In direct response to the enormous interest and input we have seen from the .ORG community over the past several months, Ethos and Public Interest Registry (PIR) have made tremendous strides in laying out our collective vision for .ORG and put forth unprecedented commitments and protections for the .ORG community. Over the last two weeks, in particular, we have taken concrete actions to better align the community's interests with the operations of PIR and .ORG. more
Our relationship to human rights is ambivalent. We take them for granted, we don't want to be without them, but on the other hand, we see them as somewhat abstract and aspirational, a lofty ideal easily forgotten and set aside in our daily struggles. When it comes to the digital domain, human rights are seen by many as an unwanted source of regulations in an industry that demands "unregulated innovation." more
Iran's near-total internet blackout during airstrikes reveals how cyberattacks, sanctions and platform power can isolate a nation. The conflict shows digital infrastructure, satellites and cloud services becoming decisive weapons in modern geopolitical competition worldwide today. more
As geopolitical tensions expose the fragility of subsea cables, Low Earth Orbit satellites and the QUIC protocol promise a more resilient internet by diversifying routes, preserving session continuity, and redefining control over global data flows. more
Predictions of IPv4's demise were premature. A market webinar shows demand has diversified, prices reflect structure not relevance, and leasing, policy shifts and broadband funding will keep the ageing protocol strategically important for years ahead. more
Craig Moffett, of MoffettNathanson, was recently quoted in FierceTelecom asking if the broadband industry is reaching maturity. Other than in rural areas, where many homes are still hungry for better broadband, the broadband penetration rate in cities is approaching 90%. It's a fair question to ask if there is room for much more growth in the industry. This is a question that has bounced around for the last five years. more
With IPv4 addresses fetching up to $30 apiece and IPv6 adoption lagging, companies may be sitting on hidden digital assets. A strategic audit could unlock unexpected revenue and enhance long-term infrastructure planning. more
A dispute over 6.2m IPv4 addresses at AFRINIC exposes how litigation and market incentives could erode regional stewardship, setting a precedent that risks turning the Internet's allocation system into a vehicle for global arbitrage. more
Let's face it, when it comes to digital technologies, fundamental human rights are not on top of the digital agenda. They seem irrelevant and remote, even an obstacle to digital innovation and opportunities. We are quick to pay lip service to them, but we permit the profit motive and stakeholder self-interests to override human rights principles. It does not matter how right and righteous the cause might be; to be implemented, it must be profitable or carry stakeholder benefits. more
Wolfgang Kleinwaechter, in his Internet Governance Outlook 2024, reminded us that 2024, as the years before and future years, will be pivotal for Internet Governance processes. We eagerly await Wolfgang's missives every January, and we trust what we read because we know him, and we trust CircleID. We should be grateful and cherish this example of straightforward, digitally enabled, and trust-based human communication... more
The FCC warns telecom companies of rising ransomware threats after attacks quadrupled since 2022. The agency urges stronger defenses including patching, multifactor authentication, network segmentation, and closer oversight of vendors and incident response planning. more
Global digital policy frameworks often overlook the realities of African SMEs, imposing compliance standards shaped by mature economies and infrastructure, thereby constraining innovation, competitiveness, and inclusion in the digital economy. more
Over the years, most communication service providers will build up their information systems bit by bit. Every so often as new services are required, a new process and vendor product is installed. Several years later, there can be many legacy processes and vendor products chosen and designed by many different people. Generally, each implementation team is diligently aware of these legacy processes and vendor products. But in a lot of cases the whole enterprise architecture becomes very convoluted and complicated. more
As the 2026 gTLD round opens, applicants face an overlooked geopolitical hazard: what happens if the registry or RIR underpinning their domain collapses under sanctions or war, leaving contracts stranded and accountability elusive. more
Zoom programmers made elementary security errors when coding, and did not use protective measures that compiler toolchains make available. It's not a great stretch to assume that similar flaws afflict their server implementations. While Mudge noted that Zoom's Windows and Mac clients are (possibly accidentally) somewhat safer than the Linux client, I suspect that their servers run on Linux.Were they written with similar lack of attention to security? more
Sponsored byRadix
Sponsored byVerisign
Sponsored byCSC
Sponsored byWhoisXML API
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byIPv4.Global