/ Featured Blogs

Why We Need Broadband Regulation

Anybody that reads my blog posts knows that I am in favor of broadband regulation. I'm sure ISPs read this and wonder why -- because who doesn't like being unregulated? My feelings on this go back to basic economics - monopolies must either be regulated or split up. By definition, monopolies always end up taking advantage of consumers - unregulated monopolies really can't help this behavior because employees and management of monopolies will inevitably take advantage of monopoly market power. more

An Inquiry Into an Organization’s Security Priorities

In the wake of recent high-profile security incidents, I started wondering: what, generally speaking, should an organization's security priorities be? That is, given a finite budget - and everyone's budget is finite - what should you do first? More precisely, what security practices or features will give you the most protection per zorkmid? I suggested two of my own, and then asked my infosec-heavy Twitter feed for suggestions. more

The Future of Europe’s Fight Against Child Sexual Abuse

Like much of how the Internet is governed, the way we detect and remove child abuse material online began as an ad hoc set of private practices. In 1996, an early online child protection society posted to the Usenet newsgroup alt.binaries.pictures.erotica.children (yes, such a thing really existed) to try to discourage people from posting such "erotica" on the assumption that the Internet couldn't be censored. more

78% of Cybersecurity Professionals Expect an Increase in DNS Threats, Yet Have Reservations

A recent survey conducted by the Neustar International Security Council confirmed the heightened interests on domain name system (DNS) security. The survey reveals that over three-quarters of cybersecurity professionals anticipate increases in DNS attacks, especially with more people shopping online amid the pandemic. Yet, close to 30% have reservations about their ability to respond to these attacks. more

Psst! Do You Know Anyone Developing Blockchain Applications?

The International Trademark Association's Blockchain Subcommittee is interested in meeting companies working on Blockchain applications related to intellectual property. The Blockchain Subcommittee's mission is to explore the use of blockchain technology in trademark prosecution, maintenance, protection, and practice, including the opportunities and threats to the value of trademarks, brands, and consumer trust in emerging blockchain technologies. more

A Simple Suggestion for President Biden Regarding the Cuban Internet

Last September, I asked what had happened to the proposal for a branch connecting the ARCOS undersea cable, which has a landing point in North Miami Beach, to Cojimar, Cuba. The consortium that operates the cable had applied for permission to connect Cuba in July 2018, and the FCC granted a request for streamlined processing, which should have taken less than 45 days, but nothing happened until September 2020 when the application was referred to a Justice Department committee... more

Notes from NANOG 81

As the pandemic continues, the network operator community continues to meet online. NANOG held its 81st meeting on February 8 and 9, and these are my notes from some of the presentations at that meeting... Ethernet, developed in 1973 at Xerox PARC, was a revolutionary step in network architectures in many ways. The common bus architecture imposed several constraints on the network that have echoed through the ensuing four decades in all kinds of ways. more

Facebook Stays, Everybody’s Happy, but Nothing Has Changed

After some turmoil, Facebook won the war with the Australian Government as the necessary changes were made to the legislation that avoided them needing to change their business model. Those subtleties are lost in the general press. What counts for the popular media is that they were able to spin some great stories around the fact that Australia stood up to the giants. That brought international attention, which boosted the ego of Australian Prime Minister Scott Morrison. more

Cybersecurity Tech Accord: 98% of Registrar Whois Requests Unrequited

When a brand goes so far as to ask a domain name registrar for Whois (the registration contact details) of a potentially abusive domain name, there's likely a lot at stake. Most often, the request is prompted by consumer safety concerns, such as the risk to consumers posed by a malicious site. Other times, the demand has a simple goal: to have a dialog with the registrant about the use of trademarks or other intellectual property in order to avoid extreme action. more

Let’s Bring Telecom Manufacturing Back to the US

President Biden recently signed an executive order that will require that the federal government buys more goods produced in the United States. This was done to promote American jobs and to keep profits at home. It's a great idea, but it suffers from one big flaw -- we don't manufacture a lot of things in the US anymore. Statistics are hard to pin down, but something like 40,000 US factories have shut down over the last decade. more