/ Most Viewed

A Financial Back-Up to Win .WINE?

Still want to protect wine Geographical Indications (GIs)? A hot potato! Where the bucket ends is still to be found and the launching of both .WINE and .VIN new gTLDs is still an issue. At least some of the three applicants are following the ICANN new gTLD applicant guidebook, working with parties interested in bringing better protection mechanism to protect wine GIs. There seems to have been an attempt which has not worked... more

Is 5G Faster than 4G?

Ookla recently tackled this question in one of its research articles. Ookla compared the time it takes to load pages for Facebook, Google, and YouTube on cellphones using 4G LTE networks versus 5G networks. Ookla thinks that page load speed is a great way to measure cellphone experience. The time needed to load a web page is directly impacted by latency, which measures the lag between the time a phone requests a website and that website responds. more

Measuring Canada’s Internet Performance One Test at a Time

As the head of the registry for the .CA top-level domain, I can tell you that few things get Canadians riled up as much as the performance of their Internet service. Their concerns aren't entirely unfounded -- according to OECD data, Canada's ranking for broadband speed and price relative to its OECD counterparts has been on a downward trend over the past dozen years. And for those of us who travel overseas, especially to countries with advanced Internet infrastructure like South Korea and Sweden, we've experienced firsthand just how green the grass is on the other side of the fence. more

If Compliance Were an Olympic Sport

It probably won't raise any eyebrows to know that for practically every penetration tester, security researcher, or would-be hacker I know, nothing is more likely to make their eyes glaze over and send them to sleep faster than a discussion on Governance, Risk, and Compliance (i.e. GRC); yet the dreaded "C-word" (Compliance) is a core tenet of modern enterprise security practice. more

Feds Confirm Cyberattack Caused Nation’s Critical Suicide Helpline Outage

Federal officials have confirmed that a cyberattack caused a nearly day-long outage of the United States's 988 mental health helpline on December 1st, 2020. The Substance Abuse and Mental Health Services Administration (SAMHSA) revealed that the attack occurred on the network of Intrado, the company that provides telecommunications services for the helpline.  more

Must IETF, ICANN Stop Meeting in the U.S.?

With Trump's "extreme vetting" extending to Pakistan and others, nearly all U.S. institutions with a global reach will be cut off from some members. Internet Society Board Member Walid Al-Saqaf, from Yemen, can't attend the IETF meeting next month in Chicago. Board Member Alice Munyua from Kenya may also have to skip the event. "There is a high threat from terrorism in Kenya," the British government reports. Kenyans likely will require extreme vetting. ICANN board member Kaveh Ranjbar, born in Iran, has also been appointed to the IETF Administrative Oversight Committee. more

An Alternative to CCWG Overreach

ICANN is in the midst (I wouldn't yet say the middle) of its transition from oversight by the US Department of Commerce to oversight by something else. A Cross Community Working Group (CCWG) on Accountability delivered a long report in August that proposes a new oversight structure for ICANN. But it has the practical problem that the ICANN board really, really hates it. Having looked at it, I can't entirely blame them. more

Domain Registrar Hide and Seek

In the past year ICANN has been putting a lot more effort into its compliance activities, which is a good thing, since the previous level was, ah, exiguous. That's the good news. The bad news is that while they're paying more attention to misbehaving registrants, the registrars, gatekeepers to the world of domains, have serious issues that ICANN has yet to address. more

IPv6 Medics Without Borders

At its November 5th plenary, the Canadian ICT Standards Advisory Committee approved the recommendations of the Canadian IPv6 Task Group set up by isacc in april. The 50 members of the Task Group were invited to individually produce a list of seven recommendations. Received inputs were collated, debated, ranked and ultimately distilled down to a pair of quite straightforward recommendations for immediate action. more

Asia and Africa Top Mobile Web Usage

Highest share of mobile web usage isn't in the most developed nations, but rather in the developing nations of the world, based on StatCounter's October 2010 data. "The reason these countries have such high mobile web usage compared to desktop web usage (for lack of a better name) is very much a result of economics," says RoyalPingdom. "A relatively cheap mobile phone (most often from Nokia, as we have seen) will then be a much more realistic option, and it therefore becomes the way to reach the Web for many. " more

Keys Under the Doormat

To those of us who have worked on crypto policy, the 1990s have become known as the Crypto Wars. The US government tried hard to control civilian use of cryptography. They tried to discourage academic research, restricted exports of cryptographic software, and -- most memorably -- pushed something called "escrowed encryption", a scheme wherein the government would have access to the short-term keys used to encrypt communications or stored files. more

Data, DNS Abuse and What to Do Next

To the annoyance of some, surely, the issue of abuse in the domain name system (DNS) has been high on the list of critical issues in internet governance circles. Personally, in my more than 20 years of internet governance experience, tackling DNS abuse is one of the more important issues I've participated in and seen debated. Despite this intense scrutiny, common-sense solutions (such as contract improvements) have been so far elusive, even as they fall squarely within its ICANN's remit. more

The East Asia Telecommunication Union

That's what Europeans are now calling the venerable old International Telecommunication Union -- EATU for short. In fact, based on current metrics, this transformation is exactly what has occurred. The shift began occurring almost a decade ago, and has dramatically accelerated in recent years. At the ITU-T's key Study Group 17 meeting on security now underway, fully 90% of the input contributions and more than half of those participating are from only three countries -- China, Japan, and Korea. Indeed, there has long been a semi-formal organization known as CJK that has been manifested here. more

Debugging Legislation: PROTECT IP

There's more than a hint of theatrics in the draft PROTECT IP bill that has emerged as son-of-COICA, starting with the ungainly acronym of a name. Given its roots in the entertainment industry, that low drama comes as no surprise. Each section name is worse than the last: "Eliminating the Financial Incentive to Steal Intellectual Property Online" (Sec. 4) gives way to "Voluntary action for Taking Action Against Websites Stealing American Intellectual Property". more

Update on AS Path Lengths Over Time - How Interconnected is the Internet?

With the number of ASes connected to the Internet constantly increasing, one could expect that the length of the AS paths would also increase as the network as a whole gets wider. However, this doesn't seem to be the case. Also, with IPv6 being more widely deployed, how does the interconnectedness of the IPv6 portion of the Internet compare to IPv4? more