The Wall Street Journal is reporting the terms of a yet unannounced deal which will finance a massive rollout of WiMax by a Sprint-Clearwire joint venture. Outside funding is to be provided by Intel, Google, Comcast, and Time Warner Cable as well as Bright House, a small cable company. Assuming the deal is for real, this is good news for US users of broadband and, indirectly, other users around the world. more
ICANN critics often focus on ICANN's expenditure. The organisation's overall budget had been growing for years prior to the new TLD program launch. However with the new TLD launch it mushroomed very quickly, with the organisation collecting $185k per application. With 1930 applications that gave them $357,050,000 ... ICANN's overall budget is big and how it decides to spend that money will always be subject to quite a bit of scrutiny. more
Maybe you saw this story: A Chinese man (whose name is not given) has been sentenced to serve three years in prison for extorting "virtual items and currency" from a "fellow Internet café user." The currency was worth 100,000 yuan or $14,700. The man who's sentenced to three years and the three friends who helped him also "extorted virtual equipment for online games" from their victim. The friends only seem to have been given a fine; the primary extortionist got both a fine and a jail time. The virtual currency was QQ coins... As I'm sure all of us know, there's a thriving market in virtual goods and currency... more
Judging from the development of the Internet in the world, the popularity rate of domain names is one of the primary parameters to measure whether the Internet is well developed or not in a country. The popularity rate of domain names is 11 percent in North America and reaches as high as 12.5 percent in Europe, while in China, which has over 20 million enterprises, there are only more than 300,000 domain names under .CN and the total number of domain names is only 1.187 million, including a lot of governmental and individual websites. more
The Internet Corporation for Assigned Names and Numbers (ICANN) and the United States Department of Commerce (DoC) today announced that they agreed to extend their joint Memorandum of Understanding (MoU) for three additional years until September 30, 2006. more
On my flight back from Washington, DC last night, I prepared much of what follows, minus references. Today, while looking for references, I uncovered a very recent (6 June 2012) posting to the ITU blog that seemed entirely appropriate to mention here. It is fascinating reading, and I especially like one snippet "we are not about to take over the Internet - that suggestion is frankly ridiculous". I quite agree and hope that the ITU is genuinely interested in working with others to ensure that nothing of the sort happens. Now on to what I had prepared. more
The members of the ICANN community engaged in the work of the Cross Community Working Group on Enhancing ICANN Accountability (CCWG-ACCT, or just plain "CCWG" for this article) has been engaged since late 2014 in designing an enhanced ICANN accountability plan to accompany the transition of oversight of the IANA root zone functions from the National Telecommunications and Information Administration (NTIA) to the global multistakeholder community. On August 3rd the CCWG released its 2nd Draft Report (Work Stream 1) for a public comment period that closed on September 12th. more
At the Virus Bulletin conference this past September in Dallas, Righard Zwienenberg from ESET gave a presentation entitled BYOD. BYOD stands for Bring Your Own Device, but he reframed the acronym to "Bring Your Own Destruction", that is, he alluded to the security implications of bringing your own device. BYOD is the latest trend sweeping business and schools. more
In two recent debate events I participated in, on iFreedom and privacy in the online world, mistrust of government and government's intentions and motivations on and towards the Internet were abundantly present with more than just a few people in the audiences. The emotions were not new to me, no, it was the rationality that surprised and sometimes almost shocked me. Why? Well, should these sentiments get the support of the majority of people, it would undermine all legitimacy of a government to govern. Let's try and take a closer look. more
The law set by U.S. Government for all agencies to fully remove the controversial Russian based Kaspersky Lab security software by October is proving a lot harder than anticipated. more
Last September, I asked what had happened to the proposal for a branch connecting the ARCOS undersea cable, which has a landing point in North Miami Beach, to Cojimar, Cuba. The consortium that operates the cable had applied for permission to connect Cuba in July 2018, and the FCC granted a request for streamlined processing, which should have taken less than 45 days, but nothing happened until September 2020 when the application was referred to a Justice Department committee... more
As it's coming down to brass tacks and companies are now seriously considering applying for their own .Brand Top-Level Domain (TLD), questions about whether to also apply for a truly generic TLD keep popping up. Many large corporations want to know whether it's even possible to apply for something like .Shoes AND to restrict registrations so that only a single specified registrant is allowed. After all, for the right company it seems that something like .Shoes could be a valuable namespace -- short, easy to remember, and easy to spell. more
Last week at Virus Bulletin in 2012, Tyler Moore of Southern Methodist University (SMU) gave a talk entitled "Measuring the cost of cyber crime." It was a study done in collaboration with multiple individuals in multiple countries. The study sought to answer this question - How much does cyber crime cost? Up until this point, nobody really knew. more
Researchers at Certfa Lab provide a review of the latest wave of organized phishing attacks by Iranian state-backed hackers which succeeded by compromising 2-factor authentication. more
This morning, the CRTC issued its much-anticipated ruling in the CAIP v. Bell case, the first major case to test the legality of Internet throttling. The Commission denied CAIP's application, ruling that Bell treated all of its customers (retail and wholesale) in the same throttled manner. This points to the challenge in this case -- it was not about discriminatory network practices per se, but rather about wholesale shaping in a specific context. more