The European Commission is apparently considering the promulgation and adoption of a directive that would, at least in part, criminalize botnets. As I understand it, the premise behind adopting such a directive is that since botnets are capable of inflicting "harm" on a large scale, we need to separately criminalize them. I decided to examine the need for and utility of such legislation in this post. more
Despite offering robust protection for the Domain Name System, DNSSEC suffers from poor adoption due to its complexity, cost, and operational risks. Automation and algorithmic improvements now offer practical solutions for broader deployment. more
Amongst all of the media pieces in the run up to WCIT-12 next week, few have been as counterfactual as that appearing on the website of the National Journal. The editor, Jean-Christophe Nothias clearly has very little knowledge of how Internet economics or governance works, making such uninformed statements such as "Critically, the connections between the approximately 40,000 autonomous servers at a global level are ruled by contractual agreements between operating agencies." more
The boom and bust cycle of submarine cable deployment can be traced back to the 19th century. However it doesn't look as though we have learned a lot in those 150 years. One of the problems is that it generally takes two years to plan these international projects and two years to deploy the system. And even before the process commences there are often an initial two years when the potential builders are contemplating their plans. This means that new cables need to be planned at times when there is little demand for new capacity. more
As soon as ETECSA began installing public access WiFi hotspots, black market resellers began sharing connections. They would connect a laptop to an ETECSA account then use pirated copies of Connectify, a connection sharing program running on the laptop, to create small WiFi hotspots of their own. At the time, ETECSA charged 2 CUC per hour online (two day's pay for many Cubans) and the re-sellers typically charged 1 CUC per hour. They broke even with two users and made a profit with more. more
Sometimes I hear people or read writers that say things about spam that are incorrect. I thought I would clear those up in this blog post... When the holidays roll around, people start warning other people to watch their inboxes - December is spam season! By that, they mean that more spam than normal flows around the Internet. People say this because December is the holiday season. Since spam is another form of advertising, and advertisers pepper us with ads during this time, then spammers must do the same. It makes sense except it's not true. more
Over the years I have been critical of ICANN's inability on several occasions to match its words on openness, transparency and accountability with its actions. Therefore, it was a very pleasant surprise to see ICANN post the Board briefing documents in connection with two of its last three Board meetings. more
I had already written this blog before Facebook announced it would be hiring at least 10,000 programmers to start moving the company towards the metaverse. I see the metaverse as one of the next big drivers of increased bandwidth usage. Wikipedia defines the metaverse as a collective virtual shared space created by the convergence of virtually enhanced physical reality and physically persistent virtual space, including the sum of all virtual reality worlds, augmented reality, and the Internet. In the most basic sense, the metaverse consists of online worlds where people interact through avatars. more
As you've probably read, WikiLeaks has released a trove of purported CIA documents describing their hacking tools. There's a lot more that will be learned, as people work their way through the documents. For now, though, I want to focus on something that's being misreported, possibly because of deliberately misleading text by WikiLeaks itself. Here's the text from WikiLeaks... more
Who would think that so much could go wrong with something as seemingly innocent as a domain name? As cybercrime continues to evolve, causing devastating reputational and financial losses to businesses and organizations, web addresses are used as a weapon -- and it's not always easy to notice their many faces. In this article, let's take a look at the domain name crime landscape, discuss the current challenges investigators and legitimate registrants face, and talk about some useful techniques. more
In World of Ends, Doc Searls and Dave Weinberger enumerate the Internet's three virtues: 1. No one owns it. 2. Everyone can use it. 3. Anyone can improve it. ... Online services and interactions are being held back by the lack of identity systems that have the same virtues as the Internet. This post describes what we can expect from an Internet for identity. more
The impact of new generic Top-Level Domains on the price of existing gTLDs and ccTLDs is likely to be limited, Tim Schumacher, CEO of leading domain name marketplace Sedo, told the the Domain Pulse conference in Vienna, held on 17 and 18 February. "I don't think the new gTLDs will have a major impact on pricing of existing TLDs. If you start a company or a product, you will always need to have your 'dotcom' or respective ccTLD in the market you operate in," said Schumacher in an interview following the conference. more
Do you have ideas about DNSSEC or DANE that you would like to share with the wider community? Have you created a new tool or service? Have you found a way to use DNSSEC to secure some other service? Do you have new statistics about the growth or usage of DNSSEC, DANE or other related technology? If so, and if you will be in Johannesburg, South Africa, for ICANN 59 in June 2017 (or can get there), please consider submitting a proposal to speak at the ICANN 59 DNSSEC Workshop! more
Private DNS data lakes consolidate fragmented logs into a centralised platform, improving visibility, security, and compliance. They enable advanced analytics, strengthen threat detection, and help organisations optimise network performance in increasingly complex IT environments. more
With more than 100 countries now involved in the rollout of FttH there is increased evidence that commercial demand exists for this infrastructure. In developed economies FttH demand will, over the next 5 years, grow to between 30%-50% of the population. Competition aimed at the top end of this market will trigger a broader rollout. A Bernstein study of Google's rollout of FttH in Kansas City concluded that the penetration measured by them was much higher than they had expected. more
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byCSC
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byIPv4.Global
Sponsored byRadix