/ Most Viewed

EU Presidency Pushing Other Member States for Substantial Internet Surveillance

A leaked document by Statewatch reveals the current EU Presidency (Estonia) has been pushing the other Member States to strengthen indiscriminate internet surveillance and to follow in the footsteps of China regarding online censorship. more

Japan Fueling China’s Leap to 5G, but for How Long?

As the U.S. is making it tough for American companies to help China roll out super-fast cellular networks, Japan, a U.S. ally, is fueling China with parts needed to blanket the nation with 5G cellular service. more

US House of Representatives Pass a Bill to Restore Net Neutrality Rules Repealed by Trump’s FCC

The US House of Representatives just passed the Save the Internet Act of 2019 on a vote of 232-190. more

Internet Governance: What Does It Mean, Anyway?

Ask anyone involved in Internet policy what "Internet Governance" means and you're likely to get a different answer, despite the fact that a decade ago, after torturous negotiations, the international community agreed on a working definition for the term (if a vague one). The lack of clarity has resulted in a policy space that appears to cover more and more subjects, with less and less agreement the more it spreads. In discussions recently on the /1net email list, I've seen proposals for an 'Internet Governance Roadmap' that includes delivering e-health initiatives, solving mass surveillance, and adopting new measures for taxation of Internet commerce - to name just a few. more

IGF Nairobi - Success of the Multi-stakeholder Model

A funny thing happened in Nairobi last week... I showed up for an Internet Governance Forum (IGF) panel discussion on the use of the Internet during times of political and social unrest, and a truly multi-stakeholder dialogue broke out. It turned out to be my favorite session during an incredible IGF week that, thanks to our Kenyan hosts, exceeded every expectation. The session, formerly known as "The Internet in the Post-Revolution Phase – Challenges of Political Engagement and the Safety of Citizens" was cancelled for reasons unknown. Perhaps it was a conflict of schedules, or maybe the topic was deemed by the organizers or certain governments to be too sensitive for the official agenda. more

Overcoming Cloud Storage Security Concerns: 7 Key Steps

According to a 2013 TwinStrata survey, 46 percent of organizations use cloud storage services and 38 percent plan to adopt this technology in the near future. Cloud storage capacity demands are increasing 40 to 60 percent year-over-year, while storage density lags behind at 20 percent. The result? More data, growing demands for space and increasing security concerns. How do enterprises overcome cloud storage security challenges? more

New Registry Agreement, All Good?

In the run-up to the launch of new gTLDs, ICANN has been negotiating both of its main supplier contracts. The registrar contract (Registrar Accreditation Agreement or RAA) negotiations are now all but complete. A new contract draft has been posted for public comment and it now seems likely that in little over a month, this will become the official new 2013 RAA. more

Thoughts on IPv6 Security, Take Two

A few months ago, I made a post about IPv6 security. I've caught some flak for saying that IPv6 isn't a security issue. I still stand by this position. This is not to say that you should ignore security considerations when deploying IPv6. All I claim is that deploying IPv6 in and of itself does not make an organization any more or less secure. This point was made by Dr. Joe St. Sauver, of the University of Oregon... more

When DNSBLs Go Bad

I have often remarked that any fool can run a DNS-Based Blacklist (DNSBL) and many fools do so. Since approximately nobody uses the incompetently run black lists, they don't matter. Unfortunately, using a DNSBL requires equally little expertise, which becomes a problem when an operator wants to shut down a list. When someone sets up a mail server (which we'll call an MTA for Mail Transfer Agent), one of the tasks is to configure the anti-spam features, which invariably involves using DNSBLs. more

What Happens If Two Applications for a New gTLD Are a City and a Family Name?

When applying for a new gTLD, what happens if two applications for the same extension are a city and a family name? Which one wins? Let's imagine that a person whose family name is "Marseille" applied for the .MARSEILLE new gTLD in the next round of the ICANN new gTLD program. What if there was a .MARSEILLE new gTLD too but as the name of the French city? more

The Role of the BFR in SpaceX’s Satellite Internet Service

SpaceX started with their Falcon 1 booster followed by several versions of the Falcon 9. The Falcon Heavy will fly later this year, and the rocket that will take the first person to Mars is called, for now, the Big F*ing Rocket or BFR. The 150-ton BFR payload will be ten times that of the Falcon 9. It will have an extra landing-guidance engine for reliable reusability and SpaceX also expects to be able to soft-land and reuse the second-stage payload rocket as well as its protective nose cone, substantially reducing cost per launch. more

Where’s the Blockchain Killer App? Maybe It’s Buried Underneath All the Hype!

In recent times, I've been struggling to determine where blockchain has demonstrated its immensely promised value, delivered true market or stakeholder value, or disrupted an existing ecosystem. And thus far, what I keep coming up with is that "blockchain is truly a solution searching for a problem." Most of all, many of its enthusiasts and proponents are generally conceptual thinkers and/or snake oil salespersons who have little to no experience delivering secure, integrated, complex systems. more

Amazon Web Services Targets Startups and Creators With .aws

It will come as no surprise to those who've read my blogs that I get pretty excited about seeing .brand domains launch. At Neustar we're all in on promoting .brand usage in any industry, from all around the world and as such, we're always watching closely for any signs of new domains on the horizon, trawling for case studies or any hint of new activity. So imagine my surprise when a brilliant .brand example jumped out in front of me at JFK airport. more

The U.S. Fiber Expansion Craze

I've written several times recently in blogs that there is a growing backlog in buying fiber cable. Some of the backlog is due to the general supply chain malaise that seems to be affecting almost everything we buy. During the recent gas shortages in North Carolina, I found out that there is a shortage of truck drivers. Apparently, many truck drivers found something else to do during the pandemic, and now there is a shortage of drivers to deliver the many goods that are shipped by truck. more

Cuban “Technological Sovereignty” - a Walled Garden Strategy?

ToDus, a messaging application described as a "Cuban WhatsApp" and Apklis, a distribution site for Android mobile apps, were featured at the First Computerization Workshop held recently at the Universidad de Ciencias Informáticas (UCI). One might ask, why do we need a Cuban WhatsApp and Apklis when we already have WhatsApp itself and the Google Play Store? more