A debate over aligning internet and AI governance reveals stark differences in origin, incentives and power. While lessons from ICANN's multi-stakeholder model endure, AI's corporate dominance and geopolitical rivalry demand new, bottom-up approaches. more
Craig Moffett, of MoffettNathanson, was recently quoted in FierceTelecom asking if the broadband industry is reaching maturity. Other than in rural areas, where many homes are still hungry for better broadband, the broadband penetration rate in cities is approaching 90%. It's a fair question to ask if there is room for much more growth in the industry. This is a question that has bounced around for the last five years. more
Community networks, locally built and governed, are emerging across Africa as cost-effective tools to extend connectivity, bolster digital sovereignty, and improve cyber resilience, despite regulatory, financial, and technical constraints that hinder broader adoption. more
The UN's new permanent cybersecurity mechanism promises continuity after decades of fleeting forums, yet risks irrelevance unless states enforce existing law, bridge cybercrime divides, address AI threats, build practical capacity, and include non-state expertise meaningfully. more
Global digital policy frameworks often overlook the realities of African SMEs, imposing compliance standards shaped by mature economies and infrastructure, thereby constraining innovation, competitiveness, and inclusion in the digital economy. more
Cox v. Sony narrows intermediary liability, insisting on intent over knowledge. In doing so, it preserves infrastructure neutrality, resists privatized enforcement, and sharpens a growing divide between American and European models of Internet governance. more
Afnic's 2025 review finds .fr registrations at a record 4.3m, with strong new domain creation and steady retention, even as competition from .com and shifting digital trends temper expectations for future growth in 2026 overall. more
Unicorn firms lead in DNS-based security adoption, signaling technical maturity, while Global 2000 rely on enterprise registrars. Gaps in redundancy and brand protection expose supply chain risks as cyberattacks intensify across industries globally today. more
Bad actors are exploiting DNS with growing sophistication. New domains dominate threat infrastructure, daily user exposures are rising, and AI is accelerating attack creation, making DNS intelligence an increasingly critical early-warning system for modern cyber defence. more
Let's face it, when it comes to digital technologies, fundamental human rights are not on top of the digital agenda. They seem irrelevant and remote, even an obstacle to digital innovation and opportunities. We are quick to pay lip service to them, but we permit the profit motive and stakeholder self-interests to override human rights principles. It does not matter how right and righteous the cause might be; to be implemented, it must be profitable or carry stakeholder benefits. more
Wolfgang Kleinwaechter, in his Internet Governance Outlook 2024, reminded us that 2024, as the years before and future years, will be pivotal for Internet Governance processes. We eagerly await Wolfgang's missives every January, and we trust what we read because we know him, and we trust CircleID. We should be grateful and cherish this example of straightforward, digitally enabled, and trust-based human communication... more
Over the years, most communication service providers will build up their information systems bit by bit. Every so often as new services are required, a new process and vendor product is installed. Several years later, there can be many legacy processes and vendor products chosen and designed by many different people. Generally, each implementation team is diligently aware of these legacy processes and vendor products. But in a lot of cases the whole enterprise architecture becomes very convoluted and complicated. more
Zoom programmers made elementary security errors when coding, and did not use protective measures that compiler toolchains make available. It's not a great stretch to assume that similar flaws afflict their server implementations. While Mudge noted that Zoom's Windows and Mac clients are (possibly accidentally) somewhat safer than the Linux client, I suspect that their servers run on Linux.Were they written with similar lack of attention to security? more
America's Supreme Court, in Cox v Sony, recast online copyright liability, effectively sidelining the DMCA safe harbor and replacing it with a narrow inducement standard that leaves service providers little obligation to meaningfully police infringement. more
Jan Žorž reflects on SEE RIPE's role in uniting a fragmented region, where trust built through informal exchange now underpins internet resilience and helps align engineers with policymakers as regulatory pressures intensify. more
Sponsored byWhoisXML API
Sponsored byCSC
Sponsored byDNIB.com
Sponsored byIPv4.Global
Sponsored byRadix
Sponsored byVerisign
Sponsored byVerisign