I'm continually amazed by the amount of FUD being spread with regard to VoIP security threats. People...the sky is not falling. VoIP isn't e-mail. It isn't implemented like e-mail, it won't be implemented like e-mail (maybe "it shouldn't be implemented like e-mail" is a more appropriate statement). Following best security practices will ensure at least a level of security equivalent to current TDM systems. Best FUD I've heard this week: VoIP is insecure because you can simply put a bridge on an ethernet line and capture a stream. Hey, has anyone ever heard of alligator clips? more
In 2003, the world of network engineering was far different than it is today. For instance, EIGRP was still being implemented on the basis of its ability to support multi-protocol routing. SONET, and other optical technologies were just starting to come into their own, and all-optical switching was just beginning to be considered for large-scale deployment. What Hartley says of history holds true when looking back at what seems to be a former age: "The past is a foreign country; they do things differently there." more
A few years ago, there were a lot of predictions that we'd see broadband networks converting to quantum technology because of the enhanced security. As happens with many new technologies, quantum computing is advancing at a slower pace than the wild predictions that accompanied the launch of the new technology. more
Next Monday, 29 October, most of the formal representatives of the world's nations will convene for three weeks to collectively consider the most significant developments in global network communications networks and services, and make multilateral adjustments in a treaty instrument signed by almost every country at the end. They will also elect heads of the various International Telecommunication Union (ITU) secretariats and permanent bodies for the next four years. more
Permission is always a hot topic in email marketing. Permission is key! the experts tell us. Get permission to send email! the ISPs tell us. Marketers have responded by setting up processes to "get" permission from recipients before adding them to mailing lists. They point to their privacy polices and signup forms and say "Look! the recipient gave us permission." In many cases, though, the permission isn't given to the sender, permission is taken from the recipient. more
Amid escalating violence between Israel and Gaza this weekend, the Israeli Defense Force claimed it bombed and partially destroyed the base of an active Hamas hacking group in Gaza. more
President Donald Trump has reversed an Obama-era policy that set limits on how the United States deploys cyberattacks. more
Back in the early 1980s we witnessed the launch of the first e-payments systems by French banks in Biarritz. A similar project was launched in Japan and a year or so later Berlin also launched their pilot service. In Biarritz the whole town received smartcards and all the shops were given devices to handle e-cash. Over the next 30 years very little happened -- nowhere did banks build on this initiative to take a leadership role in e-payments. more
We recently analyzed the reputation of a country's Internet (IPv4) addresses by examining the number of blacklisted IPv4 addresses that geolocate to a given country. We compared this indicator with two qualitative measures of each country's governance. We hypothesized that countries with more transparent, democratic governmental institutions would harbor a smaller fraction of misbehaving (blacklisted) hosts. The available data confirms this hypothesis. A similar correlation exists between perceived corruption and fraction of blacklisted IP addresses. more
Reports of the cancelation of the ICANN 52 meeting in the Moroccan town of Marrakesh appear to be exaggerated. They did, however, force the organization to issue a statement on Sunday confirming that while "no decision had been taken yet" ICANN was considering postponing the meeting in Marrakech scheduled for 8-12 February, 2015. This would a mistake, in our opinion... more
It is not so convincing how the developed world looks at the rest of the hemisphere with the same attitude of equality and control. On one hand there are voices of equality where as in the other there is greed of power and control that lures them with an unending fight of power vs power in safeguarding their own survival. From the participation and development of policies to running the concept of any kind of technology platform, the sense of control and collaboration that catalyzes and leads the overall process. more
The emergence of ChatGPT, a powerful AI language model developed by OpenAI, has revolutionized the way developers approach coding tasks. With its ability to generate code snippets and even entire software programs, ChatGPT offers convenience and time-saving potential. more
My story begins in ancient times when dinosaurs ruled the earth. It was a time when you could download a movie onto your desktop computer through your 56k dial-up connection if you had a few days. It was a time when more people were on the Minitel in France than on the Internet globally and when the Republic of Korea could fit all of its internet users into one small hotel room. I know because I met them all in that room. more
DataPrivacyBR and the Internet Integrity Task Force, IITF, in collaboration with CircleID and IGF recently held 2 online events focusing on digital citizenship, governance, and a digital bill of rights and responsibilities. A diverse group of high-level presenters and speakers spanning all stakeholder groups, addressed questions such as: What are the foundational principles that define and protect the rights and responsibilities of digital citizenship? Do existing internet governance models take digital rights sufficiently into account? Are there alternatives to business models that are based on digital exploitation and servitude? Why do we need a digital Bill of Rights and Responsibilities and how can it be created? more
Efforts to curb illegal online content through domain shutdowns are proving ineffective and carry significant risks, according to a new report by eco and its topDNS initiative. more