<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:admin="http://webns.net/mvcb/"
	xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
	xmlns:content="http://purl.org/rss/1.0/modules/content/">

	<channel>

	<title>&#45; CircleID</title>
	<link>https://www.circleid.com/blogs/</link>
	<description>Postings from  on CircleID</description>
	<dc:language>en</dc:language>
	<dc:rights>Copyright 2026, unless where otherwise noted.</dc:rights>
	<dc:date>2026-04-08T19:01:00+00:00</dc:date>

	
	<item>
		<title> Impenetrable Processes and Fool's Gold at ICANN (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20110403_impenetrable_processes_and_fools_gold_at_icann</guid>
		<link>https://circleid.com/posts20110403_impenetrable_processes_and_fools_gold_at_icann</link>
		<description><![CDATA[A couple of weeks ago, I attended part of the ICANN meeting in San Francisco. I've been watching ICANN and been peripherally aware of their issues since the organization began, but this was my first chance to attend a meeting. What I learned is that ICANN is a crazy behemoth of a bureaucracy, steeped in impenetrable acronyms and processes that make it nearly impossible for someone new to get up to speed. The best example of this is the recent approval of the .XXX top-level domain. <a href="https://circleid.com/posts20110403_impenetrable_processes_and_fools_gold_at_icann">More...</a>]]></description>
		<dc:date>2026-04-08T12:01:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Comcast’s Impressive System for Notifying Infected Users (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20110301_comcasts_impressive_system_for_notifying_infected_users</guid>
		<link>https://circleid.com/posts20110301_comcasts_impressive_system_for_notifying_infected_users</link>
		<description><![CDATA[Pretty much as long as there've been computers, one of the biggest challenges has been user education. How do you create software smart enough to inform a user when they're about to do something potentially disastrous - or, worse, when something disastrous has been done to them? As one of the world's largest access providers, Comcast has put a ton of thought into developing a notification system for their users. The solution Comcast developed involves, in effect, hijacking HTTP requests... <a href="https://circleid.com/posts20110301_comcasts_impressive_system_for_notifying_infected_users">More...</a>]]></description>
		<dc:date>2026-04-08T12:01:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Is Amazon Playing Chicken With Mailbox Providers? (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20110217_is_amazon_playing_chicken_with_mailbox_providers</guid>
		<link>https://circleid.com/posts20110217_is_amazon_playing_chicken_with_mailbox_providers</link>
		<description><![CDATA[It's easy to look at Amazon SES and sigh. Thousands of low-end customers sending mail from a shared IP pool? Amazon already knows that trick never works! Just one spammer will ruin the reputation of those IP addresses, resulting in ongoing delivery problems for everyone who uses the service. It is possible that Amazon can build the systems and human processes to keep spammers out; certainly sounds like they want to. <a href="https://circleid.com/posts20110217_is_amazon_playing_chicken_with_mailbox_providers">More...</a>]]></description>
		<dc:date>2026-04-08T12:01:00-07:00</dc:date>
	</item>
	
	<item>
		<title> How the End of IPv4 Affects Email and Hosting (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/postshow_the_end_of_ipv4_affects_email_and_hosting</guid>
		<link>https://circleid.com/postshow_the_end_of_ipv4_affects_email_and_hosting</link>
		<description><![CDATA[Anyone who has been watching the technology industry for more than a couple of years quickly learns to recognize FUD: Fear, Uncertainty and Doubt. FUD is (apparently) widely believed to be an effective marketing technique, especially when it comes to security, privacy, or scarcity. But the FUD often falls flat. Scarcity, in particular, is rare on the internet -- even rarer than privacy or security. There's constant FUD about scarcity of bandwidth, but the pipes get upgraded. Attempts to impose artificial scarcity through paywalls or other devices inevitably fail in the face of free alternatives. Even the scarcity of IPv4 addresses, which have indeed run out at the top, hasn't affected end users at the bottom yet -- and probably won't, for a long time. <a href="https://circleid.com/postshow_the_end_of_ipv4_affects_email_and_hosting">More...</a>]]></description>
		<dc:date>2026-04-08T12:01:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Where Every Phisher Knows Your Name (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20110104_where_every_phisher_knows_your_name</guid>
		<link>https://circleid.com/posts20110104_where_every_phisher_knows_your_name</link>
		<description><![CDATA[Spear phishing is the unholy love child of email spam and social engineering. It refers to when a message is specifically crafted, using either public or previously stolen information, to fool the recipient into believing that it's legitimate. This personalization is usually fairly general, like mentioning the recipient's employer (easily gleaned from their domain name.) Sometimes they address you by name. Much scarier is when they use more deeply personal information stolen from one of your contacts... <a href="https://circleid.com/posts20110104_where_every_phisher_knows_your_name">More...</a>]]></description>
		<dc:date>2026-04-08T12:01:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Remembering the Good Times (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20101202_remembering_the_good_times</guid>
		<link>https://circleid.com/posts20101202_remembering_the_good_times</link>
		<description><![CDATA[The most effective early email-borne viruses didn't need botnets. They didn't change your computer settings, or steal your login credentials. And they somehow convinced regular users to help them spread. The first warnings about the Good Times virus began to appear in November of 1994, and by December the warnings were seen all over as people did what the warning said, and forwarded it to all their friends. There was another outbreak the following March... <a href="https://circleid.com/posts20101202_remembering_the_good_times">More...</a>]]></description>
		<dc:date>2026-04-08T12:01:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Facebook + email = Facebook (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/postsfacebook_email_facebook</guid>
		<link>https://circleid.com/postsfacebook_email_facebook</link>
		<description><![CDATA[Remember when Gmail launched in 2004, and everyone said it was going to kill Hotmail, Yahoo!, and AOL? Six years later, and this chart shows pretty clearly that while gmail has grown, only AOL's pageviews have fallen. The rest have held fairly steady. So what's everyone freaking out about? <a href="https://circleid.com/postsfacebook_email_facebook">More...</a>]]></description>
		<dc:date>2026-04-08T12:01:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Transmissions from the Past: Radio and Email on Mobile Devices (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/poststransmissions_from_the_past_radio_and_email_on_mobile_devices</guid>
		<link>https://circleid.com/poststransmissions_from_the_past_radio_and_email_on_mobile_devices</link>
		<description><![CDATA[Apparently, along with trying to change who gets paid when the music gets played, the National Association of Broadcasters is lobbying Congress to require FM radio receivers to be built into phones and other mobile devices. I'm sure this is in part a reaction to the rise of streaming music apps like Pandora and the Public Radio Player, but they want FM receivers in not-so-smart phones too. <a href="https://circleid.com/poststransmissions_from_the_past_radio_and_email_on_mobile_devices">More...</a>]]></description>
		<dc:date>2026-04-08T12:01:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Omnibus Cybersecurity Bill May Not Go Where Original Authors Intended (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20100825_cybersecurity_bill_may_not_go_where_original_authors_intended</guid>
		<link>https://circleid.com/posts20100825_cybersecurity_bill_may_not_go_where_original_authors_intended</link>
		<description><![CDATA[In an interview with GovInfoSecurity, Sen. Thomas Carper said that the U.S. Senate is considering attaching cybersecurity legislation to a defense authorizations bill. Though clearly a ploy to be able to say "we did something about those evil hackers" before the elections, CAUCE applauds the attempt. There can be no doubt that the United States (and many other countries) sorely needs better laws to deal with these threats. <a href="https://circleid.com/posts20100825_cybersecurity_bill_may_not_go_where_original_authors_intended">More...</a>]]></description>
		<dc:date>2026-04-08T12:01:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Clouded by a Convenient Illusion (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20100727_clouded_by_a_convenient_illusion</guid>
		<link>https://circleid.com/posts20100727_clouded_by_a_convenient_illusion</link>
		<description><![CDATA[In a relatively short time, the phrase "in the cloud" has become a term of art when talking about the internet. A quick Google search shows nearly a million uses of the phrase in the past month, a 3x increase from the same period in 2009. But, what does it actually <em>mean</em> to have your web site, your software, your data, or anything else "in the cloud?" "In the cloud" is derived from "cloud computing," which in turn is just a new term for <em>distributed</em> computing, where data-crunching tasks are spread across a variety of different physical processing units. This was common in mainframes in the 1960s, and later the idea of distributing processing across cheap PCs running Linux became popular in the 1990s. <a href="https://circleid.com/posts20100727_clouded_by_a_convenient_illusion">More...</a>]]></description>
		<dc:date>2026-04-08T12:01:00-07:00</dc:date>
	</item>
	
	<item>
		<title> The Other Side of Security (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20100708_the_other_side_of_security</guid>
		<link>https://circleid.com/posts20100708_the_other_side_of_security</link>
		<description><![CDATA[The Denver edition of Security BSides took place a few weeks ago in a garage turned art gallery on the far end of Denver's emerging Santa Fe Arts District, right on the border between historic working-class neighborhoods and a rambling wasteland of building supply warehouses. ... The presentation I enjoyed most was "Top 10 Ways IT is Enabling Cybercrime," presented by Daniel J. Molina from Kaspersky Labs. He described how quickly threats are evolving, how many new threats are appearing every day, and explained that the targets aren't always who you'd expect. <a href="https://circleid.com/posts20100708_the_other_side_of_security">More...</a>]]></description>
		<dc:date>2026-04-08T12:01:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Facebook, Privacy, and the Loss of Trust (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20100513_facebook_privacy_and_the_loss_of_trust</guid>
		<link>https://circleid.com/posts20100513_facebook_privacy_and_the_loss_of_trust</link>
		<description><![CDATA[Facebook sure is getting beaten up recently. There's even a crowd-funded initiative to replace it with something open, called Diaspora -- everyone on Facebook is talking about it. Yet it wasn't even two full years ago that Facebook was the darling of the ditherati. For a while it seemed as if nearly everything Facebook did was hailed as the future of messaging, perhaps the future of the Internet - or maybe the Internet didn't matter anymore, except for Facebook. <a href="https://circleid.com/posts20100513_facebook_privacy_and_the_loss_of_trust">More...</a>]]></description>
		<dc:date>2026-04-08T12:01:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Resources for Cleaning Your Network (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/postsresources_for_cleaning_your_network</guid>
		<link>https://circleid.com/postsresources_for_cleaning_your_network</link>
		<description><![CDATA[The first step (but certainly not the last) towards saving the internet from spam, malware, and other abuse is to keep your own network clean. A friend of CAUCE, who wishes to remain anonymous, offers these tips and resources to help you identify problem traffic emanating from your network, and clean it up. Though primarily written for ISPs, many of the items below should apply equally well to any network owner. <a href="https://circleid.com/postsresources_for_cleaning_your_network">More...</a>]]></description>
		<dc:date>2026-04-08T12:01:00-07:00</dc:date>
	</item>
	
	<item>
		<title> A Dangerous Buzz, and Opt-In Isn't Just for Email (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20100212_a_dangerous_buzz_opt_not_just_for_email</guid>
		<link>https://circleid.com/posts20100212_a_dangerous_buzz_opt_not_just_for_email</link>
		<description><![CDATA[Google is great at generating buzz, and they've done it again with their new social vitality tool, appropriately named Google Buzz. Buzz takes all of your Gmail contacts (and presumably other connections from elsewhere within the Googleplex), and makes them all your "friends" by default; it then shares your activity from Google Reader, YouTube, and other tools with all of them, and vice versa... <a href="https://circleid.com/posts20100212_a_dangerous_buzz_opt_not_just_for_email">More...</a>]]></description>
		<dc:date>2026-04-08T12:01:00-07:00</dc:date>
	</item>
	
	<item>
		<title> A Look Inside the European Response to Spam (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/postsa_look_inside_the_european_response_to_spam</guid>
		<link>https://circleid.com/postsa_look_inside_the_european_response_to_spam</link>
		<description><![CDATA[Last week the European Network and Information Security Agency (ENISA), which assists the European Commission and its member states with network and information security issues, published its third Anti-Spam Measures Survey. The survey provides insight into how network operators in Europe are responding to the continued onslaught of email spam. <a href="https://circleid.com/postsa_look_inside_the_european_response_to_spam">More...</a>]]></description>
		<dc:date>2026-04-08T12:01:00-07:00</dc:date>
	</item>
	

	</channel>
</rss>