/ Most Viewed

IP Addresses and Privacy Sensitive Data - A Level Playing Field Needed

Reading Peter Olthoorn's book on Google (a link is found here), I ran into a passage on IP addresses. Where Google states that it does not see an IP address as privacy sensitive. An IP address could be used by more than one person, it claims. The Article 29 Working Party, the EU privacy commissioners, states that it is privacy sensitive as a unique identifier of a private person. It got me wondering whether it is this simple. Here is a blog post meant to give some food for thought and debate. I invite you to think about the question 'how private is an IP address'? more

Making Network Neutrality Sustainable, Revisited

Today FCC Chairman Genichowski announced that the FCC's Network Neutrality Proceeding is entering the rule-making stage. This is a historic milestone, worth celebrating, but the milestone is on a road with hairpin turns. If you look directly above us, you can see we're in almost exactly the same place we used to be when the pro-competition provisions of the 1996 Telecom Act were intact and the distinction between telecommunications service and information service was meaningful, but now we are a lot lower. more

Over 190 Internet Engineers, Pioneers, Technologists File Comments with FCC on Net Neutrality

A group of over 190 Internet engineers, pioneers, and technologists today filed joint comments with the Federal Communications Commission (FCC) explaining "Technical Flaws in the FCC's Notice of Proposed Rule-making and the Need for the Light-Touch, Bright-Line Rules from the Open Internet Order." more

Minding the Gap at the ITU-T

In 1992, Theo Irmer who had served as the organization's director for the previous eight years during its glory days, wrote that if there was any hope of saving what was left of the body, it must be privatised. That never occurred. Everyone pretty much left and migrated to dozens of other venues where all the world's information and communication technology standards have long been created and evolved. Essentially every major nation moved to competitive, private, marketplace-driven provisioning of communication products and services. more

Censorship, Email and Politics

Spamfiltering blocks email. This is something we all know and understand. For most people, that is everyone who doesn't manage an email server or work in the delivery field or create spamfilters, filtering is a totally unseen process. The only time the average person notices filters is when they break. The breakage could be blocking mail they shouldn't, or not blocking mail they should. more

New ICANN Requirements for New gTLDs Are Irrelevant

ICANN is barking up a number of wrong trees with the latest version of its Evaluation and Questions Criteria for generic top-level domains (gTLDs). The document asks for financial projections, the applicant's goals for its TLD, and the benefits the applicant expects to derive. All that information is meaningless. more

Highly Sensitive Domain Corp.com Up for Sale by Original Owner, Calls It a ‘Chemical Waste Dump’

Fallen into the wrong hands, corp.com can be an extremely dangerous domain name providing a doorway to hundreds of thousands of corporate PCs. more

Studying .BRAND New gTLDs

Many participants in the latest ICANN meeting in Copenhagen asked that same question: "when is the next round of the ICANN new gTLD program?". If the question came from new gTLD service providers, I also noticed that it was different from "the first round": now the question focuses more on .BRANDs rather than Generic TLDs dedicated to selling domain names. The question also comes more from representatives of certain Trademarks who want to acquire a .BRAND domain name extension. more

Domain Name Resale Market a Haven for Phishers?

In a recent article at TechWeb, the following observations were made: "Internet addresses that appeal to identity thieves eager to rip off consumers are being posted by major domain resellers... Finnish-based F-Secure has identified more than 30 registered domain names for resale that would be of interest only to the legitimate holder of the trademark or to phishers..." more

AT&T CEO Confident Trump-Appointed FCC Will Scrap Net Neutrality Regulations

AT&T's regulatory problems are melting away as the inauguration of President-elect Donald Trump draws near. more

Nominations Open for 2024 Public Interest Registry (PIR) Board of Directors

Are you interested in helping guide the future of the Public Interest Registry (PIR), the non-profit operator of the .ORG, .NGO and .ONG domains? (and more) Or do you know of someone who would be a good candidate? If so, the Internet Society is seeking nominations for two positions on the PIR Board of Directors. The nomination deadline is 31 January 2024. more

A Look at Mail Patterns from Legitimate Webmail Sources

For many years, I have tracked spam from botnets and reported on it. I have analyzed those botnets' distribution patterns by number of IPs, number of messages per email envelope and geographical distribution. While spam from botnets is interesting, and the main source of spam, it is not the only source of spam. What about spam that originates from the MAGY sources? more

Green Dam is Breached… Now What?

As a number of China hands predicted, the Chinese government has postponed its mandate requiring that all computers sold in China must include the Green Dam -Youth Escort censorware by today. Yesterday after the news broke I told the Financial Times: "There's been this impression in the internet industry that when the Chinese government makes a demand, they have to roll over and play dead. The lesson here is that's not necessarily the case." more

ICANN Issues a Statement on the Spamhaus Case

ICANN issued a statement on the Spamhaus case: "...ICANN is not a party to this action and no order has been issued in this matter requiring any action by ICANN. Additionally, ICANN cannot comply with any order requiring it to suspend Spamhaus.org..." more

How Frequently Do Botnets Reuse IP Addresses?

I wonder how much botnets reuse IP addresses. Do they infect a system and spam, get blocked, discard the IP and move onto the next (new) one? This means that they have a nearly unlimited supply of IP addresses. Or do they infect a system and spam, get blocked, and then let it go dormant only to awaken it some time later? I decided to take a look. more