Private equity firm Ethos Capital's attempt to take control of .org, the Internet domain that's home to most of the world's non-profit and public-benefit organizations, has triggered an interesting crisis in Internet governance. The Internet Corporation for Assigned Names and Numbers, or ICANN, is the body responsible for regulating the global domain name industry. For the first time since oversight responsibility over ICANN was passed from the United States National Telecommunications and Information Administration... more
In ICANN's earliest days, it had very few friends, or so it seemed to the initial Board members. There were none of the compliments and congratulations that normally accompany the creation of a new corporation. There was great hesitancy among potential donors over the fact that we did not yet have (and would not have for nine long months), a federal tax exemption number. There was also a poisonous open Board meeting in December 1998 in Cambridge, Massachusetts... more
In response to Russia's horrific invasion and war against the Ukrainian nation ordered by Dictator Putin that will live in infamy, an array of nations, organizations, and companies have responded to shun and shut off Russia in every possible manner. The actions include no-fly zones, removal from ICT network services, and essentially universal declarations of condemnation. For the first time ever, all Russian proposals to the International Telecommunication Union (ITU) quadrennial standards body plenary known as the WTSA have been "bracketed"... more
Dinni Jain, the CEO of Google Fiber, posted a blog last week that talks about dramatically increasing the top speeds available on fiber. He says the specific announcement will come in the coming months to dramatically expand Google Fiber's gigabit offerings. The blog gives a hint at what might be coming. Included in the blog is a speed test from the home of a Google Fiber employee in Kansas City who is receiving 20.2 Gbps. more
Last fall, when we put forth our bid to acquire the Public Interest Registry (PIR), our announcement - made jointly with PIR and its parent, the Internet Society - was met with questions. We took them seriously and made a conscious effort to engage with representative members of the .ORG community to deepen our understanding. We found that a consistent message was that the commitments made by Ethos since this fall addressed most of the community's issues, but there was a question as to whether they were enforceable and if so, how? more
The information security industry, lacking social inhibitions, generally rolls its eyes at anything remotely hinting to be a "silver bullet" for security. Despite that obvious hint, marketing teams remain undeterred at labeling their companies upcoming widget as the savior to the next security threat (or the last one -- depending on what's in the news today). I've joked in the past that the very concept of a silver bullet is patently wrong... more
On 11 February, I participated in a discussion about the pending sale of PIR at American University Washington College of Law, appropriately titled, The Controversial Sale of the .ORG Registry: The Conversation We Should Be Having. It was great to have a balanced discussion, free of some of the emotions that have often made it hard to discern the realities of the transaction. Certain misapprehensions arose in the discussion that we lacked the time to explore fully, so I want to take those up here. more
At a staggering $100 billion dollar valuation and reported 900 million users, Facebook represents a massive presence in the global economy. From an Internet infrastructure perspective, Facebook also ranks amongst the largest of the "hyper giants" generating a significant share of daily global Internet traffic. This blog explore Facebook's size in terms of its Internet traffic contribution. more
The Bug Bounty movement grew out a desire to recognize independent security researcher efforts in finding and disclosing bugs to the vendor. Over time the movement split into those that demanded to be compensated for the bugs they found and third-party organizations that sought to capitalize on intercepting knowledge of bugs before alerting the vulnerable vendor. Today, on a different front, new businesses have sprouted to manage bug bounties on behalf of a growing number of organizations new to the vulnerability disclosure space. more
The term Email Deliverability is used to describe how well a mail flow can reach its intended recipients. This has become a cornerstone concept when discussing quality metrics in the email industry and as such, it is important to understand how to measure it. Email Deliverability is considered to be affected by a mythical metric, the reputation of the sender, which is a measure of that sender behavior over time -- and the reactions of the recipients to his messages. more
In 2021, the story was price. In 2022, the story was price and large block supply. Spurred by unprecedented unit pricing, the IPv4 market in North America experienced its second-best year ever in market history. Nearly double the number of IPv4 addresses were traded in 2022 compared to 2021, predominantly due to the increased flow of large block supply from twelve sellers, five of whom were first-time market participants. more
Last month, application security provider Veracode came out with a study that stated that more than half of all enterprise applications aren't secure. The company tested approximately 2,900 applications over an 18-month period, and 57 percent failed to meet Veracode's "acceptable levels" of security. While this study gained a tremendous amount of traction in the media... it does not focus on the bigger issue... more
The number of 'things' connected to the internet is already bypassing the number of people on the planet. This Internet of 'things' is changing the way we live and work: from the way food is grown and produced on farms through automated temperature and feeding controls, to the way we check prices and buy through connected terminals, to the vehicles we drive, the security cameras at work, and automated gates at the entrance. Connected 'things' are everywhere. All these 'things' are helping us to be more productive and efficient while also offering more and more convenience. more
Before the Holidays, Yahoo got a flurry of good press for the announcement that it would (as the LA Times puts it) "purge user data after 90 days." My eagle-eyed friend Julian Sanchez noticed that the "purge" was less complete than privacy advocates might have hoped. more
These days you can hardly talk about Internet governance without hearing about security. DNSSEC is a hot issue, ICANN's new president is a cyber-security expert, and cyberattacks seem to be a daily occurrence.
This reflects a larger shift in US policy. Like the Bush administration before it, the Obama administration is making security a high priority for the US. Only now the emphasis is on security in cyberspace. The outlines of the new policy were published in the recent US Cyberspace Policy Review, which even recommends a cyber security office directly in the White House. more
Sponsored byRadix
Sponsored byVerisign
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byCSC
Sponsored byDNIB.com
Sponsored byIPv4.Global