Some members of Congress have gotten extremely upset about peer-to-peer filesharing. Even the New York Times has editorialized about the issue. The problem of files leaking out is a real one, but the bills are misguided. Fundamentally, the real issue is that files are being shared without the user intending that result... more
Of all the candidates for the Democratic nomination, Howard Dean raised the most amount of money over the Internet. On March 15th, the Dean campaign launched the first official weblog in presidential campaign history, six days after Dean himself first stumped in the blogosphere. What follows are Dean's principles for Internet Policy.
This nation -- and not just this nation -- needs to have an honest conversation about what's real, possible and desirable when it comes to the gift of the Internet. Conversations need shared ground. Here are the beliefs we think should guide the development of a fact-based federal policy. We put these forward as part of a continuing Great American Conversation. more
"Judge Percy Anderson of the U.S. District Court, Central District of California has granted ICANN's motion to dismiss in a lawsuit brought by a subsidiary of new TLD company Donuts," reports Andrew Allemann in Domain Name Wire. more
In a statement released today, Electronic Frontier Foundation (EFF) has criticized ICANN for not being proactive on privacy matters, saying the organization "can't seem to wrap its head around" the issue. more
When I was in the military, we were constantly drilled about the problem of Essential Elements of Friendly Information, or EEFIs. What are EEFis? If an adversary can cast a wide net of surveillance, they can often find multiple clues about what you are planning to do or who is making which decisions. For instance, if several people married to military members all make plans to be without their spouses for a long period of time, the adversary can be certain that a unit is about to be deployed. more
February 2002 was a seminal month in the evolution of the ICANN At-Large movement. We began hearing reports from our European members that ICANN's chief lawyer, Joe Sims, was in Brussels, Belgium, holding closed-door meetings with European Commission members to gauge their reaction to plans that completely restructure the ICANN board, replacing the At-Large with a body of government representatives! The rumors were confirmed days later when ICANN President M. Stuart Lynn posted his "ICANN - The Case for Reform". more
The browser is now a full fledged platform for apps. The major benefits of using the browser as a platform includes ease of universal deployment and avoiding concepts such as having to install software. It's also a very flexible and powerful environment. Increasingly consumer electronics "devices" are software applications... Today's PWAs (Progressive Web Apps) go further. They take advantage of HTML5 and also capabilities of the JavaScript environment. more
As the last strike of the clock signals the end of 30 May 2012 there will be quiet relief from the back offices and consultants of most top-level domain name (TLD) applicants. And finally after the drama of the TAS system gremlins we have closure. Still there may yet be squeals of anguish as someone, somewhere got it wrong. A glitch in the applicant's computer, a lost bank transfer, a last minute switch of provider: all may be reasons for failure. ...as the quip attributed to Gore Vidal so aptly put it, "It's not enough to succeed. Others must fail." So lets discuss some additional points of failure. more
Recent events have shown the threat of domain hijacking is very real; however, it is also largely preventable. As Verisign previously noted, there are many security controls that registrants can utilize to help strengthen their security posture. Verisign would like to reiterate this advice within the context of the recent domain hijacking reports. Domains are an important element of internet infrastructure; their functionality and security rely upon many factors such as their delegated name servers. more
Schneier's insight is considered particularly important according to EFF, as more and more is learnt "about the unconstitutional surveillance programs from the National Security Agency and the depth and breadth of data the NSA is collecting on the public." more
Existing laws can address AI challenges without new regulations. Legal frameworks have adapted to past technologies, and AI should be no exception. The real issue lies in outdated legal immunities, like Section 230, shielding tech companies from AI-driven harms. Accountability should focus on those who create and benefit from AI, not AI itself. more
About a year ago after coming back from Estonia, I promised I'd send in an account of the Estonian "war". A few months ago I wrote an article for the Georgetown Journal of International Affairs, covering the story of what happened there. This is the "war" that made politicians aware of cyber security and entire countries scared, NATO to "respond" and the US to send in "help". It deserved a better understanding for that alone, whatever actually happened there. more
Someone asked me a question today about Google's new partnership with Sprint. Sprint/Nextel is the third largest wireless carrier in the U.S., falling far behind Verizon and AT&T -- who together control 51% of the wireless market. (Sprint services are also resold by Comcast and Time Warner as part of their packages.) Sprint has announced it won't bid in the 700 MHz auction. Sprint has other plans... more
After decades of talk, the time for IPv6 has finally arrived. There are several transition options available, but whatever approach you choose, the challenge will be to make sure that your subscribers don't experience a reduction in quality of service. IPv4 is likely to co-exist with IPv6 for some time, so a native dual-stack migration strategy will be the best transition option for most providers... With dual-stack mode, there is no disruption to the service if a client requests an IPv4 address. more
Today, we are in a way naturally connected to automation and robotics. In the industrial revolution, people realized that many tasks could be performed better and more efficiently by a machine. The rise of our dependence on technology has greatly risen since then, and thanks to scientific and technological advancements, we are on the breach of a new era. more