/ Most Viewed

How to Restore Trust Into Cyberspace? Beer Has the Answer!

Let's face it, when it comes to digital technologies, fundamental human rights are not on top of the digital agenda. They seem irrelevant and remote, even an obstacle to digital innovation and opportunities. We are quick to pay lip service to them, but we permit the profit motive and stakeholder self-interests to override human rights principles. It does not matter how right and righteous the cause might be; to be implemented, it must be profitable or carry stakeholder benefits. more

Would the “Mensch” in the Room Please Stand Up!

Wolfgang Kleinwaechter, in his Internet Governance Outlook 2024, reminded us that 2024, as the years before and future years, will be pivotal for Internet Governance processes. We eagerly await Wolfgang's missives every January, and we trust what we read because we know him, and we trust CircleID. We should be grateful and cherish this example of straightforward, digitally enabled, and trust-based human communication... more

Re-Booting Internet Governance: Resurgence of Ideas and Proposals

Milton Mueller reporting at IGP: At the recently concluded Seoul Conference on Cyberspace, a memo was circulated calling for the creation of a "Commission on the Future of Internet Cooperation." The commission, the confidential memo said, would consist of "civic leaders, ministers, CEOs and technical pioneers." Its purpose will be to "provide new ideas for transnational and multistakeholder proposals for Internet governance." According to the leaked document, the group is supposed to begin work in October and conclude its work with a presentation at the World Economic Forum in January 2014. more

The 2022 IPv4 Market in North America

In 2021, the story was price. In 2022, the story was price and large block supply. Spurred by unprecedented unit pricing, the IPv4 market in North America experienced its second-best year ever in market history. Nearly double the number of IPv4 addresses were traded in 2022 compared to 2021, predominantly due to the increased flow of large block supply from twelve sellers, five of whom were first-time market participants. more

Copper Theft Costs $1.5 to $2 Billion Annually: A Growing Crisis with Severe Consequences

I recently saw that AT&T is offering a $10,000 reward to anybody who provides information that leads to the arrest and conviction of people stealing copper wiring. The particular announcement is related to a recent theft of copper in South Dallas, Texas, but there have been numerous other thefts. This is not a small problem, and the estimated value of stolen telephone copper is between $1.5 and $2 billion annually. more

US Senators in Letter to Yahoo Say Late Hack Disclosure “Unacceptable”

"A group of Democratic U.S. senators on Tuesday demanded Yahoo Inc (YHOO.O) to explain why hackers' theft of user information for half a billion accounts two years ago only came to light last week and lambasted its handling of the breach as "unacceptable," reports Dustin Volz from Washington in Reuters. more

T-Mobile Breaks Upload Speed Record with New 5G Dual Connectivity

T-Mobile has claimed a new world record in 5G upload speeds, achieving an impressive 2.2 Gbps in tests conducted at California's SoFi Stadium. Partnering with Ericsson and Qualcomm, the telecommunications firm leveraged an emerging technology, 5G Dual Connectivity (5G DC), which combines mid-band and millimeter-wave (mmWave) spectrum bands. more

International Law of Critical Internet Infrastructure [CII]: A Comparative Analysis

On Friday December 13, 2024 at 10:00–12:00 CET (09:00-11:00 AM UTC) the Lodz Cyber Hub at the University of Lodz Law School, an ICANN EURALO ALS, and the United Nations University – Comparative Regional Integration Studies (UNU-CRIS) hosts an online workshop 'International Law of Critical Internet Infrastructure: A Comparative Analysis of Europe and China'. more

Is Zoom’s Server Security Just as Vulnerable as the Client Side?

Zoom programmers made elementary security errors when coding, and did not use protective measures that compiler toolchains make available. It's not a great stretch to assume that similar flaws afflict their server implementations. While Mudge noted that Zoom's Windows and Mac clients are (possibly accidentally) somewhat safer than the Linux client, I suspect that their servers run on Linux.Were they written with similar lack of attention to security? more

The Internet’s Two Bodies: Understanding the Multistakeholder Reign

The reports of multistakeholder Internet governance's demise are greatly exaggerated. This article explores the dual nature of multistakeholderism: its evolving, sometimes contentious practice as the "First Body," and its enduring principle of actor plurality as the "Second Body." Despite criticism and challenges, multistakeholderism remains crucial for a resilient, non-state-led Internet, underscoring the need to adapt and uphold its foundational pluralism. more

The Benefits of Thinner Fiber

Fiber manufacturers are always trying to make it easier to deploy fiber. One of the most interesting trends is the increasing migration from 250-micron fiber to 200-micron fiber. For those not familiar with the metric system, a micron is one-thousands of a millimeter. A 250-micron fiber has a diameter of 0.25 millimeters, while a 200-micron fiber has a diameter of 0.2 millimeters. more

FCC Clears SpaceX, T-Mobile Deal to Expand Coverage to Dead Zones

The Federal Communications Commission (FCC) has granted T-Mobile and SpaceX approval to extend mobile coverage to remote areas using satellite technology. This marks the first authorization of its kind, allowing collaboration between a wireless carrier and a satellite operator to utilize spectrum bands traditionally reserved for terrestrial services. more

Ireland’s Solution to the Rural Divide

The pandemic has given the whole world a pause to consider if we should return to business as usual when the pandemic is behind us. Ireland has a unique reaction and is something that could make sense here. Ireland plans to provide incentives to lure people from cities back to smaller rural towns. Like much of the world, Ireland has seen decades of young people moving to cities to find work, leaving behind shrinking and aging rural towns. more

Security Shortfalls Exposed in End-to-End Encrypted Cloud Storage Providers

A recent study critically examines the security of popular end-to-end encrypted (E2EE) cloud storage providers, uncovering significant vulnerabilities in platforms widely marketed for their user-controlled privacy features. more

European Parliament Votes Down Amendments Aimed at Strengthening Network Neutrality

Following some heated debates, the European Parliament today voted down various amendments aimed at strengthening network neutrality in the new telecommunications package which has been on the agenda of the European Union for more than two years. more