The i2Coalition has unveiled a new report and website, DNS at Risk, spotlighting the growing misuse of Internet infrastructure by governments to control online content. Released on June 3rd, the initiative documents how states are increasingly deploying DNS resolvers and IP filtering—originally neutral systems—as tools of censorship and enforcement. more
Trust is such a difficult concept in any context, and certainly, computer networks are no exception. How can you be assured that your network infrastructure is running on authentic platforms, both hardware and software and its operation has not been compromised in any way? more
I believe Mobile Information and Communications Technologies (ICTs) are and very well remain powerful and best-suited technologies that will help provide connectivity and digital access in a much faster and cheaper way for developing countries of the globe. Thus, they are to be leveraged within their most strategic and profitable functional or usage contexts. Mobile access technologies along with relevant innovations have formed a powerful springboard for the Internet to be significantly accelerated in terms of access, usage and penetration. more
Images of clouds have been used when discussing networks for quite some time. When traditional telecoms companies were selling point-to-point circuits a drawing of a cloud was sometimes used. The cloud symbol helped indicate the provider?s domain of responsibility, effectively hid the internal complexity of the network and focused on the end user. This was all fine when the product offered was an end-to-end circuit. more
We’ve noted in previous CSC studies that phishing continues to be an extremely popular threat vector with bad actors and shows no signs of subsiding in part, because of the COVID–19 pandemic and the rise in popularity of remote working. Indeed, the most recent figures from the Anti-Phishing Working Group (APWG) show that the numbers of phishing attacks are higher than ever before, with the quarterly total of identified unique phishing attacks exceeding 1 million for the first time in Q1 2022, and over 600 distinct brands attacked each month. more
Washington may be the first state to approve a net neutrality law that applies to all wired and wireless Internet providers in the state. more
At the recent Anti-Phishing Working Group meeting in San Francisco, Rod Rasmussen and I published our latest APWG Global Phishing Survey. Phishing is a distinct kind of e-crime, one that's possible to measure and analyze in depth. Our report is a look at how criminals act and react, and what the implications are for the domain name industry. more
Registrars who support .com domain names will use the Extensible Provisioning Protocol (EPP) system by October 28. ...There will be an additional step when trying to transfer a .com domain name among registrars. Specifically, a piece of information called an EPP code (aka auth code, EPP key, transfer secret) must be obtained from the current registrar and submitted to the gaining one prior to approving with the latter. more
The New Jersey Supreme Court has issued an important decision on Internet users' right to privacy. The case involves a dispute about whether an ISP violated a user's privacy rights by turning over subscriber information (name, address, billing details) associated with a particular IP address. It ends up that the subpoena served on the ISP was invalid for a variety of reasons. As the user had a 'reasonable expectation of privacy' in her Internet activities and identifying information, and because the subpoena served on the ISP was invalid, the New Jersey court determined that the ISP should not have turned over the personal data... more
Last week, I commented on the the Gmail/Hotmail/Yahoo username and password leak. The question we now ask is whether or not we are seeing an increased amount of spam from those services. On another blog, they were commenting that various experts were claiming that this is the case. more
Anyone who reads the papers sees stories -- or hype -- about cyberwarfare. Can it happen? Has it already happened, in Estonia or Georgia? There has even been a Rand Corporation study on cyberwarfare and cyberdeterrence. I wonder, though, if real cyberwarfare might be more subtle -- perhaps a "cyber cold war"? more
I've been having arguments about Network Neutrality with a lawyer. My position is that you can't adequately regulate ISPs to be neutral, because there's no agreement what "neutral" means in practice. He points out that the courts aren't interested in technical details like what packets are dropped, it's that all traffic has to be treated the same, and ISPs should just figure out how to do that. So I contemplated a city with Plumbing Neutrality with the simple rule that all people must be treated the same... more
The ICANN meeting in Nairobi starts officially next Monday. However, as is normally the case, by the time Monday rolls around people will already have been working since Saturday morning (if not earlier). All ICANN meetings seem to be surrounded by some bit of controversy and excitement, but the Nairobi meeting is possibly more dramatic than many others. The last attempt to hold a meeting in Nairobi failed, with ICANN opting to hold the meeting near LA's airport, LAX, instead. more
It makes the strategist in my heart sing when I see that most of the new gTLDs labeled generic are in fact words that speak to a specific niche. Most are even so specific that the average person, a friend sitting next to you at a dinner party, your parents, can understand how a space online dedicated to that word might be a reasonable option for that audience and the names they chose online. And then inevitably you are forced to trot along the path of 'what about .com??!' with said dinner party guest. more
Leaders of organizations responsible for coordination of the Internet technical infrastructure globally have met in Montevideo, Uruguay, to consider current issues affecting the future of the Internet. more