United States President Biden has recently commented: “But let me be very clear: Capitalism without competition isn’t capitalism; it’s exploitation. Without healthy competition, big players can change and charge whatever they want and treat you however they want. […] So, we know we’ve got a problem – a major problem.” It’s not every day you hear the President of the United States take on the very industry that supported his national economy remaining the world’s richest over the past couple of decades. Yet his tone resonates with a growing unease within the US... more
During the recent political unrest in the Middle East, researchers have observed significant changes in Internet traffic and connectivity. Typically people look at routing data, latencies when connecting to sites and search and query statistics. Here we show results from a previously unused source of data: unsolicited Internet traffic arriving from Libya. The traffic data we captured shows distinct changes in unsolicited traffic patterns since 17 February 2011. more
Last month I published an article called "What's Driving Spam and Domain Fraud? Illicit Drug Traffic" which explained how the many of the troublesome online crime issues are related to the online sale of narcotics and dodgy pharmaceuticals. Since this article was published we have witnessed one of the largest international law enforcement efforts against online drug traffic (Operation Pangea II)... more
I think we are all hoping that when ICANN meets with the DPAs (Digital Protection Authorities) a clear path forward will be illuminated. We are all hoping that the DPAs will provide definitive guidance regarding ICANN's interim model and that some special allowance will be made so that registrars and registries are provided with additional time to implement a GDPR-compliant WHOIS solution. more
It is an open secret that the current state of IPv4 allocation contains many accidental historical imbalances and in particular developing countries who wish to use IPv4 are disadvantaged by the lack of addresses available through ordinary allocation and are forced into purchasing addresses on the open market. As most of the addresses for sale are held by organisations based in the developed world, this amounts to a transfer of wealth from the developing world to the developed world, on terms set by the developed world. more
Back when the Internet was young end servers came with shovels (for the coal), everyone on the net spoke English, and all the e-mail was in English. To represent text in a computer, each character needs to have a numeric code. The most common code set was (and is) ASCII, which is basically the codes used by the cheap, reliable Teletype printing terminals everyone used as their computer consoles. ASCII is a seven bit character code, code values 0 through 127, and it includes upper and lower case letters and a reasonable selection of punctuation adequate for written English. more
Blogging is not only a well-established element of pop culture, it has become a tremendously influential communications mechanism. As early as March 2002, an article in Wired discussed the blogging "revolution" and declared that blogging "could be to words what Napster was to music - except this time, it'll really work." more
The Internet Infrastructure Coalition (i2Coalition) has joined the Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) to continue efforts on developing best practices for hosting and cloud service companies as well as sharing other information that will protect end-users. more
Intel sent an interesting infographic: What Happens in an Internet Minute. Looking at the traffic data, Intel asks if there is sufficient attention being paid to investment in infrastructure. Imagine the state of the network in three years, when the number of connected devices is projected to be double the world's population. Can our networks scale to handle predicted traffic and meet consumer expectations for immediate access from multiple devices? more
Clearly whatever it is that Dutch politician Geert Wilders wants to talk about in his film is going to be the end of the internet. The news that Network Solutions decided to pre-empt his use of a domain name registered through them for the purpose of promoting his film need not be re-hashed here. However, before bemoaning yet another registrar freely deciding, as is its right, with whom it chooses to do business, it's important to look at the big picture. No, it is not "censorship" for Network Solutions to decide how it wants its services to be used... But, perhaps we might understand Network Solutions policy more clearly by looking at domain names registered through NSI... more
I'm sure we've all heard about "the Open Internet." The expression builds upon a rich pedigree of term "open" in various contexts. For example, "open government" is the governing doctrine which holds that citizens have the right to access the documents and proceedings of the government to allow for effective public oversight, a concept that appears to be able to trace its antecedents back to the age of enlightenment in 17th century Europe. more
All effective spam filters use DNS blacklists or blocklists, known as DNSBLs. They provide an efficient way to publish sets of IP addresses from which the publisher recommends that mail systems not accept mail. A well run DNSBL can be very effective; the Spamhaus lists typically catch upwards of 80% of incoming spam with a very low error rate. DNSBLs take advantage of the existing DNS infrastructure to do fast, efficient lookups. A DNS lookup typically goes through three computers... more
Startups in the process of selecting a company or product name are often frustrated to see that someone else, years ago, registered the .com version of their newly thought-of name. Similarly, companies that have acquired a trademark registration wonder whether they can use their crisp new registration certificate to stomp out someone else who has been using a domain name similar to the company's new mark. A recent case arising under the UDRP shows us that the earlier domain name registration is usually going to be on solid ground against a later-arriving trademark owner. more
Sometimes, a government agency will post a PDF that doesn't contain searchable text. Most often, it's a scan of a printout. Why? Don't the NSA, the Department of Justice, etc., know how to convert Word (or whatever) directly to PDF? It turns out that they know more than some of their critics do. The reason? With a piece of paper, you know much more about what you're actually disclosing. more
We got a recent analysis of Starlink broadband speeds from Ookla, which gathers huge numbers of speed tests from across the country. The U.S. average download speeds on Starlink have improved over the last year, from an average of 65.72 Mbps in 1Q 2021 to 90.55 Mbps in 1Q 2022. But during that same timeframe, upload speeds got worse, dropping from an average of 16.29 Mbps in 1Q 2021 to 10.70 Mbps in 1Q 2022. more