Since Skype has an open client-side API, why not use it as a transport to tunnel VPN traffic and blow through firewalls to connect you to a remote system? That's the idea raised by Peeter P. Mõtsküla in his Skype Developer Blog entry: "Idea: skypetunnel". For instance, have a Skype client running on your home machine logged in as one account. Have Skype on your laptop on another account. Initiate a connection between the two of them and wind up with secure, encrypted access through the firewall from wherever you are. Being peer-to-peer, there would be no central servers or infrastructure required (outside the usual Skype p2p cloud.) This would require, of course, a yet-to-be-created "extra" that connected into the Skype client API and was installed on both systems...but that was the point of the article... more
Defendant iREIT filed its answer on May 25, 2007, to the recent complaint by Verizon alleging cybersquatting. As in the prior article, these are the public court documents and nothing has been proven by either side in a court of law. more
I ought to explain why I've suddenly gone cold on VoIP. It's just I've watched my own behaviour. I've grown tired of the inconsistency of PC VoIP calls, and instead I've reverted to using landlines, mobiles and Jajah (for callback). But I'm still using IM to set up many of those calls! The problem isn't unique to any one client - they're all proving unsuitable for business use with clients (which is most of my telephony needs covered). The worst of all seems to be Skype conference calling... more
With my post earlier this month about the possibility of SIP botnets [also featured here on CircleID], I've had a number of people asking about more information and wondering about the possible impacts. And while I will write more on botnets in general, as far as the potential impact of "botnets" in general, one need only look over at the current situation in Estonia... Now, perhaps Russia is behind the attack... perhaps not. There are obviously much larger political issues going on between the two states. more
So this afternoon my charge is to lay out all the Net Neutrality (NN) issues to a bar association that doesn't have a telecom subcommittee... Cringely says that "In the end the ISPs [network providers] are going to win this [network neutrality] battle, you know. The only thing that will keep them from doing that is competition, something it is difficult to see coming along anytime soon..." more
A recent article chronicles the telcos' slow start in cable TV. I don't think the telcos stand a chance of succeeding in cable TV. Instead, if they're to succeed at all, they'll probably buy or form alliances with existing cablecos... But they'd better start swimming, because the times are a changing.. more
Fergie replied on NANOG to my recent post on the subject of broadband routers insecurity: "I'll even go a step further, and say that if ISPs keep punting on the whole botnet issue, and continue to think of themselves as 'common carriers' in some sense -- and continue to disengage on the issue -- then you may eventually forced to address those issues at some point in the not-so-distant future..." He is right, but I have a comment I felt it was important - to me - to make. Not just on this particular vulnerability, but on the "war"... more
The only Cyber law passed in Pakistan till date is the famous ETO-2002 (Electronic Transaction Ordinance - 2002). It required Ministry of IT&T to set up a Central Repository for all digital certificates and in addition to set up a body to be named as Electronic Certification Accreditation Council (ECAC) to accredit Electronic Certification Authorities to be established in the country... In this regard, government has not only closed its eyes and has blindly trusted the only certificate authority (CA) in the country operated by a private business group, it has also mandated the citizens and business to trust it. Case in point is Central Board of Revenue (CBR) that has told all taxpayers to digitally sign the emails using the certificates issued by this private party... more
In this post I'd like to discuss the threat widely circulated insecure broadband routers pose today. We have touched on it before. Today, yet another public report of a vulnerable DSL modem type was posted to bugtraq, this time about a potential WIRELESS flaw with broadband routers being insecure at Deutsche Telekom. I haven't verified this one myself but it refers to "Deutsche Telekom Speedport w700v broadband router"... more
Forwarding e-mail is so easy that it must be legal, right? Not everyone thinks so. Ned Snow at the University of Arkansas recently wrote A Copyright Conundrum: Protecting Email Privacy that argues that forwarding violates the sender's copyright rights, so it's not. The article is quite clever and is (as best I can tell, not being a legal historian) well researched, even if you agree with me that its conclusions are a bunch of codswallop... more
A story... ZZZ Telemarketing (not a real name) is locked in a heated fight with their bitter rival, YYY Telemarketing (also not a real name), to win a very large lead generation contract with Customer X. Customer X has decided to run a test pitting the two companies against each other for a week to see who can generate the most leads. The ZZZ CEO has said to his staff that it is "do or die" for the company. If they fail to win the contract, they will have to shut down -- they need to do "whatever it takes" to win over YYY. A ZZZ staffer discovers that part of why YYY has consistently underbid them is because they are using SIP trunks to reduce their PSTN connection costs. But the staffer also discovers that YYY is using very cheap voice service providers who run over the public Internet with no security... more
International organisations should step in to prevent the "tasting," "kiting" and "spying" related to Internet domain names, say representatives from the US telecommunications and trademark industries. These new activities are dramatically altering online commerce and impacting legitimate businesses, and the United States Federal Trade Commission (FTC), World Intellectual Property Organization (WIPO) and the Internet Corporation for Assigned Names and Numbers (ICANN) should take action, they say. The US Anti-Cybersquatting Consumer Protection Act (ACPA) had too many loopholes given the actual trends in the domain name secondary market, said Sarah Deutsch, vice president and associate general counsel for Verizon, and Marilyn Cade, former AT&T lobbyist and now consultant on Internet and technology issues... more
Ed Richards, Chief Executive of Ofcom, was at Columbia today... NN (Net Neutrality) debate does give us insight into importance of disclosure to consumers -- consumers should be able to switch providers, and they should know which ISPs are making prioritization decisions. This should be an obligation of suppliers to communicate this information to consumers. In particular, he says that Ofcom is actively exploring whether network operators whose traffic shaping activities change materially should have to tell consumers -- and if these changes are significant consumers should be allowed to break their contracts with the provider without penalty... more
BusinessWeek is running a column called 'Brandjacking' on the Web. In summary, nobody likes deliberate cybersquatting or typosquatting. But if Typo domain-names did not exist, the traffic would continue to flow to Microsoft or Google via the browser's error search where those very large companies would make money in the same manner as the 'evil cybersquatters'... more
In reading a Q&A with Verizon's Brian Whitten I found this striking Q and A: "Q. With a fiber connection being symmetric, many fiber providers such as Paxio are providing symmetric connections such as 5Mbit, 10Mbit, 30Mbit. Why is Verizon keeping this arbitrary asymmetric limit with Fiber? A. ...Indeed, our FTTP network can easily support a symmetric data service. As market dynamics change, we would re-assess the benefit to our customers of introducing a class of symmetric data services." My reaction is "No thank you, I'd rather do it myself". To understand my reaction you need to recognize the difference between wanting to build my own bridge across a stream and asking why I'm not allowed to cross it myself using my own boat. more