/ Most Viewed

Two Romanians Charged for Hacking Washington DC Police Computers Linked to Surveillance Cameras

US prosecutors have charged two Romanians with hacking Washington DC police computers linked to surveillance cameras just days before President Donald Trump's inauguration. more

What Does Trump’s Cuba Policy Memorandum Say About the Internet?

I recently reviewed Trump's Cuban policy speech and its implications for the Internet. The speech was accompanied by a national security memorandum on strengthening US-Cuba policy, which was sent to the Vice President, Cabinet Secretaries, and heads of various departments. The first thing that struck me about the memorandum was that it was a "national security" memorandum. Does Trump think Cuba poses a threat to our national security? more

What Your ISP (Probably) Knows About You

Earlier this week, I came across a working paper from Professor Peter Swire - a highly respected attorney, professor, and policy expert. Swire's paper, entitled "Online Privacy and ISPs", argues that ISPs have limited capability to monitor users' online activity. The paper argues that ISPs have limited visibility into users' online activity for three reasons: (1) users are increasingly using many devices and connections, so any single ISP is the conduit of only a fraction of a typical user's activity; (2) end-to-end encryption is becoming more pervasive, which limits ISPs' ability to glean information about user activity; and (3) users are increasingly shifting to VPNs to send traffic. more

ICANN To Publish New gTLD Applicants On April 30th

In a recent press release ICANN has stated that they will publish the list of applicants for new generic Top-Level Domains (gTLDs) on April 30th. Previously many had spoken of a "big reveal" on May 1st, though that would have coincided with a public holiday in many countries and might have been "missed". However ICANN CEO, Rod Beckstrom, claims that the organisation had always planned to publish the list two weeks after the application window closed. more

From “Network Neutrality” to “Sender Pays”, the Principles Remain Much the Same

The entire set of issues of network neutrality, interconnection and settlements, termination monopolies, cost allocation and infrastructure investment economics is back with us again. This time it's not under the banner of "Network Neutrality" but under a more directly confronting title of "Sender Pays." The principle is much the same: network providers want to charge both their customers and the content providers to carry content to users. more

Death of the PKI Dragons?

The recent attack on the Comodo Certification Authority has not only shown how vulnerable the current public key infrastructure is, but also that the protocols (e.g., OSCP) used to mitigate these vulnerabilities once exploited, are not in use, not implemented correctly or not even implemented at all. Is this the beginning of the death of the PKI dragons and what alternatives do we have? more

Capping Broadband Internet by Design

FIOS by Verizon, is a bundled Internet access, telephone, and television service that operates over a fiber-optic communications network with over 5 million customers in nine U.S. states -- providing Fiber to the Home (FTTH). One of the first service areas was a Northern Virginia community known as Ashburn -- which is also is the cloud data center capital of the world. It literally sits on top of the most massive mesh of high bandwidth, low latency fiber in existence. more

SIP Revolution, Massively Delayed - But There’s Hope

The SIP Center asked for an article which I finally wrote the weekend before last. My article was actually rather negative, but they published it anyway. Now I'm feeling a little guilty as there is an optimistic note I could have used as my conclusion. So let me try again... First let me summarize my problem. When SIP emerged in 1996, it's support for direct connections from one user to another was extremely compelling. This was the VoIP protocol which would lead to a complete revolution in communications... more

WSIS+20 and the Youth Dilemma: Rethinking Participation in Global Internet Governance

On Wednesday, 9 July, I attended the WSIS+20 HLE Overall Review multistakeholder consultation with co-facilitators H.E. Mr Ekitela Locale from the Republic of Kenya, and H.E. Ms Suela Janina from the Republic of Albania with my UNU-CRIS hat and had the opportunity to talk with them together with my fellow youth IGF colleagues Dana Cramer and Jasmine Ko. We discussed youth participation in Internet governance, and I raised my concerns about the future of youth IGFs. more

Protecting an Enterprise from Cyber Catastrophe

We are suffering an epidemic of cyberattacks while in a viral pandemic. This post is for those who have responsibility for assuring that the IT-based services offered by their enterprise can quickly recover in the case of successful cyber-attack or other disaster. University of Vermont Medical Center (UVMMC) is an excellent hospital. I owe my life to treatment there and am grateful for both the skill and the kindness of UVMMC staff. They have been devastated by a cyber-attack. more

Another Letter Filed Against .sucks TLD for Extortion

Kevin Murphy reporting in DomainIncite: "ICANN's Business Constituency wants US and Canadian regulators to intervene to prevent Vox Populi Registry, which runs .sucks, 'extorting' businesses with its high sunrise fees. The BC wrote to ICANN, the US Federal Trade Commission and the Canadian Office for Consumer Affairs on Friday, saying .sucks has employed 'exploitive [sic] pricing and unfair marketing practices'." more

How Not to Stop Spammers

Spam Arrest is a company that sells an anti-spam service. They attempted to sue some spammers and, as has been widely reported, lost badly. This case emphasizes three points that litigious antispammers seem not to grasp: Under CAN SPAM, a lot of spam is legal; Judges hate plaintiffs who try to be too clever, and hate sloppy preparation even more; Never, ever, file a spam suit in Seattle. more

Cybercrime and “Remote Search”

According to news reports, part of the EU's cybercrime strategy is "remote search" of suspects' computers. I'm not 100% certain what that means, but likely guesses are alarming. The most obvious interpretation is also the most alarming: that some police officer will have the right and the ability to peruse people's computers from his or her desktop. How, precisely, is this to be done? Will Microsoft and Apple – and Ubuntu and Red Hat and all the BSDs and everyone else who ships systems – have to build back doors into all operating systems? more

A Logical Place to Start the IPv6 Transition

The transition to IPv6 is top of mind for most service providers. Even in places where there are still IPv4 addresses to be had surveys we've run suggest v6 is solidly on the priority list. That's not to say everyone has the same strategy. Depending where you are in the world transition options are different -- in places such as APAC where exhaustion is at hand one of the many NAT alternatives will likely be deployed since getting a significant allocation of addresses is not going to happen and other alternatives for obtaining addresses will prove expensive. more

Mobile Trumps Fixed Broadband

"80% of Web users will choose mobile broadband over fixed by 2013" is the headline of a Total Telecom interview with John Cunliffe of Ericsson. I agree with the conclusion although I think Ericsson will be unpleasantly surprised to find that LTE is NOT the technology which leads to this revolution. Mobile access at speeds at least equal to what cable offers and at a price lower than today's cable broadband will be available both in the home and on the road within a year or two at the most. more