In the 2014 Istanbul-Turkey IGF workshop on policies to promote broadband access in developing countries organised by Rui ZHONG of ISOC China, we realized that while technological solutions are advancing rapidly, policy and regulations remain a significant barrier to affordable internet especially in the developing world. According to a report by Alliance for Affordable Internet ( A4AI), the key to affordability is the policy and regulatory environment that shapes the different actors in the market. more
In my last post I discussed some questions that remain about ICANN's generic Top-level Domain (gTLD) budget. Today I discuss the rights protections mechanisms as they currently appear. An economic study commissioned ICANN to analyze the new gTLD process recently concluded that "the biggest likely costs" of approving new gTLDs are "consumer confusion and trademark protection." more
Isn't security as important to discuss as .XSS? The DNS has become an abuse infrastructure, it is no longer just a functional infrastructure. It is not being used by malware, phishing and other Bad Things [TM], it facilitates them. Operational needs require the policy and governance folks to start taking notice. It's high time security got where it needs to be on the agenda, not just because it is important to consider security, but rather because lack of security controls made it a necessity. more
For those worried about the threat of a state-based takeover of the Internet, there is no need to obsess over the International Telecommunication Regulations (ITRs) exclusively. Three Chinese engineers are proposing a way to alter Internet standards to partition the Internet into autonomously administered national networks, using the domain name system (DNS). The idea was not proposed in the ITU; no, it was sent to a multi-stakeholder institution, the granddaddy of the Internet itself, the Internet Engineering Task Force (IETF). more
Reported in the Washington Post no less: "Dell Takes Cybersquatters to Court". As reported a few weeks ago, this is a very thorough action targeting certain practices and practitioners... I'm surprised a suit this thorough didn't name Google as a co-defendant. Then again, maybe it's not that surprising because Google offers a well liked product, has a lot more money; and a search partnership with Dell that allows Dell to share in the profit when its users engage in "right of the dot" typosquatting on Dell keyboards. It's funny, because one day, Dell could find itself on the defendant's side of the courtroom... more
This week two major transoceanic cables experienced outages that may last several days. The outages provide a reminder that several Internet bottlenecks exist where these cables make landfall. When one thinks of bottlenecks in telecommunications the first and last mile come to mind. Yet equally vulnerable are the last few 1000 feet of submarine cable links. more
Back in January, bulk mailer E360 filed a suit against giant cable ISP Comcast. This week Comcast responded with a withering response... Their memorandum of law wastes no time getting down to business: "Plaintiff is a spammer who refers to itself as a "internet marketing company," and is in the business of sending email solicitations and advertisements to millions of Internet users, including many of Comcast's subscribers." Comcast's analysis is similar to but even stronger than the one I made in January... more
The threat landscape has rapidly expanded over the past few years, and shows no signs of contracting. With major establishments in both the public and private sectors falling victim to cyber-attacks, it is critical for organizations to identify the motivations, modus operandi (MO) and objectives of adversaries in order to adequately and effectively defend their networks. Understanding the taxonomy of cyber-attacks is the first step in preparing an organization against exposure to them. more
An industry professional at Abusix is the backbone behind a proposal to improve and create better mitigation of abuse across different global internet networks. Basically, this introduces a mandatory "abuse contact" field for objects in global Whois databases. This provides a more efficient way for abuse reports to reach the correct network contact. Personally - as a Postmaster for a leading, white-label ISP, I applaud this with great happiness for multiple reasons. I also feel people who handle abuse desks, anti-abuse roles, etc. should closely follow this. more
Great article by the BBC about email vs. mobile apps in China -- and why email is losing out to the most popular apps. It's important for Westerners such as myself to remember that most of the world did not first interact with the Internet via desktop computer. In most emerging markets, people leapfrogged computers altogether on their way to using mobile apps. more
The desired goal of most of the other countries other than US is to end up with their own local language suffixes, own local language domain names, basically their own Internet, with its own domain registration policies -- in a nutshell, a very big and a very complex global mess, indeed. This fight over ICANN, the Internet Corporation for Assigned Names and Numbers, is all about a golden key, as without it, the Internet is completely useless. ...It's also ICANN, the organization that from the start has made some very stringent and often very weird policies about such issues as the golden keys. Now its global authority is being challenged, and such fights could divide the power of this controlling body, and any adverse outcome will simply split the Internet. more
This post examines whether the new gTLDs program is a disruptive innovation to the dominance of .com. I then use the idea of disruptive innovation to explain the relative adoption failure of previous generic Top-Level Domains (gTLDs), such as .biz, .info and .mobi. Harvard Professor Clayton Christensen's theory of disruption explains battles between market entrants and incumbents. Examples of markets transformed by disruptive innovations include classified ads (Craigslist), long-distance calls (Skype), record stores (iTunes), research libraries (Google), encyclopedias (Wikipedia), and taxis (Uber). more
It would be reasonable to assume that your employer is archiving your email communications. But what about your personal emails, texts, phone calls and Facebook posts. Are these really private? Not for long, if the UK government has its way. It has been reported that its new anti-terror plan, if passed, would require Internet providers and phone companies to store all online communications by UK citizens for one year. more
Quick UDP Internet Connection (QUIC) is a network protocol initially developed and deployed by Google, and now being standardized in the Internet Engineering Task Force. In this article we'll take a quick tour of QUIC, looking at what goals influenced its design, and what implications QUIC might have on the overall architecture of the Internet Protocol. more
ICANN sent a 10-page letter to RegisterFly on February 21st threatening to terminate its accreditation. The letter is available here. ICANN's not exactly advertising this -- no conspicuous notice appears on its home page and, more curiously, no update has been posted by the Ombudsman despite two prior postings about RegisterFly in the past week. A member of the general public would be hard pressed to find out that any action has been threatened. more