The public policy objectives in the area of content filtering and blocking space are intended to fulfil certain public policy objectives by preventing users within a country from accessing certain online content. The motives for such public policies vary from a desire to uphold societal values through to concessions made to copyright holders to deter the circulation of unauthorised redistribution of content. more
Last week I wrote about the arrival of a truckload of SpaceX Starlink terminals in Ukraine and their potential value to government and resistance leaders. A lot has happened in the ensuing week - this is an update. Last week, using Mike Puchol's Starlink tracking service, I found that users in Kyiv would have 100 percent uptime with connections through as many as nine satellites to ground stations in Turkey, Poland, and Lithuania. more
The 15th edition of the European Summer School on Internet Governance (EuroSSIG) took place recently in Meissen/Germany, from August 15 -20, 2021. It was the second hybrid meeting under the challenging condition of the pandemic. Eighteen fellows from 15 countries representing all regions of the world traveled to Germany, as well as five faculty members. Fifteen faculty members joined via Zoom from California to Beijing. The agenda of the one-week course included a broad range of topics such as cybersecurity, digital diplomacy, IGF+, DNS Abuse, human rights, digital trade and taxation, as well as artificial intelligence. more
For some time, the board of the American Registry for Internet Numbers (ARIN) has expressed a desire to have greater diversity across its leadership structures. Finally, steps are being taken to have representation that better reflects the diversity of the ARIN community... since ARIN was founded on April 18, 1997, two of its main oversight structures -- the Board of Trustees and Advisory Council -- have only been populated with persons from North America. At last, that changes. more
U.S. Chamber of Commerce President Thomas J. Donohue on January 10, 2018, warned that "techlash" is a threat to prosperity in 2018. What was he getting at? A "backlash against major tech companies is gaining strength -- both at home and abroad, and among consumers and governments alike." "Techlash" is a shorthand reference to a variety of impulses by government and others to shape markets, services, and products; protect local interests; and step in early to prevent potential harm to competition or consumers. more
Last week at RSA, Bruce Schneier gave a talk on the top 3 emerging threats on the Internet. Whereas we in the security field usually talk about spam, malware and cyber crime, he talked about three meta-trends that all have the potential to be more dangerous than the cybercriminals. Here are my notes. more
SpaceX delayed last Wednesdays Starlink launch due to high winds and on Thursday they decided to do a software update and postpone the launch until next week, but they revealed significant progress in their Starlink mission press release and in tweets by and a media call with Elon Musk. The mission press release said SpaceX has significantly reduced the size and weight of their satellites. more
To paraphrase an old Klingon proverb, there can be no spam solution, so long as e-mail is free. Yahoo has unveiled plans to launch its Domain Keys software as an open-source toolkit in 2004. The intent is to allow developers of major e-mail systems to integrate Yahoo's public/private key authentication system into their own software and thus create momentum for a standard whose raison d'etre is identify verification. This is a commendable effort, but a closer look reveals that it will not only not stop the spam problem, it may have almost no effect at all. more
In the current debate over the balance between privacy and Internet safety and security, one of the unanswered questions is: "How will those responsible for protecting the public interest gain access to the non-public data in the WHOIS databases post General Data Protection Regulation (GDPR)?" In an attempt to prevent WHOIS data from going "dark," several community members have been working for the past weeks to create a model that could be used to accredit users and enable access to the non-public WHOIS data. more
Researchers from Lancaster University's School of Computing and Communications have warned that the rapid growth of remote digital sensors and devices connected to the internet -- Internet of Things -- has the potential to bring unprecedented and, in principle, almost unlimited rises in energy consumed by smart technologies. more
The ICANN Security and Stability Advisory Committee (SSAC) has recently published SAC105, a report on the interplay between the DNS and the Internet of Things (IoT). Unlike typical SSAC publications, SAC105 does not provide particular recommendations to the ICANN Board, but instead is informative in nature and intends to trigger and facilitate dialogue in the broader ICANN community. more
On September 24, 2015, the free supply of IPv4 numbers in North America dwindled to zero. Despite fears to the contrary, IPv4 network operators have been able to support and extend their IP networks by purchasing the IPv4 address space they need from organizations with excess unused supply through the IPv4 market. The IPv4 market has proved to be an effective means of redistributing previously allocated IPv4 numbers, and could provide enough IPv4 addresses to facilitate the Internet's growth for several more years while the protracted migration to IPv6 is underway. more
The promise of "big data" -- real-time insights, predictive analytics and a better understanding of customer behaviors -- has many companies jumping into this near-bottomless information pool with both feet. But the sheer volume of data can cause serious stress for IT professionals trying to balance C-suite expectations, legacy tech limitations and corporate workloads. What's more, the data market is rapidly evolving. more
When I want to go to a website, I just type in the URL, and I'm there. Sure, we had to get a subscription from a service provider and set up our devices, but that was a one-time thing. As we move into a world of many connected devices, it's no longer a one-time thing. Today, creating connected devices and services requires thinking about all the mechanics and networking and onboarding and providers. more
The Internet Engineering Task Force (IETF) is the standards body for the Internet. It is the organization that publishes and maintains the standards describing the Internet Protocol (IP -- versions 4 and 6), and all directly related and supporting protocols, such as TCP, UDP, DNS (and DNSSEC), BGP, DHCP, NDP, the list goes on, and on... But how do they do that? How does the IETF produce documents, and ensure that they are high quality, relevant, and influential? more