As you probably know, the FBI has gotten into Syed Farook's iPhone. Many people have asked the obvious questions: how did the FBI do it, will they tell Apple, did they find anything useful, etc.? I think there are deeper questions that really get to the full import of the break. How expensive is the attack? Security - and by extension, insecurity - are not absolutes. Rather, they're only meaningful concepts if they include some notion of the cost of an attack. more
How do we make DNSSEC even more secure through the use of elliptic curve cryptography? What are the advantages of algorithms based on elliptic curves? And what steps need to happen to make this a reality? What challenges lie in the way? Over the past few months we've been discussing these questions within the community of people implementing DNSSEC, with an aim of increasing both the security and performance of DNSSEC. more
The apparent cyber heist of of $81 million from the Bangladesh central bank's U.S. account may cause some people to question the security of online banking. While the online theft prompted SWIFT - a cooperative owned by 3,000 financial institutions around the world -- to make sure banks are following recommended security practices, the incident also could have ramifications for banking customers worldwide. more
Google has announced that it is working to bring high-speed internet to Cuba, one of the world's least-connected countries. In a blog post published Monday, the company said it is bringing Chromebooks, Cardboard virtual reality kits, and other Google products to the Museo Orgánico Romerillo in Havana, where they will be connected to an internet network operated by the government-owned carrier ETECSA. more
Earlier this month, MarkMonitor representatives were privileged to witness, at the first ICANN meeting of 2016 in Marrakech, Morroco, the historic presentation of the plan to transfer the stewardship of key internet functions (IANA) from the United States Government to a community and consensus-based model of governance through ICANN (Internet Corporation for Assigned Names and Numbers). more
Joseph Cannataci recently submitted his first report as UN Special Rapporteur on the right to privacy - a brand new position, created in July 2015 in the wake of the German-Brazilian initiative for a UN resolution on privacy in the digital age. The report includes a description of Cannataci's working methods, a general overview of privacy-relevant topics, and a 'Ten point action plan' - described as a to-do list for the post holder, rather than a mere wish list. more
FBI says it may have found a way to unlock Syed Rizwan's iPhone without Apple's help and while exploring this option, a federal judge has postponed tomorrow's hearing. more
At the top of WIPO's list of the most cybersquatted trademarks for 2015 (issued on March 18, 2016) is "Hugo Boss" with 62 complaints. The report also reveals that the fashion industry led other commercial sectors with 10% of complainant activity. Not surprisingly, in this sector companies (couturiers extending their services to the general public) are branded with the personal names of their founders. Why any registrant would intentionally target well-known personal names in the fashion industry is a mystery because there's no future in it. In fact, complaints are never answered and always successful. more
It has been widely taken as "obvious" that a "no blocking" rule for ISPs is a good regulatory policy. Is this really the case? Does it save consumers from harm... or cause harm? Netflix has reached the point of being well over 30% of Internet traffic at peak time for some ISPs. This places three costs on the ISP and its users... So for someone who isn't a streaming video user, they are paying a share of the direct costs. more
We all know that the Internet is one of the most important tools of our time, but we can't afford to take the Internet -- or its future -- for granted. There are uncertainties facing the Internet's future and how they evolve will have a profound impact on society and our ability to solve some of the world's biggest challenges... To help answer these and other questions, the Internet Society is embarking on a collaborative initiative to envision scenarios for the evolution of the Internet. more
As a longtime member of ICANN's Intellectual Property Constituency (IPC), I'm impressed by the important work that this group does on behalf of trademark owners worldwide (as I've written before). While some die-hard IPC members spend countless (and, often, thankless) hours working virtually and in-person (at ICANN's global meetings) for the constituency, I find it very educational and worthwhile to participate on an ad-hoc basis. more
The Internet Infrastructure Coalition (i2Coalition) has joined the Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) to continue efforts on developing best practices for hosting and cloud service companies as well as sharing other information that will protect end-users. more
On Thursday, March 17, 2016, a U.S. Congressional committee will hold a hearing on the topic of "Privatizing the Internet Assigned Numbers Authority" (IANA) starting at 10:15am US EDT (UTC-4). You can learn about the hearing and view the written testimony at and watch live on the included pages. The hearing is before the Communications and Technology Subcommittee of the U.S. House of Representatives Energy and Commerce Committee. more
With companies shifting away from on-premises and "traditional" telecom networks to Internet-based protocols - such as Voice Over IP (oIP) - the market for critical communications infrastructure - most notably SIP trunking - is on the rise; not only multiple failover sites but cloud-based SIP-as-a-service solutions are now popular options. However, there's a caveat: problems unique to SIP systems that can cause IT headaches if you're not prepared. Here are three of the most common. more
On March 9th, 2016, during its final open meeting at ICANN 55 in Marrakech, Morocco, the Generic Names Supporting Organization (GNSO) Council approved a motion that I proposed to adopt the Charter of the Policy Development Process (PDP) to Review all Rights Protections Mechanisms (RPMs) in all Generic Top-Level Domains. I serve on the Council as one of the two representatives of ICANN's Business Constituency, and my fellow Councilors have designated me to serve as the GNSO's Liaison to the Working Group (WG), and as its Interim Chair. more