/ Most Viewed

Proceedings of Name Collisions Workshop Available

Keynote speaker, and noted security industry commentator, Bruce Schneier (Co3 Systems ) set the tone for the two days with a discussion on how humans name things and the shortcomings of computers in doing the same. Names require context, he observed, and "computers are really bad at this" because "everything defaults to global." Referring to the potential that new gTLDs could conflict with internal names in installed systems, he commented, "It would be great if we could go back 20 years and say 'Don't do that'," but concluded that policymakers have to work with DNS the way it is today. more

Zero-Rating vs. The Internet

Reading about the EU Neutrality vote, I'm reminded of the challenge faced by traditional telecommunications regulators in understanding the very concept of the Internet. To put it bluntly zero-rate is a policy framed in terms of Minitel and setting the price based on what phone number is dialed and not at all about the Internet where the value is determined by relationships entirely outside of a network. more

ICANN Dressing Up for New gTLD Party in San Francisco

The ICANN Board met on September 24-25 2010 in Trondheim, Norway, to consider and act on the impediments still in the way of the new generic Top-Level Domain (gTLD) program. They passed a number of resolutions that provide very clear indications of how things are going. The short version is that the news is good for new gTLDs. ICANN is nailing down the final outstanding issues and the timetable is clearer than ever. more

Cyber-Terrorism Rising, Existing Cyber-Security Strategies Failing, What Are Decision Makers to Do?

While conventional cyber attacks are evolving at breakneck speed, the world is witnessing the rise of a new generation of political, ideological, religious, terror and destruction motivated "Poli-Cyber™" threats. These are attacks perpetrated or inspired by extremists' groups such as ISIS/Daesh, rogue states, national intelligence services and their proxies. They are breaching organizations and governments daily, and no one is immune. more

Report from UN Spam Meeting in Geneva

The International Telecommunication Union (ITU), held an ITU WSIS Thematic Meeting on Countering Spam from 7 to 9 July 2004, in Geneva, Switzerland. The meeting was focused around various topics including: Scope of the problem, Technical solutions, Consumer protection and awareness, Legislation and enforcement, and International cooperation. The following is a report by William J. Drake, Senior Associate International Centre for Trade and Sustainable Development in Geneva. more

IPv6 in Slovak Academic Network

The main reason for developing a new internet protocol was based on lack of address; however this was not the only reason. Unfortunately, many people think of IPv6 only as enormous address space, but there are a lot of other advantages, for example... authorizations and authentication function are implemented directly in the protocol and are mandatory... automatic configuration of network interfaces based on their physical address... protocol itself recognizes data streams which must be transmitted in real time, and the data must be processed with highest priority... more

LACNIC, Google, CaribNOG and Internet Society to Hold ‘Internet Week Trinidad and Tobago’

The Latin American and Caribbean Internet Registry (LACNIC) and Google will hold a series of workshops next month as part of Internet Week Trinidad and Tobago, an event intended to advance the Internet development agenda of the wider region. The workshops are part of a project through which LACNIC and Google seek to strengthen digital markets in Central American and Caribbean countries. This joint project seeks to enhance local connectivity and strengthen the ecosystem for entrepreneurs. more

Are the TISA Trade Talks a Threat to Net Neutrality, Data Protection, or Privacy?

On December 17th a US proposal for online commerce in a major trade negotiation, the Trade in Services Agreement ("TISA") leaked. A flurry of press releases and opinion pieces claim that TISA is a threat to the Internet. The headlines are lurid: "TISA leak: EU Data Protection and Net Neutrality Threatened" and "Leaked TISA text exposes US threat to privacy, civil rights"... Because I've spent years in Geneva regularly meeting with and advising negotiators on the networked economy I have a very different perspective. more

The Biggest gTLD Problem Has Just Appeared on the Horizon

A letter sent earlier this month by the ICANN Board to the Governmental Advisory Committee (GAC) should cause every new gTLD applicant's ears to prick up. Having been through every one of the applications for 1,396 different Internet extensions, the world's governments not only issued formal warnings for 199 of them, but also asked what mechanisms were in place to make sure that people did what they said they would in their applications. more

Anti-Spoofing, BCP 38, and the Tragedy of the Commons

In the seminal 1968 paper "The Tragedy of the Commons" , Garrett Hardin introduced the world to an idea which eventually grew into a household phrase. In this blog article I will explore whether Hardin's tragedy applies to anti-spoofing and Distributed Denial of Service (DDoS) attacks in the Internet, or not... Hardin was a biologist and ecologist by trade, so he explains "The Tragedy of the Commons" using a field, cattle and herdsmen. more

Aging the Internet Prematurely, One PDP at a Time

After blogging about ICANN's new gTLD policy or lack thereof [also featured on CircleID], I've had several people ask me why I care so much about ICANN and new top-level domains. Domain names barely matter in a world of search and hyperlinks, I'm told, and new domains would amount to little more than a cash transfer to new registries from those trying to protect their names and brands. While I agree that type-in site-location is less and less relevant, and we haven't yet seen much end-user focused innovation in the use of domain names, I'm not ready to throw in the towel. I think ICANN is still in a position to do affirmative harm to Internet innovation. more

IoT Developments: NIST Issues Tech Guidance while NTIA Seeks Broad Input, Global Efforts Percolate

As the federal government grapples with Internet-connected devices and applications that make up the Internet of Things (IoT), the National Institute of Standards and Technology (NIST) is forging ahead to provide "technical leadership" for "the operation, trustworthiness, and lifecycle of IoT". Such efforts complement - and contrast - recent policy efforts at the National Telecommunications and Information Administration (NTIA) and elsewhere to promote IoT innovation while addressing security, privacy, and interoperability.  more

Banking Industry Evaluating Security Benefits of Blockchain to Send Encrypted Information

The banking industry is evaluating security benefits of using blockchain to send encrypted information. more

When the Backend Domain Name Registry Is Too Expensive

What we call a "backend registry" is the mandatory technical platform to operate a domain name extension and all registries have one. It is the backend registry that allows accredited registrars to technically sell domain names for each top-level domain (TLD). The question here is: what happens to a registry, who sells domain names to accredited registrars when his backend registry solution provider is too expensive? more

Learning from History: The Potsdam Call on Autonomous Weapon Systems

Eighty years ago, in August 1945, the world saw hope and horror. On August 1, 1945, just weeks after the adoption of the UN Charter, the leaders of the United States, the United Kingdom and the Soviet Union signed the Potsdam Agreement, which produced hope for a peaceful post-war world. Only some days later, the world saw the horror of nuclear bombs in Hiroshima and Nagasaki. A cold war followed. more