Periodismo de Barrio has edited a collection of 13 articles on the Cuban Internet in collaboration with the Internet Policy Observatory at the University of Pennsylvania. The articles cover the history of the Cuban Internet, the legal framework, services, communities, and projects. It is a diverse collection -- something for everyone. Here are thumbnail summaries of each article. more
Built for the most part during the Cold War, surveillance systems on a global scale were considered a vital necessity with the onset of nuclear weapons, if only to keep Mutually Assured Destruction at bay. Today, these systems are also used for domestic surveillance and universal data harvesting, including on one's own citizens. Should we still consider these systems with the same reverence as if we were, say, in the midst of some Cuban Missile Crisis? more
A fundamental rule of trademarks is that they have to be distinctive, and that nobody can register a trademark on a generic term like "wine" or "plastic." In a case decided today by the U.S. Supreme Court, the court decided 8-1 that online travel agent Booking.com could register its domain name as a trademark. In this case, I think the majority got it wrong, and Justice Breyer's lone dissent is correct. more
On April 12, ICANN closed the TLD Application System (TAS) to ensure security of applicant data. For more than a month, the system outage has cost applicants and others millions of dollars. Here's how to make up for lost time and money. Donuts supported ICANN's decision to close TAS when it realized there was a data security risk. At a critical moment, ICANN made the right choice... However, now that staff has communicated to affected applicants (including Donuts) and is preparing to re-open the TAS system, efficiency has grown to become a crucial element of the process. more
The free home-connectivity trial in Old Havana will end this week. Two thousand homes were eligible for the trial and I was told, off the record, that 700 people have signed contracts to pay for the service. I am not certain, but my guess is that those two thousand homes are served by a single central office that has been upgraded to offer Digital Subscriber Line (DSL) connectivity. more
According to the Cybersecurity and Infrastructure Security Agency (CISA), most cyberattacks, including ransomware and business email compromise, begin with phishing. Although losses due to ransomware now exceed billions annually, most ransomware protection and response measures don't protect against the most common phishing attacks. Established research shows that phishing attacks most commonly occur from a maliciously registered, confusingly similar domain name, a compromised or hijacked legitimate domain name, or via email header spoofing. more
The premise of crowdsourcing the task of uncovering new bugs and vulnerabilities in an organization's web applications or consumer products sounds compelling to many. What's not to like with the prospect of "many eyes" poking and prodding away at a corporate system for a minimal reward -- and preemptively uncovering flaws that could have been exploited by hackers with nefarious intent? more
On March 31, Swedish regulatory overview office, Post and Telecom Authority published a 54 pages report on revision of the Swedish Top-Level Domain (TLD) law for internet. The report contains proposals for revision of policy and Swedish law regulating top level domains. This is not a surprise. The issue has been simmering for ten years, at least. However, with increasing dependency of information society, public regulators are increasingly inclined to revise public regulation in the area. more
In January of 2017, Doug Madory of Dyn Research reported on Cuban traffic, noting that C&W's share had increased. Later in December Madory reported that ETECSA had activated a new internet transit provider, medium-Earth orbit (MEO) satellite-connectivity provider O3b Networks (Other 3 billion), replacing geostationary satellite provider Intelsat. (They have also added Telecom Italia, which, until 2011, owned 11% of ETECSA, but I will save that for another post). more
Out in the wilderness of cyberspace is a boundary, marking the limits of Sec. 230 immunity. On the one side roams interactive services hosting third party content immune from liability for that third party content. On the other sides is the frontier, where interactive content hosts and creators meet, merge, and become one. Here host and author blend, collaborating to give rise to new creations. more
A web-based poll on the Mobile Broadband Genie site had participants 1160 who were asked: "Is your mobile broadband fast enough?" 133 yes; 740 no; 287 don't know. Perceptions of the term "mobile broadband" appear to far exceed what is being delivered. While operators have been competing to offer cross-subsidized laptop and netbook deals with higher usage caps and ever cheaper mobile Internet deals, they seem to have overlooked the quality of the service. more
In today's rapidly evolving internet landscape, staying up-to-date with the latest developments and trends is crucial for businesses looking to strengthen their online presence. One highly anticipated development that organizations have eagerly awaited is the next round of new generic Top-Level Domains (gTLDs). more
In this part I want to focus on the gathering of cyber crime data. Are there best practices in the world on how cyber crime data is reported to law enforcement and aggregated to show the impact of said crime? Previously the discussion focused on the fact that cyber crime = crime and on a basic cyber (crime) training for every police officer. From the reactions this received, it is clear that some people see this as a possible solution. more
It's highly unusual for a well-known trademark owner to be accused of cybersquatting, but that's what happened when a Mexican milk producer filed a complaint against Apple Inc. under the Uniform Domain Name Dispute Resolution Policy (UDRP) in an attempt to get the domain name lala.com. Not only did Apple win the case, but the panel issued a finding of "reverse domain name hijacking" (RDNH) against the company that filed the complaint. more
The .ORG domain is at a crossroads: What will it be? A simple registry offering domain names for organizations, individuals and others? Or something bigger, as Ethos Capital and the Public Internet Registry propose? Will proposed changes make .ORG better? Or worse? There are valid points on both sides, but as an Internet safety advocate who for two decades has worked to teach children how to be safe online, stop the next young girl from being sex trafficked, and... more
Sponsored byRadix
Sponsored byVerisign
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byDNIB.com
Sponsored byCSC
Sponsored byWhoisXML API