Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

IGF Hyderabad: Interview of Participants

I am uploading short video interviews of Internet Governance Forum (IGF) participants during the 3 - 6 December 2008 conference in Hyderabad, India. The participants are asked a standard set of questions... Some 10 interviews are now online. My aim, if possible, is to interview at least 100 participants. more

FCC’s Ignorant Extraterritorial Jurisdiction Bravado

The Federal Communications Commission yesterday released a Report and Order in the matter of its implementation of Ray Baum's Act Section 503 and international call spoofing. The FCC mostly did the right things in the R&O except in one rather extraordinary assertion of legal ignorance and bravado. It asserted unilaterally that it could exercise "extraterritorial jurisdiction that Congress expressly provided in section 503 of the Ray Baum's Act," and it furthermore knew of no "treaty obligation [contravened],...nor other legal barrier...and...are aware of none." more

STEM to STEMM: It Will Take Musicians to Save the Internet

The internet is under all kinds of attacks from all kinds of people for all kinds of reasons. It’s not just the internet’s infrastructure that is under attack, so too is the very concept of the internet as an open communications platform serving the commonweal. Constructing effective technical defenses of the internet will require that America’s students learn and develop the quantitative disciplines known as STEM; Science, Technology, Engineering, and Mathematics. Constructing effective, ethical defenses of the internet will require that students study art and philosophy. The two educational paths are symbiotic... more

Negotiating the WSIS+10 and the Future of the Internet

After two and a half years of technical analysis and discussions, six months of deliberations among all stakeholders, and intense negotiations at the United Nations, at three o'clock in the morning on December 12, 2015, the talented co-facilitators from the United Arab Emirates and Latvia dropped the gavel on the outcome document for the ten-year review of the World Summit on the Information Society (WSIS). That consensus document presents international principles that will guide the UN's work on Information and Communications Technology (ICT)-related issues. more

How a Resilient Society Defends Cyberspace

Seventy-five years ago today, on May 29th, 1934, Egyptian private radio stations fell silent, as the government shut them down in favor of a state monopoly on broadcast communication. Egyptian radio "hackers" (as we would style them today) had, over the course of about fifteen years, developed a burgeoning network of unofficial radio stations... It couldn't last. After two days of official radio silence, on May 31st, official state-sponsored radio stations (run by the Marconi company under special contract) began transmitting a clean slate of government-sanctioned programming, and the brief era of grass-roots Egyptian radio was over... more

5 Questions to Ask To Choose the Right Website Monitoring Solution

In these competitive times and with the holiday's looming, your Website experience needs to give customers a "warm and fuzzy" feeling. That is, it should be available and fast, with no major hiccups. Website monitoring is essential in delivering just that. How do you find a monitoring tool? Just set the monitoring budget, find a vendor, call the sales department and buy yourself some monitoring, right? Whoa, not so fast. more

Broadband Consumption Continues Explosive Growth

OpenVault Just released its Broadband Industry Report for 4Q 2019 that tracks the way that the US consumes data. The results of the reports are as eye-opening as OpenVault reports for the last few years. OpenVault has been collecting broadband usage for more than ten years. As usual, the OpenVault statistics are a wake-up cry for the industry. more

The Christmas Goat and IPv6 (Year 13)

2022 was not a normal year for me. We sold our company of almost 25 years to Interlan Gefle AB to Nordlo Group, and I also moved away from Gävle city to Boänge, a small rural village outside Sandviken where my ISP (AS20626) still isn't ready for IPv6 in my location.... ☹ ( I use a Mikrotik with a Wireguard tunnel to solve my IPv6 today.) It's 2023 when I'm writing this, and I can't understand why ISPs still haven't deployed IPv6! more

Blocking Amplification Attacks: Sometimes the Incentives Work Against You

Since the end of last year, amplification attacks have been increasingly used by attackers and received heavy media coverage. Everyday protocols not given much thought before, like Network Time Protocol (NTP), can be asked in a very short remote command to send a very large response (list of 600 clients last connected to the NTP server) to a spoofed IP address (the target) by the requestor/attacker. more

We Blinked and the World Changed: Challenges of Generative AI to Internet Governance

The pace of generative AI development has been astonishing to the degree that the normative space has been unable to keep up. As governments start looking into some implementations of the technology, such as ChatGPT, more advanced techniques and products continue to emerge by the day. Society is changing in irrevocable ways, and it is paramount that the Internet Governance community turns its attention to this question. more

Facebook Stays, Everybody’s Happy, but Nothing Has Changed

After some turmoil, Facebook won the war with the Australian Government as the necessary changes were made to the legislation that avoided them needing to change their business model. Those subtleties are lost in the general press. What counts for the popular media is that they were able to spin some great stories around the fact that Australia stood up to the giants. That brought international attention, which boosted the ego of Australian Prime Minister Scott Morrison. more

Hot Take on the Twitter Hack

If you read this blog, you've probably heard by now about the massive Twitter hack. Briefly, many high-profile accounts were taken over and used to tweet scam requests to send Bitcoins to a particular wallet, with the promise of double your money back. Because some of the parties hit are sophisticated and security-aware, it seems unlikely that the attack was a straightforward one directly on these accounts. more

Decoding the WSIS Message - ISOC Releases Matrix of Countries’ WSIS+10 Positions

Over the next few months, major discussions at the United Nations will shape the future of Internet governance. In order to prepare with our community for the ten-year Review of the World Summit on the Information Society (WSIS+10), in New York, USA, on 15 to 16 December 2015, we are publishing today a matrix of the countries' positions on WSIS+10. The matrix draws from their written contributions to the UN this summer, and is designed to help all stakeholders better understand the key issues at the the heart of the negotiations. more

Dissecting the ISOC/PIR/Ethos Transaction (With Ways to Help Ensure PIR’s 2002 Commitments)

On February 11th, Professor Ben Leff of American University Washington College of Law (WCL) spoke on the panel: The Controversial Sale of the .ORG Registry: The Conversation We Should be Having as a scholar of charitable and nonprofit law. On February 21st, he posted a blog piece on WCL's PIJIP blog outlining and expanding his presentation. With Professor Leff's permission, I repost his piece on CircleID to join the timely discussion taking place here on the .ORG sale. more

Do Not Track: Not as Simple as it Sounds

Over the past few weeks, regulators have rekindled their interest in an online Do Not Track proposal in hopes of better protecting consumer privacy. ... There are a variety of possible technical and regulatory approaches to the problem, each with its own difficulties and limitations, which I'll discuss in this post. more

Topics

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

Threat Intelligence

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Domain Names

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days