The preparations of the Brazil Internet Governance Forum (IGF) meeting are well under way. After consulting the wider Internet community and discussing the overarching theme of the 2015 IGF meeting, the Multistakeholder Advisory Group (MAG) decided to retain the title "Evolution of Internet Governance: Empowering Sustainable Development". This theme will be supported by eight sub-themes that will frame the discussions at the Joao Pessoa meeting... more
In part four of this series of posts looking at emerging internet content relating to coronavirus, we explore phishing. In times of crisis, cyber criminals invariably take advantage of the growing concerns of the public. In the case of the coronavirus, they have done so by sending phishing emails that play on the fears surrounding the spread of the illness. A number of reports have emerged of emails purporting to provide advice or assistance relating to COVID-19... more
In our globalized economy, it is vital that we do establish levels of fair trade, and the USA is right in addressing that issue. However, making technology a key element of the trade war will backfire. Let's take (again) the Huawei issue as an example. The company has admitted that the US boycott is hitting them severely with an estimated loss of $30 billion in revenues. One of the other elements of the trade boycott is that Google is no longer allowed to provide... more
With the prospect of broadband networks becoming more and more of a reality, it appears that concepts such as eHealth are not too far away. Digital healthcare describes the whole system of GPs, hospitals and regional healthcare centres, while eHealth describes the many health applications which will become available for people to use at home. more
To prepare DNS security for a post-quantum future, Verisign and partners are testing new cryptographic strategies that balance security, performance, and feasibility, especially through the novel Merkle Tree Ladder mode for managing large signatures. more
Several weeks ago ICANN issued clarifying questions to approximately 50 of the 1,930 new gTLD applications submitted last spring. Some of our clients were selected for this pilot effort and we've had the opportunity to review seven sets of clarifying questions totaling approximately 30 individual questions. ICANN has indicated that in late November they will begin issuing Clarifying Questions to the balance of applicants. more
Three months after implementation of the European Union's (EU) General Data Protection Regulation (GDPR), the World Intellectual Property Organization's (WIPO) Arbitration and Mediation Center has expanded and updated its already helpful web page with important questions and answers about how the GDPR is impacting the Uniform Domain Name Dispute Resolution Policy (UDRP). more
On many occasions I have written about the dangers of electronic communications in relation to data retention laws, government e-spying and other activities undermining our democracy and our liberty. To date governments still have to come up with evidence that all of this spying on their citizens has prevented any terrorist attacks. Terrorism has been given as the key reason for the government's spying. more
Contrary to what some financial analysts would have us believe, it is highly unlikely that the price increases for mobile broadband services which were recently announced by AT&T will be replicated by other mobile operators around the world. The mobile market in the US is one of the least regulated and therefore one the most monopolised markets in the western world. more
The Uniform Domain Name Dispute Resolution Policy (UDRP) limits parties' submissions to complaints and responses; accepting "further statements or documents" is discretionary with the Panel (Rule 12, Procedural Orders), although the Forum (in Supplemental Rule 7) but not WIPO provides for supplementing the record with the proviso that "[a]dditional submissions must not amend the Complaint or Response." For some panelists, Rule 7 contradicts the Policy. more
Measuring the performance of broadband networks is an important area of research, and efforts to characterize the performance of these networks continues to evolve. Measurement efforts to date have largely relied on inĀhome devices and are primarily designed to characterize access network performance. Yet, a user's experience also relies on factors that lie upstream of ISP access networks, which is why measuring interconnection is so important. more
Decentralization is a big trend in IT, and everyone has their own definition of what "decentralization" really means. With more organizations fully embracing a work-from-anywhere culture, decentralization has moved past being a fad and turned into a necessity. Decentralized cybersecurity is nothing new. Many of us have been doing it since before the pandemic. more
Time to brush the dust off your Computer II notebooks. Are voicemail, electronic fax, and call forwarding enhanced services or telecom services? Today's case: FTC v. American eVoice, Ltd... The FTC brought an action against Defendants claiming that they were engaged in cramming, adding unwanted voicemail, electronic fax, and call forwarding services to consumers bills to the tune of $70 million. more
The introduction of New gTLDs has increased the rate at which individuals and businesses are getting online today and we're already seeing mainstream adoption of New gTLDs. By going the extra mile to spread awareness about their extensions among the masses, New gTLD Registries are bringing attention to their value propositions and, more importantly, are sharing the idea of 'getting online' to audiences. more
For decades, the US government has fought against widespread, strong encryption. For about as long, privacy advocates and technologists have fought for widespread, strong encryption, to protect not just privacy but also as a tool to secure our computers and our data. The government has proposed a variety of access mechanisms and mandates to permit them to decrypt (lawfully) obtained content; technologists have asserted that "back doors" are inherently insecure. more
Sponsored byVerisign
Sponsored byCSC
Sponsored byWhoisXML API
Sponsored byRadix
Sponsored byIPv4.Global
Sponsored byVerisign
Sponsored byDNIB.com