The global deployment of Domain Name System Security Extensions (DNSSEC) is charging ahead. With ICANN 38 Brussels just around the corner, DNSSEC deployment will inevitably be the hot topic of discussion over the next few days. Case in point, today, ICANN hosted the first production key ceremony at a secure facility in Culpepper, Va. where the first cryptographic digital key was used to secure the Internet root zone. The ceremony's goal was simple: for the global Internet community to trust that the procedures involved with DNSSEC are executed correctly and that the private key materials are stored securely. more
We've all heard too much about NN, which I've been reporting for 20 years. I support it because I don't want Randall Stephenson of AT&T deciding what I should watch on TV. The long-run effect is negative. The claims from some people who agree with me are ridiculous. "According to former FCC commissioner Michael Copps, ending net neutrality will end the Internet as we know it." Michael knows I respect him, but... more
We continue to see consolidation in the broadband market and various games played by the cablecos and telcos to thwart competition or undermine network neutrality. Until regulators create true structural separation between infrastructure and service providers the chances of seeing genuine broadband competition are slim. It is interesting to note telecom regulators in North America have imposed structural separation in the past. more
With the new top-level domain (gTLD) application process down to the last two months, here are three last minute tips on how to submit a successful gTLD application to ICANN... Sometimes the most obvious information is also the most important. In ICANN's supplemental notes under the "Best Practices" section, the first best practice ends with the parenthetical statement (i.e., show your work). For an applicant, these may be the three most important words in all the ICANN guidance. more
Earlier this year Okpako Mike Diamreyan was found guilty of wire fraud. The district court recently denied his motion for judgment of acquittal. Diamreyan "was charged with devising a scheme to defraud known as an 'advance fee.'" As the court describes it, this is a "scam . . . where a person asks an individual to pay an advance fee in order to obtain a larger sum of money, which the individual [victim] never receives." ... Two things about the case struck me... more
Mostafa Ammar, out of Georgia Tech recently posted an interesting paper titled The Service-Infrastructure Cycle, Ossification, and the Fragmentation of the Internet. I have argued elsewhere that we are seeing the fragmentation of the global Internet into multiple smaller pieces, primarily based on the centralization of content hosting combined with the rational economic decisions of the large-scale hosting services. The paper in hand takes a slightly different path to reach the same conclusion. more
Phishing is when bad guys try to impersonate a trusted organization, so they can steal your credentials. Typically they'll send you a fake e-mail that appears to be from a bank, with a link to a fake website that also looks like the bank. Malware offers another more insidious way to steal your credentials, by running unwanted code on your computer... I like VeriSign's characterization of this kind of malware as an insecure endpoint, the PC which is the endpoint of the conversation with the bank isn't actually under the control of the person who's using it. more
ICANN has, once again opened up a veritable can of worms, with their latest decision on the 'horrors' of Name Collision. While we are sure that ICANN and the Interisle Consulting Group have very good reason to make the decision that they have - delaying the delegation of several TLDs - we believe that the findings contained in Interisle's report do not give sufficient cause to delay the new gTLD program in the manner proposed by ICANN staff. more
A total of eighteen applications for new Top Level Domains (TLDs) have been withdrawn by the applicants. Of the 18 applications that have been withdrawn so far, just five were applications for generic terms, and the remaining thirteen withdrawn applications were for branded Top Level Domains. In the case of the branded TLDs, it may be that the applicant originally only filed what has been called a "defensive application", meaning that the company applied for the Top Level Domain to prevent its falling in the hands of a competitor. more
In the US administration, we see important people like incoming Secretary of Defense Leon Panetta say at his Senate confirmation hearing that "a strong likelihood that the next Pearl Harbor" could well be a cyberattack that cripples the U.S. power grid and financial and government systems. He also said that cybersecurity will be one of the main focuses of his tenure at the Pentagon. But when you look at what is actually happening in cyber security, there is more position jockeying than there is real progress. more
DOTZON presents the sixth edition of the Digital Company Brands study. After having introduced the study in 2018, DOTZON continued to expand and enhance the underlying data to display how companies successfully use their Digital Company Brands. The Digital Company Brand is the digital dimension of a company brand and mirrors the "digitalness "of a company. more
The pandemic made it clear that the millions of homes with no broadband or poor broadband were cut off from taking the office or the school home. But the pandemic also showed many additional millions of homes that their current ISP connection isn't up to snuff for working or doing schoolwork from home. Families often found that multiple adults and students couldn't share the bandwidth at the same time. more
In an interview with GovInfoSecurity, Sen. Thomas Carper said that the U.S. Senate is considering attaching cybersecurity legislation to a defense authorizations bill. Though clearly a ploy to be able to say "we did something about those evil hackers" before the elections, CAUCE applauds the attempt. There can be no doubt that the United States (and many other countries) sorely needs better laws to deal with these threats. more
One of the worldwide challenges in relation to the development of national broadband networks is equality. Broadband is critical for the digital infrastructure and it is essential that everybody enjoys the same level of quality and affordability. This is a major challenge and as a rough measuring stick approximately one-third of the people in developed economies would miss out if there were not a requirement for equality. We see some of the problems related to this issue arising in other countries. more
The timeline of the Net Neutrality issue has been detailed here. And quoting from Vox: 'Wheeler said that peering is "an issue that we are investigating, it's an issue we are very interested in, but it's not the issue here today."' more
Sponsored byDNIB.com
Sponsored byIPv4.Global
Sponsored byVerisign
Sponsored byRadix
Sponsored byVerisign
Sponsored byWhoisXML API
Sponsored byCSC