The FCC seems determined in revisiting and repairing the current CableCard rules fiasco in which it chose to mandate a universal Set-Top-Box for Cable, Telco, and DBS providers. Where does a solution lie, and is the FCC going down another road of improbable acceptance? The problem with a CableCard solution, in an attempt to create more competition, was the opening of current provider STB's to access other venues, which turned out to be both technically and business concept unfriendly. more
While attending the International Telecommunications Society's 17th bi-annual conference I attended yet another network neutrality session. Economists predominated at this conference and their collective read on network neutrality emphasizes the need for ISPs to "extract value" from content providers primarily by converting zero cost peering with ISPs into specific payments from individual content sources. I have no problem with offers of non-neutral, "better than best efforts" routing options to content providers who voluntarily opt in, particularly if the offer is made transparently and anyone can opt in. What troubles me is the impact of opt-in on content providers that opt out... more
As I noted in my recent comments on CircleID, the recent resolutions from the Special Meeting of the ICANN Board held in Norway in late September left a few important new gTLD issues up in the air and created a little uncertainty in the marketplace. ... However, whilst sign-off on the program is still not guaranteed to occur in December, a recent interesting post on the GNSO mailing list from ICANN's Senior Vice President... more
Europe is at the forefront of the global debate about data protection and privacy. Unfortunately that debate is characterised more by hyberbole and scaremongering than real discussion. Europeans deserve better -- and so does the world, who rightly see Europe as a leader on this subject. The new Commission has a chance to truly lead in partnership with governments, like Brazil, that agree with us. more
As the autumn leaves fall from naked trees to be trampled or encased in the winter snow, it reminds us of another year quickly gone by. Yet, for organisations that were breached and publicly scrutinised for their security lapses, it's been a long and arduous year. It was about this time last year that the news broke of Target's mega breach. Every news outlet was following the story and drip feeding readers with details, speculation and "expert opinion" on what happened, why it happened and who did it. more
Well, I read the indictment (available here from Spamhaus.) It's a long litany of criminal behavior, primarily pump and dump stock fraud of a long list of penny stocks from the US and China. Ralsky is described as the "chief executive officer and overall leader" of the scheme... The thing that strikes me about this indictment is that although it includes a lot of CAN SPAM charges, everything Ralsky and Co. did was already illegal under conventional fraud and computer tampering laws. more
Encryption is a way to keep private information private in the digital world. But there are government actors, particularly here in the US, that want access to our private data. The NSA has been snooping our data for years. Backdoors have been snuck into router encryption code to make it easier to break. Today at M3AAWG we had a keynote from Kim Zetter, talking about Stuxnet and how it spread well outside the control of the people who created it. more
This post outlines a typical information-gathering process for online purchasing decisions and demonstrates why a different approach is needed when buying a domain name. Huge amounts of product information are now publicly available on the Internet. When buying most products, consumers rely on that wealth of information. About 70% of consumers make online reviews a key part of their buying choices, according to a 2012 Nielsen survey. more
Google's lawsuit against the Lighthouse phishing syndicate exposes the industrial scale of cybercrime, highlighting how criminals exploit easy access to digital infrastructure to scam millions. The broader supply chain enabling such operations demands urgent reform. more
AT&T and satellite company AST SpaceMobile announced a partnership to provide satellite cellular service directly from satellites to cellphones. This will provide a service that is much needed for the billions of remote users who are not in the range of a cell tower. This is an emerging industry that is still being referred to by different acronyms. more
Since 2005, Infoblox has commissioned a survey by The Measurement Factory, a research firm that specializes in performance testing and protocol compliance. The studies examine key aspects of the Internet's Domain Name infrastructure with results that uncover trends in DNS server configuration and deployed features. Some topics that have helped define the survey over the years have been arguably more leading edge (DNSSEC), while others are best described as quotidian (lame servers). more
When does a non-profit organization become a profit-making one? This and similarly fundamental questions about ICANN's institutional character are raised by the high probability that the gTLD project will produce profits for ICANN. How much money those profits will amount to remains in question, but it is increasingly difficult for ICANN to say that there will be no profit at all. more
DNS-over-TLS has recently become a welcome addition to the range of security protocols supported by DNS. It joins TSIG, SIG(0) and DNSSEC to add privacy, and, in the absence of validating stub resolvers, necessary data integrity on the link between a full-service resolver and the users' stub resolver. (The authenticated source feature of TLS may also offer some additional benefits for those of a nervous disposition.) Good stuff. What is not good stuff is... more
Steve Lohr has a nice piece in the New York Times ('Technology Gets a Piece of Stimulus,' 26 Jan 2009, p. C1) this morning about the role that technology and innovation will play in the economic recovery (aka stimulus) bill supported by the Obama Administration. In the past, health IT deployment has been approached as an engineering problem: what computers have to be part of which networks exchanging which types of data? This loses sight of the purpose of electronic medical records... more
It appears people, governments, regulators and legislators worldwide may have forgotten Facebook's complicit involvement with Cambridge Analytica (CA). It is possible that new priorities such as the Covid-19 pandemic in 2020 may have pre-occupied them, and rightly so. But an unprecedented data breach in 2019 unfolded this weekend, bringing a recurring nightmare of the past back into today's reality. more
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byCSC
Sponsored byIPv4.Global
Sponsored byVerisign
Sponsored byRadix
Sponsored byDNIB.com