One of the primary purposes of global Internet Governance Forum (IGF) is to introduce a wide range of topics to newcomers and provide them with the opportunity to take back what they have learned in the hopes of establishing an understanding of the Internet Governance philosophy at the community or national level. As a first time participant at the 10th Global Internet Governance Forum (IGF 2015) that took place in Joao Pessoa Brazil, in early November of 2015, I felt the burden of being a representative from a developing country, a place where discussion of important issues is limited to a small group of individuals, often in informal settings, over coffee or in my case, green tea. more
One way or another we've been working on various aspects of securing the Internet's inter-domain routing system for many years. I recall presentations dating back to the late '90's that point vaguely to using some form of a digital signature on BGP updates that would allow a BGP speaker to assure themselves as to the veracity of a route advertisement. more
Yesterday's Wikipedia outage, which resulted from invalid DNS zone information, provides some good reminders about the best and worst attributes of active DNS management. The best part of the DNS is that it provides knowledgeable operators with a great tool to use to manage traffic around trouble spots on a network. In this case, Wikipedia was attempting to route around its European data center because... more
It's a wild election season here in the US. In the past few presidential elections, email has played a bigger and bigger role in messaging and fundraising. President Obama's campaign used email effectively, but sent huge volumes. In fact, the volume was so heavy, it led to a joke on the Daily Show... This year there is a stark difference in how the candidates are using email. more
A recent decision from a federal district court addresses an issue I hadn't seen before: whether searching malware on the suspect's computer was outside the scope of the search warrant issued for that computer. It seems a narrow issue, and unfortunately the opinion issued in the case doesn't tell us a whole lot about what happened; but I thought the issue was worth writing about, if only to note that it arose. more
We saw it in San Jose, then in Taipei and in Philadelphia and now it is about to happen in Denver Colorado! Yes, the IPv6 hour is about to occur a fourth and even a fifth time! The upcoming ARIN XXI will have a pre-game and a main event IPv6 hour with technical staff to assist the neophytes on their first dive into the IPv6 only world... In the meantime in the Geneva Auto show, impact of IPv6 on ITS (Intelligent Transport Systems/Services) was a topic on its own with a revealing and well timed presentation by Thierry Ernst of Inria, the French Institute of Research in Informatics and Automation. more
It wasn't too many years ago when you couldn't read an article about broadband infrastructure without hearing about the need for smart highway infrastructure that was going to enable self-driving cars. There were various versions of how this would happen, but the predominant concept was that 5G networks along roads would communicate with cars and would enable efficient and safe travel by eliminating driver error by taking the driver out of the equation. more
In his latest blog post, Google's Chief Legal Officer David Drummond reports that Chinese authorities aren't happy with the automatic redirection of Google.cn to Hong Kong. They are threatening not to renew Google's Internet Content Provider license, which is required to legally operate any kind of Internet business in China. more
The Washington Post had a good article up yesterday capturing comments issued by the United States military that it has the right to return fire when it comes to cyber attacks... This is an interesting point of view, and it extends from the United States's policy that if it is attacked using conventional weapons, it reserves the right to counter respond in kind. This has been a long accept precept governing US foreign military policy for generations. Yet cyber attacks are different for a couple of reasons... more
Would the French Government or any other French Private company -- such as a French Vineyard -- had applied to the .WINE Top-Level Domain, one could wonder what would the situation be today. Well... the situation would be the exact same -- the applicant would be in front of three other .WINE applicants with this exact same question: how do I win the auction? more
An interesting new paper from the Naval Postgraduate School describes what appears to be an interesting new twist on spam filtering, looking at the characteristics of the TCP session through which the mail is delivered. They observe that bots typically live on cable or DSL connections with slow congested upstreams. ... This paper tries to see whether it would be practical to use that info to manage spam in real time. more
It seems outlandish. However, as incredible as it may seem - especially in these times of sequestration and dire Federal budget cuts - the U.S. has potentially fallen prey to a ploy hatched by Russia and allies artfully carried out at a 2010 ITU treaty conference to relinquish the nation's sovereign right to choose its own ITU membership contributions. Here is how it happened and what can be done about it. more
Convincing competitors, disparate business entities and researchers to collaborate - many donating their services and resources - to protect millions of end-users worldwide is no small feat. Yet FBI Supervisory Special Agent Thomas X. Grasso did just that by quietly working behind the scenes to create the DNS Changer Working Group that saved an inestimable number of end-users from losing access to the Web over the last two years. more
ChatGPT, the newly released language model, has quickly gained popularity and is used for various tasks, from automation to music composition. While having useful features like fast and easy-to-use code examples, it also has the ability to create sophisticated malware without malicious code. more
The second-round new gTLD applicants have a tool they don't even know about: "crowdinvesting." That's when a venture sidesteps banks and venture capitalists and instead raises money by selling shares directly to the public. Usually this is done over the Internet, and often enough the investors can hope for a financial return that's far better than what banks and stocks offer. more