I kept wondering if all that I had said about Dr Toure was fair -- I hadn't met him before and had written so much to comment on the transcript of his speech at ICANN, Cairo . My discomfort was short-lived and even before a month elapsed I met him at the Internet Governance Forum, Hyderabad. Exchanged pleasantries before saying "I wrote some strong comments about your speech at Cairo". Dr Toure looked happy to see me, beamed with a bit of surprise and said he read my comment... more
Facebook just announced support for PGP, an encrypted email standard, for email from them to you. It's an interesting move on many levels, albeit one that raises some interesting questions. The answers, and Facebook's possible follow-on moves, are even more interesting. The first question, of course, is why Facebook has done this. It will only appeal to a very small minority of users. Using encrypted email is not easy. more
Every year those in the security industry are bombarded with various cyber security predictions. There's the good, the bad and the ugly. Some predictions are fairly ground breaking, while others are just recycled from previous years -- that's allowed of course if the threats still stand. In part one of my predictions I looked at the malware threats, so let's take a look at big data and the cloud for part two. more
Modern travel means interminable waits, but it's a good time for reading. I finally read Wireless Pittsburgh: Sustainability of Possible Models for a Wireless Metropolitan-Area Network by Jon M. Peha, published in February as a working paper of the New America Foundation. The good news: it's full of interesting cost estimates and projected subscriber take rates based on specific demographics in Pittsburgh, Minneapolis and Philadelphia... The flaws in this study...
more
According to an email, Starlink has moved into the second phase of its beta program, nicknamed the "better than nothing beta," which feels a bit like monopoly hubris to me. It may be better than nothing, but it is not as good as the initial beta, which was free. Participants will pay $99 per month for the service and pay $499 for a terminal, including a tripod and WiFi router. I wonder what the difference is between these "beta testers" and "customers." more
The term "reputation hijacking" continues to spread through the anti-spam community and the press. It's intended to describe when a spammer or other bad actor uses someone else's system -- usually one of the large webmail providers -- to send their spam. The idea is that in doing so, they're hijacking the reputation of the webmail provider's IPs instead of risking the reputation of IPs under their own control. But I really have to laugh (though mostly out of sadness) whenever this technique is described as something new... more
Failing to block a stealthy malicious host from making connections to your network could cost your company millions of dollars, a damaged reputation, and severe losses in sensitive private data. Threat intel teams have faced on-going problems: Expensive feeds that are slow to catch new threats; Chasing false positives in alerts wastes time and money; and Vendors selling a new appliance for every ill. Would 100% of your users Spot the Bot? more
Quantum computers are coming, and the American Bar Association's SciTech section is beginning to consider the legal implications. This raises the question, will the legal profession be able to adopt emerging quantum technologies on a tech-business as a usual basis? Or will the developments flowing from quantum mechanical theory present a categorical challenge to the legal-industrial complex? more
Earlier this year Okpako Mike Diamreyan was found guilty of wire fraud. The district court recently denied his motion for judgment of acquittal. Diamreyan "was charged with devising a scheme to defraud known as an 'advance fee.'" As the court describes it, this is a "scam . . . where a person asks an individual to pay an advance fee in order to obtain a larger sum of money, which the individual [victim] never receives." ... Two things about the case struck me... more
At the top of WIPO's list of the most cybersquatted trademarks for 2015 (issued on March 18, 2016) is "Hugo Boss" with 62 complaints. The report also reveals that the fashion industry led other commercial sectors with 10% of complainant activity. Not surprisingly, in this sector companies (couturiers extending their services to the general public) are branded with the personal names of their founders. Why any registrant would intentionally target well-known personal names in the fashion industry is a mystery because there's no future in it. In fact, complaints are never answered and always successful. more
If any of you are attending the USENIX Large Installation System Administration (LISA) conference in San Diego this week, the Internet Society's "Internet ON" (ION) Conference is co-located with LISA12 and will take place tomorrow, December 11, 2012, from 1:30 - 5:00 pm US Pacific time. more
After a political and administrative process of more than a month Tom Wheeler has finally been nominated by President Obama as the new chairman of the FCC with the full support of Congress. Unlike other regulators around the world the FCC is directly accountable to the American Congress, making it a far more political body than most other regulators. I have known Tom since 1983. He is an enormously energetic person and has been involved in the ICT industry for most of his working life, holding very senior positions within the American industry. more
I look at this as the ideas of Mike Powell and Meg Whitman, and a lot of unimportant wordsmithing. Before the Dublin (Erie) IETF I wrote one for one of the top three DCCC targeted races. You, or One, or I (isn't voice fun) tries for ideas that matter, and then try to connect the dots, for the semi-literate staff of a candidate who needs clue, e.g., to make effective calls to the DNC's major contributor lists for area codes 415, 408, 650 and 831. I mention Dublin because ages ago Scott Bradner's plan for Harvard, decent bandwidth everywhere and location transparency was, in just a few pages, a revolutionary policy document then, and now, and I was happy to see Scott again and let him know that two decades later I still remembered seeing policy stated with confidence and clarity. more
With the explosion in mobile broadband, every mobile operator is scrambling to secure the spectrum capacity needed to stay ahead in the market. There is no doubt that spectrum management is one of the most critical elements of telecommunications policy. It is seen as the pathway to 21C infrastructure... It is interesting to see how the different countries handle their spectrum management policies. more
Are you interested in sharing lessons you've learned in deploying DNSSEC or DANE with the wider community? Have you performed new measurements related to DNSSEC deployment that you want to share publicly? Do you have a new tool or service that you think people in the DNSSEC community would find interesting? Are you seeking feedback on some ideas you have to make DNSSEC better or easier to deploy? more
Sponsored byVerisign
Sponsored byCSC
Sponsored byIPv4.Global
Sponsored byRadix
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byDNIB.com