Adolescents were fascinated by the book and film called "Hunger Games". The plot is about a government forcing people to watch, and forcing some to play, a cruel game for life and death. ICANN's own Hunger Games, the so-called "digital archery" or "batching" process, is not lethal to people, but shares all other features: it is forced upon the participants, it is destructive, unfair and unnecessary. more
Whenever I examine the technical elements of the various Internet security certifications and standards that organisations are clamouring to achieve compliance against, I can't help but feel that in too many cases those businesses are prioritising the wrong things and wasting valuable resources. They may as well be following a WWI field guide on how to keep cavalry horses nourished and bayonets polished in a world of stealth aircraft and dirty bombs. more
Last month the FCC released a Notice of Proposed Rulemaking (NPRM) on Customer Proprietary Network Information (CPNI), the information telcos collect about consumers' phone calls. The Commission's proposed rules would adapt and apply privacy rules that have historically applied to the traditional telephone space to broadband carriers. It would also regulate how broadband providers use and share that data. more
The Internet is in for interesting times. Previously, on Renysys' blog I wrote about the engineering issues and the policy issues facing us over the next five years. But there is at least one large issue still lurking. Most of you will not be surprised to learn that almost all of these issues are outgrowths of a single factor: money. The core of the Internet still doesn't have a sustainable business model. more
A new report on 5G and geopolitics by Oxford Information Labs details the complex landscape of 5G security. Importantly, it draws out how a variety of proven technical concerns around the quality of Huawei security practices and equipment are drowned out by the US' Twitter diplomacy. Critical international dialogue on genuine cybersecurity concerns relating to 5G and Huawei are being lost in the noise of the US-China trade war. more
n 2004 Jaynes became the country's first convicted spam felon under the Virginia anti-spam law. He's been appealing his conviction ever since, most recently losing an appeal to the Virginia Supreme Court by a 4-3 decision in February. As I discussed in more detail at the time the key questions were a) whether the Virginia law had First Amendment problems and b) whether Jaynes had standing to challenge it. The court answered No to b), thereby avoiding the need to answer a), the dissent answered Yes to both. more
Upon being appointed as ICANN's new CEO in Sydney, Rod Beckstrom gave a rousing speech in which he stressed the vital importance of free expression on the Internet... Many ordinary, powerless people are indeed willing to fight and die. But is ICANN going to help them? Or at very least make sure that their decisions won't help those who want to muzzle them? more
In today's fast-paced world of IoT, perhaps one of the most significant involves the rapid identification of civilian drones -- more formally known as an Unmanned Aerial Vehicle (UAV). The identification of civilian UAVs has become a critical public safety concern today. Establishing a flexible, trusted global means for identifying these objects through worldwide supply chains and resolving the identifier tags to a responsible party rapidly via a network-based resolver is a high priority. more
James Urquhart claims Cloud is complex - deal with it, adding that "If you are looking to cloud computing to simplify your IT environment, I'm afraid I have bad news for you" and citing his earlier CNET post drawing analogies to a recent flash crash. Cloud computing systems are complex, in the same way that nuclear power stations are complex - they also have catastrophic failure modes... more
Planning to register your trademark as a domain name during a Sunrise Period only to find out that the registration appears on a Reserved Names list? There are a number of reasons why a domain that matches your trademark is appearing on a Reserved Names list. First of all, if the domain desired is the subject of Name Collision, it may appear on a Reserved Names list. Although this is not true for all registries, as some operators are allowing domains that have been the subject of Name Collision to be allocated during Sunrise, but not delegated. more
Only an idiot would believe that the U.S. is blocking TSMC manufacture of Huawei cell phone chips because of security fears. This is a commercial rivalry. The U.S. wants to put China's leading technology company out of business. We will fail, of course, at a price far higher than D.C. understands. The U.S. is ready for China's immediate countermeasures, even if Apple's stock price falls $hundreds of billions. But the long-run price will be devastating. more
On Friday I was on a surprisingly interesting session at Rightscon 2018 in Toronto about GDPR and WHOIS. The panel consisted of Eleeza Agoopian from ICANN staff; Avri Doria who was recently appointed to the ICANN board; Elliot Noss who runs large registrar Tucows; Stephanie Perrin who has done a lot of privacy work for the Canadian government and as an ICANN volunteer, and me; Milt Mueller, who is now at Georgia Tech, moderated. more
Former President Theodore Roosevelt is not one whose remarks are usually associated with the domain name industry, but his commentary in 1913 could just as easily have been written today:
"The mob leaders usually state that all that they are doing is necessary in order to advance the cause of 'liberty', while the dictator and the oligarchy are usually defended upon the ground that the course they follow is absolutely necessary so as to secure 'order'. Many excellent people are taken in by the use of the word 'liberty' at the one time, and the use of the word 'order' at the other, and ignore the simple fact that despotism is despotism, tyranny tyranny, oppression oppression, whether committed by one individual or by many individuals, by a state or by a private corporation." more
In reading a Q&A with Verizon's Brian Whitten I found this striking Q and A: "Q. With a fiber connection being symmetric, many fiber providers such as Paxio are providing symmetric connections such as 5Mbit, 10Mbit, 30Mbit. Why is Verizon keeping this arbitrary asymmetric limit with Fiber? A. ...Indeed, our FTTP network can easily support a symmetric data service. As market dynamics change, we would re-assess the benefit to our customers of introducing a class of symmetric data services." My reaction is "No thank you, I'd rather do it myself". To understand my reaction you need to recognize the difference between wanting to build my own bridge across a stream and asking why I'm not allowed to cross it myself using my own boat. more
One could think that the authors of The Universal Declaration of Human Rights (UDHR) -- adopted in 1948 -- had the Internet in mind when they declared in Article 19: "Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers." All human beings are entitled to certain rights, and it makes no difference if they choose to exercise them in a town square or an Internet chatroom. more
Sponsored byDNIB.com
Sponsored byWhoisXML API
Sponsored byIPv4.Global
Sponsored byVerisign
Sponsored byVerisign
Sponsored byRadix
Sponsored byCSC