/ Featured Blogs

Comcast’s Network Management Practices: A Brief Analysis

Late last week, Comcast officially disclosed to the FCC details of its network management practices which have been a subject of considerable discussion here on CircleID. (My thanks to Threat Level from Wired.com for providing a convenient copy of Comcast's "Attachment A" in which this disclosure is made.) There's not a lot of startling disclosure in this document, but it does provide some useful concrete facts and figures. I'll quote the more interesting parts of the document here, and offer comment on it. more

Japan Domain Market Demystified

Ever sat at one of the VeriSign "State of the domain" meetings at any of the ICANN meetings? Or read their reports about countries with the greatest opportunity in domains? Almost without question you will learn that Japan is earmarked as the country with the greatest opportunity for growth in the domain market. They take into consideration important factors such as GDP of a country, internet population, and current domain registration levels... more

The Wall Street Lesson for Net Neutrality

As the institutions of Wall Street continue to crumble one after another, there's a lesson to be learned for those of us who want to make sure the Internet remains as free and open in the future as it has been in the past. The collapse of Fannie Mae, Freddie Mac, Bear Stearns, Merrill Lynch, Lehman Brothers, AIG and the rest didn't happen overnight. The situation has been brewing for years. The subprime mortgage crisis may have precipitated the immediate tragedy, but underpinning the whole mess is a philosophy about business and government. more

IGF Meeting Blacklisted

I got an e-mail from someone currently attending the Internet Governance Forum (IGF) meeting in Geneva. The e-mail ended up in my spam folder because the IP address used for the wireless LAN at the meeting is on a spambot/virusbot blacklist, namely cbl.abuseat.org. Apparently some guy there has his computer infected by a spambot or a virusbot... more

Cloud Computing and Privacy

There has been a good deal of talk of late on the important topic of security and privacy in relation to cloud computing. Indeed there are some legitimate concerns and some work that needs to be done in this area in general, but I'm going to focus today on the latter term (indeed they are distinct -- as a CISSP security is my forte but I will talk more on this separately). more

Will John McCain Help the NEXT Blackberry Creator?

Today a senior McCain advisor, Doug Holtz-Eakin, proudly held up a Blackberry and declared: "You're looking at the miracle that John McCain helped create." Bloggers on all sides of the partisan divide are having a field day with this -- suggest that the McCain campaign is out of touch, desperate, or trying to top the trouble VP Al Gore got into, when he was falsely accused of claiming to have invented the Internet... more

Why It Doesn’t Matter That the Virginia Anti-Spam Law was Struck Down

If the headlines are to be believed, spam is now entirely legal in Virginia and anyone can send whatever they want without any fear of reprisal, ever. Looking beyond the headlines, it appears that the Virginia Supreme Court's ruling in AOL's case against formerly convicted spammer Jeremy Jaynes declares that the Virginia anti-spam law violates the Constitutional protection of anonymous speech, and thus is null and void. more

Virginia Court Throws Out Spam Law; One Spammer Gets Away With It

The 2004 criminal spam case against large-scale spammer Jeremy Jaynes, which I've covered in several previous blog entries, appears to have come to an ignominious end with the state supreme court throwing out the law under which he was convicted. The Virginia anti-spam law was one of the first in the country with criminal provisions, but it failed due to the way that First Amendment cases are treated differently from all other cases. more

Google Chrome: Cloud Operating Environment

Rather than blathering on to the blogosphere about the superficial features of Google's new Chrome browser I've spent some time studying the available material and [re]writing a comprehensive Wikipedia article on the subject which I intend for anyone to be free to reuse under a Creative Commons Attribution 3.0 license rather than Wikipedia's usual strong copyleft GNU Free Documentation License (GFDL). This unusual freedom is extended in order to foster learning and critical analysis, particularly in terms of security. more

Caring About Cybersecurity or Preparing the Ground for an I-Patriot Act?

Few months ago in a talk given at the Institution of Engineering and Technology organised here in London by the Society for Computers and Law, Professor Lessig recounted a conversation he had with former US Counter Terrorism Czar Richard Clarke, where Larry asked the question that many had in mind... how the US Government managed to conceptualize, design and draft a piece of legislation as vast and complex as the USA PATRIOT Act in such a short period of time (a month and 15 days after 9/11), and the answer was what many people had imagined... more