/ Most Viewed

The Christmas Goat and IPv6 (Year 7)

It was a great year for the goat! 2016 marked the 50th anniversary for the Christmas Goat and there was a grand opening ceremony along with music and fireworks. But only a few hours after the opening, a pyromaniac set the goat on fire. The only track the police have is a cap above that they hope to find DNA in and a crappy picture of the pyromaniac's back. more

The Death of IP Based Reputation

Back in the dark ages of email delivery the only thing that really mattered to get your email into the inbox was having a good IP reputation. If your IP sent good mail most of the time, then that mail got into the inbox and all was well with the world. All that mattered was that good IP reputation. Even better for the people who wanted to game the system and get their spam into the inbox, there were many ways to get around IP reputation. more

Intelligence Exchange in a Free Market Economy

The U.S. Government is causing a huge disservice to protection and defense in the private sector (80%+ of CIKR) by creating an ECS that contains monetary incentive for a few large players to exert undue control over the availability, distribution, and cost of security threat indicators. While there may be a legitimate need for the federal government to share classified indicators to entities for protecting critical infrastructure, the over-classification of indicator data is a widely recognized issue that presents real problems for the private sector. ECS as currently construed creates monetary incentives for continued or even expanded over-classification. more

New gTLD Program to Be Finalized After June ICANN Meeting

Today, in a presentation made to attendees of the McCarthy Institute Symposium, Peter Dengate Thrush, ICANN Chair, announced that the Final New generic Top-Level Domain (gTLD) Applicant Guidebook would be completed after the ICANN Meeting in Amman, Jordan which is scheduled for June 19 - 24, 2011. more

A Voting System for Internet by Domain Name Owners - Part II

This is the second part of a 2-part series article describing a method for voting among owners of domain names. To read the first part of this article click here.

After a ballot closes, each registrar will send the summary results to at least two vote counting entities. These organizations will tally summary results obtained from each registrar. The totals of the summary results will be cross-checked against totals from the other vote counting entities. more

The Path to Combatting Domain Abuse

Completely eradicating malware, botnets, phishing, pharming, and spam from the Domain Name System is not possible. That may be an odd statement from someone who just took the leadership position at the DNS Abuse Institute, but it's meant to underscore the scope of the work ahead of us. There will always be bad actors exploiting the DNS for their own criminal purposes, but working together, we can mitigate their impact. more

$59M and Counting: ICANN Board Downgrades Community Say on Use of Last Resort Auction Proceeds

ICANN's new gTLD program provides for last resort auctions to settle contention sets where the competing applicants are unable to reach agreement by negotiation or private auction, with the proceeds going to a segregated ICANN account. With the recent $25 million bid of Google to secure control of the .App registry the total proceeds of those ICANN auctions has swelled to $58.8 million. The final sum by the end of the first round could go higher, perhaps to more than $100 million. That's serious money. more

A Transport Protocol’s Perspective on Optimizing Starlink Performance

Digital communications systems always represent a collection of design trade-offs. Maximizing one characteristic of a system may impair others, and various communications services may choose to optimize different performance parameters based on the intersection of these design decisions with the physical characteristics of the communications medium. more

Let American Telcos and Cablecos Merge - But Declare Infrastructure a Utility

While there is much discussion in the United States about the mergers of Comcast and Time Warner Cable, and of AT&T and DirectTV, issues such as this are generally discussed from a very narrow perspective and, we maintain, from the wrong underlying telecoms regime operating in that country - one that has stifled competition in the telecoms for nearly two decades. The same wrong parameters apply to the endless debates on net neutrality an issue that is, by the way, largely of significance to the US market alone. more

How a Plaintiff Was Undeceived and Lost at Spam Litigation - What Nobody Told You About!

Back in 2003, there was a race to pass spam legislation. California was on the verge of passing legislation that marketers disdained. Thus marketers pressed for federal spam legislation which would preempt state spam legislation. The Can Spam Act of 2003 did just that... mostly. "Mostly" is where litigation lives. According to the Can Spam Act preemption-exception... more

Cyberwar vs No Cyberwar

I was browsing CircleID the other day and came across Bruce Schneier's article on cyberwar. Schneier's article, and the crux of his point, is that the term cyber war and the threat of cyber warfare has been greatly exaggerated. The real problem in cyberspace is not the threat of cyber warfare wherein a foreign government, or possibly non-state actor, conducts a cyber attack on another nation. more

Encryption and Securing Our Digital Economy

As G20 leaders from around the world gather this week, Germany wants them to agree to a concrete plan -- one that includes affordable Internet access across the world by 2025, common technical standards and a focus on digital learning. Today, the G20 economies, like so many other economies around the world, are digital and interconnected. Digital services have opened up new avenues for sustainable economic growth. more

NSA Admits Purchasing Americans’ Internet Browsing Data Without Warrants

The U.S. National Security Agency (NSA) has confirmed acquiring Americans' internet browsing information without warrants through commercial brokers, according to a letter from NSA Director Paul Nakasone to Senator Ron Wyden. more

Google to Deploy Its First Private Trans-Atlantic Subsea Cable

Google today announced plans to launch its latest private subsea cable project dubbed Dunant. The cable will cross the Atlantic Ocean from Virginia Beach in the U.S. to the French Atlantic coast, the company says. more

Net Neutrality Not a Serious Issue Outside America

Most countries, don't have to fear internet quality problems in the same way as would be possible in the USA. The US competition watchdog has little power to hold telcos accountable to the nature of their broadband services. Back in 1996 broadband was classified as a content service and not a telecom service. So, for example, if a telco wants to provide preferred access to Google, it can sell them a superior broadband services which could create a two speed internet service... more