The smartphone has effectively transformed us into cyborgs, we have in our hands a highly efficient computing device equipped with a photo and video camera, microphone, GPS, accelerometer, gyroscope, magnetometer, light and proximity sensors, as well as other features that allow creation of increasingly useful, impressive and addictive applications. more
Here in the United States, we recently celebrated Thanksgiving and with that, we now enter the last weeks of 2018. I've spent much of this past year involved in ICANN's Expedited Policy Development Process (EPDP) for gTLD Registration Data and I'm happy to say our group has reached a historic milestone. Just last week, the group published its initial report for public comment. more
Given the level of public interest in Ethos' acquisition of Public Interest Registry ("PIR") from the Internet Society, it is no surprise that this agreement continues to attract press attention. Ethos welcomes open discussion on this important investment, and we are of course following the media coverage closely. Unfortunately, it is not always possible to respond point-by-point to every article, so I would like to take this opportunity to address several mischaracterizations of the deal recently reported by Wired, Deutsche Welle, and others. more
Much of the discussion regarding mobile security revolves around the growing "pandemic" of mobile malware. It's not uncommon to see headlines reporting the discovery of large numbers of new malware samples. However, as Google recently pointed out, with quite a bit of data to support them, there's little discussion of real world impact of these discoveries. This raises a number of relevant questions. Is the average user likely to be infected? Where does this malware come from? These are questions that deserve analysis and thoughtful responses. more
I think the new gTLD program will have many successes. It is a failure, however, when it comes to serving developing and less developed economies, especially the communities in those economies. Actually it failed in serving communities anywhere, but it really failed when it came to serving the peoples of the world outside WEOG (the UN designations for the developed Western European nations and Other Groups; others including AU, CA US, and NZ). more
In the past 24 months, distributed denial of service (DDoS) attacks have changed profoundly. Gone are the days when attackers worked under the radar, when machines were infected by botnet code unknowingly and attacks were disguised leaving very little to trace the exact origin. ... The other game-changer: It's easier than ever to execute attacks. The tools are so widely available that anyone with basic skills and a high-speed connection can become a "hacktivist." more
As I type these words, I am perched on one of the benches in the main thoroughfare of the cavernous venue hosting Mobile World Congress (MWC). Above me is a video screen warning me of the perils of the infamous local pickpockets, so I know I'm definitely in Barcelona! In its current form, MWC has been the mainstay event of the telecoms business for a decade, and its roots go back to the late 1980s. The slogan of this year's event is "Mobile is Everything". I believe this phrase is a symptom of an industry suffering from dangerous strategic drift. Here's why. more
As a former FCC senior staff member, the Commission's increasing disengagement in international telecommunication technology forums over the past two decades has been dismaying. One of the adverse effects of this obliviousness-by-design approach has been felt by American consumers in the massive, exponentially increasing volume of spoofed calling numbers and CallerIDs on communications from outside the United States. more
The Secure 5G and Beyond Act of 2020 has been submitted by the U.S. Congress to the White House for signing into law. It has been sitting there for several days now, but there are obviously more important developments demanding attention than a law compelling the Executive Branch to develop a 5G security strategy within 180 days through public and Federal agency consultations that will be implemented by the NTIA. more
At Verisign, we believe that continuous improvements to the safety and security of the global routing system are critical for the reliability of the internet. As such, we've recently embarked on a path to implement Resource Public Key Infrastructure (RPKI) within our technology ecosystem as a step toward building a more secure routing system. In this blog, we share our ongoing journey toward RPKI adoption and the lessons we've learned as an operator of critical internet infrastructure. more
The eccentricities of California-based ICANN, the allocator of domain names, know few bounds. Based on the best of legal advice, though perhaps not the best of PR advice, it's Board has announced the system for allocating priority in the processing of around 1000 weighty applications for new top-level domain names. It has described the system, with all seriousness, as Digital Archery. A description that just begs for comparison with the English folk hero, Robin Hood. more
The cellular companies have made an unprecedented push to get customers interested in 5G. Back in November, I recorded a college football game that enabled me to go back and count the twelve 5G commercials during the game. Advertising during sports events is relatively expensive, so these ads were not purchased at bargain-basement prices. The amount of money being spent on advertising 5G must be gigantic. more
The year 2025 will be a landmark year for digital diplomacy and global governance. It is the year of wrapping up the UN cybersecurity OEWG and the negotiations on cybercrime at the Ad Hoc group. It's the year UN member states will decide on the future of the World Summit of Information Society process and the Internet Governance Forum (IGF). more
Kenji Kushida is a scholar at Stanford University, who has written a most explanatory overview of how America came to dominate cyberspace, through computer companies. He traces the evolution of the Internet to a series of actions taken by the US government to limit the power of the telephone companies. Kushida looks at the USA, Europe and Japan from the perspective of what happened when telephone monopolies were broken up and competition introduced in the 1990s. more
This isn't the blog post I had hoped to write. When I signed up to participate in ICANN's Expedited Policy Development Process for gTLD Registration Data, I knew we had a lot of work ahead of us, but I was cautiously optimistic that we would, eventually, reach a successful outcome. Today, I find myself looking at things differently. After hundreds of hours and countless meetings and emails, Phase 2 of the EPDP's work has wrapped up with the delivery of our final report to the GNSO Council. more
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byCSC
Sponsored byIPv4.Global
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byRadix