/ Most Viewed

Security Costs Money. So - Who Pays?

Computer security costs money. It costs more to develop secure software, and there's an ongoing maintenance cost to patch the remaining holes. Spending more time and money up front will likely result in lesser maintenance costs going forward, but too few companies do that. Besides, even very secure operating systems like Windows 10 and iOS have had security problems and hence require patching. (I just installed iOS 10.3.2 on my phone. It fixed about two dozen security holes.) more

Crypto - The New Market for Lemons

Ever buy a used car only to realize later that you've purchased a lemon? That scenario occurs because of information asymmetry between the seller -- who knows the car is a lemon -- and the buyer who doesn't. Without transparency, the market assumed that any used car for sale is a lemon, so that drove down the price of good used cars. The good news is that thanks to the Internet, buyers now have access to data that can help them determine if a car is a lemon or a good buy. more

Survey: Cloud Computing ‘No Hype’, But Fear of Security and Control Slowing Adoption

Contrary to conventional wisdom, the vast majority of business and IT executives report that cloud computing is a viable technology option that can improve a company's bottom-line results according to a new global survey conducted by an independent market research firm. However, despite growing evidence that cloud-based systems have the potential to lower costs, the majority of companies report no plans to integrate cloud computing in the next 12 months... more

“Globally, Internet Traffic Passes Through 13 Root Servers” (!)

The Times of India recently interviewed India's Minister of State for Communications and IT, Sachin Pilot, on Internet Governance. Titled "'Internet's governance can't be limited to one geography'", the article started off with an amazing assertion by the minister... While this interview is a fairly standard restatement of the position some Governments (including India) have about governmental control of Internet Governance, it is sadly apparent that the minister unfortunately doesn't appear to understand what the root servers are, or how they work. more

China Launches World’s First Underwater Data Center

China has achieved a world first by starting the assembly of an underwater commercial data center off the coast of Sanya, on Hainan Island, according to China Daily. more

Study Finds 75% of Malicious Websites from Legitimate, Trusted Sources

New report released today finds 75 percent of malicious websites are from legitimate, trusted sources with "Good" reputation scores. According to the report, 60 percent of the top 100 most popular websites either hosted malicious content or contained a masked redirect to lure unsuspecting victims from legitimate sites to malicious sites. more

8 Security Considerations for IPv6 Deployment

Feb. 3, 2011, came and went without much fanfare, but it was a milestone for Internet stakeholders, whether they knew it or not. On that Thursday, the last available IPv4 addresses were allocated by the Internet Assigned Numbers Authority (IANA). Though some Regional Internet Registries (RIRs) have a reasonable inventory of IP addresses that could last another year or two, the days of "new" IPv4 address allocations are largely over. more

A Case for Further DNS Registrar Industry Self-Regulation

In most industries, businesses that blatantly act against the interests of their customers to favor their own internal profit centers would either not be allowed or else subject to controls and oversight by the government. It is universally regarded as an unfair and deceptive business practice. In the domain name registrar business, however, the normal practices of legitimate business dealings and customer protection seem woefully wanting. Kelly's Case described here illustrates the point... more

The Ever-Evolving Problem of DNS Abuse

For several years, many within ICANN circles have raised concerns about the escalating nature of domain name system (DNS) abuse. While some strides were made toward a safer DNS, new data - this time from a comprehensive study of DNS abuse by the European Union - demonstrates that abuse remains a frustratingly obstinate problem that requires urgent attention. We've seen some registries and registrars testing innovative industry-led initiatives in an effort to address the issues. more

Amazon’s Project Kuiper Successfully Tests Laser-Based Satellite Communication

Amazon's Project Kuiper has confirmed the use of laser-based inter-satellite links (OISL) for its satellite communication system. The technology has undergone successful testing in orbit, with data transmission speeds of 100 gigabits per second (Gbps) over a distance of 621 miles achieved.  more

Local “.city” TLDs as an Opportunity for City Portals

One of the most frequently asked question when it comes to the discussion about a city top-level domain ".city" (such as .london, .berlin or .nyc) is what .city means to the already established official city portal (such as London.gov.uk, Berlin.de, NYC.gov or in general City.com). This article contributes to the most important topics in this discussion... The choices at the top-level available to individuals, companies and regional communities is today limited to country codes (such as .de or .fr) and a very few generic endings (such as .com or .info). Individuals and companies in cities can't really identify with Internet addressing and look for ways to circumvent it. For instance, the term "hamburg" is already used in about 50,000 domains such as www.habour-hamburg.de demonstrably showing that they belong to the Hamburg community. The synonym "nyc" can be found in almost 300,000 domains... more

Comcast’s Network Management Practices: A Brief Analysis

Late last week, Comcast officially disclosed to the FCC details of its network management practices which have been a subject of considerable discussion here on CircleID. (My thanks to Threat Level from Wired.com for providing a convenient copy of Comcast's "Attachment A" in which this disclosure is made.) There's not a lot of startling disclosure in this document, but it does provide some useful concrete facts and figures. I'll quote the more interesting parts of the document here, and offer comment on it. more

Every Domainer Is Subsidizing Tasting… Abolish Registration Grace Period

One issue that a large number of domainers agree on is that domain tasting under the current ICANN-approved policy is bad for the industry. For one thing, a healthy portion of the practice involves trademark use that not only is illegal but also destroys value. Of course, particular segments of the domain name ecosystem can suffer value destruction because of tasting that doesn't infringe trademarks. But most criticism is directed, and rightly so, at tasting that raises trademark issues. Litigation over the trademark issues has done little to stop the practice and destroys value for trademark holders and domainers alike... more

To Serve the Public Interest You First Have to Define ‘Public Interest’

In the ancient parable, six blind men are asked to describe an elephant, with each coming up with wildly different answers, depending on which part of the animal they touched. Now, while I would hesitate to call participants in the ICANN process "blind men," I am starting to think that "public interest" is their elephant. ICANN is on the threshold of completing its first major obligation under the Affirmation of Commitments it signed with the U.S. Government in 2009. more

How Much Money Do Spammers Make?

News reports say that high profile Ryan Pitylak was fined $10 million by the Texas Attorney General. A few days ago, he paid a $1M settlement to Microsoft. Since it had been widely reported that he'd made between $3M and $4M during his spamming career, that seemed like a pretty good deal for him. As I commented to the San Antonio Express, this new fine is more in line with what he did, and at least relieves him of all his ill-gotten gains... more