/ Most Viewed

The Great Forking Bitcoins of China

Let's say I'm with the Chinese government and decide that I am tired of people evading currency controls and money laundering using Bitcoin. So we adjust the Great Firewall of China to block port 8333. We also add some proxies that allow some uncleared transactions from outside to flow into Chinese networks but not the other way and keep track of which ones we let through. Since a large fraction of the miners are inside China, and all of the hard currency exchanges are outside, this will cause a pretty serious fork. more

YouTube, the Government, and Privacy

It was just announced that every member of Congress will be able to create his or her own channel on YouTube. Viewers can go to the House or Senate home pages and navigate via a map to find the videos they're interested in. While it is good that citizens will have more insight into what their Senators and Representatives think, the way this is being done poses a serious privacy risk. more

Internet Security and the Multistakeholder Approach: Is It Attainable?

Internet Security is a topic that has drawn a lot of attention over the past year. As awareness grows that cooperation is necessary, it dawns on people that there are many and very different stakeholders involved, stakeholders that may never have met before. Let alone have cooperated. An example of an approach is the National Cyber Security Council (NCSC) that was installed in The Netherlands on 30 June. This is a high level council that will give advice to public as well as private entities on how to better secure themselves and society at large against cyber attacks and how to become more resilient. However, without the right approach it is doomed to become a talking shop. more

IPv6 and Airline Tickets… Tales of Two Transitions

The internet bus continues to accelerate straight into the IPv4 address depletion wall with spirited discussions continuing on how to divvy up the remnants of the address space. Obviously all five Regional Internet Registries (RIR's) want to make sure they get their fair share from IANA but what is a fair share remains the subject of interpretation. In the mean time, scenarios of a speculative land rush and auctions of ever smaller address blocks abound with unattractive consequences such as an explosion of the size of the routing table and a stunted growth of the global internet economy... In the meantime, the airline industry completed a rather significant migration of their own... more

Coordinating Attack Response at Internet Scale

How do we help coordinate responses to attacks against Internet infrastructure and users? Internet technology has to scale or it won't survive for long as the network of networks grows ever larger. But it's not just the technology, it's also the people, processes and organisations involved in developing, operating and evolving the Internet that need ways to scale up to the challenges that a growing global network can create. more

U.S. Schools Targeted in Ransomware Attacks: White House Responds

In response to increasing ransomware attacks targeting U.S. educational institutions, the White House convened an inaugural cybersecurity summit this Tuesday. The malicious cyber onslaughts have led to the online leakage of confidential student data, ranging from medical files to reports on sexual assaults. more

Security Firm Recovers Over 272 Million Stolen Credentials from a Collector

The latest discovery came while researchers at a security firm found a young Russian hacker bragging in an online forum that he had collected and was ready to give away a far larger number of stolen credentials that ended up totalling 1.17 billion records, Reuters reports. more

Searching for Truth in DKIM: Part 2 of 5

In part 1, we explained that the DKIM "d=" value identifies the domain name which signed the message, which may be a different domain name from the author of the message. Tying the signing and author domains together will require an additional standard: Author Domain Signing Practices (ADSP). In IETF parlance, the "author domain" is the domain name in the From: header, so ADSP is a way for the author domain to publish a statement specifying whether any other domain name should ever sign a message purporting to be From: that author domain... more

Who Are the True Multi-Stakeholders in ICANN?

During ICANN Durban, I attended the Country Code Names Supporting Organisation (ccNSO) 10 year anniversary celebrations. ICANN Chairman, Dr Steve Crocker, was on hand to congratulate the ccNSO on their 10 years and revered them as the "true multi-stakeholders in ICANN". Post Durban, I was reviewing notes and I came across a similar statement made during a ccNSO session that country code Top-Level Domains (ccTLDs) "represent the best functioning multi-stakeholder model" in the ICANN ecosystem. Is this entirely accurate? more

A Data Dumb Exposes 773 Million Unique Email Addresses, 22 Million Passwords

Close to 773 million unique email addresses and 22 million unique passwords were found to be hosted on cloud service MEGA. more

Should You Whitelist Your Vulnerability Scanning Service Provider?

Unlike consultant-led penetration testing, periodic or continual vulnerability scanning programs have to operate harmoniously with a corporation's perimeter defenses. Firewalls, intrusion prevention systems, web proxies, dynamic malware analysis systems, and even content delivery networks, are deployed to protect against the continuous probes and exploit attempts of remote adversaries -- yet they need to ignore (or at least not escalate) similar probes and tests being launched by the managed security service providers an organization has employed to identify and alert upon any new vulnerabilities within the infrastructure or applications that are to be protected. more

Fixing the Internet Might Break It Worse Than It’s Broken Now

Willis Alan Ramsey, who wrote "Muskrat Love," recorded one and only one studio album. The cognoscenti of country think it's a gem, an all time top ten. There's an apocryphal story that when Ramsey was pushed to make another record he allegedly retorted, "What's wrong with the first one?" We who use the Internet every day risk losing sight of what a miracle it is, and the openness that keeps it so miraculous... We also lose sight of the fact that even as the Internet's miracles occur, it's almost always broken or malfunctioning or threatening or worse in many places along the line. more

The Battle for IoT

There is an interesting battle going on to be the technology that monetizes the control of Internet of Things devices. Like a lot of tech hype, IoT has developed a lot slower than initially predicted -- but it's now finally becoming a big business. I think back to a decade ago when tech prognosticators said we'd soon be living in a virtual cloud of small monitors that would monitor everything in our life. According to those early predictions, our farm fields should already be fully automated, and we should all be living in the smart home envisioned by the Jetsonsmore

What Will ICANN Do with the $135 Million It Just Got for .WEB?

ICANN has just made USD $135 million from an auction completed today (July 29, 2016) to determine who gets to operate .WEB. The auction was part of ICANN's last resort mechanism, when several parties applied for the same suffix but were unable to resolve this contention by themselves. ICANN has just more than doubled its auction proceeds in one go. more

2nd Round gTLDs: the Good, the Bad, and the Ugly

This post outlines the advantages (good) and threats (bad) that can make or break a gTLD, and the eternal fact that some applications will doom themselves to failure (ugly). The Good... Waiting until the second round to apply for a gTLD may end up being a virtue for the following reasons... more