the time have not yet been launched. more
Forty five what? Forty five abandoned top-level domains. On November 7, ICANN received a notice from the Communication Regulatory Authority of the State of Qatar that they are terminating the registration agreement for .DOHA. Two weeks before that, the Zadco company terminated .ZIPPO. In addition to the $180,000 application fee, applicants had to hire consultants, make arrangements with back-end operators, go through the certification process to get their TLD online. more
Earlier this year, I wrote about a recent enhancement to privacy in the Domain Name System (DNS) called qname-minimization. Following the principle of minimum disclosure, this enhancement reduces the information content of a DNS query to the minimum necessary to get either an authoritative response from a name server, or a referral to another name server. more
RightsCon, the world's leading summit on tech, society, and human rights has been called "the Davos of Digital Rights" (www.rightscon.org). At RightsCon 2017, the sixth event of the annual summit series on human rights in the digital age, the global human rights community came together in the heart of European politics and policymaking on March 29-31, 2017. More than 1,500 experts from 105 countries around the world, across diverse geographic and stakeholder lines, joined together to produce measurable outcomes on the most pressing and emerging issues threatening human rights in the digital age. more
As the Department of Commerce considers a policy role for the U.S. government in the Internet of Things (IoT), the Department of State is studying a dynamic and evolving international environment around IoT, including technical, commercial, and economic issues. Governments and intergovernmental organizations across the world are waking up to the potential of IoT, and some are looking to move quickly in a nascent landscape to establish themselves as leaders for IoT globally. In the process, few are reaching out to industry. more
I haven't seen it talked about a lot, but the FCC has set aside millimeter wave spectrum that can be used by anybody to provide broadband. That means that entities will be able to use the spectrum in rural America in areas that the big cellphone companies are likely to ignore. The FCC set aside the V band (60 GHz) as unlicensed spectrum. This band provides 14 GHz of contiguous spectrum available for anybody to use. This is an interesting spectrum because it has a few drawbacks. more
Afnic, the association responsible for several Internet Top Level Domains, including the .fr country-code TLD, shares its annual global domain name market analysis. In this new report, the association deciphers global trends and highlights the specific characteristics of the different segments and the regional particularities. more
Recent comments on the name collisions issue in the new gTLD program raise a question about the differences between established and new gTLDs with respect to name collisions, and whether they're on an even playing field with one another. Verisign's latest public comments on ICANN's "Mitigating the Risk of DNS Namespace Collisions" Phase One Report, in answering the question, suggest that the playing field the industry should be concerned about is actually in a different place. The following points are excerpted from the comments submitted April 21. more
Nobody doubts that some time in the near future there will be Internationalized Domain Names (IDNs) in Chinese, Russian or Arabic scripts. The Chinese, Russian and Arabic-character-using worlds are large -- encompassing hundreds of millions of current and potential users. They are politically influential blocs, with the ability to demand action in international meetings. And perhaps most importantly, they are -- at least when taken together -- rich. Everybody knows that access on the web in these languages is not a matter of if, but simply a question of when... more
Starlink expanded to 42 new countries in 2025, added 2.7 million customers, improved network speeds and latency, and continued satellite launches as it nears its first-phase constellation goal of 12,000 satellites. more
I can hardly believe it's that time of year again -- time for our annual top 10 year in review. Having been at this for more than 20 years, you'd think I'd seen it all? But with the domain name industry, things are always in flux, and I could never have predicted some of these items. So without further ado -- here are the top 10 biggest stories from 2022. more
There's lots of security advice in the press: keep your systems patched, use a password manager, don't click on links in email, etc. But there's one thing these adages omit: an attacker who is targeting you, rather than whoever falls for the phishing email, won't be stopped by one defensive measure. Rather, they'll go after the weakest part of your defenses. You have to protect everything -- including things you hadn't realized were relevant. more
I'm writing this in the midst of policy discussions between the Internet world (as embodied in ISOC) and the Telecommunications industry (ITU). The Internet and Telecommunications are very different concepts. The Internet allows us to focus on the task at hand. That's why it is so exciting. Historically telecommunication assumed value was created inside the network and this creates conflict with creating value outside the network. more
Sponsored byRadix
Sponsored byWhoisXML API
Sponsored byCSC
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byVerisign